Safety Act Certification
This designation will expire on october 31 2024.
Safety act certification. The act applies to a broad range of technologies including products services and software or combinations thereof. These can stem from physical financial or cyber network risks. If a technology achieves safety act certification it will also be placed on dhss approved products list for homeland security. As part of the homeland security act of 2002 public law 107 296 congress enacted the support anti terrorism by fostering effective technologies act safety act of 2002.
The technology is a remote system allowing for the transmission of x ray images to a remotely located bomb technician who provides immediate safety advice for the x ray machine operator. The safety act created liability limitations for claims resulting from an act of terrorism where qualified anti terrorism technologies qatts have been deployed. The technology also includes the recruitment hiring and training of smarttech personnel. Notably in the safety act context the government contractor defense applies not only to those selling to the federal government but also to those selling to state and local governments and the private sector as well.
The under secretary for science and technology is the deciding official for safety act applications. The dhs office of safety act implementation osai and office for bombing prevention obp share a mutual dhs mission space. Safety act certification provides a strong defense up to and potentially including dismissal of such claims. We help educate corporations schools and other organizations in evaluating and understanding the safety act and terrorism related liability exposures and financial risks.
Videos the office of safety act implementation. Page 1 next page. Both of these technologies are now safety act certified and fireeye will receive. To help prepare venues entities and people to reduce risk and mitigate effects from large scale catastrophic terrorist attacks by effectively using training and other integral layers of security to identify detect deter respond to or otherwise mitigate the impact.