33
1 1 Protecting you, Protecting U.S. Protecting you, Protecting U.S. SAFETY Act October 30, 2008 The Support Anti-terrorism by Fostering Effective Technologies Act of 2002

Protecting you, Protecting U.S. SAFETY Act October 30, 2008

  • Upload
    maida

  • View
    57

  • Download
    2

Embed Size (px)

DESCRIPTION

Protecting you, Protecting U.S. SAFETY Act October 30, 2008 The Support Anti-terrorism by Fostering Effective Technologies Act of 2002. A Summary of the SAFETY Act. - PowerPoint PPT Presentation

Citation preview

Page 1: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

11

Protecting you, Protecting U.S. Protecting you, Protecting U.S.

SAFETY ActOctober 30, 2008

The Support Anti-terrorism by Fostering Effective Technologies Act of 2002

Page 2: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

22

A Summary of the SAFETY ActA Summary of the SAFETY Act• The Support Anti-terrorism by Fostering Effective

Technologies Act of 2002 (SAFETY Act) was enacted as part of the Homeland Security Act of 2002 (Title VIII, Subtitle G)

• Intended to facilitate the development and deployment of effective anti-terrorism technologies by creating systems of “risk management” and “litigation management”

• Provides important legal liability protections for manufacturers and sellers of technologies and services that could save lives in the event of a terrorist attack

• Protections apply only to claims arising out of, relating to, or resulting from an Act of Terrorism

Page 3: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

33

What is Eligible for SAFETY Act What is Eligible for SAFETY Act Protections?Protections?

The SAFETY Act liability protections apply to a wide range of technologies, including:

• Products

• Services

• Software and other forms of intellectual property

Examples of eligible technologies:

•Threat and vulnerability assessment services

•Detection Systems

•Blast Mitigation Materials

•Screening Services

•Sensors and Sensor Integration

•Threatening Object Detectors

•Decision Support Software

•Security Services

•Crisis Management Systems

•Cyber Security Technologies

Page 4: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

44

Obtaining a recovery

Did the ATT fail?• Intentional attack • Not 100%• Security architecture • Gaps• Availability of evidence

Difficulties in Civil Cases Involving TerrorismDifficulties in Civil Cases Involving Terrorism

Page 5: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

55

DTED:Additional evidence ofeffectiveness needed.

Shows potential.

Designation:Proven effectiveness.

Certification:High confidenceit will continueto be effective.

Government Contractor Defense

Liability Cap

1. Two Principal Levels

of Protection

Page 6: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

66

• Liability = Insurance required by DHS• Exclusive action in Federal Court• No Joint and Several Liability for non-

economic damages• No punitives or prejudgment interest• Recovery reduced by amounts from

collateral sources

2. Benefits of Designation

Page 7: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

77

3. Benefits of Certification

• Benefits of Designation +• Assert Government Contractor

Defense Even if not selling to a Government entity Includes services and COTS

• Placed on Approved Product List for Homeland Security

Page 8: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

88

(whether Designation or Certification)

4. SAFETY Act Protections Extend to Users

“Such cause of action may be brought only against the Seller of the QATT and may not be brought against the buyers, the buyers’ contractors, downstream users of the QATT, the Seller’s suppliers or contractors, or any other person or entity…”

-Preamble to Final Rule, 6 CFR Part 25, at 33150.

Page 9: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

99

5. Criteria for Designation

•Prior United States Government use or demonstrated substantial utility and effectiveness

•Availability of the Technology for immediate deployment in public and private settings

•Existence of extraordinarily large or unquantifiable potential third party liability risk exposure to the Seller or other provider of the technology

•Substantial likelihood that the Technology will not be deployed unless SAFETY Act risk management protections are extended

•Magnitude of risk exposure to the public if the Technology is not deployed•Evaluation of scientific studies that can be feasibly conducted in order to

assess the capability of the Technology to substantially reduce risks of harm

•Whether the Technology is effective in facilitating the defense against Acts of Terrorism

•ATT determination made by Federal, State, or Local officials

Red=Technical criterionBlue=Economic criterion

Page 10: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1010

5a. How to Establish Effectiveness•Successful testing in operational environment•Operational testing

Evidence of performance metrics, including: Probability of Detection False Positive and False Negative Rates Limits of Detection (and why that limit is relevant) Interferrents Maintenance and Training

•Suitable performance of past deployments documented

•Domain expertise appropriate and available• In/external audits favorable•Customer feedback favorable•QA plans documented•Repeatability proven

Page 11: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1111

6. Criteria for Certification

Designation is a prerequisite for granting Certification

To receive Certification, a Qualified Anti-terrorism Technology must also be shown to:

• Perform as intended• Conform to the Seller’s specifications• Be safe for use as intended

Seller is required to provide safety and hazard analyses

Page 12: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1212

6a. Performs as Intended

High confidence it will continue to be effective

•Consistent positive results (e.g., long-term low failure rates and false alarms)

•Reliability/Availability is high (e.g., MTBF)•Performs in accordance with performance

specifications• Installation, use, maintenance procedures

proven•Documented processes (e.g., training, hiring,

technology refresh) are being followed•Standards are identified and met•QA/QC processes are effective

Page 13: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1313

For technology that:• Is in a prototype stage• Has lab tests that are not operational in

nature (too controlled)• Indicated potential effectiveness• Has a testing scenario identified and

“customers” to prove relevant metrics• Limited term (up to 3 yr) and limited

number of sites

7. DT&E Designation

Page 14: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1414

DTED Designation Certification

Effectiveness Evaluation

Needs more proof, but potential

exists

Proven effectiveness

(with confidence of repeatability)

Consistently proven effectiveness (with high confidence of enduring

effectiveness)

Protection Liability cap

only for identified test event(s) and for limited duration (≤3yrs)

Liability cap

for any and all deployments

made within 5-8 year term

Government Contractor of Defense (GCD)

for any and all deployments made within

5-8 year term

8. SAFETY Act Award Summary

Page 15: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1515

Timeline of SAFETY Act Application Review ProcessTimeline of SAFETY Act Application Review Process

Pre-Application

21 Days

Scoring Response letter to applicant

Full Application

Receiving & Completene

ss

Technical ReviewEconomic Review

Presentation of Findings

DHSDecision

Consolidation

120 Days

Page 16: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1616

Federal Acquisition Regulation Federal Acquisition Regulation (FAR)(FAR)• As of November 7, 2007 SAFETY Act incorporated in FAR

• PART 50 – Extraordinary Contractual Actions and the SAFETY Act (Interim Rule)

• SAFETY Act protections are not required as a part of Government Procurements, however, the Agency is encouraged to do the following:

• Determine whether the technology to be procured is appropriate for SAFETY Act protections

• Encourage offerors to seek SAFETY Act protections for their technologies, even in advance of solicitation

• A determination to award SAFETY Act protections is NOT a determination that the technology meets the requirements of a solicitation

Page 17: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1717

• DHS recognized the need to align SAFETY Act applications with the government procurement process

• Government Agency, by submitting a PPQR, can obtain a preliminarily determination of upcoming procurements for SAFETY Act applicability

• Enables the selected contractor to receive expedited review of a streamlined application for SAFETY Act coverage

• Assumes the technology to be procured either affirmatively or presumptively satisfies the technical criteria necessary to be deemed a QATT

• OSAI coordinates with other Governmental agencies to effectively coordinate government procurements with the SAFETY Act

• Instructions for filing a PPQR are found in Forms and Info section of www.SAFETYAct.gov

Procurement Pre-Qualification Request Procurement Pre-Qualification Request (PPQR(PPQR))

Page 18: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

108

233

104

163 170

113

190

111

0

50

100

150

200

250

FY 2004-05 FY 2006 FY 2007 ProjectedFY 2008

Number ofApplications

Days toProcess

•Processing time has decreased by 31% •Applications have increased by 63%•With no additional resources

2006-2007

SAFETY Act ProgressSAFETY Act Progress

Page 19: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

1919

30

10

29

44

15

45

101

2938

0

20

40

60

80

100

120

2005 2006 2007

SmallMediumLarge

*Small = $0 - $50,000,000*Medium = $50,000,000 - $1,000,000,000*Large = Over $1,000,000,000 by Net Revenue

Applications by Company Size *Applications by Company Size *

Page 20: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2020

How is Your Proprietary Data Protected?How is Your Proprietary Data Protected?

• Strong data protection measures that conform to DHS information security standards

• All application reviewers are screened for conflicts of interests, sign conflict of interest statements for each application they review, and sign general nondisclosure agreements

Page 21: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2121

Who are the SAFETY Act Reviewers?Who are the SAFETY Act Reviewers?

• Conflict of Interest & Non-Disclosure Agreement signed by each reviewer per application.

• Three Technical Reviewers and two Economic Reviewers per application.

• Reviewers from the FFRDCs, non-profits, Federal Government, Federal & National Labs, and Academia.

• 100+ already trained reviewers (SMEs) in:

Chemical

Biological

Explosive

Rad/Nuc

Human

Services

Cyber

Economic

Page 22: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2222

Providing Value for Providing Value for YouYou•Seller of a QATT

•Enterprise survival•Risk mitigation•Defense against claims•Business development

•User of a QATT•Defense against suit•Benchmarking• Interoperability•Procuring an effective

product/service

Page 23: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2323

Areas OF Areas OF Emphasis…Emphasis…

The SAFETY ActThe SAFETY Act

Looking Looking AHEAD…AHEAD…

Page 24: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2424

Critical InfrastructureCritical Infrastructure

Page 25: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2525

Transportation SecurityTransportation Security

Page 26: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2626

Counter IEDCounter IEDss

Page 27: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2727

Safer ProductsSafer Products

Page 28: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2828

Commercial FacilitiesCommercial Facilities

Page 29: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

2929

Small BusinessSmall Business

Page 30: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

3030

Public VenuesPublic Venues

Page 31: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

3131

Cyber SecurityCyber Security

Page 32: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008

3232

Additional SAFETY Act InformationAdditional SAFETY Act Information

• Online: www.safetyact.gov FAQs Help Topics Help Desk: Online form for questions

requiring an individual response• Email: [email protected]• Toll-Free: 1-866-788-9318

Page 33: Protecting you, Protecting U.S.  SAFETY Act October 30, 2008