Legal Representation
Attorney
Nathan C. Belzer
USPTO Deadlines
Application History
18 eventsDate | Code | Type | Description | Documents |
---|---|---|---|---|
Nov 19, 2024 | MAB2 | E | ABANDONMENT NOTICE E-MAILED - FAILURE TO RESPOND | Loading... |
Nov 19, 2024 | ABN2 | O | ABANDONMENT - FAILURE TO RESPOND OR LATE RESPONSE | Loading... |
Apr 19, 2024 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
Apr 19, 2024 | GNRT | O | NON-FINAL ACTION E-MAILED | Loading... |
Apr 19, 2024 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
Apr 4, 2024 | TEME | I | TEAS/EMAIL CORRESPONDENCE ENTERED | Loading... |
Apr 4, 2024 | CRFA | I | CORRESPONDENCE RECEIVED IN LAW OFFICE | Loading... |
Apr 4, 2024 | ALIE | A | ASSIGNED TO LIE | Loading... |
Nov 13, 2023 | TROA | I | TEAS RESPONSE TO OFFICE ACTION RECEIVED | Loading... |
Aug 9, 2023 | XELG | O | APPLICATION EXTENSION GRANTED/RECEIPT PROVIDED | Loading... |
Aug 9, 2023 | XELR | I | APPLICATION EXTENSION TO RESPONSE PERIOD - RECEIVED | Loading... |
May 11, 2023 | GNRN | O | NOTIFICATION OF NON-FINAL ACTION E-MAILED | Loading... |
May 11, 2023 | GNRT | F | NON-FINAL ACTION E-MAILED | Loading... |
May 11, 2023 | CNRT | R | NON-FINAL ACTION WRITTEN | Loading... |
May 1, 2023 | DOCK | D | ASSIGNED TO EXAMINER | Loading... |
Dec 16, 2022 | MDSC | E | NOTICE OF DESIGN SEARCH CODE E-MAILED | Loading... |
Dec 15, 2022 | NWOS | I | NEW APPLICATION OFFICE SUPPLIED DATA ENTERED | Loading... |
Nov 26, 2022 | NWAP | I | NEW APPLICATION ENTERED | Loading... |
Detailed Classifications
Class 009
Recorded and downloadable computer software for use in database management and training in the field of security risk assessment, third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; computer software systems comprised of recorded and downloadable computer software for use in database management and training in the field of security risk assessment, third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; recorded and downloadable computer firmware being computer software for use in database management and training in the field of security risk assessment, third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; downloadable electronic publications in the nature of articles, newsletters, periodicals, training manuals and policy documentation featuring information in the field of security risk assessment, third-party risk management processes, Cyber security, elearning, phishing, incident management and policy management
Class 016
Printed matter, namely, newspapers, brochures, books, pamphlets, articles, newsletters and periodicals in the field of security risk assessment, third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; printed training manuals in the field of security risk assessment, third-party risk management processes, Cyber security, elearning, phishing, incident management and policy management
Class 041
Educational services, namely, providing classes, workshops and seminars, and on-line classes, seminars and workshops and training services in the field of security risk assessment, third-party risk management processes, eLearning, phishing, incident management and policy management; electronic library services; provision of online, non-downloadable electronic publications, namely, articles, newsletters, electronic books, blogs in the nature of on-line journals, articles, newsletters, periodicals, training manuals and policy documentation being policy papers in the field of security risk assessment, third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; provision of online, non-downloadable electronic publications, namely, articles, newsletters, electronic books, blogs in the nature of on-line journals, articles, newsletters, periodicals, training manuals and policy documentation being policy papers in the field of third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; arranging and conducting seminars, courses in the field of security risk assessment, third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; arranging and conducting conferences and workshops in the field of security risk assessment, third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management; publication of books and texts
Class 042
Software as a service (SaaS) featuring software for use in database management and training in the field of security risk assessment, for third-party risk management processes, Cyber security, eLearning, phishing, incident management and policy management
Additional Information
Design Mark
The mark consists of a purple circle with the stylized design of a large conifer tree in the center and two small deciduous trees or shrubs to the left and right of the conifer in white followed by the stylized word Symphony in black.
Color Claim
The color(s) purple, white and black is/are claimed as a feature of the mark.
Classification
International Classes
009
016
041
042