Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

MorphoTrust USA, LLC

Approved: December 16, 2015 | Expires: January 31, 2021

MorphoTrust USA, LLC provides Universal Enrollment Services (the “Technology”). The Technology consists of hardware, software, and services necessary to provide and maintain enrollment centers, including gathering biographic information, capturing biometric data, and issuing credentials.


American Water Work Association (“AWWA”)

Approved: December 16, 2015 | Expires: December 31, 2020

The American Water Work Association (“AWWA”) provides its Standards Development Process (the “Technology”). The Technology is a process by a Standards Development Organization (accredited by the American National Standards Institute) of developing standards which set forth the minimum requirements of products and processes used in water supply and treatment to help provide safe drinking water and sanitation of a water supply. The individual standards and any implementation are not included.


MCFSA, Ltd., d/b/a Argyle Security Group and Metroplex Control Systems (“MCS”)

Approved: December 16, 2015 | Expires: December 31, 2020

MCFSA, Ltd., d/b/a Argyle Security Group and Metroplex Control Systems (“MCS”), Argyle Security, Inc., ISI Security Group, Inc., ISI Controls, Ltd., d/b/a Argyle Security Group, and Metroplex Commercial Fire and Security Alarms, Inc. provide Electronic Security Installation and Integration Services (“ESS” or the “Technology”). The Technology is the installation and integration of electronic security systems in commercial buildings, which provide access control, alarm monitoring, and situational awareness. The Technology also includes the operating manuals, deliverables associated with these systems, and maintenance and warranty services.


Duos Technologies, Inc.

Approved: December 16, 2015 | Expires: December 31, 2020

Duos Technologies, Inc. provides Praesidium® (the “Technology”). The Technology is a sensor detection suite that processes and analyzes sensor outputs such as video cameras, access control systems, thermal and infrared sensors etc., to identify significant events that will trigger alerts to security personnel through a common operating picture. The types of events detected and analyzed are perimeter violation, wrong way detection, loitering activity, object detection and tracking, objects left or removed from an area, objects moving in a secure area, and traffic congestion.


Kenton County Airport Board

Approved: November 24, 2015 | Expires: December 31, 2020

Kenton County Airport Board provides Cincinnati/Northern Kentucky Airport (“CVG”) Airport Security Management Plan (the “Technology”). The Technology is the development and implementation of its Transportation Security Administration (“TSA”)–approved Airport Security Management Plan, which includes physical and electronic security measures, tools, and procedures. The Technology also includes the operations and training of airport police, security, and rescue and firefighting personnel; operations of the airport Emergency Operations Center; selection and integration of physical and technical security systems and procedures; airport security plans and planning documentation; and, the maintenance of physical and technical security measures.


Battery Jack Inc. d/b/a Metal Defender (“BatteryJack”)

Approved: November 24, 2015 | Expires: December 31, 2018

Battery Jack Inc. d/b/a Metal Defender (“BatteryJack”), provides Metal Defender MD-6 Walk Through Metal Detector (the “Technology”). The Technology uses low frequency electromagnetic fields to aid in detecting metal-containing threat objects on screened individuals. The Technology makes detections by measuring disturbances in the generated electromagnetic fields due to the presence of metal. In the event of a detection, the Technology provides a visual and/or audible alarm. Included in the Technology are the Technology-related user manuals.


Lufthansa Cargo AG

Approved: November 24, 2015 | Expires: December 31, 2020

Lufthansa Cargo AG provides Lufthansa Screening and Security Services (the “Technology”). The Technology is cargo screening services under the Transportation Security Administration (“TSA”) programs within the United States and its territories. The Technology also includes training and quality control audits for the TSA cargo screening regulations.


The Boeing Company

Approved: October 19, 2015 | Expires: November 30, 2020

The Boeing Company provides Anti-Terrorism Integrated Logistics Support Management Services (the “Technology”). The Technology is a set of maintenance and logistics services supporting systems or products tasked with detecting, defeating, or deterring Acts of Terrorism. The Technology also includes production of process documentation, technical data sheets, and all attendant manuals and technical documentation, as well as the personnel qualification for those persons providing the Technology.


Leidos, Inc.

Approved: September 29, 2015 | Expires: October 31, 2020

Leidos, Inc. provides the Vehicle and Cargo Inspection System (“VACIS®” or the “Technology”). The Technology is a non-intrusive inspection tool used to create 2-dimensional radioscopic images of large vehicles, cargo containers, palletized cargo, and other bulk cargo. Operating as a density imager against the threat posed by Weapons of Mass Destruction, smuggling of stowaways, and conventional weapons, VACIS® detects threats through the projection of shapes, objects, or densities that are inconsistent with customs declarations and shipping documents.


Mutualink, Inc.

Approved: September 29, 2015 | Expires: October 31, 2020

Mutualink, Inc. provides Mutualink (the "Technology"). The Technology is an interoperability multimedia communications sharing product that securely connects disparate communication and media sources together for real-time collaboration. The Technology includes training, user manuals, creation, evaluation, exercise and use of concept of operations and standard operating procedures in concert with customers, roll call and table top exercises, live incident user and operational assistance as requested and other customer support services.