Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

Raytheon Company

Approved: March 02, 2017 | Expires: February 28, 2022

Raytheon Company and Raytheon Technical Services Company LLC provide Security Equipment Integration (“SEI”) services. The Technology is a set of services used for the installation and integration of security equipment applications at airport and transportation facilities for the detection of explosives and other prohibited items. The services are performed in accordance with airport, local, State, and national building codes, and in compliance with the Department of Homeland Security’s (“DHS”) Transportation Security Administration’s (“TSA”) regulations and security equipment specifications and to other Federal and State specifications/regulatory requirements.


Universal Thrive Technologies, LLC d/b/a/ THRIVE Intelligence

Approved: February 16, 2017 | Expires: March 31, 2020

Universal Thrive Technologies, LLC d/b/a/ THRIVE Intelligence, Universal Protection Service, LP, d/b/a/ Allied Universal Security Services, and Universal Protection Service, LLC, d/b/a/ Allied Universal Security Services provides Operational Intelligence Monitoring and Response Services (the “Technology”). The Technology is commercial-off-the-shelf equipment and software to provide traditional alarm monitoring (fire, burglary, and intrusion alarms) and video monitoring services. The Technology also uses commercial-off-the-shelf equipment and software to provide event-based and non-event-based video monitoring using video analytic software. The Technology includes numerous components of both Traditional Central Station Alarm Monitoring Services and Video Monitoring Services, as well as intelligence gathering, initial service-needs assessments at customer location, and the selection of commercial-off-the-shelf hardware and software and subcontractors.


The Macerich Company

Approved: February 16, 2017 | Expires: March 31, 2022

The Macerich Company provides its Macerich Shopping Center Security Program (the “Technology”). The Technology is a centralized, corporate level security program consisting of security policies and procedures and technology solutions. Plans and procured security services and technologies are for use at Macerich owned and operated retail properties. The Technology, which is customized in part for each individual property, is designed to deter, mitigate, and respond to emergency situations, including the occurrence of a terrorist attack.


Leidos Innovations Corporation

Approved: February 16, 2017 | Expires: February 28, 2021

Leidos Innovations Corporation provides the Next Generation Identification System and Services (“NGIS&S” or the “Technology”). The Technology is a multi-modal biometric identification capability that assists Federal, State, and local law enforcement authorities in investigating, detecting, preventing, or otherwise countering terrorism and other criminal activity and the services necessary to support this capability. The Technology includes hiring, vetting, and training of qualified personnel used to perform the above-listed services. The Technology also entails the processes and procedures used for the selection, testing, and integration of commercial-off-the-shelf items used in the Technology.


Lockheed Martin Corporation

Approved: February 01, 2017 | Expires: February 28, 2022

Lockheed Martin Corporation provides the Biological Aerosol Warning System (“BAWS” or the “Technology”). The Technology is a networked array of single-point sensor nodes that can alert a user to the presence of biological particulates. The Technology includes: operational and maintenance training; and systems engineering and integration services for the design, development, and deployment of the Technology.


Cybernance Corporation

Approved: February 01, 2017 | Expires: February 29, 2020

Cybernance Corporation provides the Cybernance Platform (the “Technology”), an enterprise-wide, web-based software solution (i.e., Software-as-a-Service), for managing and mitigating cyber risk The Technology comprises software reporting platforms that monitor and measure the maturity and resiliency of an enterprise’s cybersecurity in relation to domestic and internationally accepted frameworks and standards.


Accenture Federal Services LLP and Accenture LLP

Approved: February 01, 2017 | Expires: February 28, 2022

Accenture Federal Services LLP and Accenture LLP provide Holds Notification Capabilities (the “Technology”). The Technology is a software component used by the United States Postal Service’s (“USPS”) Global Business Systems (“GBS”) software. The Technology is used to place holds/alerts on mail/packages within the USPS system for further inspection. The Technology also includes Accenture Federal Services LLP and Accenture LLP’s personnel who conduct the attendant services, personnel training, as well as reports and recommendations, manuals, checklists, and technical documents related to the Technology.


ASIS International, Inc.

Approved: January 13, 2017 | Expires: January 31, 2022

ASIS International, Inc. provides ASIS Standards and Guidelines (the “Technology”). The Technology is a set of voluntary consensus standards and guidelines for the private security industry and the American National Standards Institute (“ANSI”)-accredited process for drafting, review, publication, and maintenance of ASIS American National Standards and the Department of Homeland Security (“DHS”) National Standard. The ASIS security guidelines are drafted and reviewed in an analogous process, which is also part of the Technology.


iControl, Incorporated

Approved: January 13, 2017 | Expires: January 31, 2022

iControl, Incorporated provides the Marine Asset Tag Tracking System (“MATTS” or the “Technology”). The Technology is a family of devices used for tracking and monitoring remote mobile assets. The family consists of the: iTAG, mLOCK, iCHIME, and miKEY.


Leidos Innovations Corporation

Approved: January 13, 2017 | Expires: April 30, 2017

Leidos Innovations Corporation provides the Security System Engineering Process (“SSEP” or the “Technology”). The Technology is a suite of services to design, develop, install, and support a “turn-key” integrated security system that can assist Federal Government customers to address identified vulnerabilities and to protect critical infrastructure. The Technology also includes system acquisition, installation, acceptance testing, maintenance, personnel training, and periodic reviews.