Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

National Fire Protection Association

Approved: November 14, 2012 | Expires: December 31, 2017

The National Fire Protection Association, Inc.(“NFPA”) is an American National Standards Institute (“ANSI”) Accredited Standards Development Organization, that has developed NFPA/American National Standards using the NFPA Codes and Standards Development Process, which meets the requirements of due process and criteria for approval and withdrawal of American National Standards (the “Technology”). The Technology is a set of codes and standards that address anti-terrorism technologies in the areas of personal protective garments, equipment, professional qualifications for first responders, and for preparedness planning for infrastructure and enterprise protection, fire protection systems, and for critical electrical and building systems.


Rapiscan Systems, Inc.

Approved: November 14, 2012 | Expires: December 31, 2017

Rapiscan Systems, Inc. provides Cargo and Vehicle Inspection Systems ("CVIS" or the "Technology"). The Technology consists of two product lines, the Rapiscan GaRDS and Eagle which use either X-ray or Gamma-Ray radiation to scan vehicles, containers, rail cars, cargo and the like. The Technology also includes safety trianing, installation, maintenance, warranty services, and user manuals.


JAS Forwarding (USA), Inc.

Approved: November 05, 2012 | Expires: November 30, 2017

JAS Forwarding (USA), Inc. provides Certified Cargo Screening Facilities (the "Technology"). The Technology, Certified Cargo Screening Facilities, is designed to aid in meeting the congressional mandate that 100 percent of cargo placed on passenger airplanes be screened. The Technology includes, and provides, screeners and programmatic personnel for the screening of cargo in accordance with the Transportation Security Administration’s (“TSA’s”) Certified Cargo Screening Program at TSA-approved Certified Cargo Screening Facilities.


Northrop Grumman Security Systems, LLC

Approved: October 19, 2012 | Expires: November 30, 2017

Northrop Grumman Security Systems, LLC, Northrop Grumman Systems Corporation, and Northrop Grumman Corporation provide the Guardian™ System (the "Technology"). The Technology is an infrared countermeasures system designed to provide protection for aircraft from infrared-guided Man-Portable Air Defense Systems ("MANPADS"). The Technology also includes installation, training, and maintenance services.


Chemring Detection Systems, Inc.

Approved: October 01, 2012 | Expires: October 31, 2015

Chemring Detection Systems, Inc. provides JUNO® (the "Technology"). The Technology is a hand-held vapor detector designed to detect various Toxic Industrial Chemicals, Chemical Warfare Agents, and other potential threats. The Technology also includes optional training and a user’s manual


AlliedBarton

Approved: September 25, 2012 | Expires: October 31, 2017

Allied Security Holdings, LLC, AlliedBarton Security Services, LLC, AlliedBarton (NC) LLC, and AlliedBarton Security Services provides Physical Security Services (the "Technology"). The Technology is physical security services to commercial and government facilities, including but not limited to, various critical infrastructure locations. The Technology may include: physical security guard services that perform on-site and off-site surveillance operations; access control/perimeter control; vehicle and foot patrols; screening of persons, packages, and vehicles; alarm system monitoring and response; site supervision; emergency response operations; and security guard management. The Technology also includes its qualified personnel and its recruiting, retention, and training practices and procedures.


Raytheon Company

Approved: September 25, 2012 | Expires: March 31, 2013

Raytheon Company and Raytheon Technical Services Company, LLC provide Criminal Information Sharing Services (the "Technology"). The Technology is a set of systems engineering and integration services that are used to aid the creation of a secure network system that enables law enforcement agencies to share cross jurisdictional information to provide assistance in the prevention or investigation of Acts of Terrorism.


Accenture LLP

Approved: September 24, 2012 | Expires: October 31, 2017

Accenture LLP provides Holds Notification Capabilities. The Technology is a software component used by United States Postal Service’s ("USPS") Global Business Systems Solutions ("GBS") software (the "Technology"). The Technology is used to place holds/alerts on mail/packages within the USPS system for further inspection. The Technology also includes Accenture LLP’s personnel who conduct the attendant services, personnel training, as well as reports and recommendations, manuals, checklists, and technical documents related to the Technology.


IDV Solutions, LLC

Approved: September 18, 2012 | Expires: October 31, 2017

IDV Solutions, LLC provides Visual Fusion (the "Technology"). The Technology is a system that provides a consolidated view of data from disparate sources such as incident management and 911 dispatch systems, GPS, sensor devices, live video feeds, and access control devices to allow users to interact with and analyze the data geographically on the map, chronologically using timelines, or through interactive charts and graphs. The Technology also includes training, help-desk services, and maintenance support.


Lockheed Martin Corporation

Approved: September 07, 2012 | Expires: September 30, 2017

The Lockheed Martin Corporation provides its Integrated Coastal and Border Surveillance System and Services (“ICBSS and Services” or the "Technology"). The Technology provides a capability for the tracking of vessels in coastal maritime areas and items of interest in land border areas, to detect possible threats of harm by automating the detection of suspicious activity, providing support in the interdiction process, and by supporting post incident analysis and forensic investigations. The Technology also includes design, software development, testing, training, and maintenance support services.