SlideShare a Scribd company logo
1 of 19
Download to read offline
www.kidnappedapp.com
Safe Building App
Protecting People, Places and
Things in that order!
www.kidnappedapp.com
Index
• 1 APP is actually 2!
• Overview of the APP
• How they work
– USER App.
– RESPONDER App.
• App Benefits
• What is next.
www.kidnappedapp.com
1 App is actually 2 Apps (1 is 2, 1)
• The Safe Building App has 2 separate
App components:
– USER App is delivered to the Building
Users or Occupants. These are the “eyes”
and “ears” of the System.
• There can be thousands of these.
– RESPONDER App is delivered to and
used by the Security Team.
• There is one of these!
www.kidnappedapp.com
1 App is actually 2 Apps (1 is 2, 2)
• The USER App is loaded onto Smart
phones and has an easy to easy menu
and set up.
– There are 5 Operational Modes:
• Standby/Test/Incident/Travel/Danger
– It allows the USER to communicate instantly
with Security/Responder when needed.
– Once activated data is delivered to Security.
– The Security Team can transfer data back
to the USERS to ensure Public SAFETY.
www.kidnappedapp.com
1 App is actually 2 Apps (1 is 2, 3)
• The USER App transmits to the
RESPONDER App & other Contacts:
– Pictures/Audio/Video & Text
• This data can be used as evidence in the
event of:
– Personal attacks & thefts.
– Larger disasters, armed assaults, bomb
threats etc.
– Personal Crisis (acts as a 911).
– Eye witnessed events are recorded.
www.kidnappedapp.com
RESPONDER APP
www.kidnappedapp.com
1 App is actually 2 Apps (1 is 2, 4)
• The RESPONDER App receives data &
the locations of the USER App:
– It sees where the USER is when needed.
• It collects all transmitted evidence/data
for analysis and persecutions and
learnings.
• It can TRANSMIT critical data to specific
USERS when needed.
• When needed it can TRACK Users.
– Phones can be located. People found.
www.kidnappedapp.com
1 App is actually 2 Apps (1 is 2, 5)
• The RESPONDER App can coordinate
responses.
• It can send out Notifications and Alerts
and pictures texts and videos to
SPECIFIC locales.
• It can mass broadcast Alerts such as
weather etc.
• It can connect those in NEED to those
that can help.
www.kidnappedapp.com
1 App is actually 2 Apps (1 is 2, 6)
It can be used for Profit and
Commercial reasons also in your Facility.
Users near to a building can be
targeted.
Users can be reminded of upcoming
events.
Notices, coupons etc can be sent.
www.kidnappedapp.com
The Safe Building App (overview 1)
The App is designed to protect the people and
Buildings/Facilities that have a supporting
RESPONSE force trained to respond to the
people found in the Building/Facility.
• Resides on “smart phones”/tablets/laptops
working in or associated with the Building.
• The App connects all USERS to the
RESPONDER Team.
• RESPONDERs can warn USERS.
• Data CAN go both ways.
www.kidnappedapp.com
The Safe Building App (overview 1)
• Designed & customized for:
– Universities Colleges and Schools.
– Malls, Casinos, Hotels
– Large Campuses and Office Buildings
– Recreational /Entertainment Venues & Events
– Anywhere SECURITY is needed.
• Simply requires WIFI but has GSM backup.
• No fancy hardware or costs needed.
• It sheer existence will reduce crime (like a CCTV
system).
www.kidnappedapp.com
The Safe Building App (overview 2)
• Designed to help your SECURITY Team
RESPOND
• Each USER APP replaces a CCTV camera.
• 0 $ cost of Hardware.
• Private, Safe and Secure.
• Easy to use.
• Gathers critical data.
• Facilitates INSTANT response to where HELP is
needed.
www.kidnappedapp.com
The Safe Building App (overview 3)
• The USER App has 5 modes:
– Standby
– Test
– Incident
– Travel
– DANGER
– Can find lost phones & devices with GPS built in.
www.kidnappedapp.com
How they work (work 1)
USER App
• Installed on Smart Phone.
• Profile is set up.
• RESPONDER predefined.
• Other Contacts added.
• Need Wifi can use GSM.
• Needs battery power to the
device.
RESPONDER App
• Needs a Window Operated
PC & Server for installation
of System.
• Needs a dedicated Cell
phone for GSM backup.
• Needs Wifi or Internet on
the whole Building/Facility.
• Needs to have USER App’s
registered on the system
(this is automated)
• Needs Security trained to
use it.
www.kidnappedapp.com
How they work (work 3)
• When the USER needs HELP they access the App.
• Help is instantly contacted and certain predefined data
sets are AUTOMATICALLY transmitted.
• USER location is revealed when needed.
• Several “Operational” Modes are available and can be
used when needed:
– Incident Mode: Used when Danger is close or being observed.
– Travel Mode: Used when travelling or in a risky circumstance.
– Danger Mode: When the danger is real and happening.
• RESPONDER and CONTACTS receive notifications
and data and respond in the DANGER mode.
www.kidnappedapp.com
How they work (work 4)
• The RESPONDER App receives alerts and data
from USERS.
• USERS are shown on the MAP.
• All data received is KEPT.
• Data received from USERS can be forwarded to
USERS that need to know.
• RESPONDER can target other USERS with
specific data as a warning.
www.kidnappedapp.com
App Benefits
Low cost per student/occupant
Greatly enhanced personal SAFETY &
SECURITY
Reduces Crime
Ability to WARN USERs in real time of
attacks or dangers.
Ability to FIND those that need HELP.
Enhanced RESPONSE capability.
www.kidnappedapp.com
What is Next(win 1)
• How can we help you to protect your populace?
• What customization is needed?
• Does your team need training?
• Does your team need response procedures?
• What more could we do for you?
www.kidnappedapp.com
www.kidnappedapp.com
What is Next (win 2)
 For more information please contact:
W. George Conroy
wgc@kidnappedapp.com
587-888-1097
www.kidnappedapp.com

More Related Content

What's hot

Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013
Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013
Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013Anna Dahlström
 
16 Killer Crisis Management Apps for iPhone & iPad
16 Killer Crisis Management Apps for iPhone & iPad16 Killer Crisis Management Apps for iPhone & iPad
16 Killer Crisis Management Apps for iPhone & iPadMissionMode
 
How to-choose-spy-app
How to-choose-spy-appHow to-choose-spy-app
How to-choose-spy-appspyguy.club
 
Xamarin Mobile App Development - Tecordeon Software Profile
Xamarin Mobile App Development - Tecordeon Software ProfileXamarin Mobile App Development - Tecordeon Software Profile
Xamarin Mobile App Development - Tecordeon Software ProfileRavi Chandra
 
The Making of Tesla Smartwatch Apps
The Making of Tesla Smartwatch AppsThe Making of Tesla Smartwatch Apps
The Making of Tesla Smartwatch AppsOstap Andrusiv
 
The Gamification of Stopping Violance on Woman in Turkey
The Gamification of Stopping Violance on Woman in TurkeyThe Gamification of Stopping Violance on Woman in Turkey
The Gamification of Stopping Violance on Woman in TurkeyAlper Berber
 
Top 15 iPhone App Ideas
Top 15 iPhone App Ideas Top 15 iPhone App Ideas
Top 15 iPhone App Ideas Sush Padhye
 
The App Explosion in Journalism
The App Explosion in JournalismThe App Explosion in Journalism
The App Explosion in JournalismDerrick Fountain
 
AAM March Travel Apps Article
AAM March Travel Apps ArticleAAM March Travel Apps Article
AAM March Travel Apps ArticleTanya Friedland
 
Fit presentation: starbucks app
Fit presentation: starbucks appFit presentation: starbucks app
Fit presentation: starbucks apprsluvsoth4life
 
A Case Study on Travel Application - Tripoto | Coding Brains
A Case Study on Travel Application - Tripoto | Coding BrainsA Case Study on Travel Application - Tripoto | Coding Brains
A Case Study on Travel Application - Tripoto | Coding BrainsAdam Thompson
 
St michael presentation
St michael presentationSt michael presentation
St michael presentationJim Bannon
 
Travel mobile app development ppt
Travel mobile app development  pptTravel mobile app development  ppt
Travel mobile app development pptEmbark Software
 

What's hot (19)

Mobile APM 5 Factors
Mobile APM 5 FactorsMobile APM 5 Factors
Mobile APM 5 Factors
 
ALERT! APP
ALERT! APPALERT! APP
ALERT! APP
 
Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013
Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013
Part 1: Fundamentals of Designing for Multiple Devices - GA London, 24 Jul 2013
 
16 Killer Crisis Management Apps for iPhone & iPad
16 Killer Crisis Management Apps for iPhone & iPad16 Killer Crisis Management Apps for iPhone & iPad
16 Killer Crisis Management Apps for iPhone & iPad
 
How to-choose-spy-app
How to-choose-spy-appHow to-choose-spy-app
How to-choose-spy-app
 
Xamarin Mobile App Development - Tecordeon Software Profile
Xamarin Mobile App Development - Tecordeon Software ProfileXamarin Mobile App Development - Tecordeon Software Profile
Xamarin Mobile App Development - Tecordeon Software Profile
 
Unit 4 project
Unit 4 projectUnit 4 project
Unit 4 project
 
St Michael Presentation
St Michael PresentationSt Michael Presentation
St Michael Presentation
 
The Making of Tesla Smartwatch Apps
The Making of Tesla Smartwatch AppsThe Making of Tesla Smartwatch Apps
The Making of Tesla Smartwatch Apps
 
Applewatchpdf
ApplewatchpdfApplewatchpdf
Applewatchpdf
 
Woa app
Woa appWoa app
Woa app
 
The Gamification of Stopping Violance on Woman in Turkey
The Gamification of Stopping Violance on Woman in TurkeyThe Gamification of Stopping Violance on Woman in Turkey
The Gamification of Stopping Violance on Woman in Turkey
 
Top 15 iPhone App Ideas
Top 15 iPhone App Ideas Top 15 iPhone App Ideas
Top 15 iPhone App Ideas
 
The App Explosion in Journalism
The App Explosion in JournalismThe App Explosion in Journalism
The App Explosion in Journalism
 
AAM March Travel Apps Article
AAM March Travel Apps ArticleAAM March Travel Apps Article
AAM March Travel Apps Article
 
Fit presentation: starbucks app
Fit presentation: starbucks appFit presentation: starbucks app
Fit presentation: starbucks app
 
A Case Study on Travel Application - Tripoto | Coding Brains
A Case Study on Travel Application - Tripoto | Coding BrainsA Case Study on Travel Application - Tripoto | Coding Brains
A Case Study on Travel Application - Tripoto | Coding Brains
 
St michael presentation
St michael presentationSt michael presentation
St michael presentation
 
Travel mobile app development ppt
Travel mobile app development  pptTravel mobile app development  ppt
Travel mobile app development ppt
 

Viewers also liked

ONEPLACE + BUSCAAI - ENGLISH
ONEPLACE + BUSCAAI - ENGLISHONEPLACE + BUSCAAI - ENGLISH
ONEPLACE + BUSCAAI - ENGLISHaosucesso
 
Alegeri 14 iunie 2015 din stefanesti
Alegeri 14 iunie 2015 din stefanestiAlegeri 14 iunie 2015 din stefanesti
Alegeri 14 iunie 2015 din stefanestiIon Balan
 
British transports
British transportsBritish transports
British transportsMarcos_L
 
Ensalada de naranjas mediterránea
Ensalada de naranjas mediterránea Ensalada de naranjas mediterránea
Ensalada de naranjas mediterránea karmela111
 
VTS Testimonial - Oct 2015
VTS Testimonial - Oct 2015VTS Testimonial - Oct 2015
VTS Testimonial - Oct 2015Luis Zea
 

Viewers also liked (7)

Sangre y sus componentes
Sangre y sus componentesSangre y sus componentes
Sangre y sus componentes
 
ONEPLACE + BUSCAAI - ENGLISH
ONEPLACE + BUSCAAI - ENGLISHONEPLACE + BUSCAAI - ENGLISH
ONEPLACE + BUSCAAI - ENGLISH
 
Alegeri 14 iunie 2015 din stefanesti
Alegeri 14 iunie 2015 din stefanestiAlegeri 14 iunie 2015 din stefanesti
Alegeri 14 iunie 2015 din stefanesti
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
British transports
British transportsBritish transports
British transports
 
Ensalada de naranjas mediterránea
Ensalada de naranjas mediterránea Ensalada de naranjas mediterránea
Ensalada de naranjas mediterránea
 
VTS Testimonial - Oct 2015
VTS Testimonial - Oct 2015VTS Testimonial - Oct 2015
VTS Testimonial - Oct 2015
 

Similar to Safe Building for schools app.

Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Advanced monitoring
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and GeocoderIRJET Journal
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women SecurityIRJET Journal
 
Abnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android SmartphoneAbnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android SmartphoneShivi Tandon
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Relayware
 
Cracking the mobile application code
Cracking the mobile application codeCracking the mobile application code
Cracking the mobile application codeSreenarayan A
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APPIRJET Journal
 
EvIM: a real time complex event discovery platform for CPSS
EvIM: a real time complex event discovery platform for CPSSEvIM: a real time complex event discovery platform for CPSS
EvIM: a real time complex event discovery platform for CPSSSiripen Pongpaichet
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Blueboxer2014
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A ReviewUmang Singh
 
Mobile App PPT_Updated
Mobile App PPT_UpdatedMobile App PPT_Updated
Mobile App PPT_UpdatedAmy Reed
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...Matteo Ferroni
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-pptWSO2
 
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVAPHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVAssuser7f90ae
 

Similar to Safe Building for schools app. (20)

Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
Юрий Чемёркин (Yury Chemerkin) Owasp russia 2016
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
E contact
E contactE contact
E contact
 
Life watch App Presentation
Life watch App PresentationLife watch App Presentation
Life watch App Presentation
 
IRJET - Android App for Women Security
IRJET -  	  Android App for Women SecurityIRJET -  	  Android App for Women Security
IRJET - Android App for Women Security
 
Abnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android SmartphoneAbnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android Smartphone
 
SISAH_Portfolio_New
SISAH_Portfolio_NewSISAH_Portfolio_New
SISAH_Portfolio_New
 
Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2Demystifying the Mobile Container - PART 2
Demystifying the Mobile Container - PART 2
 
Cracking the mobile application code
Cracking the mobile application codeCracking the mobile application code
Cracking the mobile application code
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
EvIM: a real time complex event discovery platform for CPSS
EvIM: a real time complex event discovery platform for CPSSEvIM: a real time complex event discovery platform for CPSS
EvIM: a real time complex event discovery platform for CPSS
 
Transforming any apps into self-defending apps
Transforming any apps into self-defending apps Transforming any apps into self-defending apps
Transforming any apps into self-defending apps
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Mobile App Security: A Review
Mobile App Security: A ReviewMobile App Security: A Review
Mobile App Security: A Review
 
Mobile App PPT_Updated
Mobile App PPT_UpdatedMobile App PPT_Updated
Mobile App PPT_Updated
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
 
Wso2 con byod-shan-ppt
Wso2 con byod-shan-pptWso2 con byod-shan-ppt
Wso2 con byod-shan-ppt
 
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVAPHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
 
Rc mobile profile_sep2011
Rc mobile profile_sep2011Rc mobile profile_sep2011
Rc mobile profile_sep2011
 
Dynamic Methods -Portfolio & Services
Dynamic Methods -Portfolio & ServicesDynamic Methods -Portfolio & Services
Dynamic Methods -Portfolio & Services
 

Safe Building for schools app.

  • 1. www.kidnappedapp.com Safe Building App Protecting People, Places and Things in that order!
  • 2. www.kidnappedapp.com Index • 1 APP is actually 2! • Overview of the APP • How they work – USER App. – RESPONDER App. • App Benefits • What is next.
  • 3. www.kidnappedapp.com 1 App is actually 2 Apps (1 is 2, 1) • The Safe Building App has 2 separate App components: – USER App is delivered to the Building Users or Occupants. These are the “eyes” and “ears” of the System. • There can be thousands of these. – RESPONDER App is delivered to and used by the Security Team. • There is one of these!
  • 4. www.kidnappedapp.com 1 App is actually 2 Apps (1 is 2, 2) • The USER App is loaded onto Smart phones and has an easy to easy menu and set up. – There are 5 Operational Modes: • Standby/Test/Incident/Travel/Danger – It allows the USER to communicate instantly with Security/Responder when needed. – Once activated data is delivered to Security. – The Security Team can transfer data back to the USERS to ensure Public SAFETY.
  • 5. www.kidnappedapp.com 1 App is actually 2 Apps (1 is 2, 3) • The USER App transmits to the RESPONDER App & other Contacts: – Pictures/Audio/Video & Text • This data can be used as evidence in the event of: – Personal attacks & thefts. – Larger disasters, armed assaults, bomb threats etc. – Personal Crisis (acts as a 911). – Eye witnessed events are recorded.
  • 7. www.kidnappedapp.com 1 App is actually 2 Apps (1 is 2, 4) • The RESPONDER App receives data & the locations of the USER App: – It sees where the USER is when needed. • It collects all transmitted evidence/data for analysis and persecutions and learnings. • It can TRANSMIT critical data to specific USERS when needed. • When needed it can TRACK Users. – Phones can be located. People found.
  • 8. www.kidnappedapp.com 1 App is actually 2 Apps (1 is 2, 5) • The RESPONDER App can coordinate responses. • It can send out Notifications and Alerts and pictures texts and videos to SPECIFIC locales. • It can mass broadcast Alerts such as weather etc. • It can connect those in NEED to those that can help.
  • 9. www.kidnappedapp.com 1 App is actually 2 Apps (1 is 2, 6) It can be used for Profit and Commercial reasons also in your Facility. Users near to a building can be targeted. Users can be reminded of upcoming events. Notices, coupons etc can be sent.
  • 10. www.kidnappedapp.com The Safe Building App (overview 1) The App is designed to protect the people and Buildings/Facilities that have a supporting RESPONSE force trained to respond to the people found in the Building/Facility. • Resides on “smart phones”/tablets/laptops working in or associated with the Building. • The App connects all USERS to the RESPONDER Team. • RESPONDERs can warn USERS. • Data CAN go both ways.
  • 11. www.kidnappedapp.com The Safe Building App (overview 1) • Designed & customized for: – Universities Colleges and Schools. – Malls, Casinos, Hotels – Large Campuses and Office Buildings – Recreational /Entertainment Venues & Events – Anywhere SECURITY is needed. • Simply requires WIFI but has GSM backup. • No fancy hardware or costs needed. • It sheer existence will reduce crime (like a CCTV system).
  • 12. www.kidnappedapp.com The Safe Building App (overview 2) • Designed to help your SECURITY Team RESPOND • Each USER APP replaces a CCTV camera. • 0 $ cost of Hardware. • Private, Safe and Secure. • Easy to use. • Gathers critical data. • Facilitates INSTANT response to where HELP is needed.
  • 13. www.kidnappedapp.com The Safe Building App (overview 3) • The USER App has 5 modes: – Standby – Test – Incident – Travel – DANGER – Can find lost phones & devices with GPS built in.
  • 14. www.kidnappedapp.com How they work (work 1) USER App • Installed on Smart Phone. • Profile is set up. • RESPONDER predefined. • Other Contacts added. • Need Wifi can use GSM. • Needs battery power to the device. RESPONDER App • Needs a Window Operated PC & Server for installation of System. • Needs a dedicated Cell phone for GSM backup. • Needs Wifi or Internet on the whole Building/Facility. • Needs to have USER App’s registered on the system (this is automated) • Needs Security trained to use it.
  • 15. www.kidnappedapp.com How they work (work 3) • When the USER needs HELP they access the App. • Help is instantly contacted and certain predefined data sets are AUTOMATICALLY transmitted. • USER location is revealed when needed. • Several “Operational” Modes are available and can be used when needed: – Incident Mode: Used when Danger is close or being observed. – Travel Mode: Used when travelling or in a risky circumstance. – Danger Mode: When the danger is real and happening. • RESPONDER and CONTACTS receive notifications and data and respond in the DANGER mode.
  • 16. www.kidnappedapp.com How they work (work 4) • The RESPONDER App receives alerts and data from USERS. • USERS are shown on the MAP. • All data received is KEPT. • Data received from USERS can be forwarded to USERS that need to know. • RESPONDER can target other USERS with specific data as a warning.
  • 17. www.kidnappedapp.com App Benefits Low cost per student/occupant Greatly enhanced personal SAFETY & SECURITY Reduces Crime Ability to WARN USERs in real time of attacks or dangers. Ability to FIND those that need HELP. Enhanced RESPONSE capability.
  • 18. www.kidnappedapp.com What is Next(win 1) • How can we help you to protect your populace? • What customization is needed? • Does your team need training? • Does your team need response procedures? • What more could we do for you? www.kidnappedapp.com
  • 19. www.kidnappedapp.com What is Next (win 2)  For more information please contact: W. George Conroy wgc@kidnappedapp.com 587-888-1097 www.kidnappedapp.com