About 67 Trademarks found for “DE*CA”
Filters
Mark | Details | Status | Class/Description | |
---|---|---|---|---|
DEAN & DELUCA DEAN & DELUCA BRANDS INC. 1812623 5 Dec 2016 | ABANDONED SECTION 36 on 21 Sept 2020 | Tote bags and picnic tote bags,Preserved olives, olive spread, olive o... Class 018 Class 018 Leather Products not including clothing Tote bags and picnic tote bags Class 029 Class 029 Meats and Processed Food Products Preserved olives, olive spread, olive oil, preserved fruits, preserved chestnuts, preserved tomatoes, nut spreads, nut oils, pickled gherkins, preserved truffles, canned mushrooms, dried mushrooms, fruit jams, mincemeat, dried beans, caviar, smoked fish, cheese, dried fruits, dried nuts, salami, roast beef, chicken liver mousse, duck mousse, pork and liver pate, goose liver, sausage, smoked chicken breasts, smoked turkey breasts, smoked ham, smoked Peking duck breasts, ostrich, quail, pheasant, weisswurst, bratwurst, knockwurst, Vienna sausage, potato chips, sweet potato chips, infused olive oil, flavored olive oil, dried vegetables, antipasto ... Class 030 Staple Food Products Barbecue sauce, pretzels, chocolate covered pretzels, flavored pretzels, chocolate covered nuts, nougat with nuts, maple syrup, infused maple syrup, flavored maple syrup, pancake mix, scone mix, cookie mix, brownie mix, cake mix, candy, capers, raw rice, raw pasta, culinary dried herbs, spices, roasted coffee beans, ground coffee, tea, mustard, vinegar, honey, fruit syrups used as a topping and/or flavoring for foods, shortbread, pastries, cookies, chocolate sauce, plum pudding Class 035 Advertising, Business & Retail Services Online retail store services featuring fine food and kitchenware; retail food store services Class 043 Restaurant and Hotel Services Restaurant and café services | ||
DELICA T&G GLOBAL LIMITED 1794599 5 Aug 2016 | REGISTERED on 19 Mar 2018 | Fresh fruits and vegetables Class 031 Class 031 Natural Agricultural Products Fresh fruits and vegetables | ||
DECA LOBLAWS INC. 1782906 18 May 2016 | REGISTERED on 12 May 2017 | Vodka Class 033 Class 033 Wines and Spirits Products Vodka | ||
DECA GS BEAUTY GROUP INC. 1781130 6 May 2016 | REGISTERED on 16 May 2017 | Cosmetics, namely, lipstick, foundation, mascara, blush, lip gloss, ey... Class 003 Class 003 Cosmetics and Cleaning Products Cosmetics, namely, lipstick, foundation, mascara, blush, lip gloss, eyeshadow, bronzer, eye liner, lip pencils, eye pencils, non-medicated skin care creams and lotions, make up removers, fragrances, cosmetics, namely, compacts, compacts containing make-up | ||
DE' LONGHI DINAMICA DE' LONGHI APPLIANCES S.R.L. A LEGAL ENTITY 1756714 26 Nov 2015 | REGISTERED on 5 Jul 2019 | Electric milk frothers.,Electric kettles for household use; electric c... Class 007 Class 007 Machinery Products Electric milk frothers. Class 011 Class 011 Environmental Control Instrument Products lighting heating cooling cooking Electric kettles for household use; electric coffee machines; electric coffee percolators; electric toasters for household purposes. | ||
DETTES.CA GROUPE LEBLANC SYNDIC INC. 1752548 29 Oct 2015 | ABANDONED SECTION 36 on 28 Feb 2017 | Services de consultation en restructuration financière offrant, pour l... Class 036 Class 036 Insurance & Financial Services Services de consultation en restructuration financière offrant, pour les personnes physiques et morales désirant rétablir leur santé financière, un programme de soins financiers tel que: faillite sommaire, faillite ordinaire, proposition concordataire et proposition consommateur. | ||
DENTCA DENTCA INC. 1734684 25 Jun 2015 | REGISTERED on 26 Jun 2018 | Dental clips for securing pre-existing dentures; Dental products, name... Class 005 Class 005 Pharmaceutical Products Dental clips for securing pre-existing dentures; Dental products, namely, plastic material for fabricating complete and partial denture liners/relines, and for fabricating gaskets for over dentures; Dentures; Flexible partial dentures Class 010 Class 010 Medical Instrument Products | ||
DETTES.CA GROUPE LEBLANC SYNDIC INC. 1653321 22 Nov 2013 | ABANDONED SECTION 36 on 9 Jun 2015 | Services de consultation en restructuration financière offrant, pour l... Class 036 Class 036 Insurance & Financial Services Services de consultation en restructuration financière offrant, pour les personnes physiques et morales désirant rétablir leur santé financière, un programme de soins financiers tel que: faillite sommaire, faillite ordinaire, proposition concordataire et proposition consommateur. | ||
DETICA BAE SYSTEMS PLC 1606146 11 Dec 2012 | ABANDONED SECTION 36 on 11 Aug 2015 | Compilation and systematization of information into computer databases... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Class 016 Class 016 Paper Goods and Printed Material ... Class 035 Advertising, Business & Retail Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 036 Insurance & Financial Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 037 Construction and Repair Services Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets. Class 041 Education and Entertainment Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 042 Computer & Software Services & Scientific Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. Class 045 Personal & Legal & Social Services Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks. | ||
DEALER.CA 3744515 CANADA INC. 1578034 16 May 2012 | REGISTERED on 18 Dec 2015 | Telecommunication services in the field of business brokerage, mergers... Class 038 Class 038 Communications Services Telecommunication services in the field of business brokerage, mergers and acquisitions, management consulting, business valuations, business financing services, franchise consulting, namely the electronic transmission of data and information through the operation of an electronic bulletin board. |
on 21 Sept 2020
DEAN & DELUCA BRANDS INC.
1812623 · 5 Dec 2016
018
Class 018
Leather Products not including clothing
Tote bags and picnic tote bags
029
Class 029
Meats and Processed Food Products
Preserved olives, olive spread, olive oil, preserved fruits, preserved chestnuts, preserved tomatoes, nut spreads, nut oils, pickled gherkins, preserved truffles, canned mushrooms, dried mushrooms, fruit jams, mincemeat, dried beans, caviar, smoked fish, cheese, dried fruits, dried nuts, salami, roast beef, chicken liver mousse, duck mousse, pork and liver pate, goose liver, sausage, smoked chicken breasts, smoked turkey breasts, smoked ham, smoked Peking duck breasts, ostrich, quail, pheasant, weisswurst, bratwurst, knockwurst, Vienna sausage, potato chips, sweet potato chips, infused olive oil, flavored olive oil, dried vegetables, antipasto
...
Class 030
Staple Food Products
Barbecue sauce, pretzels, chocolate covered pretzels, flavored pretzels, chocolate covered nuts, nougat with nuts, maple syrup, infused maple syrup, flavored maple syrup, pancake mix, scone mix, cookie mix, brownie mix, cake mix, candy, capers, raw rice, raw pasta, culinary dried herbs, spices, roasted coffee beans, ground coffee, tea, mustard, vinegar, honey, fruit syrups used as a topping and/or flavoring for foods, shortbread, pastries, cookies, chocolate sauce, plum pudding
Class 035
Advertising, Business & Retail Services
Online retail store services featuring fine food and kitchenware; retail food store services
Class 043
Restaurant and Hotel Services
Restaurant and café services
Tote bags and picnic tote bags,Preserved olives, olive spread, olive o...
on 19 Mar 2018
T&G GLOBAL LIMITED
1794599 · 5 Aug 2016
031
Class 031
Natural Agricultural Products
Fresh fruits and vegetables
Fresh fruits and vegetables
on 12 May 2017
LOBLAWS INC.
1782906 · 18 May 2016
033
Class 033
Wines and Spirits Products
Vodka
Vodka
on 16 May 2017
GS BEAUTY GROUP INC.
1781130 · 6 May 2016
003
Class 003
Cosmetics and Cleaning Products
Cosmetics, namely, lipstick, foundation, mascara, blush, lip gloss, eyeshadow, bronzer, eye liner, lip pencils, eye pencils, non-medicated skin care creams and lotions, make up removers, fragrances, cosmetics, namely, compacts, compacts containing make-up
Cosmetics, namely, lipstick, foundation, mascara, blush, lip gloss, ey...
on 5 Jul 2019
DE' LONGHI APPLIANCES S.R.L. A LEGAL ENTITY
1756714 · 26 Nov 2015
007
Class 007
Machinery Products
Electric milk frothers.
011
Class 011
Environmental Control Instrument Products lighting heating cooling cooking
Electric kettles for household use; electric coffee machines; electric coffee percolators; electric toasters for household purposes.
Electric milk frothers.,Electric kettles for household use; electric c...
on 28 Feb 2017
GROUPE LEBLANC SYNDIC INC.
1752548 · 29 Oct 2015
036
Class 036
Insurance & Financial Services
Services de consultation en restructuration financière offrant, pour les personnes physiques et morales désirant rétablir leur santé financière, un programme de soins financiers tel que: faillite sommaire, faillite ordinaire, proposition concordataire et proposition consommateur.
Services de consultation en restructuration financière offrant, pour l...
on 26 Jun 2018
DENTCA INC.
1734684 · 25 Jun 2015
005
Class 005
Pharmaceutical Products
Dental clips for securing pre-existing dentures; Dental products, namely, plastic material for fabricating complete and partial denture liners/relines, and for fabricating gaskets for over dentures; Dentures; Flexible partial dentures
010
Class 010
Medical Instrument Products
Dental clips for securing pre-existing dentures; Dental products, name...
on 9 Jun 2015
GROUPE LEBLANC SYNDIC INC.
1653321 · 22 Nov 2013
036
Class 036
Insurance & Financial Services
Services de consultation en restructuration financière offrant, pour les personnes physiques et morales désirant rétablir leur santé financière, un programme de soins financiers tel que: faillite sommaire, faillite ordinaire, proposition concordataire et proposition consommateur.
Services de consultation en restructuration financière offrant, pour l...
on 11 Aug 2015
BAE SYSTEMS PLC
1606146 · 11 Dec 2012
009
Class 009
Computer & Software Products & Electrical & Scientific Products
016
Class 016
Paper Goods and Printed Material
...
Class 035
Advertising, Business & Retail Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 036
Insurance & Financial Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 037
Construction and Repair Services
Computer software, firmware and hardware for searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for searching for, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling transactions in the fields of crime, financial crime, fraud, anti-smuggling operations and counter-terrorism; computer software, firmware and hardware for searching, exploring, identifying, viewing, analysing, processing, storing, managing, monitoring, aggregating and modelling patterns and networks in data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data in the fields of crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware for use in detecting and reporting on suspicious and abnormal behaviour in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, anti-smuggling operations, homeland security and counter-terrorism; computer software, firmware and hardware for analysing and predicting customer behaviour; computer software, firmware and hardware for use in customer relationship management; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the field of information technology and communications technology security; computer software, firmware and hardware for use in detecting, preventing, combating and defending against fraud, financial fraud, debit and credit card fraud, Internet fraud, financial crime, money laundering, terrorism and smuggling operations; computer software, firmware and hardware for identifying, recording, investigating, analysing and reviewing financial crime of all types; computer software, firmware and hardware for the purposes of enabling, improving and monitoring regulatory compliance, operational efficiency, corporate governance, risk management, risk prevention, and the reduction of monetary losses; computer software, firmware and hardware for the purposes of carrying out due diligence, background checks and vetting of customers and potential customers; computer software, firmware and hardware for use in searching, mining, collecting, analysing, viewing, processing, storing, managing, monitoring, aggregating and modelling in the fields of defence, law enforcement, and business process optimisation; data processing equipment, namely, computers; computer software, firmware, hardware and electronic sensors for data security, computer security, computer network security and communications network security purposes; computer software, firmware, hardware and electronic sensors to identify threats and malicious behaviour on the Internet and within enterprises; computer software, firmware and hardware for reducing vulnerability to cyber-attacks, minimising the damage caused by cyber-attacks, and for recovering from cyber-attacks; computer software, firmware, hardware and electronic sensors for identifying and reporting intrusions into computer networks and communications networks; computer software, namely, firewalls; computer hardware, namely, firewalls; computer software, firmware and hardware for identifying, collecting, viewing, recording, analysing, sharing, processing, managing, filtering, storing, monitoring and transmitting data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; computer software for real-time situational awareness and workflow management; computer software, firmware and hardware for receiving, collecting, storing, viewing, sharing, monitoring, managing, processing, configuring, analysing, sanitising, cleansing, anonymising, de-anonymising, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation, transmitting, sharing and validating of data and of information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and of electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software, firmware and hardware which provide a gateway for anonymising, de-anonymising, transmitting, encrypting, decrypting, masking, hashing, filtering, redaction, tokenisation and validating data and information, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, and electronic communications, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for receiving, processing, converting, translating, validating, encrypting, decrypting, recording, sending and distributing data, namely financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data, in the fields of law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; computer software for checking the integrity of data; computer software for transferring data between networks; computer software for message brokering; computer software for protecting the quality, integrity and security of data and information, in particular when transmitted between networks; computer software, firmware and hardware for minimising the risk of data leaks, data breach, data loss and other risks associated with the transmission of data between networks; computer software for the creation and operation of a data firewall which intercepts and transforms data sent between different networks, interfaces or security domains; computer software for checking data for viruses, malware and spyware; computer software for monitoring data levels; computer software, firmware and hardware for use in gathering intelligence and evidence; sensors, namely, motion sensors, proximity sensors and voice sensors; apparatus, namely, computers, for gathering information and evidence; computer software, firmware and hardware for use in detection, analysing, neutralisation, excavation and disposal in the field of explosive ordnance disposal; computer software, firmware, hardware, sensors, namely, motion sensors, weight sensors and proximity sensors for the purposes of countering improvised explosive devices (IEDs), including minefield clearance; parts and fittings for computer firmware and computer hardware; publications, brochures, reports, certificates, user manuals, user guides, technical manuals, instruction manuals, training manuals, educational, training and instructional materials in electronic form, namely, user guides, technical manuals, instruction sheets, instruction manuals, training manuals, online seminars, online training courses and DVDs, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed matter, namely, printed magazines, printed periodical publications, printed newsletters, printed brochures and printed product information sheets, in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; printed reports; technical manuals; instruction manuals; user manuals; user guides; educational, training and instructional materials in printed form, namely, printed user guides, printed technical manuals, printed instruction sheets, printed instruction manuals and printed training manuals in the fields of information technology, communications technology, intelligence gathering, evidence gathering, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; certificates; newsletters; pamphlets; brochures; catalogues; printed advertising materials, namely, printed commercials (advertisements), printed posters, printed brochures, printed leaflets, printed magazines and printed product information sheets.
Class 041
Education and Entertainment Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 042
Computer & Software Services & Scientific Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Class 045
Personal & Legal & Social Services
Compilation and systematization of information into computer databases; management of computer databases; computer data processing; providing data searches in computer files for others; data logging, data storage and data retrieval services; data services, namely identifying, capturing, searching, exploring, analysing, processing, storing, managing, monitoring, aggregating and modelling of data and transactions, and of patterns and networks in data and transactions; business consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; management consulting in the fields of financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; technical management consulting in the fields of information technology, communications technology and computer network security; strategy consulting in the fields of information technology, communications technology, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, attacks on computer networks and computer network security; provision of business information; provision of business management information; business analysis services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; analytics, namely, business intelligence and business lifecycle analysis; business operational analysis services; business research services in the fields of regulatory compliance, risk management, corporate governance, business operational efficiency, marketing and customer research; carrying out studies in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure to provide evidence to support informed decision making; business consulting relating to operational availability, operational capability, capability planning, capability audits, cost analysis and effectiveness analysis; supply chain modelling, namely, mathematical modelling of supply chain networks; business modelling to support operational risk analysis and capability audits; advice and consultancy relating to business risk management; preparation of business reports, commercial reports and economic reports; business simulation to understand and explain business performance; enterprise mapping, namely, developing a breakdown of the key activities required to support a complex multi-organisational enterprise in the achievement of its goals; business facilitation services, namely, designing, running, guiding or chairing meetings to facilitate the reaching of a common goal or to facilitate a productive or successful exchange of information or ideas; identification of business or organisational performance indicators; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; information, advice and consultancy relating to detecting, combating and defending against financial crime, namely, money laundering, financial fraud, debit and credit card fraud and on-line fraud; information, advice and consultancy relating to the monitoring of financial transactions, detecting and preventing suspicious financial behaviour and reducing monetary losses; information, advice and consultancy relating to due diligence, background checks and vetting of customers and potential customers; information, advice and consultancy relating to the identification, investigation, review and management of cases of financial crime of all types; information, advice and consultancy relating to regulatory compliance, operational efficiency, risk management and corporate governance; information technology consultancy services; communications technology consultancy services; research, design, development and customisation of computer software, computer firmware, computer hardware, computer systems and computer architectures; preparation of technical reports; preparation of reports relating to computer data, computer software, computer firmware, computer hardware, computer operating systems, computer networks, communications networks, the security of computer networks and the security of communications networks; installation, integration, implementation, configuration, servicing, maintenance, updating, upgrading, repair and operational support services for computer software; computer software services relating to the searching, mining, collection, gathering, storage, exploration, analysis, processing, management, aggregation, modelling, viewing, sharing and monitoring of data and transactions, namely, patterns and networks in data and transactions; computer software services relating to the detection and prevention of fraud, on-line fraud, financial fraud, financial crime, suspicious behaviour, terrorism operations, smuggling operations, money laundering operations and monetary losses; computer software services relating to identifying, investigating, reviewing and managing cases of financial crime of all types; computer software services, namely, SaaS ("software as a service"), relating to predictive modelling, regulatory compliance, operational efficiency, risk management, risk prevention, corporate governance and customer relationship management; computer software services in the field of due diligence investigations on customers and potential customers; computer software services relating to the analysis and prediction of customer behaviour; computer system monitoring services; analytical services in the fields of computers, computer networks and communications networks; forensic analysis of computer operating systems; forensic analysis, reverse engineering, storage, recovery, conversion, compression and migration of computer data; computer software services in the fields of matching, transforming, sampling, partitioning and analysis of data, namely, financial data, transactions data, Internet traffic data, computer data, communications network data, personal data, behavioural data, audio data, visual data and geographical data; analytical services in the field of computers, computer software, computer networks and communications networks; computer software, computer programs and manuals in electronic form, dealing with artificial intelligence; technical support services, namely, developing technologies for others in the field of artificial intelligence; neural network modelling, namely, mathematical and technical consulting services in the field of neural network technologies; project management services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; industrial analysis and research services in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; providing analytical tools for raising threat alerts; computer virus, malware and spyware protection services; recovery of computer data and computer operating systems; incident management and investigations relating to threats and malicious behaviour in connection with computer operating systems, computer networks and communications networks; geographic mapping and spatial modelling; information, advice and consultancy relating to computer security, computer network security and communications network security; advising and consulting on how to reduce vulnerability to cyber-attacks, how to minimise the damage caused by cyber-attacks, and how to recover from cyber-attacks; computer software services, consultancy and advice in the field of gathering of intelligence and evidence; computer software services, consultancy and advice in the field of explosive ordnance disposal; computer software services, consultancy and advice relating to the countering of improvised explosive devices (IEDs), including minefield clearance; military and defence analysis and consulting; provision of information, advice and consultancy in the fields of information technology, communications technology, law enforcement, crime, financial crime, fraud, regulatory compliance, risk management, corporate governance, business operational efficiency, marketing, customer research, anti-smuggling operations, homeland security, counter-terrorism, attacks on computer networks and attacks on national infrastructure; data security services, namely, provision of services for the secure gathering, storage, retrieval, analysis, monitoring, transmission and exchange of data, namely, personal data, business data, financial data, transactions data, Internet traffic data, computer data, communications network data, behavioural data, audio data, visual data and geographical data; analysis, consulting and advice in relation to national security; homeland security advisory and consultancy services, namely, advising and consulting on how to reduce vulnerability to terrorism, how to minimise the damage caused by terrorist attacks, and how to recover from terrorist attacks.
Compilation and systematization of information into computer databases...
on 18 Dec 2015
3744515 CANADA INC.
1578034 · 16 May 2012
038
Class 038
Communications Services
Telecommunication services in the field of business brokerage, mergers and acquisitions, management consulting, business valuations, business financing services, franchise consulting, namely the electronic transmission of data and information through the operation of an electronic bulletin board.
Telecommunication services in the field of business brokerage, mergers...
Owners
Dean & deluca brands inc. (4)
Umg recordings inc. (3)
Bae systems plc (2)
Casalasco societa' agricola s.P.A. (2)
De fonseca s.P.A. (2)
Groupe leblanc syndic inc. (2)
Migros-genossenschafts-bund (2)
Unilever ip holdings b.V. (2)
1766437 ontario inc. (1)
3744515 canada inc. (1)
Categories
Class 35 (18)
Class 9 (12)
Class 41 (11)
Class 3 (9)
Class 5 (8)
Class 29 (8)
Class 36 (8)
Class 42 (8)
Class 25 (7)
Class 30 (7)
Class 44 (7)
Class 37 (6)
Class 11 (5)
Class 16 (5)
Class 21 (5)
Class 31 (5)
Class 39 (5)
Class 38 (4)
Class 43 (4)
Class 45 (4)
Class 7 (3)
Class 10 (3)
Class 12 (3)
Class 18 (3)
Class 19 (3)
Class 20 (3)
Class 33 (3)
Class 40 (3)
Class 1 (2)
Class 2 (2)
Class 4 (2)
Class 6 (2)
Class 15 (2)
Class 17 (2)
Class 24 (2)
Class 28 (2)
Class 8 (1)
Class 13 (1)
Class 14 (1)
Class 22 (1)
Class 23 (1)
Class 26 (1)
Class 27 (1)
Class 32 (1)
Class 34 (1)
Correspondents
Smart & biggar lp (8)
Baker & mckenzie llp (6)
Gowling wlg (canada) llp (5)
Borden ladner gervais llp (3)
Robic agence pi s.E.C./ robic ip agency lp (3)
Marks & clerk (2)
Benoît & côté inc. (1)
Cabinet juridique st. lawrence s.E.N.C.R.L. (1)
Chitiz pathak llp (1)
Apply for Trademark
Select countries to protect your logo Trademark
Trademark Name
Country Selected
Canada
C$500/ 1 class + gov fee
United States
C$138/ 1 class + gov fee
Canada
C$500/ 1 class + gov fee
Mexico
C$692/ 1 class + gov fee
European Union
C$971/ 1 class + gov fee
China
C$692/ 1 class + gov fee
South Korea
C$969/ 1 class + gov fee
Japan
C$1,108/ 1 class + gov fee
India
C$138/ 1 class + gov fee
United Kingdom
C$692/ 1 class + gov fee
Australia
C$415/ 1 class + gov fee
Israel
C$969/ 1 class + gov fee
United Arab Emirates
C$969/ 1 class + gov fee
New Zealand
C$969/ 1 class + gov fee
Brazil
C$692/ 1 class + gov fee
Taiwan
C$1,108/ 1 class + gov fee
Ukraine
C$1,108/ 1 class + gov fee
Indonesia
C$969/ 1 class + gov fee
South Africa
C$692/ 1 class + gov fee
Singapore
C$1,108/ 1 class + gov fee
Saudi Arabia
C$1,108/ 1 class + gov fee
Afghanistan
C$1,108/ 1 class + gov fee
Algeria
C$1,108/ 1 class + gov fee
Argentina
C$554/ 1 class + gov fee
Austria
C$1,247/ 1 class + gov fee
Bahrain
C$969/ 1 class + gov fee
Bangladesh
C$831/ 1 class + gov fee
Benelux
C$1,385/ 1 class + gov fee
Bhutan
C$1,247/ 1 class + gov fee
Bolivia
C$1,108/ 1 class + gov fee
Botswana
C$1,801/ 1 class + gov fee
British Virgin Islands
C$1,662/ 1 class + gov fee
Bulgaria
C$1,108/ 1 class + gov fee
Cambodia
C$1,108/ 1 class + gov fee
Chile
C$692/ 1 class + gov fee
Colombia
C$969/ 1 class + gov fee
Congo
C$1,662/ 1 class + gov fee
Costa Rica
C$1,247/ 1 class + gov fee
Croatia
C$1,247/ 1 class + gov fee
Cyprus
C$1,385/ 1 class + gov fee
Czech Republic
C$1,247/ 1 class + gov fee
Denmark
C$1,108/ 1 class + gov fee
Curacao
C$1,662/ 1 class + gov fee
Macau
C$969/ 1 class + gov fee
Dominican Republic
C$1,247/ 1 class + gov fee
Aruba
C$1,662/ 1 class + gov fee
Greenland
C$1,108/ 1 class + gov fee
Ecuador
C$1,108/ 1 class + gov fee
Egypt
C$969/ 1 class + gov fee
El Salvador
C$1,108/ 1 class + gov fee
Ethiopia
C$1,524/ 1 class + gov fee
France
C$1,247/ 1 class + gov fee
Gaza
C$1,108/ 1 class + gov fee
Germany
C$1,247/ 1 class + gov fee
Greece
C$1,108/ 1 class + gov fee
Guatemala
C$1,247/ 1 class + gov fee
Haiti
C$1,247/ 1 class + gov fee
Honduras
C$1,247/ 1 class + gov fee
Hong Kong (SAR)
C$1,247/ 1 class + gov fee
Hungary
C$1,524/ 1 class + gov fee
Iraq
C$2,078/ 1 class + gov fee
Italy
C$1,247/ 1 class + gov fee
Jordan
C$1,108/ 1 class + gov fee
Kazakhstan
C$1,108/ 1 class + gov fee
Kenya
C$1,247/ 1 class + gov fee
Kuwait
C$1,108/ 1 class + gov fee
Laos
C$969/ 1 class + gov fee
Lebanon
C$1,385/ 1 class + gov fee
Lesotho
C$1,662/ 1 class + gov fee
Libya
C$1,247/ 1 class + gov fee
Madrid Protocol (WIPO)
C$2,771/ 1 class + gov fee
Malawi
C$1,524/ 1 class + gov fee
Malaysia
C$969/ 1 class + gov fee
Maldives
C$1,385/ 1 class + gov fee
Morocco
C$1,385/ 1 class + gov fee
Mozambique
C$1,247/ 1 class + gov fee
Myanmar
C$1,108/ 1 class + gov fee
Namibia
C$1,108/ 1 class + gov fee
Nepal
C$969/ 1 class + gov fee
Nicaragua
C$1,247/ 1 class + gov fee
Norway
C$1,247/ 1 class + gov fee
Oman
C$1,524/ 1 class + gov fee
Pakistan
C$1,108/ 1 class + gov fee
Panama
C$1,247/ 1 class + gov fee
Paraguay
C$1,247/ 1 class + gov fee
Peru
C$1,108/ 1 class + gov fee
Philippines
C$1,247/ 1 class + gov fee
Poland
C$692/ 1 class + gov fee
Portugal
C$1,247/ 1 class + gov fee
Puerto Rico
C$1,247/ 1 class + gov fee
Qatar
C$1,108/ 1 class + gov fee
Romania
C$1,247/ 1 class + gov fee
Serbia
C$1,247/ 1 class + gov fee
Slovakia
C$1,247/ 1 class + gov fee
Spain
C$1,247/ 1 class + gov fee
Sri Lanka
C$969/ 1 class + gov fee
Swaziland
C$1,801/ 1 class + gov fee
Sweden
C$1,108/ 1 class + gov fee
Switzerland
C$1,247/ 1 class + gov fee
Thailand
C$1,108/ 1 class + gov fee
Tunisia
C$1,247/ 1 class + gov fee
Turkey
C$1,108/ 1 class + gov fee
Uganda
C$969/ 1 class + gov fee
United Republic of Tanzania
C$969/ 1 class + gov fee
Uruguay
C$1,108/ 1 class + gov fee
Venezuela
C$1,247/ 1 class + gov fee
Vietnam
C$1,108/ 1 class + gov fee
West Bank, Palestine
C$1,108/ 1 class + gov fee
Yemen
C$2,355/ 1 class + gov fee
Albania
C$1,247/ 1 class + gov fee
Andorra
C$1,247/ 1 class + gov fee
Angola
C$1,801/ 1 class + gov fee
Antigua and Barbuda
C$1,662/ 1 class + gov fee
Armenia
C$1,108/ 1 class + gov fee
Azerbaijan
C$1,108/ 1 class + gov fee
Bahamas
C$1,940/ 1 class + gov fee
Barbados
C$1,801/ 1 class + gov fee
Belgium
C$1,385/ 1 class + gov fee
Belize
C$1,801/ 1 class + gov fee
Benin
C$1,108/ 1 class + gov fee
Bosnia and Herzegovina
C$1,385/ 1 class + gov fee
Brunei
C$1,801/ 1 class + gov fee
Burkina Faso
C$1,108/ 1 class + gov fee
Burundi
C$1,662/ 1 class + gov fee
Cabo Verde
C$1,247/ 1 class + gov fee
Cameroon
C$1,108/ 1 class + gov fee
Central African Republic (CAR)
C$1,108/ 1 class + gov fee
Chad
C$1,108/ 1 class + gov fee
Comoros
C$1,108/ 1 class + gov fee
Cote d'Ivoire
C$1,108/ 1 class + gov fee
Czechia
C$1,385/ 1 class + gov fee
Djibouti
C$1,662/ 1 class + gov fee
Dominica
C$1,801/ 1 class + gov fee
Equatorial Guinea
C$1,108/ 1 class + gov fee
Eritrea
C$1,385/ 1 class + gov fee
Estonia
C$1,801/ 1 class + gov fee
Eswatini
C$1,801/ 1 class + gov fee
Fiji
C$1,247/ 1 class + gov fee
Finland
C$969/ 1 class + gov fee
Gabon
C$1,108/ 1 class + gov fee
Gambia
C$1,247/ 1 class + gov fee
Georgia
C$1,108/ 1 class + gov fee
Ghana
C$1,385/ 1 class + gov fee
Grenada
C$1,801/ 1 class + gov fee
Guinea
C$1,108/ 1 class + gov fee
Guinea-Bissau
C$1,108/ 1 class + gov fee
Guyana
C$1,801/ 1 class + gov fee
Iceland
C$1,801/ 1 class + gov fee
Ireland
C$1,108/ 1 class + gov fee
Jamaica
C$1,662/ 1 class + gov fee
Kiribati
C$1,385/ 1 class + gov fee
Kosovo
C$1,247/ 1 class + gov fee
Kyrgyzstan
C$1,247/ 1 class + gov fee
Latvia
C$969/ 1 class + gov fee
Liberia
C$1,385/ 1 class + gov fee
Liechtenstein
C$1,385/ 1 class + gov fee
Lithuania
C$969/ 1 class + gov fee
Luxembourg
C$1,385/ 1 class + gov fee
Madagascar
C$1,385/ 1 class + gov fee
Mali
C$1,108/ 1 class + gov fee
Malta
C$831/ 1 class + gov fee
Marshall Islands
C$1,385/ 1 class + gov fee
Mauritania
C$1,108/ 1 class + gov fee
Mauritius
C$1,385/ 1 class + gov fee
Micronesia
C$1,385/ 1 class + gov fee
Moldova
C$1,385/ 1 class + gov fee
Monaco
C$1,940/ 1 class + gov fee
Mongolia
C$831/ 1 class + gov fee
Montenegro
C$1,247/ 1 class + gov fee
Nauru
C$1,385/ 1 class + gov fee
Netherlands
C$1,385/ 1 class + gov fee
Niger
C$1,108/ 1 class + gov fee
Nigeria
C$554/ 1 class + gov fee
North Macedonia
C$1,247/ 1 class + gov fee
Palau
C$1,385/ 1 class + gov fee
Palestine
C$1,385/ 1 class + gov fee
Papua New Guinea
C$1,108/ 1 class + gov fee
Rwanda
C$1,385/ 1 class + gov fee
Saint Kitts and Nevis
C$1,801/ 1 class + gov fee
Saint Lucia
C$1,801/ 1 class + gov fee
Saint Vincent and the Grenadines
C$1,801/ 1 class + gov fee
Samoa
C$1,662/ 1 class + gov fee
San Marino
C$1,385/ 1 class + gov fee
Sao Tome and Principe
C$1,385/ 1 class + gov fee
Senegal
C$1,108/ 1 class + gov fee
Seychelles
C$1,385/ 1 class + gov fee
Sierra Leone
C$1,385/ 1 class + gov fee
Slovenia
C$1,247/ 1 class + gov fee
Solomon Islands
C$1,385/ 1 class + gov fee
Somalia
C$1,385/ 1 class + gov fee
South Sudan
C$1,385/ 1 class + gov fee
Suriname
C$2,217/ 1 class + gov fee
Tajikistan
C$1,108/ 1 class + gov fee
Tanzania
C$969/ 1 class + gov fee
Timor-Leste
C$1,385/ 1 class + gov fee
Togo
C$1,108/ 1 class + gov fee
Tonga
C$1,801/ 1 class + gov fee
Trinidad and Tobago
C$1,662/ 1 class + gov fee
Turkmenistan
C$1,108/ 1 class + gov fee
Tuvalu
C$1,385/ 1 class + gov fee
Uzbekistan
C$969/ 1 class + gov fee
Vanuatu
C$1,662/ 1 class + gov fee
Zambia
C$1,247/ 1 class + gov fee
Zimbabwe
C$1,247/ 1 class + gov fee
OAPI
C$1,247/ 1 class + gov fee
ARIPO
C$1,385/ 1 class + gov fee