09
Utility, security and cryptography software; software for
network and device security; software development tools;
security software; network access server hardware;
downloadable mobile applications for the management of
information; internet access software; downloadable computer
software for the management of information; computer
software for biometric systems for the identification and
authentication of persons
42
Updating of computer software relating to computer security
and prevention of computer risks; software development,
programming and implementation; software design and
development; rental of internet security programs; provision
of security services for computer networks, computer access
and computerised transactions; provision of computer
security risk management programs; providing information in
the field of information technology; it security, protection
and restoration; providing information in the field of
computer software design; programming of internet security
programs; monitoring of computer systems for security
purposes; maintenance of computer software relating to
computer security and prevention of computer risks; it
consultancy, advisory and information services; internet
security consultancy; digital asset management; electronic
monitoring of personally identifying information to detect
identity theft via the internet; development of software for
secure network operations; design and development of virtual
private network (vpn) operating software; development of
computer hardware and software; design and development of
internet security programs; design and development of
electronic data security systems; data security services;
consultancy services for analysing information systems;
consultancy in the field of security software; consultancy
in the field of data security; consultancy and information
services relating to information technology architecture and
infrastructure; consultancy in the field of computer
security; consultancy and information services relating to
computer system integration; computer security threat
analysis for protecting data; computer security services in
the nature of administering digital certificates; computer
programming services for electronic data security; computer
and information technology consultancy services;
authentication services for computer security; advisory
services relating to computer based information systems
45
Consultancy in the field of data theft and identity theft;
identity validation services