undefined
EUTM file information

018646786

DOGMA


January 31, 2022

Trademark Summary

The trademark DOGMA was filed by DuskRise Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on March 14, 2022, and received one opposition filed on June 13, 2022 by Dogma S.p.A. on Likelihood of confusion. the opponent was represented by Fieldfisher Italy

It was designated 'Basic Application' for International Application 1657490 at the World Intellectual Property Organization (WIPO).

The application was filed in English, and English was also language of all opposition proceedings (Italian was selected as the second language).

The Opposition with reference B 003172836 was rejected according to Article 8(1)(b) EUTMR with decision issued on August 17, 2023 by the EUIPO.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer hardware with preinstalled software for the detection and assessment of cybersecurity threats
    2. Computer hardware
    3. Computer hardware for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach
    4. Downloadable mobile application for monitoring of computer systems and networks to detect and assess cybersecurity threats, unauthorized access or data breach
    5. Security software
    6. Utility, security and cryptography software
    7. Software for network and device security
    8. Software.
  • The mark was filed in class 42 with following description of goods:
    1. Technology consultation in the field of cybersecurity
    2. Software as a Service (SAAS) services, namely, hosting software for use by others for use to facilitate cybersecurity protection, and monitoring and assessment of network threats
    3. Computer security threat analysis for protecting data
    4. Cybersecurity services, namely cybersecurity threat analysis services
    5. Monitoring of computer systems for detecting unauthorized access or data breach
    6. IT security, protection and restoration
    7. Authentication services for computer security
    8. Internet security consultancy
    9. Data security consultancy
    10. Maintenance of computer software
    11. Computer software design
    12. Computer software technical support services
    13. Updating of computer programs.