EUTM file information

009422908

NORTON BY SYMANTEC


October 4, 2010

Trademark Summary

The trademark application NORTON BY SYMANTEC was filed by Gen Digital Inc., a U.S. corporation (the "Applicant"). The application was published for oppositions on July 27, 2011, and it was registered by office on November 3, 2011 without any oppositions.

The application was filed in English (French was selected as the second language).

The renewal of the trademark was recorded by the office on August 4, 2021.

of the trademark registration was recorded on August 4, 2021. Change of name and professional address of the trademark registration was recorded on April 23, 2015. Appointment and Replacement of representative of the trademark registration was recorded on June 22, 2015. Change of name and professional address of the trademark registration was recorded on May 23, 2019. Change of name and address of the trademark registration was recorded on March 1, 2020. Appointment and Replacement of representative of the trademark registration was recorded on January 4, 2021.


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Computer hardware
    2. Computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions
    3. Computer software
    4. Computer software in the field of cryptographic network security and data security functions
    5. Computer software for integration of information logic and data between computer networks
    6. Computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks
    7. Computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices
    8. Computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services
    9. Computer software for use in analysis and reporting of firewall log data
    10. Computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices
    11. Computer software platform for providing faster Internet connections, website resolution and e-mail deliveries
    12. Computer antivirus software
    13. Internet security software
    14. Enterprise security software
    15. Intrusion detection software
    16. Firewall software
    17. Privacy control software
    18. Content filtering software
    19. Cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers
    20. Computer software for the creation of virtual private network
    21. Computer software and downloadable computer software, namely, utility software
    22. Computer utility software for removal of computer applications and software
    23. Utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks
    24. Computer software, namely, middleware for interfacing client applications and networked or host based databases
    25. Computer software and downloadable computer software for use in updating other computer software
    26. Computer software for use in networking applications
    27. Computer software for sending and receiving facsimile transmissions from computers and notebook computers
    28. Computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users
    29. Computer software for file management and transfer
    30. Computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices
    31. Computer communications software for use with a home or remote office for connecting computer network users to global networks
    32. Computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals
    33. Computer programs for data communications applications, and for the encryption and authentication of electronic information
    34. Computer software for identity security
    35. Computer software for authentication and identity management information security
    36. Computer software for digital information and data access
    37. Computer software for detecting identity fraud
    38. Computer software and firmware for the management, transmission, and storage of data and information
    39. Computer software for use in networking computers
    40. Computer software for use in computer emulation
    41. Computer software for use in operating electronic mail
    42. Computer software for use in operating voice mail and voice messaging
    43. Computer software for use in database management
    44. Computer software for use in monitoring computers for security purposes
    45. Computer software for use with computer servers for controlling and managing server applications
    46. Computer telephony software
    47. Computer software for use in accessing databases
    48. Downloadable electronic publications in the nature of user manuals, white papers, articles, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologies.
  • The mark was filed in class 35 with Providing data collection, storage and retrieval services.
  • The mark was filed in class 38 with Providing data access and delivery services.
  • The mark was filed in class 42 with following description of goods:
    1. Providing authentication of identity
    2. Issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith
    3. Development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks
    4. Development, integration and operation of computer systems to support issuance and management of digital certificates
    5. Creation and implementation of procedures and practices for issuance and management of digital certificates
    6. Computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration
    7. On-line technical support services, namely, troubleshooting of computer hardware and software problems
    8. Computer services, namely, providing search engines for obtaining data on a global computer network
    9. Computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of Internet and network firewall software for others
    10. Computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security
    11. Security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability
    12. Computer software consultation services for the development of software applications
    13. Designing and programming computer controlled communications systems
    14. Providing data conversion services
    15. Provision of security services for virtual private computer networks (VPNs)
    16. Application hosting
    17. Web hosting
    18. Consulting in the field of computers and computer networks, namely, turnkey e-commerce services
    19. Computer services, namely, providing a computer software platform that bridges Internet and telephony services and enables users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices
    20. Providing a computer software platform that provides faster Internet connections, web site resolution, and email delivery
    21. Services that support the on-boarding, formatting, distribution, translation, and mediation of digital content for distribution via networks
    22. Directory, discovery, and information services associated with Radio Frequency ID (RFID) and the Electronic Product Code (EPC) network
    23. Application service provider (ASP) featuring billing and customer relationship management software for wireless service providers
    24. Data automation and collection service using proprietary software to evaluate, analyze, and collect service data from communications carriers
    25. Data conversion of computer program data or information from communication carriers
    26. Application service provider (ASP), namely, hosting computer software applications for others
    27. Cross-platform conversion of digital content into other forms of digital content for distribution via networks
    28. Providing temporary use of on-line, non-downloadable software for storing, managing, tracking and analyzing data in the field of Radio Frequency ID (RFID) and the Electronic Product Code (EPC)
    29. Designing, creating or maintaining of computer programs for computer networks using Radio Frequency ID (RFID) and the Electronic Product Code (EPC)
    30. Hosting of digital content over the Internet for use in wireless communications and with wireless communication equipment and apparatus
    31. Computer consultation in the field of computer security
    32. Computer software installation services
    33. Computer programming
    34. Notification and delivery of software updates
    35. Research services relating to computer hardware and computer software
    36. Technical consultation in the field of computer software installation and maintenance
    37. Computer support services, namely, technical support and software update services
    38. Computer consulting services related to computer products and services
    39. Computer software design for others
    40. Providing information in the field of new computer software applications, using computers at remote locations, and other computer and technology related issues
    41. Application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security
    42. Scientific and technological services, namely, technology consultation in the fields of computers, computer hardware, computer software, computer peripherals, computer systems, computer networks, computer security, information technology, electronic commerce technology and global computer network technology, communications networks and devices, consumer electronics, mobile computing, and telecommunications equipment and devices
    43. Providing consultants to help deploy, supervise and manage information technology projects
    44. Providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks
    45. Providing hosted electronic mail and instant messaging services
    46. Business services in the nature of managed public key infrastructure (PKI) services, namely, application and network infrastructure security services
    47. Providing identity verification services in e-commerce transactions
    48. Business management, namely, issuance of digital certificates for authentication
    49. Monitoring of computer systems for security purposes
    50. Providing information in the fields of global computer network and local area network security, preventing computer viruses, computer hardware and software applications in security.