EUTM file information

019059701


July 24, 2024

Trademark Summary

The trademark application was filed by Deeploi GmbH, a corporation established under the laws of the Federal Republic of Germany (the "Applicant"). The application was published for oppositions on July 31, 2024, and still open for oppositions.

The application was filed in German (English was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Software
    2. Mobile apps
    3. Application software
    4. Computer software
    5. Computer software for mobile phones
    6. Computer software platforms, recorded or downloadable
    7. Computer programs, downloadable
    8. Mobile software
    9. Web application and server software
    10. Databases.
  • The mark was filed in class 42 with following description of goods:
    1. Updating of computer software
    2. Software design for others
    3. Computer virus protection services
    4. Electronic data storage
    5. Creating and designing website-based indexes of information for others [information technology services]
    6. Off-site data backup
    7. Monitoring of computer systems by remote access
    8. Installation of computer software
    9. Software as a service [SaaS]
    10. Monitoring of computer systems to detect breakdowns
    11. Monitoring of computer systems for detecting unauthorized access or data breach
    12. Maintenance of computer software
    13. Troubleshooting of computer hardware and software problems
    14. Remote server administration
    15. Monitoring of computer system operation by remote access
    16. Computer services concerning electronic data storage
    17. Data back-up services
    18. Electronic data storage and data back-up services
    19. Remote computer backup services
    20. Configuration of computer networks by software
    21. Configuring computer hardware using software
    22. Computer firewall services
    23. Provision of security services for computer networks, computer access and computerised transactions
    24. Computer security threat analysis for protecting data
    25. Computer system monitoring services
    26. Data recovery services
    27. Data security services [firewalls]
    28. Computer security services for protection against illegal network access
    29. IT services for data protection
    30. Monitoring of computer systems for security purposes
    31. Monitoring of network systems
    32. Computer security system monitoring services
    33. Disaster recovery services for computer systems
    34. Disaster recovery services (Computer -)
    35. Disaster recovery services for data communications systems
    36. Recovery of computer data
    37. IT services.