Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

Priority 5 Holdings, Inc.

Approved: October 12, 2021 | Expires: October 31, 2026

Priority 5 Holdings, Inc. provides Touch Assisted Command and Control System (TACCS™ or the Technology). The Technology is a software suite that combines information from disparate data sources, displays the aggregated information as layers over imagery or another location-based background independently obtained by the end-user; and enables the data from various layers to interact dynamically in a user-created, geospatially oriented, common operating picture (COP). The Seller installs and configures the Technology for customers and provides training and support services.


Priority 5 Holdings, Inc.

Approved: December 18, 2015 | Expires: January 31, 2021

Priority 5 Holdings, Inc. provides Touch Assisted Command and Control System (“TACCS™” or the “Technology”). The Technology is a software suite that aggregates information from disparate data sources, including static data from databases and in geographic information system layers, the output of various software programs, and the results of one or more simulation engines. The aggregated information is displayed as layers over imagery independently obtained by the end-user. The Technology also includes customization and installation services and support per the maintenance agreement.


Priority 5 Holdings, Inc.

Approved: May 04, 2011 | Expires: May 31, 2016

Priority 5 Holdings, Inc. provides Touch Assisted Command and Control System (TACCS). The Technology is a software suite that fuses disparate data sources, the output of various software tools, and the results of one or more simulations as layers over imagery the end-user independently obtained. The Technology also includes customization and installation services, and support per the maintenance agreement.