SlideShare a Scribd company logo
DHS Science and Technology Directorate
Researchand Development Partnerships – SAFETY Act
forLiability Protection
CongresscreatestheSAFETYActtoencourage SAFETYActCriteriaforDesignation
10 Venue security
In FY 2014, approved technologies are totaling more than
$4.16 billion in projected annual technology revenue and
supporting more than 75,446 private sector jobs in small
and large businesses.
To learn more about the SAFETY Act and how to apply for SAFETY Act
protections, see our Web site www.safetyact.gov
Toll Free: 1(866) 788- 9318
theuseofanti-terrorismtechnologies
In the aftermath of the 9/11 attacks, the private sector was
extremely reluctant to deploy security technologies and
services in civilian settings due to the enormous liability
risks involved. Should the company’s technology be
impacted by an act of terrorism, the company could be
held responsible for any damages. In response, Congress
enacted the Support Anti-Terrorism by Fostering
Effective Technologies (SAFETY) Act in 2002.
The SAFETY Act created liability limitations for claims
resulting from an act of terrorism where Qualified Anti-
TerrorismTechnologies (QATTs) have been deployed.
The Act applies to a broad range of technologies, including
products, services, and software, or combinations thereof.
Parties covered under the SAFETY Act are referred to as
“Sellers” and can include any person, firm, or other entity
that provides a QATT to customer(s) and to whoma
Designation has been issued. The Act applies to claims
against the Seller of a QATT that are filed in United States
courts. Similar claims may not be brought against the
buyers, buyers’ contractors, or downstreamusers of the
QATT.
Therearetwolevelsofliabilityprotections
Designation – The Seller’s liability for products or
services that are deemed “Designated Technologies” is
limited to the amount of liability insurance that the U.S.
Department of Homeland Security (DHS) determines the
Seller must maintain. A Developmental Testing & Evalua-
tion Designation may also be obtained for promising
QATTs that are undergoing testing and evaluation.
Certification – In addition to the benefits provided under
Designation, Certification allows a Seller of anti-terrorism
technology to assert the Government Contractor Defense
for claims arising from acts of terrorism. QATTs will be
placed on an Approved SAFETY Act Products List for
Homeland Security.
The DHS approved the following marks for use:
Certified Designated DT&E Designated
1. Prior United States Government use or demonstrated
substantial utility and effectiveness.
2. Availability of the technology for immediate deploy-
ment in public and private settings.
3. Existence of extraordinarily large or unquantifiable
potential third-party liability risk exposure to the Seller
or other provider of the technology.
4. Substantial likelihood that the technology will not be
deployed unless SAFETY Act risk management pro-
tections are extended.
5. Magnitude of risk exposure to the public if the tech-
nology is not deployed.
6. Evaluation of scientific studies that can be feasibly
conducted to assess the capability of the technology to
substantially reduce risks of harm.
7. Effectiveness of the technology in facilitating the de-
fense against acts of terrorism.
SAFETYActCriteriaforCertification
Designation is a prerequisite for Certification. To receive
Certification, a QATT must also be shown to:
1. Performas intended.
2. Conformto the Seller’s specifications.
3. Be safe for use as intended.
It is not required that applicants satisfy all of the
relevant criteria to receive SAFETY Act protections.
The DHS approved over 737 applications for
SAFETY Act protections including:
1. Threat and vulnerability assessment services
2. Detection systems
3. Blast mitigation materials
4. Screening services
5. Sensors and sensor integration
6. First responder technologies
7. Decision support software
8. Security plans/services
9. Crisis management systems
10.
2015-03-09

More Related Content

What's hot

The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
Shawn Tuma
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
Reputelligence
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Shawn Tuma
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Shawn Tuma
 
Sia Partners - Insurance emerging risks infographic_v1
Sia Partners - Insurance emerging risks infographic_v1Sia Partners - Insurance emerging risks infographic_v1
Sia Partners - Insurance emerging risks infographic_v1
Brieuc Balamba
 

What's hot (6)

The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk SummitThe Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
The Legal Case for Cyber Risk Management - InfoSec World Privacy & Risk Summit
 
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERSDRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
DRONES THE NEW WEAPON OF CHOICE - ALSO FOR HACKERS
 
White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
Cybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and ClientsCybersecurity: Cyber Risk Management for Lawyers and Clients
Cybersecurity: Cyber Risk Management for Lawyers and Clients
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Sia Partners - Insurance emerging risks infographic_v1
Sia Partners - Insurance emerging risks infographic_v1Sia Partners - Insurance emerging risks infographic_v1
Sia Partners - Insurance emerging risks infographic_v1
 

Viewers also liked

Da un'idea a una startup
Da un'idea a una startupDa un'idea a una startup
Da un'idea a una startup
Francesco Baruffi
 
Columna de Joan Navarro en El País
Columna de Joan Navarro en El PaísColumna de Joan Navarro en El País
Columna de Joan Navarro en El País
LLYC
 
Tugas tik
Tugas tikTugas tik
Tugas tik085646
 
A sample twitter and facebook analytics report for Indian diplomacy - Surge C...
A sample twitter and facebook analytics report for Indian diplomacy - Surge C...A sample twitter and facebook analytics report for Indian diplomacy - Surge C...
A sample twitter and facebook analytics report for Indian diplomacy - Surge C...
Surge Social Media Consulting
 
Evaluation question four
Evaluation question four Evaluation question four
Evaluation question four
amberneill
 
Sisältöstrategiaa 2010-luvun tutkija–yrittäjälle
Sisältöstrategiaa 2010-luvun tutkija–yrittäjälleSisältöstrategiaa 2010-luvun tutkija–yrittäjälle
Sisältöstrategiaa 2010-luvun tutkija–yrittäjälle
Petro Poutanen
 
Hotel Rural El Duende del Chafaril. Cáceres.
Hotel Rural El Duende del Chafaril. Cáceres.Hotel Rural El Duende del Chafaril. Cáceres.
Hotel Rural El Duende del Chafaril. Cáceres.
chafaril
 
Agrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barrios Agrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barrios
santi302930
 
Agrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barriosAgrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barrios
santi302930
 
Holaaaaaaaaaaaaaaa
HolaaaaaaaaaaaaaaaHolaaaaaaaaaaaaaaa
Holaaaaaaaaaaaaaaa
carlosmazenett
 
И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"
И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"
И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"
ЗПШ СПбГУ
 
Evaluation Question 1
Evaluation Question 1Evaluation Question 1
Evaluation Question 1
a2media14g
 
ผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคาม
ผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคามผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคาม
ผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคาม
nuyu123
 

Viewers also liked (16)

Da un'idea a una startup
Da un'idea a una startupDa un'idea a una startup
Da un'idea a una startup
 
Vivimos en sociedad
Vivimos en sociedadVivimos en sociedad
Vivimos en sociedad
 
Dkczhjvh kjvtd
Dkczhjvh kjvtdDkczhjvh kjvtd
Dkczhjvh kjvtd
 
Columna de Joan Navarro en El País
Columna de Joan Navarro en El PaísColumna de Joan Navarro en El País
Columna de Joan Navarro en El País
 
Tugas tik
Tugas tikTugas tik
Tugas tik
 
A sample twitter and facebook analytics report for Indian diplomacy - Surge C...
A sample twitter and facebook analytics report for Indian diplomacy - Surge C...A sample twitter and facebook analytics report for Indian diplomacy - Surge C...
A sample twitter and facebook analytics report for Indian diplomacy - Surge C...
 
Evaluation question four
Evaluation question four Evaluation question four
Evaluation question four
 
Sisältöstrategiaa 2010-luvun tutkija–yrittäjälle
Sisältöstrategiaa 2010-luvun tutkija–yrittäjälleSisältöstrategiaa 2010-luvun tutkija–yrittäjälle
Sisältöstrategiaa 2010-luvun tutkija–yrittäjälle
 
Hotel Rural El Duende del Chafaril. Cáceres.
Hotel Rural El Duende del Chafaril. Cáceres.Hotel Rural El Duende del Chafaril. Cáceres.
Hotel Rural El Duende del Chafaril. Cáceres.
 
Agrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barrios Agrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barrios
 
Agrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barriosAgrgar fecha y hora acevedo y barrios
Agrgar fecha y hora acevedo y barrios
 
Holaaaaaaaaaaaaaaa
HolaaaaaaaaaaaaaaaHolaaaaaaaaaaaaaaa
Holaaaaaaaaaaaaaaa
 
И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"
И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"
И.В. Журавлев "Коммуникативная функция симптомов болезни.Феномен алекситимии"
 
Evaluation Question 1
Evaluation Question 1Evaluation Question 1
Evaluation Question 1
 
ผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคาม
ผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคามผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคาม
ผลกระทบทางการท่องเที่ยว คณะการท่องเที่ยวและการโรงแรม มหาวิทยาลัยมหาสารคาม
 
Resume to be printed
Resume to be printedResume to be printed
Resume to be printed
 

Similar to SAFETY Act Factsheet 3.15

GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
Government Technology and Services Coalition
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
Matthew Rosenquist
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
falknoor56
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
William McBorrough
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Government Technology and Services Coalition
 
Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...
David Sweigert
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
CloudMask inc.
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefJonathan Reyes
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
Jon Lendrum
 
FDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on CybersecurityFDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on Cybersecurity
EMMAIntl
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Matthew Rosenquist
 
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
VMware Tanzu
 
July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...
LexisNexis
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...Jon Polenberg
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
Settapong_CyberSecurity
 

Similar to SAFETY Act Factsheet 3.15 (20)

safety-act-faq
safety-act-faqsafety-act-faq
safety-act-faq
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Cyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docxCyber Security Strategy for Pakistan.docx
Cyber Security Strategy for Pakistan.docx
 
Need for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure ProtectionNeed for Improved Critical Industrial Infrastructure Protection
Need for Improved Critical Industrial Infrastructure Protection
 
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
Emile Monette: How do we Strengthen the Public-Private Partnership to Mitigat...
 
ExecBriefFinal
ExecBriefFinalExecBriefFinal
ExecBriefFinal
 
Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...Cyber-insurance and liability caps proposed as incentives by Department of Co...
Cyber-insurance and liability caps proposed as incentives by Department of Co...
 
Renewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security SectorRenewed Context for the Defense and Security Sector
Renewed Context for the Defense and Security Sector
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Government-ForeScout-Solution-Brief
Government-ForeScout-Solution-BriefGovernment-ForeScout-Solution-Brief
Government-ForeScout-Solution-Brief
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
 
FDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on CybersecurityFDA’s Updated Guidance on Cybersecurity
FDA’s Updated Guidance on Cybersecurity
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
Minimizing Compliance Resistance to Digital Transformation --- Design for reg...
 
July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
 
Guideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital Economy
 

SAFETY Act Factsheet 3.15

  • 1. DHS Science and Technology Directorate Researchand Development Partnerships – SAFETY Act forLiability Protection CongresscreatestheSAFETYActtoencourage SAFETYActCriteriaforDesignation 10 Venue security In FY 2014, approved technologies are totaling more than $4.16 billion in projected annual technology revenue and supporting more than 75,446 private sector jobs in small and large businesses. To learn more about the SAFETY Act and how to apply for SAFETY Act protections, see our Web site www.safetyact.gov Toll Free: 1(866) 788- 9318 theuseofanti-terrorismtechnologies In the aftermath of the 9/11 attacks, the private sector was extremely reluctant to deploy security technologies and services in civilian settings due to the enormous liability risks involved. Should the company’s technology be impacted by an act of terrorism, the company could be held responsible for any damages. In response, Congress enacted the Support Anti-Terrorism by Fostering Effective Technologies (SAFETY) Act in 2002. The SAFETY Act created liability limitations for claims resulting from an act of terrorism where Qualified Anti- TerrorismTechnologies (QATTs) have been deployed. The Act applies to a broad range of technologies, including products, services, and software, or combinations thereof. Parties covered under the SAFETY Act are referred to as “Sellers” and can include any person, firm, or other entity that provides a QATT to customer(s) and to whoma Designation has been issued. The Act applies to claims against the Seller of a QATT that are filed in United States courts. Similar claims may not be brought against the buyers, buyers’ contractors, or downstreamusers of the QATT. Therearetwolevelsofliabilityprotections Designation – The Seller’s liability for products or services that are deemed “Designated Technologies” is limited to the amount of liability insurance that the U.S. Department of Homeland Security (DHS) determines the Seller must maintain. A Developmental Testing & Evalua- tion Designation may also be obtained for promising QATTs that are undergoing testing and evaluation. Certification – In addition to the benefits provided under Designation, Certification allows a Seller of anti-terrorism technology to assert the Government Contractor Defense for claims arising from acts of terrorism. QATTs will be placed on an Approved SAFETY Act Products List for Homeland Security. The DHS approved the following marks for use: Certified Designated DT&E Designated 1. Prior United States Government use or demonstrated substantial utility and effectiveness. 2. Availability of the technology for immediate deploy- ment in public and private settings. 3. Existence of extraordinarily large or unquantifiable potential third-party liability risk exposure to the Seller or other provider of the technology. 4. Substantial likelihood that the technology will not be deployed unless SAFETY Act risk management pro- tections are extended. 5. Magnitude of risk exposure to the public if the tech- nology is not deployed. 6. Evaluation of scientific studies that can be feasibly conducted to assess the capability of the technology to substantially reduce risks of harm. 7. Effectiveness of the technology in facilitating the de- fense against acts of terrorism. SAFETYActCriteriaforCertification Designation is a prerequisite for Certification. To receive Certification, a QATT must also be shown to: 1. Performas intended. 2. Conformto the Seller’s specifications. 3. Be safe for use as intended. It is not required that applicants satisfy all of the relevant criteria to receive SAFETY Act protections. The DHS approved over 737 applications for SAFETY Act protections including: 1. Threat and vulnerability assessment services 2. Detection systems 3. Blast mitigation materials 4. Screening services 5. Sensors and sensor integration 6. First responder technologies 7. Decision support software 8. Security plans/services 9. Crisis management systems 10. 2015-03-09