We help organizations protect themselves from catastrophic liability following a terrorist event
SAFETY ACT CONSULTANTS
P.O. Box 1666
Brookfield, WI 53008-1666
ph: 202 640 4000
fax: 202 407 7054
alt: Toll Free 855-SAFETY-ACT
INFO
SAFETY Act Protection for
Cyber or Network Terrorism
Hacking is no longer limited to bored teenage techies. It is a tool used by organized crime, unfriendly nations, radicals, extremists and terrorist groups. Today’s potential cyber risks and exposures are far more severe than just compromised personal information. Vulnerabilities in information systems threaten the entire country’s physical and financial safety and security. Cyber terrorism is real and it will continue to be exploited and "perfected".
Cyber terrorism falls into many categories. The first, well exploited by Hollywood, would be hacking into a system in order to cause physical harm to people or property. Examples include opening a dam, shutting down a power grid or causing highly dangerous situations at refineries or chemical plants.
The second type of cyber related terrorism would be hacking into a system with the intent of causing massive financial harm as a direct result.
Other types of e-terrorism categories are more obscure, intertwined, and can easily be employed to help facilitate other types of attacks including the ones described above. These events, the ultimate damage, and any resulting liability may not be discovered for many years. These types of attacks include, but are certainly not limited to:
Unlike “conventional” terrorism limited to physical attacks on hard targets, cyber threats:
As a part of their recent Board meeting, the Internet Security Alliance (ISA) released “The Cyber Security Social Contract: Policy Recommendations for the Obama Administration and the 111th Congress”. This 45-page document provides detailed recommendations for the new administration. One of the four top suggestions made to the President Elect is providing “Better positive based incentives … To accomplish this, we can look at historical examples of positive incentive programs, such as the SAFETY Act …. .” Another of the four suggestions presented to Mr. Obama is the need to “Have a robust insurance market”.
Regardless of the cost, post September 11th, there is currently not enough, and likely there will never be enough, terrorism related insurance available globally to assure any organization’s financial survival following a serious event. On the other hand, the good news is that approval under SAFETY Act automatically grants immunity, liability caps, affirmative defenses and other incentives for entities providing or using approved anti-terrorism products, technologies, facilities, software, procedures and/or services. The very nature of network and IT security protection makes the developer, provider or user an ideal candidate for SAFETY Act protection.
We can help you use SAFETY Act to drastically reduce the enterprise threatening liability exposures you will face if a cyber terrorism event somehow involves your products, systems, networks, hardware, software, advice, services or facilities. In addition, entities that sell or provide anti-terrorism / e-terrorism goods or services to others will enjoy a significant marketing advantage and higher demand for their approved products and services.
To qualify for SAFETY Act protection, the protections utilized do not have to be dedicated exclusively to preventing e-terrorism but they do need to have an anti-terrorism element. Network protection is an ideal example of simultaneously guarding against both terrorism and non-terrorism threats.
DHS approval under the SAFETY Act automatically grants unprecedented liability protection and immunity from lawsuits stemming from a terrorist event including cyber terrorism. The Act protects against allegations that a SAFETY Act Designated product, technology, service, procedure, software, advice or facility failed, was misused, inadequate or otherwise and did not identify, prevent, respond to or respond appropriately or otherwise help mitigate a terrorist act. SAFETY Act’s broad protections will apply to suits resulting from, or alleging, bodily injury, property damage and/or other harm, including financial harm.
Another exciting feature, although not the SAFETY Act’s intended purpose, is the significant marketing edge and higher demand that SAFETY Act approval creates for entities that provide products and services to others.
See our SAFETY Act Marketing Advantages Page
SAC's White Paper: "Cyber Terrorism and the SAFETY Act" - Nov 2011
Cyber Related News
Release Date: March 13, 2013
From The Public Entity Risk Institute’s
"PERIScope" Newsletter - January 2011:
PERI - "Cyber Terrorism and SAFETY Act"
The Public Entity Risk Institute (PERI) is an independent thought leader and definitive resource for risk management, serving public entities, small businesses and small nonprofit organizations. Its mission is to improve its constituents’ sustainability by enabling them to identify and address their risks and vulnerabilities. PERI provides guidance through relevant and high quality publications, information, training, resources, and consulting services. PERI was established in 1997 as a 501(c)(3) tax-exempt, nonprofit, non-membership organization.
The threat is real:
New threat: Hackers look to take over power plants
By LOLITA C. BALDOR (AP) – August 3, 2010
WASHINGTON — Computer hackers have begun targeting power plants and other critical operations around the world in bold new efforts to seize control of them, setting off a scramble to shore up aging, vulnerable systems....
See our SAFETY Act Marketing Advantages Section
By e-Mail:
info [at] SAFETYACTCONSULTANTS dot com
Our online web-form: Web-form
Phone: (202) 640-4000
Toll-free: (855) SAFETY ACT or: (877) S ACT HELP
Fax: (202) 407-7054
Mailing Address:
SAFETY ACT CONSULTANTS
P.O. Box 1666
Brookfield, WI 53008-1666
We look forward to assisting you in creating customized solutions critical to your organization and key in helping to protect people and assets.
Protect Your Organization from enterprise threatening liability that will follow a terrorist event alleged to involve your organization's facilities or products in any way
Protect your bottom line from suits stemming from the use, manufacture, distribution, provision or deployment of anti-terrorism or terrorism response or mitigation related products, advice, aid, procedures, technologies or other services
Save Money on both new and existing insurance programs, the ongoing cost of risk as well as the overall SAFETY Act process
Increase Your Revenue by using SAFETY Act approval to help market your products, advice, facilities, technologies or services including cyber or network related
Thoroughly understand the SAFETY Act as well as the regulations that implement it
Thoroughly understand the SAFETY Act application process
Evaluate the Act's benefit to your organization, insurance, products, suppliers, vendors and customers
Determine if SAFETY Act
protection can apply to a given product, facility, technology, procedure and/or service
Describe and review the Act with your risk management, legal, upper management, finance, engineering, and marketing groups as needed
Evaluate the time demands, costs and difficulty of the application process for your unique exposures
Manage the entire application process through completion
Evaluate insurance programs for adequacy in coverage, limits, protecting your liability cap savings, insurer and SAFETY Act compliance
Evaluate contracts and other agreements for conflicts, issues adequacy as well as insurer and SAFETY Act compliance
Provide options for minimizing cost of insurance and risk while maximizing coverages
Arrange for outside experts as appropriate for your specific needs including experts in technical, legal, insurance and political affairs as well as physical and financial asset, business income and supply chain protection
Monitor the SAFETY Act status of your suppliers, vendors, subcontractors and customers
Negotiate with the DHS, insurance brokers, insurers and/or lawyers if potential problems, conflicts, limitations, potential savings or enhancement possibilities exist
Create a standardized process to coordinate and manage all SAFETY Act related activities for existing, planned or future exposures as well as third party approvals (i.e. your vendors)
Post approval support including any changes in your insurance, the insurance market, insurance costs; changes in your approved products or services; periodic review of compliance and other services you deem necessary
Advise on other terrorism related financial protection strategies including contractual protection review, FARs, Public Law 85-804, Government Contractor Defense - "Boyle", captive utilization and/or formation, conventional and non-conventional terrorism insurance coverages, TRIA applicability and access, etc.
"Vision without Action is a Daydream -
Action without Vision is a Nightmare"
- Japanese Proverb
THE SAFETY ACT
UTILITY COMPANY SAFETY ACT DESIGNATION & CERTIFICATION
BUILDING SAFETY ACT DESIGNATION & CERTIFICATION
Website © Copyright 2003 - 2020 by HAVeESP, Inc.™ and
HAVeESP, Inc.™ D/B/A:
SAFETY ACT CONSULTANTS
All Rights Reserved
Website updated frequenttly
Latest Update: 11/2/2020
SAFETY ACT CONSULTANTS
P.O. Box 1666
Brookfield, WI 53008-1666
ph: 202 640 4000
fax: 202 407 7054
alt: Toll Free 855-SAFETY-ACT
INFO