09
Security software; computer software for tracking and
managing information for use in the field of information
technology asset and lifecycle management and power
management; computer software for tracking and managing
information for use in the field of information technology
services management; computer software for tracking and
managing information for use in the field of information
technology asset management for computers and mobile
devices; computer software that generates security access
codes for accessing self-encrypting drives; computer
software pre-loaded into computers and personal mobile
devices for the protection of data by activating automatic
enforcement of data protection policies and procedures;
computer software for use in security applications, namely,
loss control protection, anti-theft protection, anti-virus
protection, intrusion detection, firewall and prevention of
computer applications from performing potentially damaging
operations, asset management, namely, asset auto-discovery,
asset distribution, protection of data, namely, remotely
activating automatic geolocation, locking of devices, data
encryption and remote deletion of data, through personal
computing devices such as laptop personal computers,
personal digital assistants, mobile phones and other
computing devices; security software and equipment, namely,
pre-recorded disks featuring computer security software and
erasable programmable read only memories (eproms) for
security systems for computers, computer tablets, personal
digital assistants, mobile phones and other computing
devices; and instruction manuals sold together as a unit
therewith
42
Installation, implementation and ongoing support and
maintenance of computer security software; maintenance of
computer software relating to computer security and
prevention of computer risks; installation, implementation
and ongoing support and maintenance of computer software for
use in the field of generation of security access codes for
accessing self-encrypting drives; installation,
implementation and ongoing support and maintenance of
computer software for computers, computer tablets, personal
digital assistants, mobile phones and other computing
devices for the protection of data by remotely activating
automatic geolocation, locking of devices, data encryption
and remote deletion of data; installation, implementation
and ongoing support and maintenance of computer software
pre-loaded into personal mobile devices for the protection
of data by activating automatic enforcement of data
protection policies and procedures; installation,
implementation and ongoing support and maintenance of
computer software for use in the field of information
technology for mobile devices, namely, computer software for
tracking and managing information on mobile devices, user,
installation and system configuration and installation and
deployment of computer software and software upgrades for
mobile devices by local or remote means; automatic back-up
of information on personal computers; installation, removal
and updating of computer software on a personal computer
45
Investigation, surveillance and security services for
monitoring and tracking computers, computer tablets,
personal digital assistants, mobile phones and other
computing devices and for locating lost or stolen computers,
computer tablets, personal digital assistants, mobile phones
and other computing devices, namely, monitoring services
wherein telecommunications equipment is maintained to
receive telephone signals originating with computers,
computer tablets, personal digital assistants, mobile phones
and other computing devices programmed with software
designed to contact the monitoring service centre on a
regular basis or in the event of theft or loss of the
computers, computer tablets, personal digital assistants,
mobile phones and other computing devices; computer assisted
investigation, surveillance and security services, namely,
monitoring and tracking of location of personal computers;
monitoring and tracking information, data and status of
software; validation of identity of end users of personal
computers; security services relating to the automatic
deletion of files on personal computers and notification of
law enforcement if personal computers are lost or stolen
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen