undefined
EUTM file information

018377740

Telefónica CyberAcademy+


January 17, 2021

Trademark Summary

The trademark application Telefónica CyberAcademy+ was filed by TELEFONICA, S.A., a corporation established under the laws of the Kingdom of Spain (the "Applicant"). The application was published for oppositions on February 14, 2021, and it was registered by office on May 24, 2021 without any oppositions.

The application was filed in Spanish (English was selected as the second language).

Change of name and professional address of the trademark registration was recorded on July 7, 2022. Change of name and professional address of the trademark registration was recorded on July 18, 2022.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Downloadable computer software, programs and mobile applications for management, monitoring, protection, authentication and securing of data, electronic mail, computer systems, computer networks, servers, the internet and mobile devices
    2. Downloadable computer software, programs and mobile applications for computer network security, communication network security and data security
    3. Downloadable computer software, programs and mobile applications for the implementation of data policies
    4. Data collection and storage apparatus and devices
    5. Data processing systems
    6. Encryption software
    7. Databases
    8. Software for database management
    9. Downloadable computer security software
    10. Software for network and device security
    11. Software for enduring the security of electronic mail
    12. Recorded and recordable publications in electronic, magnetic or optical form
    13. Computer software applications, downloadable
    14. Downloadable mobile applications for the transmission of data
    15. Cloud servers
    16. Cloud network monitoring software
    17. Portable telecommunications apparatus
    18. Portable telecommunications apparatus
    19. Computer software for creating dynamic websites
    20. Website development software
    21. Computer networking and data communications equipment
    22. Computer programmes for data processing
    23. Data communications hardware
    24. Data collection apparatus
    25. Software for the analysis of business data
    26. Computer application software for mobile telephones
    27. Interactive software
    28. Computer software for wireless content delivery
    29. Communication software
    30. Computer software for controlling and managing access server applications
    31. Computer digital maps
    32. Wireless local area network devices
    33. Optical fibre sensors
    34. Electronic sensors
    35. Synchro sensors
    36. Apparatus for recording, transmission and reproduction of sound or images
    37. Electronic publications (downloadable)
    38. Electronic agendas
    39. Intercommunication apparatus
    40. Interfaces for computers
    41. Games programmes
    42. Modems
    43. Computer hardware
    44. Microchips [computer hardware]
    45. VPN [virtual private network] hardware
    46. USB web keys for automatically launching pre-programmed website URLs
    47. Data buffers
    48. Interactive data transfer apparatus
    49. Virtual reality software
    50. Virtual reality glasses
    51. Virtual reality hardware
    52. Virtual reality headsets
    53. Virtual reality game software
    54. Interfaces for computers
    55. Interfaces for computers
    56. Computer programs for user interface design
    57. Access interfaces for managed private circuit networks
    58. Interactive data transfer apparatus
    59. Computer programmes for interactive television and for interactive games and/or quizzes
    60. USB Dongles [Wireless network adapters]
    61. Downloadable video game programs
    62. Interactive video game programs
    63. Software programs for video games
    64. Software for online messaging
    65. DVDs and other digital recording media
    66. Audiovisual apparatus
    67. Audio visual recordings
    68. Films, exposed
    69. Digital signage
    70. Mobile apps
    71. Computer software applications, downloadable
    72. Teaching apparatus
    73. Event recorders
    74. Communications networks
    75. Teaching apparatus.
  • The mark was filed in class 41 with following description of goods:
    1. Education and educational training in the field of internet security, computer security, network security, application security, data security and information security
    2. Software training courses in the field of cybersecurity, computer security, network security, application security, data security and information security
    3. Training on the use of software in the field of cybersecurity, computer security, network security, application security, data security and information security
    4. Training of personnel in cybersecurity processes and procedures, computer security, network security, application security, data security and information security
    5. Conducting of educational conferences in the field of cybersecurity
    6. Conducting of educational courses in the field of cybersecurity
    7. Conducting of educational events in the field of cybersecurity
    8. Educational consultancy in the field of cybersecurity
    9. Educational instruction in the field of cybersecurity
    10. Educational research in the field of cybersecurity
    11. Educational seminars in the field of cybersecurity
    12. Educational services in the field of cybersecurity
    13. Rental of educational
    14. Offering courses in the field of cybersecurity
    15. Providing educational services in the field of cybersecurity
    16. Providing educational courses in the field of cybersecurity
    17. Providing educational exams in the field of cybersecurity
    18. Providing educational information in the field of cybersecurity
    19. Technological education services
    20. Arranging and conducting of training workshops in the field of cybersecurity
    21. Conducting of training workshops in the field of cybersecurity
    22. Education and training services namely, Professional education and vocational training seminars and workshops in the field of cybersecurity
    23. Providing online electronic publications, not downloadable
    24. Providing on-line interactive computer games
    25. Providing interactive multi-player computer games via the internet and electronic communication networks
    26. Electronic game services provided by means of the internet
    27. Training services provided via simulators
    28. Electronic data processing training
    29. Games offered on-line on a computer network
    30. Arranging and conducting of conferences, colloquiums, seminars, training workshops
    31. All the aforesaid services being provided for project studies in the field of cybersecurity.
  • The mark was filed in class 42 with following description of goods:
    1. Design, development, programming, installation, maintenance and updating of computer software relating to data security, computer security and computer risk prevention
    2. Data protection services
    3. Creating and maintaining bespoke technology platforms and websites
    4. Providing temporary use of non-downloadable database management software
    5. Providing temporary use of non-downloadable software for data analysis and preparing reports
    6. Operating search engines
    7. Providing online assistance for computer software users
    8. Computer security system monitoring
    9. Computer security services for protection against illegal network access
    10. Hosting platforms on the Internet
    11. Programming of software for information platforms on the Internet
    12. Maintenance of computer software
    13. Software implementation
    14. Updating of computer software
    15. Computer firewall services
    16. Monitoring of secure computer systems
    17. Data security services [firewalls]
    18. IT security, protection and monitoring
    19. Research and consultancy relating to IT security, protection and monitoring
    20. Detecting computer viruses
    21. Computer virus protection services
    22. Software monitoring
    23. Computer systems evaluation
    24. Regeneration and conversion of software and computer data
    25. Advisory services relating to computer hardware
    26. Design of storage systems
    27. Consultancy relating to computer security, namely, Consultancy relating to software and electronic data protection against computer viruses and security threats
    28. Providing research information and Online information relating to protection against computer viruses and security threats
    29. Technology consultation and research in the field of cybersecurity, information and data security of computer networks and computer network security
    30. Consultancy in the field of computer security
    31. Consultancy in the field of software security
    32. IT protection
    33. Computer security threat analysis for protecting data
    34. Project studies in the field of cybersecurity
    35. Computer security system monitoring services
    36. Computer security services in the nature of administering digital certificates
    37. Computer security services for protection against illegal network access
    38. Provision of computer security risk management programs
    39. Computer security threat analysis for protecting data
    40. Computer programming services for electronic data security
    41. Consultancy and information services relating to computer programming
    42. Maintenance of computer software relating to computer security and prevention of computer risks
    43. Updating of computer software relating to computer security and prevention of computer risks
    44. Installation, maintenance, updating and upgrading of computer software
    45. Software development
    46. Network security services (test and risk assessment for electronic networks)
    47. Computer security services (repair and maintenance services for software programming and installation)
    48. Computer security services (test and risk assessment for computer networks)
    49. Internet security consultancy
    50. Data security consultancy
    51. Research relating to security
    52. Writing of programs for data processing
    53. Preparation of computer programs for data processing
    54. Consultancy in the field of security software
    55. Software as a service [SaaS]
    56. Rental of computer software
    57. Software development, programming and implementation
    58. IT consultancy, advisory and information services
    59. IT security, protection and restoration
    60. Internet security consultancy
    61. Data security consultancy
    62. Research in the field of information technology
    63. IT service management [ITSM]
    64. IT project management
    65. Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability
    66. Computer security consultancy in the field of automotive components
    67. Development of software for secure network operations
    68. Maintenance of computer software relating tocomputer security and prevention of computer risks
    69. Computer security threat analysis for protecting data
    70. Application service providers (ASP) services
    71. Platform as a service [PaaS]
    72. Design and development of virtual reality software
    73. Advisory services relating to man-machine interfaces for computer software
    74. Developing programs for simulating experiments or series of experiments in a virtual optical laboratory
    75. Development of interactive multimedia software
    76. Cloud computing
    77. Consulting in the field of cloud computing networks and applications
    78. Providing virtual computer systems through cloud computing
    79. Programming of operating software for accessing and using a cloud computing network
    80. Computer virus protection services
    81. Computer programming services for electronic data security
    82. Monitoring of computer systems for detecting unauthorized access or data breach
    83. Development of technologies for the protection of electronic networks
    84. Computer disaster recovery planning
    85. Disaster recovery services for data communications systems
    86. Recovery of computer data
    87. Computer security services for protection against illegal network access
    88. Electronic monitoring of personal identification information for detecting identity theft via the internet
    89. Computer programming services for data warehousing
    90. Data warehousing
    91. Data mining
    92. Digital compression of computer data
    93. Electronic data storage
    94. Off-site data backup
    95. Maintenance of data bases
    96. Data migration services
    97. Application service provider [ASP], namely, hosting computer software applications of others
    98. Development of computer software application solutions
    99. Hosting of computerized data, files, applications and information
    100. Advisory services relating to planning applications
    101. Application service provider services
    102. Software as a service [SaaS]
    103. Updating of computer programs
    104. Creation of computing platforms for third parties.