undefined
EUTM file information

018927002

VOTIRO


September 18, 2023

Trademark Summary

The trademark application VOTIRO was filed by Votiro Cybersec Global Pty Ltd, a corporation established under the laws of the Commonwealth of Australia (the "Applicant"). The application was published for oppositions on December 4, 2023, and it was registered by office on March 12, 2024 without any oppositions.

The application was filed in English (Spanish was selected as the second language).

Appointment and Replacement of representative of the trademark registration was recorded on October 24, 2024.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer software
    2. Computer software and hardware platforms for cooperative intelligent transport systems
    3. Computer software adapted for use in the operation of computers
    4. Data security instruments
    5. Network management computer software
    6. Computer programs relating to local area networks
    7. Devices for use in the networking of computers
    8. Data encryption apparatus
    9. Data communications software
    10. Data processing software
    11. Downloadable computer software applications
    12. Electronic data files
    13. Data security apparatus
    14. Data processing materials
    15. Security encryption devices
    16. Apparatus for electronic digital processing
    17. Apparatus for processing digital data
    18. Downloadable software for ensuring the security of electronic mail.
  • The mark was filed in class 42 with following description of goods:
    1. Online provision of web-based software (non-downloadable)
    2. Provision of online non-downloadable web-based software
    3. Data encryption services
    4. Hosting of software as a service (SaaS)
    5. Software as a service (SaaS)
    6. Computer security consultancy
    7. Computer security engineering
    8. Computer security services, namely, design and development of secure computer hardware, software and systems
    9. Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates
    10. Security risk assessment services relating to computer systems
    11. Computer security, namely, verification of personal identification
    12. Data security consultancy
    13. Security assessment services for computer networks
    14. Cloud computing
    15. Computer software consultancy
    16. Computer software development
    17. Providing information, including online, about design and development of computer hardware and software
    18. Software engineering
    19. Online provision of non-downloadable web-based applications
    20. Online provision of non-downloadable web-based software
    21. Provision of online non-downloadable software in the nature of application service provider
    22. Computer security services, namely, testing and risk assessment of computer networks
    23. Provision of online non-downloadable software, namely, application service provider
    24. Installation, repair and maintenance of middleware software
    25. Installation of middleware (software)
    26. Computer software engineering
    27. Development of computer software application solutions
    28. Installation and maintenance of computer software
    29. Computer virus protection services
    30. Information technology services, namely, computer hardware, software and peripherals design and technical consultancy
    31. Data security services
    32. Software as a service (SAS) featuring software for use in generating replicas of electronic documents that are safe from malware and other unauthorized data and programs
    33. Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities
    34. Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials
    35. Development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management
    36. Maintenance of computer software relating to computer security and prevention of computer risks
    37. Updating of computer software relating to computer security and prevention of computer risks
    38. Computer security services in the nature of administering digital keys
    39. Computer security threat analysis for protecting data
    40. Computer security services, namely, restricting unauthorized network access
    41. Computer services, namely, filtering of unwanted e-mails
    42. Electronic document and e-mail authentication services not for identification verification
    43. Design and development of electronic data security systems.