CODE42

WIPO WIPO 2022

Protect this trademark from copycats!

With our trademark monitoring alerts, you are automatically notified by email about copycats and free riders.

The International trademark CODE42 was filed as Word mark on 07/27/2022 at the World Intellectual Property Organization.

Trademark Details Last update: August 7, 2023

Trademark form Word mark
File reference 1692897
Countries Australia Canada China European Community United Kingdom India Japan South Korea Mexico
Base trademark US No. 97263815, February 11, 2022
Application date July 27, 2022
Expiration date July 27, 2032

Trademark owner

Suite 2000,
100 Washington Avenue South
US

Trademark representatives

1560 Broadway, Suite 1200 Denver CO 80202 US

goods and services

09 Computer application software for electronic devices, mobile phones, and handheld computers, namely, software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device, and cloud application content; downloadable computer software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; downloadable computer software for encryption; downloadable computer software for litigation hold and electronic discovery; downloadable computer software for monitoring properties of files; downloadable computer software for analyzing file properties and determining if file properties have changed; downloadable computer software for creating reports regarding properties of files and changes in the properties of files; downloadable computer software for identifying when files have been moved to removable media or cloud applications; downloadable computer software for creating audit trails relating to file properties; downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; downloadable computer software for tracking and identifying unusual activity relating digital content and files; downloadable computer software for analyzing file properties and generating file property reports; downloadable computer software for tracking, identifying, searching, and reporting on file activity data; downloadable computer software for tracking activity across computers, email and the cloud; downloadable software for use in connection with data security, computer security, cybersecurity, software threats, and prevention of computer risks
41 Educational services, namely, conducting courses, workshops, trainings and seminars in the fields of technology, computer software, computer systems, computer facilities and networks, data storage, data security, computer security, and information security and distribution of course and educational materials in connection therewith; publication of on-line diaries (blogs) on the Internet and providing non-downloadable publications in the nature of articles in the fields of technology, computer software, computer systems, computer facilities and networks, data storage, data security, computer security, and information security via a website; training services in the fields of information risk management and computer data security
42 File protection services, namely, back-up services for computer hard drive and cloud data; data warehousing; remote computer backup services; remote online backup of computer and cloud data; software as a service (saas) services featuring software for aggregating, storing, managing, editing, backing up, securing, protecting and managing data and computer, electronic device and cloud application content; providing temporary use of non-downloadable cloud-based software for monitoring files and properties of files; providing temporary use of non-downloadable cloud-based software for analyzing file properties and determining if file properties have changed; providing temporary use of non-downloadable cloud-based software for creating reports regarding properties of files and changes in the properties of files; data encryption services, data encryption and decoding services; computer services, namely, encrypted data recovery and data security services; providing temporary use of non-downloadable computer software for litigation hold and electronic discovery; cross-platform conversion of digital content into other forms of digital content; providing temporary use of non-downloadable computer software for identifying when files have been moved to removable media or cloud-based applications or storage; providing temporary use of non-downloadable computer software for creating audit trails relating to file properties; providing temporary use of non-downloadable computer software for generating reports regarding ownership history of files, movement history of files, and content history of files; providing temporary use of non-downloadable computer software for tracking and identifying unusual activity relating digital content and files; providing temporary use of non-downloadable computer software for analyzing file properties and generating file property reports; providing temporary use of non-downloadable computer software for tracking, identifying, searching, and reporting on file activity data; software as a service (saas) services featuring software for data security and for assistance and support in the prevention of unauthorized network data exfiltration on computers, computer systems, computer networks and digital devices; software as a service (saas) services featuring software for computer system, corporate cloud and email risk detection; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of internet technology and services; consulting services in the fields of information risk management and computer data security; technical consulting services related to designing, developing, customizing, configuring, deploying, analyzing, and managing of data security systems for others; computer security consultancy in the field of insider threat management, in the nature of insider risk monitoring and reduction; computer security consultancy in the nature of advanced cybersecurity services featuring the application and implementation of techniques, tools and expertise to detect, investigate and remediate advanced persistent threats and insider threats and include offensive cyber capabilities

Trademark history

Date Document number Area Entry
August 3, 2023 2023/31 Gaz JP Rejection
April 10, 2023 2023/15 Gaz CN Rejection
April 10, 2023 2023/15 Gaz GB Rejection
March 22, 2023 2023/12 Gaz EM Rejection
January 17, 2023 2023/3 Gaz AU Rejection
December 19, 2022 2022/51 Gaz IN Rejection
July 27, 2022 2022/42 Gaz US Registration

ID: 141692897