Trademarkia Logo

Canada

C$
NordSec
APPROVED

on 27 May 2025

Last Applicant/ Owned by

NordSec B.V.

Fred. Roeskestraat 115 NL-1076 EE Amsterdam

NL

Serial Number

2163790 filed on 29th Sept 2021

Correspondent Address

SMART & BIGGAR LP

SUITE 1000, 55 METCALFE STREETP.O. BOX 2999, STATION DOTTAWA

ONTARIO

CA

K1P5Y6

NordSec

Trademark usage description

scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, Read More

Classification Information


Class [009]
Scientific, research, navigation, surveying, photographic, cinematographic, audiovisual, optical, weighing, measuring, signaling, detecting, testing, inspecting, life-saving and teaching apparatus and instruments, namely, computer security hardware and security tokens used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling the distribution or use of electricity used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; apparatus and instruments for recording, transmitting, receiving, storing, reproducing or processing sound, images or data, namely, computers, computer hardware, computer network hubs, switches and routers, computer network adapters, computer network bridges used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computers and computer peripheral devices, namely, virtual private network [VPN] hardware used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer hardware; anti-ad computer software; anti-malware computer software; anti-spam computer software; anti-tracking computer software; antispyware software; computer application software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy, namely, security software, computer software for biometric systems for the identification and authentication of persons, encryption software, cryptography software, password storage software and password management software; computer software for cloud computing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; security software; cloud servers; computer network server; computer network adapters; computer network bridges; computer network hubs; computer network routers; computer networking hardware, namely, computer network hubs, switches and routers, computer network-attached storage [NAS] hardware; computer network switches; wide area computer network apparatus, namely, computer hardware for setting up and configuring wide area networks; local area computer network apparatus, namely, computer hardware for setting up and configuring local area networks; computer software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for biometric systems for the identification and authentication of persons; computer software for controlling and managing access server applications; computer software for privacy violation detection and for informing and protecting a user's privacy; computer security software for web content filtering; downloadable and recorded computer software packages consisting of security software for use in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates data compression in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software which facilitates the routing of communications and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for cryptography in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for data communications in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; data communication network devices, namely, network gateways, cloud storage gateways, network gateway proxy servers and modems; data communication network servers; data communication network routers; data communication network hubs; data communication network adapters; data communication network bridges; computer software for data processing in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for enabling virtual private network (VPN) operation on computers; downloadable computer software for encrypting any kind of electronic data for transmission through a secure and private connection over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software for providing secure and private access for users to the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; downloadable computer software that enables users of computers and mobile computing devices to securely connect to a remote server in order to allow for secure and private transmission of communications over the Internet in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; encryption software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; local area network (LAN) hardware, access points and computer cards; wireless local area network (LAN) hardware, access points and computer cards; computer hardware for setting up and configuring local area networks; mobile software in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network access server operating software; computer software for network management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software that allows users to connect to websites through a proxy server in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; proxy server software for managing and controlling network gateway proxy servers used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; VPN (virtual private network) operating software; VPN (virtual private network) hardware; computer software for creating, sending and receiving email; downloadable electronic mail software; electronic mail terminals, namely, computer terminals; electronic mail servers; software for ensuring the security of electronic mail; computer hardware for remotely accessing and transmitting data; encryption apparatus, namely, encryption units used in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; hardware and software for managing encryption and passwords; computer software for database management in the field of cryptographic network security, website security and data security; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software for detecting, blocking, and intercepting malware and other threats to computer hardware and software; computer software for encrypting and authenticating data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for encryption in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; computer software for securing identity in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for authentication and identity management in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for digital information and data access in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software and firmware for the management, transmission, and storage of data and information in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in networking computers in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for monitoring computers and websites for security purposes in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for accessing databases in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer software for use in vulnerability scanning of networks and websites.


Classification kind code

11

Class [038]
Telecommunications services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; Telecommunications services, namely, electronic transmission of audio and video content in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; email services; electronic mail and mailbox services; transmission of electronic mail; data transmission by electronic mail; providing electronic transmission of secure e-mail and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; communication via virtual private networks, namely, providing virtual private network (VPN) services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; network services for enabling securely connect to a remote server in order to allow for secure and private transmission and receipt of data and communications [digital data communication services]; network services for enabling virtual private network (VPN) operation [digital data communication services]; providing users with secure remote access via the Internet to private computer networks; providing virtual private network (VPN) services; remote data access services, namely, providing secure remote access via the internet to private computer networks in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; providing secure remote access via the internet to private computer networks; provision of access to data or documents stored electronically in central files for remote consultation, namely, providing multiple user access to global computer information networks for the transfer and dissemination of information and files in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.


Classification kind code

11

Class [042]
Scientific and technological research and design in the fields of computer hardware and computer software for use in cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; design and development of computer hardware and software; data security services; cloud computing, namely, cloud hosting provider services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; cloud services in the nature of updating of computer software relating to computer security and prevention of computer risks; computer network configuration services; computer network security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; data encryption services, data decryption services and authentication services for computer security of information, messages and data in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; information services relating to the development of computer networks; monitoring of computer network systems for detecting unauthorized access or data breach in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; technical support, namely, monitoring technological functions of computer network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS] in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; data encryption and decryption services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; hosting computer applications of others in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in ecommerce transactions; information, consultancy and advisory services relating to all of the aforesaid.


Classification kind code

11

Class [045]
Licensing of databases; software licensing; security services in the fields of cybersecurity, digital security, information security, file storing, file sharing, password management, virtual networks, encryption, authentication and privacy.


Classification kind code

11

Mark Details


Serial Number

2163790

Mark Type

Trademark

Legal History


Show more

Action TakenStatus
Submitted for opposition 236
on 7th Dec 2022
Partial Withdrawal - Madrid Protocol
Submitted for opposition 256
on 5th Dec 2022
Notification of Possible Opposition Sent
Submitted for opposition 67
on 7th Oct 2022
Agent Name Changed
Submitted for opposition 135
on 28th Jul 2022
Amendment to Application
Submitted for opposition 48
on 13th Apr 2022
Agent Changed
Submitted for opposition 257
on 3rd Feb 2022
Designation Notification - Madrid Protocol
Submitted for opposition 1
on 2th Feb 2022
Created
Submitted for opposition 31
on 2th Feb 2022
Formalized
Submitted for opposition 30
on 29th Sept 2021
Filed
Submitted for opposition 228
on 29th Sept 2021
International Registration