undefined
EUTM file information

018929151

H HOGO.eu


September 21, 2023

Trademark Summary

The trademark H HOGO.eu was filed by HOGO BUSINESS SERVICES, a corporation established under the laws of the French Republic (the "Applicant"). The application was published for oppositions on November 22, 2023, and received undefined oppositions.

Opposition Proceedings

There are undefined Oppositions claimed against trademark.

The first opposition filed on February 22, 2024 by HUGO BOSS Trade Mark Management GmbH & Co. KG on (a) Likelihood of confusion, (b) Unfair advantage and detriment to distinctiveness or repute. the opponent was represented by DENNEMEYER & ASSOCIATES and its proceedings were handled in English The second opposition filed on February 22, 2024 by Howden Group Limited on Likelihood of confusion. the opponent was represented by MURGITROYD & COMPANY and its proceedings were handled in English

The application was filed in French, and French was also language of all opposition proceedings (English was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer equipment for detecting and removing computer risks, in particular malware
    2. Computer terminals
    3. Computer terminals for detecting and removing computer risks, in particular malware
    4. Tablet computers
    5. Tablet computers for detecting and removing computer risks, in particular malware
    6. Interactive touchscreen terminals
    7. Computer appliances, namely: Sheep-dips, for use in the following fields: Making computer peripherals secure
    8. Stick computers
    9. USB flash drive readers
    10. USB flash drive readers, for use in the following fields: Detection and removal of computer risks, in particular malware
    11. Software [recorded programs] for detecting and removing computer risks, in particular malware
    12. Application software for detecting and removing computer risks, in particular malware, For use with the following goods: Mobile terminals namely Telephone apparatus and Tablet computers
    13. Application software for cloud computing services for detecting and removing computer risks, in particular malware
    14. Web application software for detecting and removing computer risks, in particular malware
    15. Reporting software, in relation to the following fields: Computer systems and data security systems (software) in relation to IT security
    16. Content control software, Software for analysing computer content
    17. Software for testing vulnerability in computers and computer networks
    18. Software for detecting, preventing, diagnosing, and repairing computer security breaches
    19. Antivirus software
    20. Computer software for IT security
    21. Software for network and device security
    22. Computer software for the purposes of data encryption, in relation to the following fields: Computing
    23. None of the aforementioned is related to virtual or physical fashion.
  • The mark was filed in class 35 with following description of goods:
    1. Company organisation consulting and Business organisation consultancy in relation to the following fields: Computer security, security software and Data security
    2. Retailing and wholesaling, in relation to the following goods: Computer software for detecting and removing computer risks, in particular malware
    3. Computer data processing for detecting and removing computer risks, in particular malware
    4. Conducting data searches in computer files for others
    5. None of the aforementioned is related to virtual or physical fashion.
  • The mark was filed in class 42 with following description of goods:
    1. Formatting, In connection with the following goods: Computer peripherials
    2. Computer programming for detecting and removing computer risks, in particular malware
    3. Design, facilitating and Programming, In connection with the following goods: Software for detecting and removing computer risks, in particular malware
    4. Integration, In connection with the following goods: Software for detecting and removing computer risks, in particular malware
    5. The installation, Servicing, repair and maintenance, In connection with the following goods: Computer software for detecting and removing computer risks, in particular malware
    6. Design, development and programming of computer data security software
    7. Updating, In connection with the following goods: Software for computer security and risk prevention
    8. Development and implementation of software, testing, analysis and consultancy in the field of computer security systems, access, authorisation, authentication, encryption and identification for use with computer hardware and computer networks
    9. Software as a service [SaaS] for detecting and removing computer risks, in particular malware
    10. Software as a service [SaaS] for computer data security
    11. Platform as a service [PaaS] for computer data security
    12. Development of computer data transmission systems
    13. Computer data security
    14. Monitoring of computer systems for security purposes
    15. Computer security threat analysis for protecting data
    16. Automated tests and manuals, in relation to the following fields: Data security
    17. Computer firewall services
    18. IT security, protection and restoration
    19. Computer system analysis, in relation to the following fields: Detection of computer security threats
    20. Providing of management systems, in relation to the following fields: Computer security threats
    21. Auditing and monitoring of computer security
    22. Sensing, in relation to the following fields: Computer security flaws or malware
    23. Computer virus protection and anti-malware services, Spyware protection
    24. Data encryption services, in relation to the following fields: Computing
    25. Consulting and Research, In connection with the following goods: Software for detecting and removing computer risks, in particular malware
    26. Research, in relation to the following fields: Computer security, Security software and Data security
    27. Data security services [firewalls]
    28. Tutorials, in relation to the following fields: Computer security, Security software and Data security
    29. Consulting and Consultancy in relation to the following fields: Computer security, Security software and Data security
    30. None of the aforementioned is related to virtual or physical fashion.