09
Software in the field of telecommunications; software in the
field of data security for secure network access, data and
software security, encryption, content compliance and
governance; software for compliance management and risk
analysis in the fields of computer and network security;
software for electronic fraud and identity theft protection
37
Installation, maintenance and repair of telecommunications
equipment and networks, computer hardware, systems and
networks and electronic equipment; installation, maintenance
and repair of electrical and mechanical infrastructure at
data centers
38
Telecommunications services, namely, transmission of voice,
audio, visual images and data by telecommunications
networks, wireless communication networks, the Internet,
information services networks and data networks;
telecommunications services, namely, providing network
access points (NAPs); providing multiple-user access to a
global computer network; providing telecommunications
connections to a global computer network for telecom
hoteling; consultation in the field of telecommunications;
telecommunications gateway services; telecommunications
routing and junction services; providing co-location
services for voice, video and data communications
applications on internal, extranet and global computer
network servers, for others; leasing telecommunications
equipment, components, systems and supplies; providing
technical support services regarding the usage of
telecommunications equipment; consulting services in the
field of telecommunications; providing a website featuring
information in the field of telecommunications products and
services
39
Storage of computer and telecommunications equipment for
others
42
Leasing and rental of computing capacity, namely, computer
software, computer hardware and computer networking
equipment; evaluation of computer systems, namely, analysis
of internal computer systems, extranet computer systems and
global computer network systems, for others; implementing
computer software for others; designing, developing,
implementing and monitoring computer networks and computer
systems for others; computer and network monitoring
services, namely, performance reporting, load balancing, and
computer network security services; managed services,
namely, hosting the digital content and web sites of others
on a global computer network; providing non-downloadable
software for accessing and using a cloud computing network;
software as a service (SaaS), namely, providing hosted
software applications for others for use in information
technology (IT) systems and information security management;
application service provider (ASP) services, namely, hosting
computer software applications of others; consulting
services in the field of software as a service (SaaS);
infrastructure as a service (IaaS), namely, providing
remotely accessible server computing; providing a virtual
computing environment accessible via the internet and other
computer networks; providing virtual computer systems and
virtual computer environments via cloud computing; leasing
of computer servers; technical management of virtual
infrastructure and computer networking; technical consulting
services in the fields of datacenter architecture, public
and private cloud computing solutions, and evaluation and
implementation of internet technology and internet services;
remote administration and management of in-house and hosted
datacenter devices, databases and software applications for
others; computer co-location services, namely, providing
facilities for the location of computer servers with the
equipment of others; providing secure,
environmentally-controlled, facilities and technical
monitoring for the computer servers and telecommunication
and network equipment of others; computer disaster planning
and recovery; design of premises- based, cloud-based and
hybrid unified communications systems; providing temporary
use of on-line non-downloadable computer software for
compliance management and risk analysis in the fields of
computer and network security; providing temporary use of on
downloadable network security software; providing temporary
use of downloadable identity verification software;
providing temporary use of non-downloadable network auditing
software in the fields of secure communications and data
networks; computer consultation and providing information in
the field of Internet and network security and secure
transmission of data and information; providing a website
featuring information in the field of computer systems,
cloud computing and virtual computing infrastructure;
electronic storage and archiving of data for others; storage
of computer and telecommunications equipment for others;
providing remote cloud- based server storage to others; data
center services, namely, centralized storage of electronic
data for others; technical consulting services in the field
of electronic storage and archiving of data for others;
infrastructure as a service (IaaS), namely, providing
remotely accessible storage capacity; technical management
of virtual infrastructure storage services; storage services
for archiving of electronic data; providing a website
featuring information in the field of data storage products
and services and data center services; monitoring of
computers, websites, computer networks and communications
network systems for security purposes; computer networks and
communications network security services in the nature of
intrusion protection, security threat analysis, managed
security services, vulnerability management and assessment,
threat analysis, incident response and forensics and
penetration testing; providing user authentication services
for security purposes to others in the field of voice and
data communication services via computer network; computer
security services in the nature of the issuance and
management of digital certificates and other security
credentials for others; identity as a service (IdaaS),
namely, providing cloud-based computer network
identification verification, authentication and management
services for security purposes; secure hosted management,
storage and administration of passwords, credentials and
identity information relating to persons, accounts and
devices for security purposes; fraud prevention and
detection access authorization system for verifying a user's
true identity for all purposes, both on-line and on-site,
featuring control of access to information, medical records,
computer systems, websites, online services and e-commerce
and financial transactions (terms considered too vague by
the International Bureau - rule 13 (2) (b) of the Common
Regulations); consulting services in the field of computer
security and communications network security; providing a
website featuring information in the field of Internet,
network, computer and data security, fraud and identity
theft protection
45
Fraud prevention and detection access authorization system
for verifying a user's true identity for all purposes
on-site, featuring control of access to information, medical
records, computer systems, websites, online services and
e-commerce and financial transactions (terms considered too
vague by the International Bureau - rule 13 (2) (b) of the
Common Regulations); providing information in the field of
fraud and identity theft protection, via a website
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen