EUTM file information

019084535

Monse


September 25, 2024

Trademark Summary

The trademark application Monse was filed by CIES CIBERSEGURIDAD Y CUMPLIMIENTO, S.L., a corporation established under the laws of the Kingdom of Spain (the "Applicant"). The application was published for oppositions on October 1, 2024, and still open for oppositions.

The application was filed in Spanish (English was selected as the second language).


Goods And Services

  • The mark was filed in class 9 with following description of goods:
    1. Information technology and audio-visual, multimedia and photographic devices
    2. Downloadable and recorded content
    3. Software
    4. Databases (electronic)
    5. Interactive databases
    6. Electronic databases recorded on computer media
    7. Prerecorded CD-ROMs
    8. Multi-media recordings
    9. E-books
    10. USB web keys
    11. Training manuals in the form of a computer program
    12. Instruction manuals in electronic format
    13. Electronic publications recorded on computer media
    14. Electronic publications, downloadable
    15. Computer software platforms, recorded or downloadable
    16. Computer software platforms
    17. Application software
    18. Computer programmes stored in digital form
    19. Computer shareware
    20. Computer software downloaded from the internet
    21. Computer programs, downloadable
    22. Computer programs, recorded
    23. Freeware
    24. Interactive computer software
    25. Computer programmes for use in telecommunications
    26. Data processing programs
    27. Programs for computers
    28. Artificial intelligence software for analysis
    29. Computer programmes for data processing
    30. Downloadable software
    31. Computer software downloadable from global computer networks
    32. Computer software downloadable from global computer information networks
    33. Computer software
    34. Downloadable software applications
    35. Computer software development tools
    36. Computer application software
    37. Risk detection software
    38. CAD-CAM software
    39. Application software for cloud computing services
    40. Virtual assistant software
    41. Computer software to enable the searching of data
    42. Information retrieval software
    43. Intelligent gateways for real-time data analysis
    44. Machine learning software
    45. Artificial intelligence software
    46. Interactive software based on artificial intelligence
    47. Software for the integration of artificial intelligence and machine learning in the field of Big Data
    48. Artificial intelligence and machine learning software
    49. Business intelligence software.
  • The mark was filed in class 42 with following description of goods:
    1. Artificial intelligence consultancy
    2. Research in the field of artificial intelligence technology
    3. Technology consultation in the field of artificial intelligence
    4. Quality control
    5. Quality control and authentication services
    6. Process monitoring for quality assurance
    7. Quality control relating to computer software
    8. Quality control for others
    9. Providing quality assurance services
    10. IT security, protection and restoration
    11. Authentication services for computer security
    12. Computer security consultancy
    13. Testing, authentication and quality control
    14. Science and technology services
    15. Design services
    16. IT services
    17. Computer analysis
    18. Computer hardware development
    19. Development of computers
    20. Development of systems for the processing of data
    21. Development of computer systems
    22. Development of systems for the storage of data
    23. Development of systems for the transmission of data
    24. Software development, programming and implementation
    25. Design of computer machine and computer software for commercial analysis and reporting
    26. Design and development of electronic database software
    27. IT project management
    28. Computer project management services
    29. Maintenance of data processing software
    30. Advice relating to the development of computer systems
    31. Providing technical advice relating to computer hardware and software
    32. Consultancy relating to software maintenance
    33. Consultancy in the field of computer system integration
    34. Information technology consulting
    35. Consultancy in the field of security software
    36. Professional consultancy relating to computer security
    37. Computer software consultancy
    38. Information technology [IT] consultancy
    39. Technical consultancy relating to the application and use of computer software
    40. Technical consultancy relating to the installation and maintenance of computer software
    41. Technical consultancy relating to the use of computer hardware
    42. Computer feasibility studies
    43. Consultancy and advice on computer software and hardware
    44. Consultancy and information services relating to the design, programming and maintenance of computer software
    45. Provision of reports relating to computing
    46. Updating of computer software
    47. Updating of computer software relating to computer security and prevention of computer risks
    48. Developing and updating computer software
    49. Creating of computer programs
    50. Software creation
    51. Development of computer hardware and software
    52. Development of data programs
    53. Development of software for secure network operations
    54. Design of web pages
    55. Design and development of Internet security programs
    56. Design and development of antivirus software
    57. Implementation of computer programs in networks
    58. Installation of computer software
    59. Maintenance of computer software relating to computer security and prevention of computer risks
    60. Hosting of Access Control as a Service (ACaaS) servers and software
    61. Computer security threat analysis for protecting data
    62. Development of technologies for the protection of electronic networks
    63. Digital forensic investigations in the field of computer crimes
    64. Monitoring of computer systems for detecting unauthorized access or data breach
    65. Monitoring of computer systems for security purposes
    66. Provision of security services for computer networks, computer access and computerised transactions
    67. Reconstruction of database systems for others
    68. Cloud-based data protection services
    69. Data recovery services
    70. Computer security services for protection against illegal network access
    71. Computer security services in the nature of administering digital certificates
    72. Computer security system monitoring services
    73. Electronic monitoring of personally identifying information to detect identity theft via the internet
    74. Encryption, decryption and authentication of information, messages and data.