The trademark application SECURE RESET was filed by Fortra, LLC, a Limited Liability Company (the "Applicant"). Application refused.
The application was filed in English (Italian was selected as the second language).
Change of name and address of the trademark registration was recorded on July 26, 2020.
The Refusal with reference B 018275007 was Rejected according to Article 7(1)(b) EUTMR with decision issued on February 8, 2021 by the EUIPO.
Goods And Services
The mark was filed in class 9 with following description of goods:
Computer security software, namely, software for encrypting and protecting the integrity of data and electronic communications over computer networks
Computer software for authentication, access control and other security features within computer networks and through external connections
Computer software for implementing security methodology involving encryption of payment card numbers over a global computer network
Computer software for use to compile, manage, encrypt and store personal information
Computer software for use to access, collect and modify network user identification
Computer software for workflow, helpdesk and network security management
Computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks
Computer software to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks
Computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications
Computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks
Computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization
Computer software for registering and authenticating digital certificates
Computer software for accessing, creating and modifying network user identification information
Computer software for workflow management, help desk management, and network security
Computer software which provides analysis of data being accessed within a network
Computer software which enables users of other computer products to access and use customer help and customer support functions
Computer consultation services involving the creation and development of computer security software programs for others and security printing, namely, encoding identification information, non-valuable documents and products
Software as a service (saas) services, namely, providing temporary use of online computer software for use to compile, manage, encrypt and store personal information
Providing temporary use of online computer software for use to access, collect and modify network user identification
Providing temporary use of online computer software for workflow, helpdesk and network security management
Providing temporary use of online computer software for use to automate password management allowing users to securely reset and synchronize passwords across multiple applications, the internet, and local, wide area and other global computer networks
And to enable users of other computer products to connect to and use customer help and support functions across multiple applications, the internet, and local, wide area and other global computer networks
Providing temporary use of online computer software for automating and managing security policy administration, enforcement, and compliance for users of software applications
Providing temporary use of online computer software, namely, identification management software for defining, managing, establishing and assigning sets of users' access rights to applications, data, and networks
Providing temporary use of online computer software to receive, aggregate, define, store, model, manage, send, and present information on relationships between people and their access rights to processes, projects, data, locations, and business resources in an organization
Providing temporary use of online computer software for registering and authenticating digital certificates
Providing temporary use of online computer software for accessing, creating and modifying network user identification information. providing temporary use of online computer software for workflow management, help desk management, and network security
Providing temporary use of online computer software which provides analysis of data being accessed within a network.