1 1 Protecting You, Protecting U.S.. 2 2 A Summary of the SAFETY Act The Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (SAFETY.

Slides:



Advertisements
Similar presentations
The SAFETY Act The Support Anti-terrorism by Fostering Effective Technologies Act of 2002 June 2012 Bruce Davidson Director, Office of SAFETY Act Implementation.
Advertisements

Module 1 Evaluation Overview © Crown Copyright (2000)
A Joint Code of Practice Objectives and Summary Presentation
ASARECA Procurement guidelines Goods and Works. PROCUREMENT OF GOODS By P rocurement and C ontracting Officer ITAZA MUHIIRWA.
Office of Purchasing and Contracts Procurement Outreach Training Level II - Module D State Finance Law; Ethics; OMB Guidelines.
Personnel Background Investigations. Introduction The interests of the national security require that all persons privileged to be employed in the departments.
Transition from Q1- 8th to Q1- 9th edition
Information Risk Management Key Component for HIPAA Security Compliance Ann Geyer Tunitas Group
1 1 From Science and Technology… Security and Trust From Science and Technology… Security and Trust Protecting you, Protecting U.S. SAFETY Act The Support.
CONFIDENTIAL Business Development Tools.  After 9/11/2001 companies threatened to remove anti-terrorism technologies and services from homeland security.
Securing the Chemical Sector: An Outline of the Chemical Facility Anti-Terrorism Standards (CFATS) Program May 2008.
1 Disclaimer The following information was presented by Andrew Levy of the Office of General Counsel of DHS on June 12, 2007 at the 2007 Chemical Sector.
Introduction to the State-Level Mitigation 20/20 TM Software for Management of State-Level Hazard Mitigation Planning and Programming A software program.
New HR Challenges in the Dynamic Environment of Legal Compliance By Teri J. Elkins.
ISO General Awareness Training
Computer Security: Principles and Practice
Supplier Ethics: Program Checklist
ISO 9000 Certification ISO 9001 and ISO
Actionable Process Steps and Focused Mitigation Strategies
4. Quality Management System (QMS)
4. Quality Management System (QMS)
QUALITY MANAGEMENT SYSTEM ACCORDING TO ISO
Introduction to ISO New and modified requirements.
Risk Management & Liability Informa Brownfield Hospital Development Summit June 2009.
UNCLASSIFIED User Guide Applicant. UNCLASSIFIED Table of Contents What is the SAFETY Act? Applicant Guide Help Desk.
© 2007 McNees Wallace & Nurick LLC The Value of Employment Practices Liability Insurance Andrew L. Levy McNees Wallace & Nurick.
Planning an Audit The Audit Process consists of the following phases:
WHY CONFORMITY ASSESSMENT?. What is conformity assessment?  Conformity assessment is the name given to processes that are used to demonstrate that a.
Presented to: SBAS Technical Interoperability Working Group Date: 21 June 2005 Federal Aviation Administration Certification of the Wide Area Augmentation.
UNDERSTANDING THE SAFETY ACT February 23, 2005 Presented by Matt Schlesinger Kurt Ferstl.
Oconee County Hazard Mitigation Plan Update Kickoff Meeting Brian Laughlin Hazard Mitigation Planner Georgia Emergency.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
EARTO – working group on quality issues – 2 nd session Anneli Karttunen, Quality Manager VTT Technical Research Centre of Finland This presentation.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Auditing Information Systems (AIS)
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
July LEReC Review July 2014 Low Energy RHIC electron Cooling Edward T. Lessard ESHQ.
FleetBoston Financial HIPAA Privacy Compliance Agnes Bundy Scanlan Managing Director and Chief Privacy Officer FleetBoston Financial.
Equitable Services, Part 2 Planning for Equitable Services Virginia Department of Education Office of Program Administration and Accountability Title I.
Exercise 1 Tor Stålhane IDI / NTNU. Intro The strength of ISO 9001 and many other standards is that they focus on “What shall be done” and leave “How.
Chapter 20 Additional Assurance Services: Other Information McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Information Security 14 October 2005 IT Security Unit Ministry of IT & Telecommunications.
Diploma in Procurement & Supply Business needs in Procurement & Supply Session 1 Business Needs and Procurement Decisions.
“Biodefense Acquisition Authorities, Procedures, and Liability Protections.” Presented by Mark J. Robertson Klitenic Robertson PLLC ABA Public Contract.
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Fiscal Year 2007 Urban Area Security Initiative Nonprofit Security Grant Program Investment Justification Questions, Criteria, and Prioritization Methodology.
1 1 Protecting you, Protecting U.S. SAFETY Act October 30, 2008 The Support Anti-terrorism by Fostering Effective Technologies Act of 2002.
ISO 9001:2015 Subject: Quality Management System Clause 8 - Operation
Safety Management Standards. Introduction Health and Safety Procedures (which identify the risks, hazards and ways of mitigating these) are weak in that.
FDIC Perspective on Environmental Risk Presented by: Gordon Stoner Legal Division Federal Deposit Insurance Corporation May 6, 2008.
WORKSHOP ON ACCREDITATION OF BODIES CERTIFYING MEDICAL DEVICES INT MARKET TOPIC 9 CH 8 ISO MEASUREMENT, ANALYSIS AND IMPROVEMENT INTERNAL AUDITS.
1 EASTERN MUNICIPAL WATER DISTRICT Risk Management and Insurance Program Doug Hefley Director of Safety, Risk and Emergency Management June.
A risk assessment is the process of identifying potential hazards an organization may face and analyzing methods of response if exposure occurs.
Technology Services – National Institute of Standards and Technology Conformity Assessment ANSI-HSSP Workshop Emergency Communications December 2, 2004.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Business Continuity Planning 101
Import Safety Phase 2 Workgroup 1.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Campus Wide Safety Committee Initial Meeting 11/9/16
What Is ISO ISO 27001, titled "Information Security Management - Specification With Guidance for Use", is the replacement for BS It is intended.
Chapter 20 Additional Assurance Services: Other Information
Chapter 3: IRS and FTC Data Security Rules
I have many checklists: how do I get started with cyber security?
What Is VQIP? FDA required to establish a program to provide for the expedited review of food imported by voluntary participants. Eligibility is limited.
Presentation transcript:

1 1 Protecting You, Protecting U.S.

2 2 A Summary of the SAFETY Act The Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (SAFETY Act) was enacted as part of the Homeland Security Act of 2002 (Title VIII, Subtitle G) Intended to facilitate the development and deployment of anti-terrorism technologies by creating systems of “risk management” and “litigation management” Protections apply only to claims arising out of, relating to, or resulting from an Act of Terrorism

3 3 What is considered an “Anti-Terrorism Technology?” Any technology that is designed, developed, modified or procured for preventing, detecting, identifying, or deterring acts of terrorism or limiting the harm such acts might otherwise cause

4 4 What is Eligible for SAFETY Act Protections? The SAFETY Act liability protections apply to a vast range of technologies, including: Products Services Software and other forms of intellectual property Examples of eligible technologies: Threat and vulnerability assessment services Detection Systems Blast Mitigation Materials Screening Services Sensors and Sensor Integration Threatening Object Detectors Decision Support Software Security Services Crisis Management Systems

5 5 The Different Levels of SAFETY Act Protection The SAFETY Act provides different levels of liability protections to help promote the creation, deployment and use of anti-terrorism technologies: Developmental Testing and Evaluation (DT&E) Designation Designation Certification

6 6 Snapshot of the Distinction Certification: High confidence it will continue to be effective. Designation: Proven effectiveness. DTED: Additional evidence of effectiveness needed. Shows potential.

7 7 Benefits of SAFETY Act Designation Liability = Insurance required by DHS Exclusive action in Federal court No joint and several liability for non-economic damages No punitive damages or prejudgment interest Plaintiff's recovery reduced by amounts from collateral sources

8 8 SAFETY Act Protections Extend to Users “Such cause of action may be brought only against the Seller of the QATT and may not be brought against the buyers, the buyers’ contractors, downstream users of the QATT, the Seller’s suppliers or contractors, or any other person or entity…” Preamble to Final Rule, 6 CFR Part 25, at

9 9 Criteria for SAFETY Act Designation Prior United States Government use or demonstrated substantial utility and effectiveness Availability of the Technology for immediate deployment in public and private settings Existence of extraordinarily large or unquantifiable potential third party liability risk exposure to the Seller or other provider of the technology Substantial likelihood that the Technology will not be deployed unless SAFETY Act risk management protections are extended Magnitude of risk exposure to the public if the Technology is not deployed Evaluation of scientific studies that can be feasibly conducted in order to assess the capability of the Technology to substantially reduce risks of harm Whether the Technology is effective in facilitating the defense against Acts of Terrorism ATT determination made by Federal, State, or local officials Red=Technical criterion Blue=Economic criterion

10 What Do We Look for in Terms of Effectiveness in a SAFETY Act Application? Successful testing in operational environment  Operational testing Evidence of performance metrics, including: oProbability of Detection oFalse Positive and False Negative Rates oLimits of Detection (and why that limit is relevant) oInterferrents oMaintenance and Training Suitable performance of past deployments documented Domain expertise appropriate and available In/external audits favorable Customer feedback favorable QA plans documented Repeatability proven

11 What Are the Benefits of SAFETY Act Certification? In addition to the benefits provided under Designation, Certification allows a Seller to: Assert the Government Contractor Defense for claims arising from acts of terrorism Be placed on DHS’s Approved Products List for Homeland Security Certificate of Conformance issued to the Seller

12 Additional Criteria for Certification Designation is a prerequisite for granting Certification To receive Certification, a Qualified Anti- terrorism Technology must also be shown to:  Perform as intended  Conform to the Seller’s specifications  Be safe for use as intended Seller is required to provide safety and hazard analyses

13 Certification Performs as intended: High confidence it will continue to be effective Consistent positive results (e.g., long-term low failure rates and false alarms) Reliability/Availability is high (e.g., MTBF) Performs in accordance with performance specifications Installation, use, maintenance procedures proven Documented processes (e.g., training, hiring, technology refresh) are being followed Standards are identified and met QA/QC processes are effective Note: Designation is a prerequisite

14 Developmental Testing and Evaluation Designation (DT&E Designation) Certain Anti-Terrorism Technologies being developed could serve as homeland security resources, but require additional testing and evaluation Provides SAFETY Act liability protection (Designation) for a limited term (presumptively not longer than 36 months), usually limited to certain deployment sites.

15 Details of Developmental Testing and Evaluation Designation May be appropriate if your Technology Is in a prototype stage Has lab tests that are not operational in nature (too controlled) Indicates potential effectiveness Has a testing scenario identified and “customers” to prove relevant metrics *Needs protections nevertheless due to liability during testing scenario or deployment during “heightened risk”

16 SAFETY Act Award Summary DTEDDesignationCertification Effectiveness Evaluation Needs more proof, but potential exists Proven effectiveness (with confidence of repeatability) Consistently proven effectiveness (with high confidence of enduring effectiveness) ProtectionLiability cap only for identified test event(s) and for limited duration (≤3yrs) Liability cap for all deployments made within 5-8 year term— protections in perpetuity Government Contractor of Defense (GCD) for all deployments made within 5-8 year term—protections in perpetuity

17 How is Your Proprietary Data Protected? Strong data protection measures that conform to DHS information security standards All application reviewers are screened for conflicts of interests, sign conflict of interest statements for each application they review, and sign general nondisclosure agreements

18 Who are the SAFETY Act Reviewers? Approximately 420 experts available to review applications. Conflict of Interest & Non-Disclosure Agreement signed by each reviewer per application. Three Technical Reviewers and two Economic Reviewers per application. Reviewers from the FFRDCs, non-profits, Federal Government, Federal & National Labs, and Academia already trained reviewers (SMEs) in:  Chemical  Biological  Explosive  Rad/Nuc  Human  Services  Cyber  Economic

19 Pre-Application Consultation Provided at no cost (as is the rest of the program) Offer the opportunity to have a teleconference with the Office of SAFETY Act Implementation staff Receive a preliminary assessment of your product or service and its potential eligibility for SAFETY Act liability protections Obtain guidance for completing the applications for Designation and Certification Ask us questions!

20 How to Apply to the SAFETY Act The SAFETY Act application kit with instructions and forms may be found and completed at This site also contains information on the SAFETY Act statute and other reference materials. $ = 0

21 Additional SAFETY Act Information Online:  FAQs  Help Topics  Help Desk: Online form for questions requiring an individual response Toll-Free: