ABSOLUTE

Welcome to the Brand page for “ABSOLUTE”, which is offered here for The mark consists of the term absolute appearing in stylized letters with the letter a represented by an inverted v with a solid, contrasting line running parallel to the left of the inverted v.;computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; computer software for tracking and managing information for use in the field of information technology service management; computer software for tracking and managing information for use in the field of information technology asset management for mobile devices; computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; computer security software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; equipment, pre-recorded disks featuring computer security software and erasable programmable read only memories (eproms) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith;color is not claimed as a feature of the mark.;(based on section 44) services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, monitoring services for security purposes wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices;installation, implementation and maintenance of computer software for use in the field of information technology asset and lifecycle management and power management; installation, implementation and maintenance of computer software for use in the field of information technology service management; installation, implementation and maintenance of computer software for use in the field of information technology asset management for mobile devices; installation, implementation and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures;.

Its status is currently believed to be active. Its class is unavailable. “ABSOLUTE” is believed to be currently owned by “Absolute Software Corporation”.


Owner:
ABSOLUTE SOFTWARE CORPORATION
Owner Details
Description:
The mark consists of the term ABSOLUTE appearing in stylized letters with the letter A represented by an inverted V with a solid, contrasting line running parallel to the left of the inverted V.;Computer software for tracking and managing information for use in the field of information technology asset and lifecycle management and power management; computer software for tracking and managing information for use in the field of information technology service management; computer software for tracking and managing information for use in the field of information technology asset management for mobile devices; computer software that generates security access codes for accessing self-encrypting drives; computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures; computer security software for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; equipment, pre-recorded disks featuring computer security software and erasable programmable read only memories (EPROMS) for security systems for computers, computer tablets, personal digital assistants, mobile phones and other computing devices; and instruction manuals sold together as a unit therewith;Color is not claimed as a feature of the mark.;(Based on Section 44) Services for monitoring and tracking computers, computer tablets, personal digital assistants, mobile phones and other computing devices and for locating lost or stolen computers, computer tablets, personal digital assistants, mobile phones and other computing devices, monitoring services for security purposes wherein telecommunications equipment is maintained to receive telephone signals originating with computers, computer tablets, personal digital assistants, mobile phones and other computing devices programmed with software designed to contact the monitoring service center on a regular basis or in the event of theft or loss of the computers, computer tablets, personal digital assistants, mobile phones and other computing devices;Installation, implementation and maintenance of computer software for use in the field of information technology asset and lifecycle management and power management; installation, implementation and maintenance of computer software for use in the field of information technology service management; installation, implementation and maintenance of computer software for use in the field of information technology asset management for mobile devices; installation, implementation and maintenance of computer software for use in the field of generation of security access codes for accessing self-encrypting drives; installation, implementation and maintenance of computer software pre-loaded into personal mobile devices for the protection of data by activating automatic enforcement of data protection policies and procedures;
Categories: