Regulations Implementing the Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (the SAFETY Act), 33147-33168 [06-5223]

Download as PDF 33147 Rules and Regulations Federal Register Vol. 71, No. 110 Thursday, June 8, 2006 This section of the FEDERAL REGISTER contains regulatory documents having general applicability and legal effect, most of which are keyed to and codified in the Code of Federal Regulations, which is published under 50 titles pursuant to 44 U.S.C. 1510. The Code of Federal Regulations is sold by the Superintendent of Documents. Prices of new books are listed in the first FEDERAL REGISTER issue of each week. DEPARTMENT OF HOMELAND SECURITY Office of the Secretary 6 CFR Part 25 [USCG–2003–15425] RIN 1601–AA15 Regulations Implementing the Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (the SAFETY Act) Office of the Secretary, Department of Homeland Security. ACTION: Final rule. cprice-sewell on PROD1PC66 with RULES AGENCY: 15:35 Jun 07, 2006 Jkt 208001 If you have questions on this final rule, contact the Director of the Office of SAFETY Act Implementation, Science and Technology, Department of Homeland Security, telephone 703– 575–4511. If you have questions on viewing or submitting material to the docket, call Dorothy Beard, Chief, Dockets, Department of Transportation, telephone 202–366–5149. FOR FURTHER INFORMATION CONTACT: SUMMARY: This final rule implements Subtitle G of Title VIII of the Homeland Security Act of 2002—the Support Antiterrorism by Fostering Effective Technologies Act of 2002 (‘‘the SAFETY Act’’ or ‘‘the Act’’), which provides critical incentives for the development and deployment of anti-terrorism technologies by providing liability protections for providers of ‘‘qualified anti-terrorism technologies.’’ The purpose of this rule is to facilitate and promote the development and deployment of anti-terrorism technologies that will save lives. The final rule amends the interim rule to incorporate changes resulting from the comments. DATES: This final rule is effective July 10, 2006. ADDRESSES: You may submit comments identified by Coast Guard docket number USCG–2003–15425 or RIN 1601–AA15, to the Docket Management Facility at the Department of Transportation, by one of the following methods: (1) Web Site: https://dms.dot.gov. (2) Mail: Docket Management Facility, U.S. Department of Transportation, 400 Seventh Street, SW., Washington, DC 20590–0001. VerDate Aug<31>2005 (3) Fax: 202–493–2251. (4) Delivery: Room PL–401 on the Plaza level of the Nassif Building, 400 Seventh Street, SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. The telephone number is 202–366– 9329. (5) Federal eRulemaking portal: https://www.regulations.gov. Instructions: Comments and materials received from the public, as well as documents mentioned in this preamble as being available in the docket, are part of docket USCG–2003–15425 and are available for inspection or copying from the Docket Management Facility, U.S. Department of Transportation, room PL– 401, 400 Seventh Street, SW., Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday except Federal holidays. You may also find this docket on the Internet at https:// dms.dot.gov. You may also access the Federal eRulemaking Portal at https:// www.regulations.gov. SUPPLEMENTARY INFORMATION: Capitalized terms appearing in this preamble shall have the meanings ascribed to such terms in § 25.2 of this final rule. This section is organized as follows: Table of Contents I. Analysis of the SAFETY Act A. Background B. Statutory and Regulatory History and Analysis C. Government Contractor Defense D. Exclusive Federal Jurisdiction and Scope of Insurance Coverage E. Relationship of the SAFETY Act to Indemnification Under Public Law 85– 804 II. Discussion of Changes and Comments A. Confidentiality of Information B. Application Preparation Burden C. Certifying ‘‘accuracy and completeness’’ D. Conditions on Designations E. Significant Modification to a Qualified Anti-TerrorismTechnology PO 00000 Frm 00001 Fmt 4700 Sfmt 4700 F. Exclusive Responsibility for Government Contractor Defense, Definitions of Fraud and Willful Misconduct G. Definition of an ‘‘Act of Terrorism’’ H. Retroactive Designation I. Bias Toward Product-Based AntiTerrorism Technologies J. Scope of Insurance Coverage K. Interactions With Public Law 85–804 L. Prioritization of Evaluations M. Standards N. Expiration of Designations O. Appeal/Review of Decisions Regarding SAFETY Act Applications P. Coordination With Government Procurements Q. Pre-Application Consultations R. Developmental Test & Evaluation Designations S. Seller’s Continuing Obligations With Respect to Maintaining Insurance T. Block Designations and Block Certifications U. Reciprocal Waivers V. Deference Due to Other Federal or State Regulatory or Procurement Officials III. Regulatory Requirements A. Executive Order 12866 B. Regulatory Flexibility Act C. Unfunded Mandates Reform Act of 1995 D. Executive Order 13132—Federalism E. Paperwork Reduction Act I. Analysis of the SAFETY Act A. Background Congress was clear, both in the text of the SAFETY Act and in the Act’s legislative history, that the SAFETY Act can and should be a critical tool in expanding the creation, proliferation and use of anti-terrorism technologies. On July 11, 2003, the Department of Homeland Security (‘‘DHS’’) published its first proposed rules for implementation of the SAFETY Act (Notice of Proposed Rulemaking entitled ‘‘Regulations Implementing the Support Anti-terrorism by Fostering Effective Technologies Act of 2002 (the SAFETY Act)’’ (68 FR 41420), laying out its fundamental interpretive approach to the Act and requesting comment. On October 16, 2003, an interim rule governing implementation of the SAFETY Act was promulgated making certain changes to the proposed rules but again embracing many of the fundamental interpretive approaches proposed several months earlier (68 FR 59684). Subsequently, the Department published detailed procedural mechanisms for implementation of the Act and announced additional details relating to the process for filing and adjudicating applications. E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES 33148 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations The SAFETY Act program is now in its third year, and the Department has a substantial record of program performance to evaluate. While the Department concludes that the Department’s core legal interpretations of the Act’s provisions are fundamentally sound, experience in administering the program has demonstrated that certain of the procedural processes built to administer the Act can be improved. Shortly after being sworn in, Secretary of Homeland Security Michael Chertoff stated: ‘‘There is more opportunity, much more opportunity, to take advantage of this important law, and we are going to do that.’’ In the past year, the Department has instituted process improvements which have yielded positive initial results. In the first sixteen months of the SAFETY Act program, from October 2003 to February 2005, six technologies were designated Qualified AntiTerrorism Technologies under the SAFETY Act. By contrast, since March 2005, 68 additional technologies have received SAFETY Act protections. This is a greater than ten-fold increase in SAFETY Act approvals in the past 14 months. In addition, the Department has instituted a program to run SAFETY Act reviews in parallel with key antiterrorism procurement processes. Despite these recent improvements, further changes to Department rules and processes are necessary to ensure that the program achieves the results that Congress intended. With this final rule, the Department: 1. Further clarifies the liability protections available under the SAFETY Act; 2. States with greater specificity those products and services that are eligible for Designation as a Qualified AntiTerrorism Technology; 3. Clarifies the Department’s efforts to protect the confidential information, intellectual property, and trade secrets of SAFETY Act applicants; 4. Articulates the Department’s intention to extend SAFETY Act liability protections to well-defined categories of anti-terrorism technologies by issuing ‘‘Block Designations’’ and ‘‘Block Certifications;’’ 5. Discusses appropriate coordination of SAFETY Act consideration of antiterrorism technologies with government procurement processes; and 6. Takes other actions necessary to streamline processes, add flexibility for applicants, and clarify protections afforded by the SAFETY Act. While this rule is indeed final, the Department remains committed to making future changes to the implementing regulation or to any VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 element of the program that interferes with the purposes of the SAFETY Act. To that end, the Department seeks further comment on the specific issues identified herein. Section I of this preamble reviews the Department’s longstanding legal interpretation of the SAFETY Act’s provisions and reviews the Act’s statutory and regulatory history. Section II addresses regulatory changes and outlines additional improvements in SAFETY Act processes and procedures that the Department will implement in the coming months that will improve administration of the Act. Section III addresses this rule’s compliance with other regulatory requirements. B. Statutory and Regulatory History and Analysis As part of the Homeland Security Act of 2002, Public Law 107–296, Congress enacted liability protections for providers of certain anti-terrorism technologies. The SAFETY Act provides incentives for the development and deployment of anti-terrorism technologies by creating a system of ‘‘risk management’’ and a system of ‘‘litigation management.’’ The purpose of the Act is to ensure that the threat of liability does not deter potential manufacturers or sellers of antiterrorism technologies from developing, deploying, and commercializing technologies that could save lives. The Act thus creates certain liability limitations for ‘‘claims arising out of, relating to, or resulting from an act of terrorism’’ where Qualified AntiTerrorism Technologies (as such term is defined in 6 CFR 25.2) have been deployed. Together, the risk and litigation management provisions provide the following protections: • Exclusive jurisdiction in Federal court for suits against the sellers of ‘‘Qualified Anti-Terrorism Technologies’’ (§ 863(a)(2)); • A limitation on the liability of sellers of Qualified Anti-Terrorism Technologies to an amount of liability insurance coverage specified for each Qualified Anti-Terrorism Technology, provided that sellers cannot be required to obtain any more liability insurance coverage than is reasonably available ‘‘at prices and terms that will not unreasonably distort the sales price’’ of the technology (§ 864(a)(2)); • A prohibition on joint and several liability such that sellers can only be liable for the percentage of noneconomic damages that is proportionate to their responsibility (§ 863(b)(2)); PO 00000 Frm 00002 Fmt 4700 Sfmt 4700 • A complete bar on punitive damages and prejudgment interest (§ 863(b)(1)); • The reduction of a plaintiff’s recovery by the amount of collateral source compensation, such as insurance benefits or government benefits, such plaintiff receives or is eligible to receive (§ 863(c)); and • A rebuttable presumption that sellers are entitled to the ‘‘government contractor defense’’ (§ 863(d)). The Secretary’s designation of a technology as a Qualified AntiTerrorism Technology (QATT) confers each of the liability protections identified above except the rebuttable presumption in favor of the government contractor defense. The presumption in favor of the government contractor defense requires an additional ‘‘Certification’’ by the Secretary under section 863(d) of the Act. In many cases, however, SAFETY Act Designation and Certification are conferred contemporaneously. As noted above, the Designation of a technology as a Qualified AntiTerrorism Technology confers all of the liability protections provided in the SAFETY Act, except for the presumption in favor of the government contractor defense. The Act gives the Secretary broad discretion in determining whether to designate a particular technology as a Qualified Anti-Terrorism Technology, although the Act sets forth the following criteria for consideration of a particular technology: (1) Prior United States Government use or demonstrated substantial utility and effectiveness; (2) availability of the technology for immediate deployment; (3) the potential liability of the Seller; (4) the likelihood that the technology will not be deployed unless the SAFETY Act protections are conferred; (5) the risk to the public if the technology is not deployed; (6) evaluation of scientific studies; and (7) the effectiveness of the technology in defending against acts of terrorism. It is not required that applicants satisfy all of the preceding criteria to receive SAFETY Act protections. Moreover, these criteria are not exclusive—the Secretary may consider other factors that he deems appropriate. The Secretary has discretion to give greater weight to some factors over others, and the relative weighting of the various criteria may vary depending upon the particular technology at issue and the threats that the particular technology is designed to address. The Secretary may, in his discretion, determine that failure to meet a particular criterion justifies denial of an application under the SAFETY Act. However, the Secretary is E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations not required to reject an application that fails to meet one or more of the criteria. Rather, the Secretary may conclude, after considering all of the relevant criteria and any other relevant factors, that a particular technology merits Designation as a Qualified AntiTerrorism Technology even if one or more particular criteria are not satisfied. The Secretary’s considerations will also vary with the constantly evolving threats and conditions that give rise to the need for the technologies. The SAFETY Act applies to a broad range of technologies, including products, services, and software, or combinations thereof, as long as the Secretary, as an exercise of discretion and judgment, determines that a technology merits Designation. The Secretary may designate a system containing many component technologies (including products and services) or may designate specific component technologies individually. Further, as the statutory criteria suggest, a Qualified Anti-Terrorism Technology need not be newly developed—it may have already been employed (e.g. ‘‘prior United States government use’’’) or may be a new application of an existing technology. The SAFETY Act provides that, before designating a Qualified Anti-Terrorism Technology, the Secretary will examine the amount of liability insurance the Seller of the technology proposes to maintain for coverage of the antiterrorism technology at issue. Under section 864(a), the Secretary must certify that the coverage level is appropriate ‘‘to satisfy otherwise compensable third-party claims arising out of, relating to, or resulting from an act of terrorism when qualified antiterrorism technologies have been deployed.’’ § 864(a)(1). While the Act provides the Secretary with significant discretion in this regard, the Secretary may not require the Seller to obtain liability insurance of more than the maximum amount of liability insurance reasonably available from private sources on the world market. Likewise, the Secretary may not require a Seller to obtain insurance, the cost of which would unreasonably distort the sales price of Seller’s anti-terrorism technologies. § 864(a)(2). Although the Secretary may permit the Seller to selfinsure, he may not require the Seller to self-insure if appropriate insurance is unavailable. § 864(a)(2). The Secretary does not intend to set a ‘‘one-size-fits-all’’ numerical requirement regarding required insurance coverage for all technologies that have been designated as QATTs. Instead, as the Act suggests, the inquiry VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 will be specific to each application and may involve an examination of several factors, including without limitation the following: (i) The amount of insurance the Seller has previously maintained; (ii) the amount of insurance maintained by the Seller for other related technologies or for the Seller’s business as a whole; (iii) the amount of insurance typically maintained by Sellers of comparable technologies; (iv) data and history regarding mass casualty losses; and (v) the particular technology at issue. Once the Secretary concludes the analysis regarding the appropriate level of insurance coverage (which typically will include discussions with the Seller), the Secretary will provide a description of the coverage appropriate for the particular Seller of a Qualified Anti-Terrorism Technology to maintain. The Seller’s insurance certification may identify an appropriate amount of insurance coverage available under a comprehensive general liability policy or other liability insurance program. The insurance certification also may specify that the amount of insurance required to be maintained will be the amount of coverage available under the terms of the specific policy at issue. If, during the term of the Designation, the Seller desires to request reconsideration of that insurance certification due to changed circumstances or for other reasons, the Seller may do so and the Secretary is authorized to use the discretion described above to adjust insurance requirements appropriately. If the Seller fails to maintain coverage at the certified level, the liability protections of the Act will continue to apply, but the Seller’s liability limit will remain at the certified insurance level. The Department recognizes that the market for insurance might change over time and seeks further comment on how the Department can and should address changes in insurance availability. C. Government Contractor Defense The SAFETY Act creates a rebuttable presumption that the government contractor defense applies to those Qualified Anti-Terrorism Technologies ‘‘approved by the Secretary’’ in accordance with certain criteria specified in § 863(d)(2). The government contractor defense is an affirmative defense that immunizes Sellers from liability for certain claims brought under § 863(a) of the Act. See § 863(d)(1). The presumption of this defense applies to all ‘‘approved’’ Qualified Anti-Terrorism Technologies for claims brought in a ‘‘product liability or other lawsuit’’ and ‘‘arising out of, relating to, or resulting from an act of terrorism when qualified anti- PO 00000 Frm 00003 Fmt 4700 Sfmt 4700 33149 terrorism technologies * * * have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller.’’ Id. While the government contractor defense is a judicially-created doctrine, section 863’s express terms supplant the requirements in the case law for the application of the defense. First, and most obviously, the Act expressly provides that the government contractor defense is available not only to government contractors, but also to those who sell to State and local governments or the private sector. See § 863(d)(1) (‘‘This presumption of the government contractor defense shall apply regardless of whether the claim against the Seller arises from a sale of the product to Federal Government or non-Federal Government customers.’’) Second, Sellers of Qualified AntiTerrorism Technologies need not design their technologies to federal government specifications in order to obtain the government contractor defense under the SAFETY Act. Instead, the Act sets forth criteria for the Department’s Certification of technologies. Specifically, the Act provides that before issuing a Certification for a technology, the Secretary will conduct a ‘‘comprehensive review of the design of such technology and determine whether it will perform as intended, conforms to the Seller’s specifications, and is safe for use as intended.’’ § 863(d)(2). The Act also provides that the Seller will ‘‘conduct safety and hazard analyses’’ and supply such information to the Secretary. Id. This express statutory framework thus governs in lieu of the requirements developed in case law for the application of the government contractor defense. Third, the Act expressly states the limited circumstances in which the applicability of the defense can be rebutted. The Act provides expressly that the presumption can be overcome only by evidence showing that the Seller acted fraudulently or with willful misconduct in submitting information to the Secretary during the course of the Secretary’s consideration of such technology. See § 863(d)(1) (‘‘This presumption shall only be overcome by evidence showing that the Seller acted fraudulently or with willful misconduct in submitting information to the Secretary during the course of the Secretary’s consideration of such technology under this subsection.’’) The applicability of the government contractor defense to particular technologies is thus governed by these express provisions of the Act, rather than by the judicially-developed criteria E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES 33150 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations for applicability of the government contractor defense outside the context of the SAFETY Act. While the Act does not expressly delineate the scope of the defense (i.e., the types of claims that the defense bars), the Act and the legislative history make clear that the scope is broad. For example, it is clear that any Seller of an ‘‘approved’’ technology cannot be held liable under the Act for design defects or failure to warn claims, unless the presumption of the defense is rebutted by evidence that the Seller acted fraudulently or with willful misconduct in submitting information to the Secretary during the course of the Secretary’s consideration of such technology. In Boyle v. United Technologies Corp., and its progeny, the Supreme Court has ruled that the government contractor defense bars a broad range of claims. For example, the Supreme Court in Boyle concluded that ‘‘state law which holds Government contractors liable for design defects’’ can present a significant conflict with Federal policy (including the discretionary function exception to the Federal Tort Claims Act) and therefore ‘‘must be displaced.’’ Boyle v. United Technologies Corp., 487 U.S. 500, 512 (1988). The Department believes with the SAFETY Act that Congress incorporated government contractor defense protections outlined in the Supreme Court’s Boyle line of cases as it existed on the date of enactment of the SAFETY Act, rather than incorporating future developments of the government contractor defense in the courts. Indeed, it is difficult to imagine that Congress would have intended a statute designed to provide certainty and protection to Sellers of anti-terrorism technologies to be subject to future developments of a judiciallycreated doctrine. In fact, there is evidence that Congress rejected such a construction. See, e.g., 148 Cong. Rec. E2080 (November 13, 2001) (statement of Rep. Armey) (‘‘[Companies] will have a government contractor defense as is commonplace in existing law.’’) (emphasis added). Procedurally, the presumption of applicability of the government contractor defense is conferred by the Secretary’s Certification of a Qualified Anti-Terrorism Technology specifically for the purposes of the government contractor defense. This Certification is an act separate from the Secretary’s issuance of a Designation for a Qualified Anti-Terrorism Technology and confers additional benefits to Sellers. Importantly, Sellers may submit applications for both Designation as a Qualified Anti-Terrorism Technology VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 and Certification for purposes of the government contractor defense at the same time, and the Secretary may review and act upon both applications contemporaneously. The distinction between the Secretary’s two actions is important, however, because the approval process for the government contractor defense includes a level of review that is not required for the Designation as a Qualified AntiTerrorism Technology. In appropriate cases, Sellers may obtain the protections that come with Designation as a Qualified Anti-Terrorism Technology even if they have not satisfied the additional requirements for the government contractor defense. In an effort to provide greater clarity, the Department intends to publish guidance regarding its interpretation of the government contractor defense and the Supreme Court’s Boyle line of cases as it existed on the date of enactment of the SAFETY Act. D. Exclusive Federal Jurisdiction and Scope of Insurance Coverage The Act creates an exclusive Federal cause of action ‘‘for any claim for loss of property, personal injury, or death arising out of, relating to, or resulting from an act of terrorism when qualified anti-terrorism technologies have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller.’’ § 863(a)(2); See also § 863(a)(1). This exclusive ‘‘Federal cause of action shall be brought only for claims for injuries that are proximately caused by sellers that provide qualified antiterrorism technology.’’ § 863(a)(1). The best reading of § 863(a), and the reading the Department has adopted, is that (1) Only one cause of action exists for loss of property, personal injury, or death for performance or nonperformance of the Seller’s Qualified Anti-Terrorism Technology in relation to an Act of Terrorism, (2) Such cause of action may be brought only against the Seller of the Qualified Anti-Terrorism Technology and may not be brought against the buyers, the buyers’ contractors, downstream users of the Qualified AntiTerrorism Technology, the Seller’s suppliers or contractors, or any other person or entity, and (3) Such cause of action must be brought in Federal court. The exclusive Federal nature of this cause of action is evidenced in large part by the exclusive jurisdiction provision in § 863(a)(2). That subsection states: ‘‘Such appropriate district court of the United States shall have original and exclusive jurisdiction over all actions for any PO 00000 Frm 00004 Fmt 4700 Sfmt 4700 claim for loss of property, personal injury, or death arising out of, relating to, or resulting from an act of terrorism when Qualified Anti-Terrorism Technologies have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller.’’ Id. Any presumption of concurrent causes of action (between state and Federal law) is overcome by two basic points. First, Congress would not have created in this Act a Federal cause of action to complement State law causes of action. Not only is the substantive law for decision in the Federal action derived from State law (and thus would be surplusage), but in creating the Act Congress plainly intended to limit rather than increase the liability exposure of Sellers. Second, the granting of exclusive jurisdiction to the Federal district courts provides further evidence that Congress wanted an exclusive Federal cause of action. Indeed, a Federal district court (in the absence of diversity) does not have jurisdiction over State law claims, and the statute makes no mention of diversity claims anywhere in the Act. Further, it is clear that the Seller is the only appropriate defendant in this exclusive Federal cause of action. First and foremost, the Act unequivocally states that a ‘‘cause of action shall be brought only for claims for injuries that are proximately caused by sellers that provide qualified anti-terrorism technology.’’ § 863(a)(1). Second, if the Seller of the Qualified Anti-Terrorism Technology at issue were not the only defendant, would-be plaintiffs could, in an effort to circumvent the statute, bring claims (arising out of or relating to the performance or non-performance of the Seller’s Qualified Anti-Terrorism Technology) against arguably less culpable persons or entities, including but not limited to contractors, subcontractors, suppliers, vendors, and customers of the Seller of the technology. Because the claims in the cause of action would be predicated on the performance or non-performance of the Seller’s Qualified Anti-Terrorism Technology, those persons or entities, in turn, would file a third-party action against the Seller. In such situations, the claims against non-Sellers thus ‘‘may result in loss to the Seller’’ under § 863(a)(2). The Department believes Congress did not intend through the Act to increase rather than decrease the amount of litigation arising out of or related to the deployment of Qualified Anti-Terrorism Technology. Rather, Congress balanced the need to provide recovery to plaintiffs against the need to E:\FR\FM\08JNR1.SGM 08JNR1 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations ensure adequate deployment of antiterrorism technologies by creating a cause of action that provides a certain level of recovery against Sellers, while at the same time protecting others in the supply chain. cprice-sewell on PROD1PC66 with RULES E. Relationship of the SAFETY Act to Indemnification Under Public Law 85– 804 The Department recognizes that Congress intended that the SAFETY Act’s liability protections would substantially reduce the need for the United States to provide indemnification under Public Law 85– 804 to Sellers of anti-terrorism technologies. The liability protections of the SAFETY Act should, in many circumstances, make it unnecessary to provide indemnification to Sellers. The Department recognizes, however, that there are circumstances in which both SAFETY Act coverage and indemnification are warranted. See 148 Cong. Rec. E2080 (statement by Rep. Armey) (November 13, 2002) (stating that in some situations the SAFETY Act protections will ‘‘complement other government risk-sharing measures that some contractors can use such as Pub. L. 85–804’’). In recognition of this close relationship between the SAFETY Act and indemnification authority, in section 73 of Executive Order 13286 of February 28, 2003, the President amended the existing Executive Order on indemnification–Executive Order 10789 of November 14, 1958, as amended. The amendment granted the Department of Homeland Security authority to indemnify under Public Law 85–804. At the same time, it requires that all agencies—not just the Department of Homeland Security— follow certain procedures to ensure that the potential applicability of the SAFETY Act is considered before any indemnification is granted for an antiterrorism technology. Specifically, the amendment provides that Federal agencies cannot provide indemnification ‘‘with respect to any matter that has been, or could be, designated by the Secretary of Homeland Security as a qualified antiterrorism technology’’ unless the Secretary of Homeland Security has advised whether SAFETY Act coverage would be appropriate and the Director of the Office of Management and Budget has approved the exercise of indemnification authority. The amendment includes an exception for the Department of Defense where the Secretary of Defense has determined that indemnification is ‘‘necessary for the timely and effective conduct of VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 United States military or intelligence activities.’’ II. Discussion of Changes and Comments The Department received 16 sets of comments to the interim rule during the comment period and has made substantive and stylistic changes in response to those comments. The Department considered all of the comments received and the Department’s responses follow. A. Confidentiality of Information Eight commenters expressed dissatisfaction with the Department’s stated policy with regard to safeguarding proprietary information (including business confidential information) submitted as part of a SAFETY Act application. Some commenters desired the Department to declare that SAFETY Act application contents are ‘‘voluntary submissions’’ for purposes of determining whether the Critical Infrastructure Information Act applies. Commenters also noted that Exemption 4 of FOIA protects ‘‘trade secrets or commercial or financial information from a person [that is] privileged or confidential.’’ The Department remains committed to the vigorous protection of applicants’ submissions and confidential information. One applicant suggested that the Department ‘‘adopt a general presumption of confidential treatment of all SAFETY Act applications, evaluations and studies of such applications, underlying decisional documentation, and application rejection notices.’’ This has been the Department’s intention, policy, and practice from the outset. DHS is committed to taking all appropriate steps to protect the proprietary information of applicants consistent with applicable FOIA exemptions and the Trade Secrets Act (18 U.S.C. 1905). As an example of this commitment, those engaged in evaluating applications are required to enter into appropriate nondisclosure agreements. In addition, prior to being granted access to any proprietary information associated with an application or its evaluation, each potential evaluator is examined for potential conflicts of interest. Finally, the Department’s conflict of interest and confidentiality policies apply to everyone associated with SAFETY Act implementation. Underlying this commitment to protect an applicant’s information are various Federal civil and criminal laws that potentially apply to unauthorized disclosure of SAFETY Act confidential materials, including the Trade Secrets PO 00000 Frm 00005 Fmt 4700 Sfmt 4700 33151 Act and 18 U.S.C. Chapter 90 (Protection of Trade Secrets, especially section 1831—Economic Espionage, and section 1832—Theft of Trade Secrets). These laws establish criminal penalties for disclosing proprietary data under various circumstances. There are also relevant state laws, including versions of the Uniform Trade Secrets Act adopted in the District of Columbia, the State of Maryland, the Commonwealth of Virginia, and 39 other states. In addition, sensitive homeland security information, including information regarding vulnerabilities of critical infrastructure can be entitled to certain statutory protections under sections 892(a)(1)(B), 892(b)(3), 892(f) of the Homeland Security Act of 2002, Sensitive Security Information under 49 U.S.C. 40119, 49 CFR part 1520 and FOIA Exemption 3 (among other FOIA exemptions). The Department also believes that all information that is submitted as part of an application, including the fact that a particular entity has submitted an application, is confidential commercial information under the tests established in National Parks & Conservation Association v. Morton, 498 F.2d 765 (D.C. Cir. 1974), and its progeny. In particular, much or all of this information qualifies as confidential under both the ‘‘competitive harm’’ prong of the test, and the ‘‘third prong’’ of government interest and program effectiveness. The Department will assert appropriate exemptions (including, as applicable, FOIA Exemptions 1 through 4) in declining to disclose under FOIA any information concerning the source of a SAFETY Act application or the contents of applications. This policy is now reflected in the rule at section 25.10 of this final rule. In addition, the Department will work with applicants to ensure that no proprietary information is published in connection with an announcement of a Block Designation (pursuant to § 25.6(i) of this final rule), DHS’s publication of the Approved Product List for Homeland Security (pursuant to § 25.8(k) of the final rule) or the voluntary publication by DHS of issued Designations. Moreover, the Government does not, at this time, intend to ‘‘portion mark’’ information contained in the application, or associated case file, to delineate between protected proprietary information (also referred to as ‘‘SAFETY Act Confidential Information’’) and other less sensitive data in the application. Instead the entirety of the application will be treated as confidential under appropriate law. It is the Department’s E:\FR\FM\08JNR1.SGM 08JNR1 33152 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations cprice-sewell on PROD1PC66 with RULES belief that requiring the reviewer to portion mark at the time of submission would greatly impact efficiency and applicants’ confidence in the integrity of protections for proprietary information, and that such a practice does not reflect the requirements of applicable confidentiality protections. The Department has established internal security procedures for handling technical, business, and insurance information that is submitted in connection with a SAFETY Act application. Certain of the measures the Department has instituted to safeguard proprietary information are reflected in 6 CFR 25.10. All applications, whether paper or electronic, will be subject to stringent safeguards. In obtaining the input of subject matter experts and evaluators that analyze SAFETY Act applications, the Department will only seek input from individual experts or evaluators and will not consult any committee in the process of reviewing SAFETY Act applications. Finally, the Department recognizes that information submitted in SAFETY Act applications may constitute Protected Critical Infrastructure Information pursuant to sections 211–215 of the Homeland Security Act of 2002. The Department is in the process of revising its Protected Critical Infrastructure Information regulations and anticipates providing further information on this subject in the near future. B. Application Preparation Burden Six commenters expressed concern that the amount and type of information required by the SAFETY Act Application Kit is extremely burdensome, if not prohibitively so, and that only large companies have the resources necessary to respond to each of the questions. Commenters also expressed the opinion that some of the information being requested— particularly financial information—is not relevant to the evaluation of applications against the criteria of the Act. The Department recognizes that the SAFETY Act Application Kit utilized to date poses significant burdens for applicants. We are very sensitive to concerns about the application process and the difficulty of preparing and submitting a SAFETY Act application. The Department specifically solicited comments on the SAFETY Act Application Kit and application process set forth in the interim rule. In addition, the Department released for comment a revised SAFETY Act Application Kit in December 2004. Based on both the comments received concerning the SAFETY Act Application Kit as well as VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 the experience of the Office of SAFETY Act Implementation (‘‘OSAI’’) with the applications filed to date, OSAI has published numerous Frequently Asked Questions on its Web site as well as undertaken a substantial revision of the SAFETY Act Application Kit. The Department plans to publish a revised SAFETY Act Application Kit, which will account for the changes contained in this final rule and which will state with greater specificity the information required to properly evaluate a SAFETY Act application. For example, the Department agrees that some of the financial information requested in the original SAFETY Act Application Kit is not essential to the evaluation of every application. The Department, therefore, will limit the amount of financial information requested as part of the initial submission and to supplement the information as needed throughout the evaluation process. The Department believes that the streamlining of the SAFETY Act Application Kit will result in further efficiencies and time reductions. We anticipate making a revised SAFETY Act Application Kit available as soon as practicable. C. Certifying ‘‘accuracy and completeness’ Two commenters expressed the opinion that it is unreasonable to require applicants to certify the application as ‘‘accurate and complete’’ under penalty of perjury when some of the questions require the applicant to provide answers on a ‘‘best guess’’ basis. In particular, the answers to the questions related to threat estimates, potential casualties, and potential casualty reductions were cited as questions whose answers may be essentially unknowable. The Department agrees that it would be unreasonable to expect applicants to certify the accuracy of their speculative or predictive estimates of future events and risks. The language of the completeness certification is qualified, however, by the phrase ‘‘to the best of my knowledge and belief.’’ Since the applicant either knows or is able to obtain accurate factual information about the applicant’s anti-terrorism technology and business enterprise, the Department believes the application’s completeness certification is appropriate as to factual information and the application will so state. Conversely, since estimates are by definition not factual information, the Department’s position is that the completeness certification requires only that estimates be provided in good faith with a reasonable belief they are as PO 00000 Frm 00006 Fmt 4700 Sfmt 4700 accurate as possible at the time of submission. The Department will add this explanation as to estimates to the application form, and will consider all forms presented to date as incorporating this explanation. D. Conditions on Designations Two commenters took exception to the inclusion of limitations on SAFETY Act Designations (as such term is defined in 6 CFR 25.2) or Certifications (as such term is defined in 6 CFR 25.2), suggesting that the liability protections presented by the SAFETY Act potentially could be bypassed through a claim that such limitations imposed by the Department as a condition of SAFETY Act Designation were not met. The Department is aware of this concern and understands that undependable or uncertain liability protections would not have the desired effect of fostering the deployment of anti-terrorism technologies. Further, the Department is aware of the difficulty of crafting language for limitations that is not subject to multiple interpretations. As a general matter, the Department does not intend to impose conditions on SAFETY Act Designations and Certifications. If a question arises regarding the functionality of a technology, generally the Department will address and resolve that question in the course of the application process. E. Significant Modification to a Qualified Anti-Terrorism Technology Section 25.5(i) of the interim final rule has been the focus of significant attention, both by commenters and by members of Congress. That provision provided for automatic termination of SAFETY Act protection if a ‘‘significant modification’’ was made to a QATT, defined as a modification that could significantly reduce the technology’s safety or effectiveness, unless the Seller notified the Under Secretary and received approval of the modification. Several commenters have argued that the rule improperly suggests that a SAFETY Act Designation or Certification could terminate without notice if a ‘‘significant modification’’ is made to the QATT. Commenters have argued that, in hindsight, any routine, non-substantive or immaterial change in use, implementation, components, manufacturing process or other facet of a Technology might later be regarded as a ‘‘significant modification.’’ If such a change might be used later in litigation to invalidate SAFETY Act coverage retroactive to the time of the change, they argue, the value of a SAFETY Act Designation or Certification is minimal. The American Bar Association, Public E:\FR\FM\08JNR1.SGM 08JNR1 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations cprice-sewell on PROD1PC66 with RULES Contract Law Section commented, for instance, that: ‘‘the regulations should be clear that the designation cannot be stripped away after the fact by a claimant alleging a significant change * * *’’ ‘‘Because the SAFETY Act covers all parties in the stream of commerce who rely on the designation and certification, it makes sense that their justifiable reliance not be undermined by retroactive effect back to the time of the change * * *’’ Other commenters were even more direct: ‘‘This requirement is misplaced in several respects and undermines the intent of the SAFETY Act to provide certainty and protection for those afforded coverage under the Act.’’ ‘‘[T]he language of this provision is so broad that some unanticipated future change in operation, maintenance or methodology by a downstream user of the technology, totally outside the control of the QATT Seller, might ultimately be construed to terminate the Seller’s SAFETY Act coverage. This is particularly problematic for technologies involving technical services—almost every new application of these technologies will encounter unique circumstances and variations in operation, installation, implementation that, in retrospect, might be construed to be ‘significant.’ ’’ Commenters indicated that section 25.5(i) was thus a ‘‘grave concern,’’ and that ‘‘it is essential that this provision be altered.’’ The American Bar Association proposed regulatory language to address this issue, including the following: ‘‘The termination of the Designation will apply prospectively and will only affect products or services deployed after the DHS notice of termination * * *’’ In addition, commenters and certain members of Congress have raised concerns about the tension between the statutory provision in § 863(d) of the SAFETY Act and the text of the section 25.5(i) of the interim final rule. Section 863(d) of the SAFETY Act provides that a SAFETY Act Certification is entitled to a presumption that the Government Contractor Defense applies, and specifies that a Certification may only terminate for one reason: This presumption shall only be overcome by evidence showing that the Seller acted fraudulently or with willful misconduct in submitting information to the Secretary during the course of the Secretary’s consideration of such technology under this subsection. § 863(d)(1) Thus, the argument goes, because the statute specifies one and only one means to terminate a certification, the regulations cannot add a second route to VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 termination through the ‘‘significant modification’’ provision. The Department has carefully considered all of these comments and the legal arguments above. Section 25.5(i) of the interim final rule was intended to serve an important purpose—to provide the Department with knowledge of and the ability to address significant modifications that diminish the capability of a QATT. While the Department needs to preserve the intended function of this provision of the interim final rule, it agrees that changes to the provision are necessary to address the legal and policy concerns raised above. The final rule eliminates language from section 25.5(i) of the interim final rule that could suggest that a Designation or Certification could terminate automatically and retroactively to the time of change and without notice, and replaces such language with a portion of the suggested text from the ABA commentary, and with procedures similar to those recommended by other commenters. To be clear, modifications that do not cause the QATT to be outside the scope of the QATT’s Designation or Certification will not adversely affect SAFETY Act coverage, nor are such modifications required to be notified to the Department. The final rule does not, however, eliminate the requirement that a Seller provide notice to the Department if the Seller intends to make, or has made, a modification that would cause the QATT to be outside the scope of a Designation or Certification. The Department recognizes that many modifications to components, processes, use, implementation or other aspects of a technology occur from time to time during the life of a technology, and that many modifications either will have no consequence for the functionality of the Technology or will improve it. While certain proposed significant modifications should require review, many routine or non-significant modifications will not. The Department needs a rapid system for prospectively reviewing significant modifications that could reduce the effectiveness of a QATT. Such a system must recognize that routine changes may occur to components or processes that do not reduce the safety or effectiveness of the Technology. This final rule modifies the procedure for Sellers to notify the Department of modifications or proposed modifications to a QATT and for the Department to respond quickly to such notifications with appropriate instructions for the Seller. Immaterial or routine modifications that are within PO 00000 Frm 00007 Fmt 4700 Sfmt 4700 33153 the scope of the Designation will not require notice. It is important, however, and required, that the Department be informed of any significant modifications that the Seller makes or intends to make to a QATT. A significant modification is one that is outside the scope of a Designation. The Under Secretary will make the language of Designations and Certifications as precise as practicable under the circumstances to ensure that Sellers and other parties have fair notice of the scope of coverage, and in that regard the Department calls attention to the revisions in sections 25.6(e) and 25.9(f) of the final rule. Whether notice to the Department is required for a change to a particular QATT will depend on the specific nature of the QATT and the terms of the Designation or Certification applicable to the QATT. If notice of a modification is required, review of the notice will also be undertaken in a reasonable time. If the Department does not take action in response to the notice, SAFETY Act coverage of the Technology as modified will be conclusively established. If the Department ultimately does not approve of the proposed changes, it will so notify the Seller and may discuss possible remedial action to address the Department’s concerns or take other appropriate action in the discretion of the Under Secretary, as provided in section 25.6(l) of the final rule. In no event will a Designation terminate automatically or retroactively under this provision. It is also important to recognize that the ‘‘significant modification’’ provisions may require notice by the Seller to the Department only when the modifications are made to a QATT by the Seller or are made to a QATT with the Seller’s knowledge and consent. The rule does not require that a Seller notify the Department of changes to a QATT made post-sale by an end-user of the QATT, and any such change by an enduser cannot result in loss of SAFETY Act protection for the Seller or others protected by the Seller’s Designation or Certification. F. Exclusive Responsibility for Government Contractor Defense, Definitions of Fraud and Willful Misconduct The Act is clear in allocating to the Secretary the exclusive responsibility for establishing the government contractor defense under section 861. The Act does not permit judicial review of the Secretary’s exercise of discretion in this context. When the Secretary determines that a Certification is appropriate, that decision creates a E:\FR\FM\08JNR1.SGM 08JNR1 33154 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations cprice-sewell on PROD1PC66 with RULES rebuttable presumption that the government contractor defense applies. This presumption may only be rebutted ‘‘by clear and convincing evidence showing that the Seller acted fraudulently or with willful misconduct in submitting information to the Department during the course of the consideration of such Technology.’’ See section 25.8(b). Two commenters expressed concern over the lack of a concrete standard of evidence for determining ‘‘fraud’’ or ‘‘willful misconduct.’’ One commenter specifically suggested adoption of the ‘‘clear and convincing evidence’’ standard from common-law civil fraud jurisprudence. The Department agrees that the statutory presumption should only be overcome by evidence demonstrating an intentional effort to deceive the Department during the Certification process. This is the clear import of the statutory language and legislative history of the Act. Also, the traditional common law ‘‘clear and convincing evidence’’ standard is appropriate for evaluating a claim of fraud or willful misconduct in the SAFETY Act context. G. Definition of ‘‘Act of Terrorism’’ Two commenters expressed uncertainty concerning whether an act on foreign soil could be deemed an ‘‘Act of Terrorism’’ for purposes of the SAFETY Act. One commenter additionally requested clarification of the role of the Secretary in declaring whether a given event was or was not an ‘‘Act of Terrorism’’ for purposes of the SAFETY Act. The definition of the term ‘‘Act of Terrorism’’ set forth in the SAFETY Act provides that any act meeting the requirements specified in the Act, as such requirements ‘‘are further defined and specified by the Secretary,’’ may be deemed an ‘‘Act of Terrorism.’’ In the interim rule, the Department presented its view that the term ‘‘Act of Terrorism’’ potentially encompasses acts that occur outside the territory of the United States. The Department stated that the basis for that view is ‘‘there is no geographic requirement in the definition; rather, an act that occurs anywhere may be covered if it causes harm to a person, property, or an entity in the United States.’’ The Department confirms its prior interpretation. The statutory requirements for what may be deemed an ‘‘Act of Terrorism’’ address the legality of the act in question, the harm such act caused, and whether instrumentalities, weapons or other methods designed or intended ‘‘to cause mass destruction, injury or other loss to citizens or institutions of the United VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 States’’ were employed. The statutory requirements are focused on the locus where harm was caused, the intent of the perpetrators and the victims of the particular act. See § 865(2)(B)(ii). The Department does not interpret the language of the Act to impose a geographical restriction for purposes of determining whether an act may be deemed an ‘‘Act of Terrorism.’’ In other words, the Act is concerned more with where effects of a terrorist act are felt rather than where on a map a particular act may be shown to have occurred. Accordingly, an act on foreign soil may indeed be deemed an ‘‘Act of Terrorism’’ for purposes of the SAFETY Act provided that it causes harm in the United States. The Department interprets ‘‘harm’’ in this context to include harm to financial interests. It is certainly possible that terrorist acts occurring outside the United States could be intended to cause, and may result in, devastating financial harm in the United States. The focus of the ‘‘Act of Terrorism’’ definition on where harm is realized is appropriate in light of the possibility that an Act of Terrorism may be the result of a series of actions occurring in multiple locations or that the locus of the terrorist act may not be readily discernible. This is especially the case with respect to acts of cyber terrorism. H. Retroactive Designation Five commenters found the distinction between ‘‘sales’’ and ‘‘deployments,’’ as expressed in the interim rule, to be confusing. The commenters expressed concern that similar deployments of identical QATTs might not be similarly protected, depending on when the deployment was made. In particular, failing to extend SAFETY Act liability protections retroactively may incentivize Sellers to remove or nullify existing deployments, only to make identical new deployments at significant cost to the Seller and/or its customers. The Department believes these commenters may have misunderstood the language of the interim rule. As part of each Designation or Certification, the Department will specify the earliest date that deployments of the QATT will be accorded the protections of that Designation or Certification. The Seller supplies the information concerning the earliest date the technology was deployed. I. Bias Toward Product-Based AntiTerrorism Technologies Despite the assurances of the interim rule, particularly in the responses to comments on the Notice of Proposed PO 00000 Frm 00008 Fmt 4700 Sfmt 4700 Rulemaking, four commenters thought that the language of the interim rule and of the SAFETY Act Application Kit implicitly assumed that all antiterrorism technologies would be product-based and not service-based or analysis-based. To avoid any confusion on this issue, the definition of ‘‘Technology’’ set forth in this final rule clearly and unequivocally states that a Technology for SAFETY Act purposes includes ‘‘any product, equipment, service (including support services), device, or technology (including information technology) or any combination of the foregoing.’’ In particular, design services, consulting services, engineering services, software development services, software integration services, program management and integration services, threat assessments, vulnerability studies, and other analyses relevant to homeland security may each be deemed a Technology under the SAFETY Act. Corresponding changes will be incorporated into the revised SAFETY Act Application Kit. Further, this concern is not manifest in the operating history of the Act. Multiple antiterrorism services have received SAFETY Act Designation to date. J. Scope of Insurance Coverage Several commenters suggested there is no reason for the insurance required to be purchased by Sellers pursuant to the Act to cover claims brought against the Seller’s supply and distribution chains since a plaintiff’s sole point of recovery with respect to claims implicating the SAFETY Act would be the Seller. Furthermore, commenters pointed out that insurance policies offering coverage for a Seller and the Seller’s contractors, subcontractors, suppliers, vendors and customers are not currently available on the open market. The Department recognizes that an action for recovery of damages proximately caused by a QATT that arises out of an Act of Terrorism may only be properly brought against a Seller. Accordingly, the Department has specified, and will continue to specify in particular Designations, that the liability insurance required to be obtained by the Seller shall not be required to provide coverage for the Seller’s contractors, subcontractors, suppliers, vendors or customers. K. Interactions With Public Law 85–804 Three commenters believed that the language in the interim rule concerning Public Law 85–804, and its relationship with the SAFETY Act, was unclear, especially in light of Executive Order 13286. In particular, the commenters E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations sought clarification with respect to the circumstances in which both SAFETY Act Designation and indemnification under Public Law 85–804 might be available. One commenter suggested that DHS implement a mechanism for simultaneous SAFETY Act and Public Law 85–804 consideration in association with a procurement. Commenters also expressed concern with the availability of Public Law 85– 804 indemnification for technologies for which Sellers do not apply for (or receive) SAFETY Act Designation. They suggested that the phrase ‘‘any matter that has been, or could be, designated by the Secretary of Homeland Security as a Qualified Anti-Terrorism Technology’’ in Executive Order 13286 is a potential source of confusion and an obstacle to otherwise appropriate indemnification for Sellers who do not seek, and would not merit, Designation. Section 73(b) of Executive Order 13286 revises Executive Order 10789 to state that no technology that has been, or could be Designated as a QATT, can be considered for indemnification under Public Law 85–804 (except by the Department of Defense) until ‘‘(i) the Secretary of Homeland Security has advised whether the use of the authority provided under [the SAFETY Act] would be appropriate, and (ii) the Director of the Office and Management and Budget has approved the exercise of authority under this order.’’ The Department is sympathetic to the notion that separate processes in multiple agencies for Public Law 85– 804 and SAFETY Act review could consume inordinate time and expense. The Department is supporting interagency efforts to find a solution to speed and ease the burden of both processes. The Department acknowledges that some anti-terrorism technologies involve unusually hazardous risk, independent of an act of terrorism, and that indemnification under Public Law 85–804 might appropriately be made available under such circumstances. In those circumstances, both the SAFETY Act and Public Law 85–804 could be applicable to the same technology for different risks at the same time, and one process should not slow progress in the other. Executive Order 10789, as amended by section 73 of Executive Order 13286, allows for such a solution with the concurrence of the Director of the Office of Management and Budget. Where appropriate, the Department will entertain letter requests for a ‘‘Notice of Inapplicability of SAFETY Act Designation,’’ which would allow entities to obtain a statement from the Department regarding the VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 inappropriateness of SAFETY Act Designation for a particular technology in a particular context, outside of the established SAFETY Act application process. In this process, the Department expects that submitters will include sufficient information within their letter request to allow for a determination of inapplicability to be made. The Department will, however, reserve the right either to request additional information of the type included in the SAFETY Act application if it determines that the request does not adequately describe the Seller’s technology before a determination of applicability or inapplicability, as the case may be, can be made. L. Prioritization of Evaluations Three commenters noted the importance of an appropriate process for expediting SAFETY Act applications associated with government procurements that are ready to proceed and where the need for immediate deployment is urgent and compelling. They also asked that the Department publish guidance describing how it plans to prioritize application reviews. The Department will expedite the review of SAFETY Act applications that it deems particularly urgent and that involve government procurements and will publish guidance on how SAFETY Act applications and the government procurement process may best be aligned (See ‘‘Coordination with Government Procurements’’ below and section 25.6(g) of the rule). M. Standards Three commenters expressed concern about standards and suggested proposed changes to the interim rule in this area. The gist of these suggestions was to ensure that proprietary standards are not treated inappropriately by the Department, and that the Department not needlessly develop new standards in competition with existing, widelyaccepted, proprietary standards. In addition, several commenters felt that adherence to certain existing standards, or to Federal certifications of various kinds, should be deemed conclusive evidence of compliance with certain SAFETY Act evaluation criteria. The Department reiterates that it intends to protect proprietary and other protected information to the maximum extent possible. No copyrighted or otherwise protected intellectual property will be distributed by the Department without the express permission of the owner, unless the Department’s rights in that data have been acquired through some other manner. Where specific proprietary PO 00000 Frm 00009 Fmt 4700 Sfmt 4700 33155 standards are relevant to the SAFETY Act evaluation process, the Department will advise applicants of the appropriate channels for obtaining copies of such standards. The Department has to date and will continue to work closely with standardsetting organizations that have sought SAFETY Act protection for antiterrorism standards. The Secretary has discretion to decide which standards are relevant with respect to the criteria for SAFETY Act Designation and Certification, and the Department remains open to the concept that a standard itself may constitute a QATT. N. Expiration of Designations Three commenters stated that Designations should not expire, or should at the least have a minimum term of 10 years or more. The Department notes that qualification for SAFETY Act coverage depends on a combination of the ability of the technology to be effective in a specific threat environment, the nature and cost of available insurance, and other factors, all of which are subject to change. At the same time, the Department is cognizant of the need for a guaranteed period of protection for successful SAFETY Act applicants to achieve the main goal of the Act, which is to facilitate the deployment of needed anti-terrorism technologies. Since the expiration of SAFETY Act Designation and Certification would impact only future sales of the subject QATT, the Department believes that mandatory reconsideration of Designations after five to eight years provides a fair balancing of public and private interests while providing the certainty required by Sellers. Sellers may apply for renewal up to two years prior to the expiration of their SAFETY Act Designation. O. Appeal/Review of Decisions Regarding SAFETY Act Applications Two commenters reiterated a request for an independent appeal or review process. The Department is aware of the complexity of the review process and has made and is making numerous allowances for exchange of information and concerns between evaluators and applicants at multiple points during the application process, to give the applicant further opportunity to provide supplemental information and address issues. The Department believes that this interactive process will provide sufficient recourse to applicants. The SAFETY Act is a discretionary authority accorded by Congress to the Secretary of Homeland Security to facilitate the commercialization and deployment of E:\FR\FM\08JNR1.SGM 08JNR1 33156 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations cprice-sewell on PROD1PC66 with RULES needed anti-terrorism technologies. The exercise of that authority with respect to a particular technology requires that many discretionary judgments be made regarding the applicability of the SAFETY Act criteria to the technology and the weighting of the criteria in each case. SAFETY Act protections are not a prerequisite for marketing any technology and therefore the absence of a grant of protection under the SAFETY Act will not prevent any person, firm or other entity from doing business. The Department also notes that a SAFETY Act Designation is not a ‘‘license required by law’’ within the meaning of the Administrative Procedure Act (APA), and thus is not covered by the APA. 5 U.S.C. 558(c). P. Coordination With Government Procurements The Department recognizes the need to align consideration of SAFETY Act applications and the government procurement process more closely. Accordingly, the final rule incorporates provisions that establish a flexible approach for such coordination. A government agency can seek a preliminary determination of SAFETY Act applicability, a ‘‘Pre-Qualification Designation Notice,’’ with respect to a technology to be procured. This notice would (i) enable the selected contractor to receive expedited review of a streamlined application for SAFETY Act coverage and (ii) in most instances establish the presumption that the technology under consideration constitutes a QATT. If the technology in question has previously received Block Designation or Block Certification (as defined in 6 CFR 25.8), or the technology is based on established, well-defined specifications, the Department may indicate in DHS procurements, or make recommendations with respect to procurements of other public entities, that the contractor providing such technology will affirmatively receive Designation or Certification with respect to such technology, provided the contractor satisfies each other applicable requirement set forth in this final rule. In addition, the OSAI may expedite SAFETY Act review for technologies subject to ongoing procurement processes. The Department will on an on-going basis provide guidance for effectively coordinating government procurements (among Federal and non-Federal procurement officials) and consideration of SAFETY Act applications. In addition, the Department may unilaterally determine that the subject of a procurement is VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 eligible for SAFETY Act protections and give notice of such determination in connection with a government solicitation. The final rule clarifies that a determination by the Department to designate, or not to designate, a particular technology as a QATT should not be viewed as a determination that the technology meets, or fails to meet, the requirements of any solicitation issued by a Federal government customer or a non-Federal government customer. Q. Pre-Application Consultations The Department regards the process by which an applicant seeks SAFETY Act coverage as necessarily interactive and cooperative. Accordingly, the final rule continues to provide that the Department and applicants may consult prior to the submission of SAFETY Act Application. These consultations will provide an opportunity for applicants to provide the Department with a description of their anti-terrorism technology and will allow for the Department to address an applicant’s questions with respect to the application process and the criteria by which the Department evaluates the anti-terrorism technology. Prospective applicants may request such consultations through the preapplication process set forth in the SAFETY Act Application Kit. The confidentiality provisions in § 25.10 are applicable to such consultations. R. Developmental Testing and Evaluation Designations The SAFETY Act provides the Secretary significant discretion in determining what may be designated a ‘‘Qualified Anti-Terrorism Technology.’’ Section 25.4 recognizes that there may be instances of certain anti-terrorism technologies being developed that could serve as an important homeland security resource but that require additional developmental testing and evaluation, e.g., a prototype of a particular technology that has undergone successful lab testing may require field testing or a controlled operational deployment to validate its safety and efficacy. This section provides that the system of litigation and risk management established by the SAFETY Act may be afforded to such technologies albeit with certain limitations and constraints that otherwise would not attach to Qualified Anti-Terrorism Technologies that are Designated pursuant to § 25.4(a). Developmental Testing and Evaluation (DT&E) Designations will facilitate the deployment of promising anti-terrorism PO 00000 Frm 00010 Fmt 4700 Sfmt 4700 technologies in the field either for test and evaluation purposes or in response to exigent circumstances, by providing, on a limited basis, the liability protections offered by the SAFETY Act. The limits on the protections offered by a DT&E Designation, as compared with a Designation issued pursuant to § 25.4(a), are set forth in the final rule. In general, DT&E Designations will include limitations on the use and deployment of the subject technology, remain terminable at-will by the Department should any concerns regarding the safety of technology come to light, and will have a limited term not to exceed a reasonable period for testing or evaluating the technology (presumptively not longer than 36 months). Further, the SAFETY Act liability protections associated with DT&E Designations will apply only to acts that occur during the period set forth in the particular DT&E Designation. The Department seeks further comment on this topic. S. Seller’s Continuing Obligations With Respect to Maintaining Insurance The Department received comments on insurance certification requirements. There is no change with respect to the obligation of the Seller to certify to the Department in writing that the insurance required to be maintained pursuant to a particular SAFETY Act Designation has been obtained. However, this rule modifies each Seller’s obligation to certify to the Department that the required insurance has been maintained, and to do so within 30 days of each anniversary of the issuance of their SAFETY Act Designation. A Seller’s obligation to certify on an annual basis that the required insurance has been maintained is now dependent upon the Under Secretary making a request for such an insurance certification from the Seller. In other words, following their initial insurance certification, Sellers will be obligated to certify that they have maintained the required insurance as set forth in their SAFETY Act Designation only upon the Department requesting such a certification. However, no change has been made to each Seller’s continuing obligation to advise the Department of any material change in the type or amount of liability insurance coverage that the Seller actually maintains. T. Block Designations and Block Certifications The Department has established a streamlined procedure for providing SAFETY Act coverage for qualified Sellers of certain categories of E:\FR\FM\08JNR1.SGM 08JNR1 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations cprice-sewell on PROD1PC66 with RULES technologies. Those Certifications or Designations are known as ‘‘Block Designations’’ or ‘‘Block Certifications.’’ Block Designations and Block Certifications may be issued at the Secretary’s discretion and are intended to recognize technology that meets the criteria for Designation as a Qualified Anti-Terrorism Technology and that is based on established performance standards or defined technical characteristics. Fundamentally, Block Designation or Block Certification will announce to potential Sellers of the subject QATT that the Department has determined that the QATT satisfies the technical criteria for either Certification or Designation and that no additional technical analysis will be required in evaluating applications from potential Sellers of that QATT. The terms of any such Block Designation or Block Certification will establish the procedures and conditions upon which an applicant may receive SAFETY Act coverage as a Seller of the subject technology. Applications from potential Sellers of a QATT that has received either Block Designation or Block Certification will receive expedited review and will not require submission of information concerning the technical merits of the underlying technology. All Block Designations and Block Certifications will be published by the Department within ten days after the issuance thereof at https:// www.safetyact.gov, and copies may also be obtained by mail by sending a request to: Directorate of Science and Technology, Office of SAFETY Act Implementation, Room 4320, Department of Homeland Security, Washington, DC 20528. Such publication will be coordinated to guard again the unauthorized disclosure of proprietary information. Any person, firm, or other entity that desires to qualify as a Seller of a QATT that is the subject of a Block Designation or Block Certification will be required to submit only those portions of the application referenced in § 25.6(a) that are specified in such Block Designation or Block Certification and otherwise to comply with terms of § 25.6(a) and the relevant Block Designation or Block Certification. may be unwilling to enter into such reciprocal agreements. The Department recognizes that the ability of the Seller to obtain the reciprocal waiver of claims with its contractors, subcontractors, suppliers, vendors, and customers, and contractors and subcontractors of the customers necessarily depends on action by parties other than the Seller and that it may not be possible to obtain such waivers in all circumstances. The Department’s view is that such waivers are not an absolute condition precedent or subsequent for the issuance, validity, effectiveness, duration, or applicability of a Designation because (1) obtaining such waivers often will be beyond the control of SAFETY Act applicants, (2) requiring all of such waivers as such a condition would thwart the intent of Congress in enacting the SAFETY Act by rendering the benefits of the SAFETY Act inapplicable in many otherwise appropriate situations, and (3) the consequences of failing to obtain the waivers are not specified in the Act. Accordingly, as was previously the case, this rule requires only a good faith effort by the Seller to secure these waivers. U. Reciprocal Waivers Several commenters stated that reciprocal waivers of the type described in the SAFETY Act (reciprocal waivers of claims by the specified parties for losses sustained arising from an Act of Terrorism with respect to which a Qualified Anti-Terrorism Technology is deployed) are not standard practice in most industries and that some parties A. Executive Order 12866 The Department has examined the economic implications of the final rule as required by Executive Order 12866. Executive Order 12866 directs agencies to assess all costs and benefits of available regulatory alternatives and, when regulation is necessary, to select regulatory approaches that maximize net benefits (including potential VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 V. Deference Due to Other Federal or State Regulatory or Procurement Officials The Department has received multiple comments suggesting that the Department defer to the expertise of other Federal or state procurement officials in reviewing the technical criteria for SAFETY Act applications. The level of deference due to other governmental officials will depend on the nature of such officials’ review of the technology in question. In certain circumstances when qualified officials have determined specifically that a technology is appropriate for antiterrorism purposes, such determinations may be accorded significant weight in the SAFETY Act application review process. In other circumstances, where a prior government determination was made for different purposes or by persons not qualified to address antiterrorism threats, less weight will be given the prior determination. See § 25.4(b)(8). III. Regulatory Requirements PO 00000 Frm 00011 Fmt 4700 Sfmt 4700 33157 economic, environmental, public health and safety, and other advantages; distributive impacts; and equity). Executive Order 12866 classifies a rule as significant if it meets any one of a number of specified conditions, including: Having an annual effect on the economy of $100 million, adversely affecting a sector of the economy in a material way, adversely affecting competition, or adversely affecting jobs. A regulation is also considered a significant regulatory action if it raises novel legal or policy issues. These matters were discussed in the interim rule and the Department received no comments on the economic analysis. The Department concludes that the final rule is a significant regulatory action under the Executive Order because it will have a positive, material effect on public safety under section 3(f)(1) of Executive Order 12866, and it raises novel legal and policy issues under section 3(f)(4) of the Executive Order. The Department concludes, however, that the final rule does not meet the significance threshold of $100 million effect on the economy in any one year under section 3(f)(1), due to the relatively low estimated burden of applying for this technology program, the unknown number of Certifications and Designations that the Department will dispense, and the unknown probability of a terrorist attack that would have to occur in order for the protections put in place in the final rule to have a large impact on the public. Need for the Regulation and Market Failure The final rule implements the SAFETY Act and is intended to implement the provisions set forth in that Act. The Department believes the current development of anti-terrorism technologies has been slowed due to the potential liability risks associated with their development and eventual deployment. In a fully functioning insurance market, technology developers would be able to insure themselves against excessive liability risk; however, the terrorism risk insurance market appears to be in disequilibrium. The attacks of September 11 fundamentally changed the landscape of terrorism insurance. Congress, in the findings of the Terrorism Risk Insurance Act of 2002 (TRIA), concluded that temporary financial assistance in the insurance market is needed to ‘‘allow for a transitional period for the private markets to stabilize, resume pricing of such insurance, and build capacity to absorb any future losses.’’ Public Law E:\FR\FM\08JNR1.SGM 08JNR1 33158 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations cprice-sewell on PROD1PC66 with RULES 107–297, 101(b)(2). This final rulemaking addresses a similar concern, to the extent that potential technology developers are unable to insure efficiently against large losses due to an ongoing reassessment of terrorism issues in insurance markets. Even after a temporary insurance market adjustment, purely private terrorism risk insurance markets may exhibit negative externalities. Because the risk pool of any single insurer may not be large enough efficiently to spread and therefore insure against the risk of damages from a terrorist attack, and because the potential for excessive liability may render any terrorism insurance prohibitively expensive, society may suffer from less than optimal technological protection against terrorist attacks. The measures set forth in the final rule are designed to meet this goal; they will provide certain liability protection and consequently will increase the likelihood that businesses will pursue development and deployment of important technologies that may not be pursued without this protection. Costs and Benefits to Technology Development Firms Since this final rulemaking puts in place an additional voluntary option for technology developers, the expected direct net benefits to firms of this rulemaking will be positive; companies presumably will not choose to pursue the Designation of ‘‘Qualified AntiTerrorism Technology’’ unless they believe it to be a profitable endeavor. The Department cannot predict with certainty the number of applicants for this program. An additional source of uncertainty is the reaction of the insurance market to this Designation. As mentioned above, insurance markets appear currently to be adjusting their strategy for terrorism risk, so little market information exists that would inform this estimate. If a firm chooses to invest effort in pursuing SAFETY Act liability protection, the direct costs to that firm will be the time and money required to submit the required paperwork and other information to the Department. Only companies that choose to request this protection will incur paperwork costs in completing the application kit. The direct benefits to firms include lower potential losses from liability for terrorist attacks and, as a consequence, a lower burden from liability insurance for this type of technology. In this assessment, we were careful to consider only benefits and costs specifically due to the implementation of the final rule and not costs that would have been VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 incurred by companies absent any rulemaking. The SAFETY Act requires the Sellers of the technology to obtain liability insurance ‘‘of such types and in such amounts’’ certified by the Secretary. The entire cost of insurance is not a cost specifically imposed by the proposed rulemaking, as companies in the course of good business practice routinely purchase insurance absent Federal requirements to do so. Any difference in the amount or price of insurance purchased as a result of the SAFETY Act would be a cost or benefit of the final rule for firms. The language of the SAFETY Act clearly states that Sellers are not required to obtain liability insurance beyond the maximum amount of liability insurance reasonably available from private liability sources on the world market at prices and terms that will not unreasonably distort the sales price of the Seller’s Anti-Terrorism Technologies. We tentatively conclude, however, that this final rulemaking will impact both the prices and terms of liability insurance relative to the amount of insurance coverage absent the SAFETY Act. The probable effect of the final rule is to lower the quantity of liability coverage needed in order for a firm to protect itself from terrorism liability risks, which would be considered a benefit of the final rule to firms. This change will most likely be a reduction in demand that leads to a movement along the supply curve for technology firms already in this market; they probably will buy less liability coverage. This will have the effect of lowering the price per unit of coverage in this market. The Department also expects, however, that this final rule will lead to greater market entry, which will generate benefits for technology firms but should also lead to a larger pool of potential products that will require insurance. Costs and Benefits to Insurers The Department has little information on the future structure of the terrorism risk insurance market, and how this final rule will affect that structure. As stated above, this type of intervention could serve to lower the demand for insurance in the current market, thus the static effect on the profitability of insurers is negative. The benefits of the lower insurance burden to technology firms would be considered a cost to insurers; the static changes to insurance coverage would cause a transfer of economic benefits from insurers to technology firms. On the other hand, this type of intervention should serve to increase the economic benefits of PO 00000 Frm 00012 Fmt 4700 Sfmt 4700 insurers by making some types of insurance products possible that would have been cost prohibitive for customers to purchase or insurers to design in the absence of this final rulemaking. Costs and Benefits to the Public The benefits to the public of this final rulemaking are very difficult to put in dollar value terms since the ultimate objective of the final rule is the development of new technologies that will help prevent or limit the damage from terrorist attacks. It is not possible to determine whether these technologies could help prevent large or small scale attacks, as the SAFETY Act applies to a vast range of technologies, including products, services, software, and other forms of intellectual property that could have a widespread impact. In qualitative terms, the SAFETY Act removes a great deal of the risk and uncertainty associated with product liability and in the process creates a powerful incentive that will help fuel the development of critically-needed anti-terrorism technologies. Additionally, we expect the SAFETY Act to reduce the research and development costs of these technologies. The tradeoff, however, may be that a greater number of technologies may be developed and qualify for this program that have a lower average effectiveness against terrorist attacks than technologies currently on the market, or technologies that would be developed in the absence of this final rulemaking. In the absence of this rulemaking, strong liability discouragement implies that the fewer products that are deployed in support of anti-terrorist efforts may be especially effective, since profit maximizing firms will always choose to develop the technologies with the highest demand first. It is the tentative conclusion of the Department that liability discouragement in this market is currently too strong or prohibitive, for the reasons mentioned above. The Department tentatively concludes that the final rule will have positive net benefits to the public, since it serves to strike a better balance between consumer protection and technological development. B. Regulatory Flexibility Act The Regulatory Flexibility Act (RFA) mandates that an agency conduct an RFA analysis when an agency is ‘‘required by section 553 * * *, or any other law, to publish general notice of proposed rulemaking for any proposed rule, or publishes a notice of proposed rulemaking for interpretative rule involving the internal revenue laws of the United States * * *’’ 5 U.S.C. E:\FR\FM\08JNR1.SGM 08JNR1 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations 603(a). The Regulatory Flexibility Act requires the Department to determine whether this final rulemaking will have a significant impact on a substantial number of small entities. Although we expect that many of the applicants for SAFETY Act protection are likely to meet the Small Business Administration’s criteria for being a small entity, we do not believe this final rulemaking will impose a significant financial impact on them. In fact, we believe the final rule will be a benefit to technology development businesses, especially small businesses, and present them with an attractive, voluntary option of pursuing a potentially profitable investment by reducing the amount of risk and uncertainty of lawsuits associated with developing anti-terrorist technology. The requirements of this final rulemaking will only be imposed on such businesses that voluntarily seek the liability protection of the SAFETY Act. If a company does not request that protection, the company will bear no cost from the final rule. To the extent that demand for insurance falls, however, insurers may be adversely impacted by the final rule. The Department believes that eventual new entry into this market and further opportunities to insure against terrorism risk implies that the long-term impact of this final rulemaking on insurers is ambiguous but could very well be positive. We also expect that this final rulemaking will affect relatively few firms and relatively few insurers either positively or negatively, as this appears to be a specialized industry. Therefore, we certify this final rule will not have a significant impact on a substantial number of small entities. cprice-sewell on PROD1PC66 with RULES C. Unfunded Mandates Reform Act of 1995 The final rule will not result in the expenditure by State, local and tribal governments, in the aggregate, or by the private sector, of $100 million or more in any one year, and it will not significantly or uniquely affect small governments. Therefore, no actions were deemed necessary under the provisions of the Unfunded Mandates Reform Act of 1995. D. Executive Order 13132—Federalism The Department of Homeland Security does not believe the final rule will have substantial direct effects on the States, on the relationship between the national government and the States, or on distribution of power and responsibilities among the various levels of government. States will, however, benefit from the final rule to VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 the extent that they are purchasers of qualified anti-terrorism technologies. E. Paperwork Reduction Act The revised SAFETY Act Application Kit referenced above was released for comment with public notice published in the Federal Register on December 13, 2004, at 69 FR 72207. The SAFETY Act Application Kit may also be found at https://www.safetyact.gov. Concurrent with the publication of this final rule, the Department submitted a revised Paperwork Reduction Act package to the Office of Management and Budget (OMB) for review. List of Subjects in 6 CFR Part 25 Business and industry, Insurance, Practice and procedure, Science and technology, Security measures. I For the reasons discussed in the preamble, 6 CFR part 25 is revised to read as follows: PART 25—REGULATIONS TO SUPPORT ANTI-TERRORISM BY FOSTERING EFFECTIVE TECHNOLOGIES § 25.1 Purpose. § 25.2 Definitions. § 25.3 Delegation. § 25.4 Designation of Qualified AntiTerrorism Technologies. § 25.5 Obligations of Seller. § 25.6 Procedures for Designation of Qualified Anti-Terrorism Technologies. § 25.7 Litigation Management. § 25.8 Government Contractor Defense. § 25.9 Procedures for Certification of Approved Products for Homeland Security. § 25.10 Confidentiality and Protection of Intellectual Property. Authority: Subtitle G, of Title VIII, Public Law 107–296, 116 Stat. 2238 (6 U.S.C. 441– 444). § 25.1 Purpose. This part implements the Support Anti-terrorism by Fostering Effective Technologies Act of 2002, sections 441– 444 of title 6, United States Code (the ‘‘SAFETY Act’’ or ‘‘the Act’’). § 25.2 Definitions. Act of Terrorism—The term ‘‘Act of Terrorism’’ means any act determined to have met the following requirements or such other requirements as defined and specified by the Secretary: (1) Is unlawful; (2) Causes harm, including financial harm, to a person, property, or entity, in the United States, or in the case of a domestic United States air carrier or a United States-flag vessel (or a vessel based principally in the United States on which United States income tax is paid and whose insurance coverage is PO 00000 Frm 00013 Fmt 4700 Sfmt 4700 33159 subject to regulation in the United States), in or outside the United States; and (3) Uses or attempts to use instrumentalities, weapons or other methods designed or intended to cause mass destruction, injury or other loss to citizens or institutions of the United States. Certification—The term ‘‘Certification’’ means (unless the context requires otherwise) the certification issued pursuant to section 25.9 that a Qualified Anti-Terrorism Technology for which a Designation has been issued will perform as intended, conforms to the Seller’s specifications, and is safe for use as intended. Contractor—The term ‘‘contractor’’ means any person, firm, or other entity with whom or with which a Seller has a contract or contractual arrangement relating to the manufacture, sale, use, or operation of anti-terrorism Technology for which a Designation is issued (regardless of whether such contract is entered into before or after the issuance of such Designation), including, without limitation, an independent laboratory or other entity engaged in testing or verifying the safety, utility, performance, or effectiveness of such Technology, or the conformity of such Technology to the Seller’s specifications. Designation—The term ‘‘Designation’’ means the designation of a Qualified Anti-Terrorism Technology under the SAFETY Act issued by the Under Secretary under authority delegated to the Under Secretary by the Secretary of Homeland Security. Loss—The term ‘‘loss’’ means death, bodily injury, or loss of or damage to property, including business interruption loss (which is a component of loss of or damage to property). Noneconomic damages—The term ‘‘noneconomic damages’’ means damages for losses for physical and emotional pain, suffering, inconvenience, physical impairment, mental anguish, disfigurement, loss of enjoyment of life, loss of society and companionship, loss of consortium, hedonic damages, injury to reputation, and any other nonpecuniary losses. Office of SAFETY Act Implementation—The term ‘‘Office of SAFETY Act Implementation’’ or ‘‘OSAI’’ means the office within the Department of Homeland Security’s Directorate of Science and Technology that assists with the implementation of the SAFETY Act. The responsibilities of the Office of SAFETY Act Implementation may include, without limitation, preparing the SAFETY Act Application Kit, receiving and E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES 33160 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations facilitating the evaluation of applications, managing the SAFETY Act Web site and otherwise providing the public with information regarding the SAFETY Act and the application process. Physical harm—The term ‘‘physical harm’’ as used in the Act and this part means any physical injury to the body, including an injury that caused, either temporarily or permanently, partial or total physical disability, incapacity or disfigurement. In no event shall physical harm include mental pain, anguish, or suffering, or fear of injury. Qualified Anti-Terrorism Technology or QATT—The term ‘‘’Qualified AntiTerrorism Technology’’ or ‘‘QATT’’ means any Technology (including information technology) designed, developed, modified, procured, or sold for the purpose of preventing, detecting, identifying, or deterring acts of terrorism or limiting the harm such acts might otherwise cause, for which a Designation has been issued pursuant to this part. SAFETY Act or Act—The term ‘‘SAFETY Act’’ or ‘‘Act’’ means the Support Anti-terrorism by Fostering Effective Technologies Act of 2002, sections 441–444 of title 6, United States Code. SAFETY Act Application Kit —The term ‘‘SAFETY Act Application Kit’’ means the Application Kit containing the instructions and forms necessary to apply for Designation or Certification. The SAFETY Act Application Kit shall be published at https:// www.safetyact.gov or made available in hard copy upon written request to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. SAFETY Act Confidential Information—Any and all information and data voluntarily submitted to the Department under this part (including Applications, Pre-Applications, other forms, supporting documents and other materials relating to any of the foregoing, and responses to requests for additional information), including, but not limited to, inventions, devices, Technology, know-how, designs, copyrighted information, trade secrets, confidential business information, analyses, test and evaluation results, manuals, videotapes, contracts, letters, facsimile transmissions, electronic mail and other correspondence, financial information and projections, actuarial calculations, liability estimates, insurance quotations, and business and marketing plans. Notwithstanding the foregoing, ‘‘SAFETY Act Confidential Information’’ shall not include any VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 information or data that is in the public domain or becomes part of the public domain by any means other than the violation of this section. Secretary—The term ‘‘Secretary’’ means the Secretary of Homeland Security as established by section 102 of the Homeland Security Act of 2002. Seller—The term ‘‘Seller’’ means any person, firm, or other entity that sells or otherwise provides Qualified AntiTerrorism Technology to any customer(s) and to whom or to which (as appropriate) a Designation and/or Certification has been issued under this Part (unless the context requires otherwise). Technology—The term ‘‘Technology’’ means any product, equipment, service (including support services), device, or technology (including information technology) or any combination of the foregoing. Design services, consulting services, engineering services, software development services, software integration services, threat assessments, vulnerability studies, and other analyses relevant to homeland security may be deemed a Technology under this part. Under Secretary—The term ‘‘Under Secretary’’ means the Under Secretary for Science and Technology of the Department of Homeland Security. § 25.3 Delegation. All of the Secretary’s responsibilities, powers, and functions under the SAFETY Act, except the authority to declare that an act is an Act of Terrorism for purposes of section 865(2) of the SAFETY Act, may be exercised by the Under Secretary for Science and Technology of the Department of Homeland Security or the Under Secretary’s designees. § 25.4 Designation of Qualified AntiTerrorism Technologies. (a) General. The Under Secretary may Designate as a Qualified Anti-Terrorism Technology for purposes of the protections under the system of litigation and risk management set forth in sections 441–444 of Title 6, United States Code, any qualifying Technology designed, developed, modified, provided or procured for the specific purpose of preventing, detecting, identifying, or deterring acts of terrorism or limiting the harm such acts might otherwise cause. (b) Criteria to be Considered. (1) In determining whether to issue the Designation under paragraph (a) of this section, the Under Secretary may exercise discretion and judgment in considering the following criteria and evaluating the Technology: PO 00000 Frm 00014 Fmt 4700 Sfmt 4700 (i) Prior United States Government use or demonstrated substantial utility and effectiveness. (ii) Availability of the Technology for immediate deployment in public and private settings. (iii) Existence of extraordinarily large or extraordinarily unquantifiable potential third party liability risk exposure to the Seller or other provider of such anti-terrorism Technology. (iv) Substantial likelihood that such anti-terrorism Technology will not be deployed unless protections under the system of risk management provided under sections 441–444 of title 6, United States Code, are extended. (v) Magnitude of risk exposure to the public if such anti-terrorism Technology is not deployed. (vi) Evaluation of all scientific studies that can be feasibly conducted in order to assess the capability of the Technology to substantially reduce risks of harm. (vii) Anti-terrorism Technology that would be effective in facilitating the defense against acts of terrorism, including Technologies that prevent, defeat or respond to such acts. (viii) A determination made by Federal, State, or local officials, that the Technology is appropriate for the purpose of preventing, detecting, identifying or deterring acts of terrorism or limiting the harm such acts might otherwise cause. (ix) Any other factor that the Under Secretary may consider to be relevant to the determination or to the homeland security of the United States. (2) The Under Secretary has discretion to give greater weight to some factors over others, and the relative weighting of the various criteria may vary depending upon the particular Technology at issue and the threats that the Technology is designed to address. The Under Secretary may, in his discretion, determine that failure to meet a particular criterion justifies denial of an application under the SAFETY Act. However, the Under Secretary is not required to reject an application that fails to meet one or more of the criteria. The Under Secretary may conclude, after considering all of the relevant criteria and any other relevant factors, that a particular Technology merits Designation as a Qualified AntiTerrorism Technology even if one or more particular criteria are not satisfied. The Under Secretary’s considerations will take into account evolving threats and conditions that give rise to the need for the anti-terrorism Technologies. (c) Use of Standards. From time to time, the Under Secretary may develop, E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations issue, revise, adopt, and recommend technical standards for various categories or components of antiterrorism Technologies (‘‘Adopted Standards’’). In the case of Adopted Standards that are developed by the Department or that the Department has the right or license to reproduce, the Department will make such standards available to the public consistent with necessary protection of sensitive homeland security information. In the case of Adopted Standards that the Department does not have the right or license to reproduce, the Directorate of Science and Technology will publish a list and summaries of such standards and may publish information regarding the sources for obtaining copies of such standards. Compliance with any Adopted Standard or other technical standards that are applicable to a particular anti-terrorism Technology may be considered in determining whether a Technology will be Designated pursuant to paragraph (a) of this section. Depending on whether an Adopted Standard otherwise meets the criteria set forth in section 862 of the Homeland Security Act; 6 U.S.C. 441, the Adopted Standard itself may be deemed a Technology that may be Designated as a Qualified AntiTerrorism Technology. (d) Consideration of Substantial Equivalence. In considering the criteria in paragraph (b) of this section, or evaluating whether a particular antiterrorism Technology complies with any Adopted Standard referenced in paragraph (c) of this section, the Under Secretary may consider evidence that the Technology is substantially equivalent to other Technologies (‘‘Predicate Technologies’’) that previously have been Designated as Qualified Anti-Terrorism Technologies under the SAFETY Act. A Technology may be deemed to be substantially equivalent to a Predicate Technology if: (1) It has the same intended use as the Predicate Technology; and (2) It has the same or substantially similar performance or technological characteristics as the Predicate Technology. (e) Pre-Application Consultations. To the extent that he deems it to be appropriate, the Under Secretary may consult with prospective and current SAFETY Act applicants regarding their particular anti-terrorism Technologies. Prospective applicants may request such consultations through the Office of SAFETY Act Implementation. The confidentiality provisions in § 25.10 shall be applicable to such consultations. VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 (f) Developmental Testing & Evaluation (DT&E) Designations. With respect to any Technology that is being developed, tested, evaluated, modified or is otherwise being prepared for deployment for the purpose of preventing, detecting, identifying, or deterring acts of terrorism or limiting the harm such acts might otherwise cause, the Under Secretary may Designate such Technology as a Qualified Anti-Terrorism Technology and make such Technology eligible for the protections under the system of litigation and risk management set forth in sections 441–444 of title 6, United States Code. A Designation made pursuant to this paragraph shall be referred to as a ‘‘DT&E Designation,’’ and shall confer all of the rights, privileges and obligations that accompany Designations made pursuant to paragraph (a) of this section except as modified by the terms of this paragraph or the terms of the particular DT&E Designation. The intent of this paragraph is to make eligible for SAFETY Act protections qualifying Technologies that are undergoing testing and evaluation and that may need to be deployed in the field either for developmental testing and evaluation purposes or on an emergency basis, including during a period of heightened risk. DT&E Designations shall describe the subject Technology (in such detail as the Under Secretary deems to be appropriate); identify the Seller of the subject Technology; be limited to the period of time set forth in the applicable DT&E Designation, which in no instance shall exceed a reasonable period for testing or evaluating the Technology (presumptively not longer than 36 months); be terminable by the Under Secretary at any time upon notice to the Seller; be subject to the limitations on the use or deployment of the QATT set forth in the DT&E Designation; and be subject to such other limitations as established by the Under Secretary. The protections associated with a DT&E Designation shall apply only during the period specified in the applicable DT&E Designation. Consent of the Seller of a QATT Designated pursuant to this paragraph will be a condition precedent to the establishment of any deployment or use condition and any other obligation established by the Under Secretary pursuant to this paragraph. Those seeking a DT&E Designation for a QATT pursuant to this paragraph (f) shall follow the procedures for DT&E Designations set forth in the SAFETY Act Application Kit. PO 00000 Frm 00015 Fmt 4700 Sfmt 4700 § 25.5 33161 Obligations of Seller. (a) Liability Insurance Required. The Seller shall obtain liability insurance of such types and in such amounts as shall be required in the applicable Designation, which shall be the amounts and types certified by the Under Secretary to satisfy otherwise compensable third-party claims arising out of, relating to, or resulting from an Act of Terrorism when Qualified AntiTerrorism Technologies have been deployed in defense against, response to, or recovery from, such act. The Under Secretary may request at any time that the Seller of a Qualified AntiTerrorism Technology submit any information that would: (1) Assist in determining the amount of liability insurance required; or (2) Show that the Seller or any other provider of Qualified Anti-Terrorism Technology otherwise has met all of the requirements of this section. (b) Amount of Liability Insurance. (1) The Under Secretary may determine the appropriate amounts and types of liability insurance that the Seller will be required to obtain and maintain based on criteria he may establish to satisfy compensable third-party claims arising from, relating to or resulting from an Act of Terrorism. In determining the amount of liability insurance required, the Under Secretary may consider any factor, including, but not limited to, the following: (i) The particular Technology at issue; (ii) The amount of liability insurance the Seller maintained prior to application; (iii) The amount of liability insurance maintained by the Seller for other Technologies or for the Seller’s business as a whole; (iv) The amount of liability insurance typically maintained by Sellers of comparable Technologies; (v) Information regarding the amount of liability insurance offered on the world market; (vi) Data and history regarding mass casualty losses; (vii) The intended use of the Technology; and (viii) The possible effects of the cost of insurance on the price of the product, and the possible consequences thereof for development, production, or deployment of the Technology. (2) In determining the appropriate amounts and types of insurance that a particular Seller is obligated to carry, the Under Secretary may not require any type of insurance or any amount of insurance that is not available on the world market, and may not require any type or amount of insurance that would E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES 33162 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations unreasonably distort the sales price of the Seller’s anti-terrorism Technology (c) Scope of Coverage. (1) Liability insurance required to be obtained pursuant to this section shall, in addition to the Seller, protect the following, to the extent of their potential liability for involvement in the manufacture, qualification, sale, use, or operation of Qualified Anti-Terrorism Technologies deployed in defense against, response to, or recovery from, an Act of Terrorism: (i) Contractors, subcontractors, suppliers, vendors and customers of the Seller. (ii) Contractors, subcontractors, suppliers, and vendors of the customer. (2) Notwithstanding the foregoing, in appropriate instances the Under Secretary will specify in a particular Designation that, consistent with the Department’s interpretation of the SAFETY Act, an action for the recovery of damages proximately caused by a Qualified Anti-Terrorism Technology that arises out of, relates to, or results from an Act of Terrorism may properly be brought only against the Seller and, accordingly, the liability insurance required to be obtained pursuant to this section shall be required to protect only the Seller. (d) Third Party Claims. To the extent available pursuant to the SAFETY Act, liability insurance required to be obtained pursuant to this section shall provide coverage against third party claims arising out of, relating to, or resulting from an Act of Terrorism when the applicable Qualified Anti-Terrorism Technologies have been deployed in defense against, response to, or recovery from such act. (e) Reciprocal Waiver of Claims. The Seller shall enter into a reciprocal waiver of claims with its contractors, subcontractors, suppliers, vendors, and customers, and contractors and subcontractors of the customers, involved in the manufacture, sale, use, or operation of Qualified Anti-Terrorism Technologies, under which each party to the waiver agrees to be responsible for losses, including business interruption losses, that it sustains, or for losses sustained by its own employees resulting from an activity resulting from an Act of Terrorism when Qualified Anti-Terrorism Technologies have been deployed in defense against, response to, or recovery from such act. Notwithstanding the foregoing, provided that the Seller has used diligent efforts in good faith to obtain all required reciprocal waivers, obtaining such waivers shall not be a condition precedent or subsequent for, nor shall the failure to obtain one or more of such VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 waivers adversely affect, the issuance, validity, effectiveness, duration, or applicability of a Designation or a Certification. Nothing in this paragraph (e) shall be interpreted to render the failure to obtain one or more of such waivers a condition precedent or subsequent for the issuance, validity, effectiveness, duration, or applicability of a Designation or a Certification. (f) Information to be Submitted by the Seller. As part of any application for a Designation, the Seller shall provide all information that may be requested by the Under Secretary or his designee, regarding a Seller’s liability insurance coverage applicable to third-party claims arising out of, relating to, or resulting from an Act of Terrorism when the Seller’s Qualified Anti-Terrorism Technology has been deployed in defense against, response to, or recovery from such act, including: (1) Names of insurance companies, policy numbers, and expiration dates; (2) A description of the types and nature of such insurance (including the extent to which the Seller is self-insured or intends to self-insure); (3) Dollar limits per occurrence and annually of such insurance, including any applicable sublimits; (4) Deductibles or self-insured retentions, if any, that are applicable; (5) Any relevant exclusions from coverage under such policies or other factors that would affect the amount of insurance proceeds that would be available to satisfy third party claims arising out of, relating to, or resulting from an Act of Terrorism; (6) The price for such insurance, if available, and the per-unit amount or percentage of such price directly related to liability coverage for the Seller’s Qualified Anti-Terrorism Technology deployed in defense against, or response to, or recovery from an Act of Terrorism; (7) Where applicable, whether the liability insurance, in addition to the Seller, protects contractors, subcontractors, suppliers, vendors and customers of the Seller and contractors, subcontractors, suppliers, vendors and customers of the customer to the extent of their potential liability for involvement in the manufacture, qualification, sale, use or operation of Qualified Anti-terrorism Technologies deployed in defense against, response to, or recovery from an Act of Terrorism; and (8) Any limitations on such liability insurance. (g) Under Secretary’s Certification. For each Qualified Anti-Terrorism Technology, the Under Secretary shall certify the amount of liability insurance the Seller is required to carry pursuant PO 00000 Frm 00016 Fmt 4700 Sfmt 4700 to section 443(a) of title 6, United States Code, and paragraphs (a), (b), and (c) of this section. The Under Secretary shall include the insurance certification under this section as a part of the applicable Designation. The insurance certification may specify a period of time for which such insurance certification will apply. The Seller of a Qualified Anti-Terrorism Technology may at any time petition the Under Secretary for a revision of the insurance certification under this section, and the Under Secretary may revise such insurance certification in response to such a petition. The Under Secretary may at any time request information from the Seller regarding the insurance carried by the Seller or the amount of insurance available to the Seller. (h) Seller’s Continuing Obligations. Within 30 days after the Under Secretary’s insurance certification required by paragraph (g) of this section, the Seller shall certify to the Under Secretary in writing that the Seller has obtained the required insurance. Within 30 days of each anniversary of the issuance of a Designation or at any other time as he may determine, the Under Secretary may require, by written notice to the Seller, that the Seller certify to the Under Secretary in writing that the Seller has maintained the required insurance. The Under Secretary may terminate a Designation if the Seller fails to provide any of the insurance certifications required by this paragraph (h) or provides a false certification. § 25.6 Procedures for Designation of Qualified Anti-Terrorism Technologies. (a) Application Procedure. Any person, firm or other entity seeking a Designation shall submit an application to the Under Secretary or such other official as may be named from time to time by the Under Secretary. Such applications shall be submitted according to the procedures set forth in and using the appropriate forms contained in the SAFETY Act Application Kit prescribed by the Under Secretary, which shall be made available at https://www.safetyact.gov and by mail upon written request to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. The burden is on the applicant to make timely submission of all relevant data requested in the SAFETY Act Application Kit to substantiate an application for Designation. An applicant may withdraw a submitted application at any time and for any reason by making a written request for withdrawal with the Department. Withdrawal of a SAFETY Act E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations application shall have no prejudicial effect on any other application. (b) Initial Notification. Within 30 days after receipt of an application for a Designation, the Under Secretary his designee shall notify the applicant in writing that: (1) The application is complete and will be reviewed and evaluated, or (2) That the application is incomplete, in which case the missing or incomplete parts will be specified. (c) Review Process. (1) The Under Secretary or his designee will review each complete application and any included supporting materials. In performing this function, the Under Secretary or his designee may but is not required to: (i) Request additional information from the Seller; (ii) Meet with representatives of the Seller; (iii) Consult with, and rely upon the expertise of, any other Federal or nonFederal entity; (iv) Perform studies or analyses of the subject Technology or the insurance market for such Technology; and (v) Seek information from insurers regarding the availability of insurance for such Technology. (2) For Technologies with which a Federal, State, or local government agency already has substantial experience or data (through the procurement process or through prior use or review), the review may rely in part upon such prior experience and, thus, may be expedited. The Under Secretary may consider any scientific studies, testing, field studies, or other experience with the Technology that he deems appropriate and that are available or can be feasibly conducted or obtained, including test results produced by an independent laboratory or other entity engaged to test or verify the safety, utility, performance, in order to assess the effectiveness of the Technology or the capability of the Technology to substantially reduce risks of harm. Such studies may, in the Under Secretary’s discretion, include, without limitation: (i) Public source studies; (ii) Classified and otherwise confidential studies; (iii) Studies, tests, or other performance records or data provided by or available to the producer of the specific Technology; and (iv) Proprietary studies that are available to the Under Secretary. (3) In considering whether or the extent to which it is feasible to defer a decision on a Designation until additional scientific studies can be conducted on a particular Technology, VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 the Under Secretary will bring to bear his expertise concerning the protection of the security of the United States and will consider the urgency of the need for the Technology. (d) Action by the Under Secretary. Within 90 days of notification to the Seller that an application for a Designation is complete in accordance with paragraph (b)(1) of this section, the Under Secretary shall take one of the following actions: (1) Approve the application and issue an appropriate Designation to the applicant for the Technology, which shall include the insurance certification required by § 25.5(h) of this Part; (2) Notify the applicant in writing that the Technology is potentially eligible for a Designation, but that additional specified information is needed before a decision may be reached; or (3) Deny the application, and notify the applicant in writing of such decision. The Under Secretary may extend the 90-day time period for up to 45 days upon notice to the Seller. The Under Secretary is not required to provide a reason or cause for such extension. The Under Secretary’s decision shall be final and not subject to review, except at the discretion of the Under Secretary. (e) Content of Designation. (1) A Designation shall: (i) Describe the Qualified AntiTerrorism Technology (in such detail as the Under Secretary deems to be appropriate); (ii) Identify the Seller(s) of the Qualified Anti-Terrorism Technology; (iii) Specify the earliest date of sale of the Qualified Anti-Terrorism Technology to which the Designation shall apply (which shall be determined by the Under Secretary in his discretion, and may be prior to, but shall not be later than, the effective date of the Designation); (iv) Set forth the insurance certification required by § 25.5(g); and (v) To the extent practicable, include such standards, specifications, requirements, performance criteria, limitations, or other information as the Department in its sole and unreviewable discretion may deem appropriate. (2) The Designation may, but need not, specify other entities that are required to be covered by the liability insurance required to be purchased by the Seller. The failure to specify a covered person, firm, or other entity in a Designation will not preclude the application or applicability of the Act’s protections to that person, firm, or other entity. (f) Term of Designation; Renewal. A Designation shall be valid and effective PO 00000 Frm 00017 Fmt 4700 Sfmt 4700 33163 for a term of five to eight years (as determined by the Under Secretary) commencing on the date of issuance, and the protections conferred by the Designation shall continue in full force and effect indefinitely to all sales of Qualified Anti-Terrorism Technologies covered by the Designation. At any time within two years prior to the expiration of the term of the Designation, the Seller may apply for renewal of the Designation. The Under Secretary shall make the application form for renewal available at https://www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. (g) Government Procurements. (1) Overview. The Under Secretary may coordinate the review of a Technology for SAFETY Act purposes in connection with a Federal, State, or local government agency procurement of an anti-terrorism Technology in any manner he deems appropriate consistent with the Act and other applicable law. A determination by the Under Secretary to issue a Designation, or not to issue a Designation for a particular Technology as a QATT is not a determination that the Technology meets, or fails to meet, the requirements of any solicitation issued by any Federal government customer or non-Federal government customer. Determinations by the Under Secretary with respect to whether to issue a Designation for Technologies submitted for his review shall be based on the factors identified in § 25.4(b). (2) Procedure. Any Federal, State, or local government agency that engages in or is planning to engage in the procurement of a Technology that potentially qualifies as a Qualified Antiterrorism Technology, through the use of a solicitation of proposals or otherwise, may request that the Under Secretary issue a notice stating that the Technology to be procured either affirmatively or presumptively satisfies the technical criteria necessary to be deemed a Qualified Anti-Terrorism Technology (a ‘‘Pre-Qualification Designation Notice’’). The PreQualification Designation Notice will provide that the vendor(s) chosen to provide the Technology (the ‘‘Selected Vendor(s)’’), upon submitting an application for SAFETY Act Designation will: Receive expedited review of their application for Designation; either affirmatively or presumptively (as the case may be) be deemed to have satisfied the technical criteria for SAFETY Act Designation with respect to the Technology identified in the PreQualification Designation Notice; and be E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES 33164 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations authorized to submit a streamlined application as set forth in the PreQualification Designation Notice. In instances in which the subject procurement involves Technology with respect to which a Block Designation or Block Certification has been issued, the Department may determine that the vendor providing such Technology will affirmatively receive Designation or Certification with respect to such Technology, provided the vendor satisfy each other applicable requirement for Designation or Certification. Government agencies seeking a PreQualification Designation Notice shall submit a written request using the ‘‘Procurement Pre-Qualification Request’’ form prescribed by the Under Secretary and made available at https:// www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. (3) Actions. Within 60 days after the receipt of a complete Procurement PreQualification Request, the Under Secretary shall take one of the following actions: (i) Approve the Procurement PreQualification Request and issue an appropriate Pre-Qualification Designation Notice to the requesting agency that it may include in the government contract or in the solicitation materials, as appropriate; or (ii) Notify the requesting agency in writing that the relevant procurement is potentially eligible for a PreQualification Designation Notice, but that additional information is needed before a decision may be reached; or (iii) Deny the Procurement PreQualification Request and notify the requesting agency in writing of such decision, including the reasons for such denial. (4) Contents of Notice. A PreQualification Designation Notice shall contain, at a minimum, the following: (i) A detailed description of and detailed specifications for the Technology to which the PreQualification Designation Notice applies, which may incorporate by reference all or part of the procurement solicitation documents issued or to be issued by the requesting agency; (ii) A statement that the Technology to which the Pre-Qualification Designation Notice applies satisfies the technical criteria to be deemed a Qualified Anti-Terrorism Technology and that the Selected Vendor(s) may presumptively or will qualify for the issuance of a Designation for such Technology upon compliance with the terms and conditions set forth in such VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 Pre-Qualification Designation Notice and the approval of the streamlined application; (iii) A list of the portions of the application referenced in § 25.6(a) that the Selected Vendor(s) must complete and submit to the Department in order to obtain Designation and the appropriate period of time for such submission; (iv) The period of time within which the Under Secretary will take action upon such submission; (v) The date of expiration of such PreQualification Designation Notice; and (vi) Any other terms or conditions that the Under Secretary deems to be appropriate in his discretion. (5) Review of Completed Applications. The application for Designation from the Selected Vendor(s) shall be considered, processed, and acted upon in accordance with the procedures set forth in § 25.6 (which shall be deemed to be modified by the terms and conditions set forth in the applicable Pre-Qualification Designation Notice). However, the review and evaluation of the Technology to be procured from the Selected Vendor(s), in relation to the criteria set forth in § 25.4(b), shall ordinarily consist of a validation that that the Technology complies with the detailed description of and detailed specifications for the Technology set forth in the applicable Pre-Qualification Designation Notice. (h) Block Designations. (1) From time to time, the Under Secretary, in response to an application submitted pursuant to § 25.6(a) or upon his own initiative, may issue a Designation that is applicable to any person, firm, or other entity that is a qualified Seller of the QATT described in such Designation (a ‘‘Block Designation’’). A Block Designation will be issued only for Technology that relies on established performance standards or defined technical characteristics. All Block Designations shall be published by the Department within ten days after the issuance thereof at https:// www.safetyact.gov, and copies may also be obtained by mail by sending a request to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. Any person, firm, or other entity that desires to qualify as a Seller of a QATT that has received a Block Designation shall complete only such portions of the application referenced in § 25.6(a) as are specified in such Block Designation and shall submit an application to the Department in accordance with § 25.6(a) and the terms of the Block Designation. Applicants seeking to be qualified PO 00000 Frm 00018 Fmt 4700 Sfmt 4700 Sellers of a QATT pursuant to a Block Designation will receive expedited review of their applications and shall not be required to provide information with respect to the technical merits of the QATT that has received Block Designation. Within 60 days (or such other period of time as may be specified in the applicable Block Designation) after the receipt by the Department of a complete application, the Under Secretary shall take one of the following actions: (i) Approve the application and notify the applicant in writing of such approval, which notification shall include the certification required by § 25.5(g); or (ii) Deny the application, and notify the applicant in writing of such decision, including the reasons for such denial. (2) If the application is approved, commencing on the date of such approval the applicant shall be deemed to be a Seller under the applicable Block Designation for all purposes under the SAFETY Act, this part, and such Block Designation. A Block Designation shall be valid and effective for a term of five to eight years (as determined by the Under Secretary in his discretion) commencing on the date of issuance, and may be renewed or extended by the Under Secretary at his own initiative or in response to an application for renewal submitted by a qualified Seller under such Block Designation in accordance with § 25.6(h). Except as otherwise specifically provided in this paragraph, a Block Designation shall be deemed to be a Designation for all purposes under the SAFETY Act and this part. (i) Other Bases for Expedited Review of Applications. The Under Secretary may identify other categories or types of Technologies for which expedited processing may be granted. For example, the Under Secretary may conduct expedited processing for applications addressing a particular threat or for particular types of antiterrorism Technologies. The Under Secretary shall notify the public of any such opportunities for expedited processing by publishing such notice in the Federal Register. (j) Transfer of Designation. Except as may be restricted by the terms and conditions of a Designation, any Designation may be transferred and assigned to any other person, firm, or other entity to which the Seller transfers and assigns all right, title, and interest in and to the Technology covered by the Designation, including the intellectual property rights therein (or, if the Seller is a licensee of the Technology, to any E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations person, firm, or other entity to which such Seller transfers all of its right, title, and interest in and to the applicable license agreement). Such transfer and assignment of a Designation will not be effective unless and until the Under Secretary is notified in writing of the transfer using the ‘‘Application for Transfer of Designation’’ form issued by the Under Secretary (the Under Secretary shall make this application form available at https:// www.safetyact.gov and by mail by written request sent to: Directorate of Science and Technology, SAFETY Act/ room 4320, Department of Homeland Security, Washington, DC 20528). Upon the effectiveness of such transfer and assignment, the transferee will be deemed to be a Seller in the place and stead of the transferor with respect to the applicable Technology for all purposes under the SAFETY Act, this part, and the transferred Designation. The transferred Designation will continue to apply to the transferor with respect to all transactions and occurrences that occurred through the time at which the transfer and assignment of the Designation became effective, as specified in the applicable Application for Transfer of Designation. (k) Application of Designation to Licensees. Except as may be restricted by the terms and conditions of a Designation, any Designation shall apply to any other person, firm, or other entity to which the Seller licenses (exclusively or nonexclusively) the right to manufacture, use, or sell the Technology, in the same manner and to the same extent that such Designation applies to the Seller, effective as of the date of commencement of the license, provided that the Seller notifies the Under Secretary of such license by submitting, within 30 days after such date of commencement, a ‘‘Notice of License of Qualified Anti-terrorism Technology’’ form issued by the Under Secretary. The Under Secretary shall make this form available at https:// www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. Such notification shall not be required for any licensee listed as a Seller on the applicable Designation. (l) Significant Modification of Qualified Anti-terrorism Technologies. (1) The Department recognizes that Qualified Anti-Terrorism Technologies may routinely undergo changes or modifications in their manufacturing, materials, installation, implementation, operating processes, component assembly, or in other respects from time VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 to time. When a Seller makes routine changes or modifications to a Qualified Anti-Terrorism Technology, such that the QATT remains within the scope of the description set forth in the applicable Designation or Certification, the Seller shall not be required to provide notice under this subsection, and the changes or modifications shall not adversely affect the force or effect of the Seller’s QATT Designation or Certification. (2) A Seller shall promptly notify the Department and provide details of any change or modification to a QATT that causes the QATT no longer to be within the scope of the Designation or Certification by submitting to the Department a completed ‘‘Notice of Modification to Qualified AntiTerrorism Technology’’ form issued by the Under Secretary (a ‘‘Modification Notice’’). A Seller is not required to notify the Department of any change or modification of a particular Qualified Anti-Terrorism Technology that is made post-sale by a purchaser unless the Seller has consented expressly to the modification. The Under Secretary shall make an appropriate form available at https://www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act/ room 4320, Department of Homeland Security, Washington, DC 20528. The Department will promptly acknowledge receipt of a Modification Notice by providing the relevant Seller with written notice to that effect. Within 60 days of the receipt of a Modification Notice, the Under Secretary may, in his sole and unreviewable discretion: (i) Inform the submitting Seller that the QATT as changed or modified is consistent with, and is not outside the scope of, the Seller’s Designation or Certification; (ii) Issue to the Seller a modified Designation or Certification incorporating some or all of the notified changes or modifications; (iii) Seek further information regarding the changes or modifications and temporarily suspend the 60-day period of review; (iv) Inform the submitting Seller that the changes or modifications might cause the QATT as changed or modified to be outside the scope of the Seller’s Designation or Certification, and require further review and consideration by the Department; (v) Inform the submitting Seller that the QATT as changed or modified is outside the scope of the subject Seller’s Designation or Certification, and require that the QATT be brought back into conformance with the Seller’s Designation or Certification; or PO 00000 Frm 00019 Fmt 4700 Sfmt 4700 33165 (vi) If the Seller fails to bring the subject QATT into conformance in accordance with the Under Secretary’s direction pursuant to paragraph (l)(2)(v) of this section, issue a public notice stating that the QATT as changed or modified is outside the scope of the submitting Seller’s Designation or Certification and, consequentially, that such Designation or Certification is not applicable to the QATT as changed or modified. If the Under Secretary does not take one or more of such actions within the 60-day period following the Department’s receipt of a Seller’s Modification Notice, the changes or modifications identified in the Modification Notice will be deemed to be approved by the Under Secretary and the QATT, as changed or modified, will be conclusively established to be within the scope of the description of the QATT in the Seller’s Designation or Certification. (3) Notwithstanding anything to the contrary herein, a Seller’s original QATT Designation or Certification will continue in full force and effect in accordance with its terms unless modified, suspended, or terminated by the Under Secretary in his discretion, including during the pendency of the review of the Seller’s Modification Notice. In no event will any SAFETY Act Designation or Certification terminate automatically or retroactively under this section. A Seller is not required to notify the Under Secretary of any change or modification that is made post-sale by a purchaser or end-user of the QATT without the Seller’s consent, but the Under Secretary may, in appropriate circumstances, require an end-user to provide periodic reports on modifications or permit inspections or audits. § 25.7 Litigation Management (a) Liability for all claims against a Seller arising out of, relating to, or resulting from an Act of Terrorism when such Seller’s Qualified Anti-Terrorism Technology has been deployed in defense against, response to, or recovery from such act and such claims result or may result in loss to the Seller shall not be in an amount greater than the limits of liability insurance coverage required to be maintained by the Seller under this section or as specified in the applicable Designation. (b) In addition, in any action for damages brought under section 442 of Title 6, United States Code: (1) No punitive damages intended to punish or deter, exemplary damages, or other damages not intended to compensate a plaintiff for actual losses E:\FR\FM\08JNR1.SGM 08JNR1 33166 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations may be awarded, nor shall any party be liable for interest prior to the judgment; (2) Noneconomic damages may be awarded against a defendant only in an amount directly proportional to the percentage of responsibility of such defendant for the harm to the plaintiff, and no plaintiff may recover noneconomic damages unless the plaintiff suffered physical harm; and (3) Any recovery by a plaintiff shall be reduced by the amount of collateral source compensation, if any, that the plaintiff has received or is entitled to receive as a result of such Acts of Terrorism that result or may result in loss to the Seller. (c) Without prejudice to the authority of the Under Secretary to terminate a Designation pursuant to paragraph (h) of § 25.6, the liability limitations and reductions set forth in this section shall apply in perpetuity to all sales or deployments of a Qualified AntiTerrorism Technology in defense against, response to, or recovery from any Act of Terrorism that occurs on or after the effective date of the Designation applicable to such Qualified Anti-Terrorism Technology, regardless of whether any liability insurance coverage required to be obtained by the Seller is actually obtained or maintained or not, provided that the sale of such Qualified AntiTerrorism Technology was consummated by the Seller on or after the earliest date of sale of such Qualified Anti-Terrorism Technology specified in such Designation and prior to the earlier of the expiration or termination of such Designation. (d) There shall exist only one cause of action for loss of property, personal injury, or death for performance or nonperformance of the Seller’s Qualified Anti-Terrorism Technology in relation to an Act of Terrorism. Such cause of action may be brought only against the Seller of the Qualified Anti-Terrorism Technology and may not be brought against the buyers, the buyers’ contractors, or downstream users of the Technology, the Seller’s suppliers or contractors, or any other person or entity. In addition, such cause of action must be brought in the appropriate district court of the United States. cprice-sewell on PROD1PC66 with RULES § 25.8 Government Contractor Defense (a) Criteria for Certification. The Under Secretary may issue a Certification for a Qualified AntiTerrorism Technology as an Approved Product for Homeland Security for purposes of establishing a rebuttable presumption of the applicability of the government contractor defense. In determining whether to issue such VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 Certification, the Under Secretary or his designee shall conduct a comprehensive review of the design of such Technology and determine whether it will perform as intended, conforms to the Seller’s specifications, and is safe for use as intended. The Seller shall provide safety and hazard analyses and other relevant data and information regarding such Qualified Anti-Terrorism Technology to the Department in connection with an application. The Under Secretary or his designee may require that the Seller submit any information that the Under Secretary or his designee considers relevant to the application for approval. The Under Secretary or his designee may consult with, and rely upon the expertise of, any other governmental or non-governmental person, firm, or entity, and may consider test results produced by an independent laboratory or other person, firm, or other entity engaged by the Seller. (b) Extent of Liability. Should a product liability or other lawsuit be filed for claims arising out of, relating to, or resulting from an Act of Terrorism when Qualified Anti-Terrorism Technologies Certified by the Under Secretary as provided in §§ 25.8 and 25.9 of this part have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller, there shall be a rebuttable presumption that the government contractor defense applies in such lawsuit. This presumption shall only be overcome by clear and convincing evidence showing that the Seller acted fraudulently or with willful misconduct in submitting information to the Department during the course of the consideration of such Technology under this section and § 25.9 of this part. A claimant’s burden to show fraud or willful misconduct in connection with a Seller’s SAFETY Act application cannot be satisfied unless the claimant establishes there was a knowing and deliberate intent to deceive the Department. This presumption of the government contractor defense shall apply regardless of whether the claim against the Seller arises from a sale of the product to Federal Government or nonFederal Government customers. Such presumption shall apply in perpetuity to all deployments of a Qualified AntiTerrorism Technology (for which a Certification has been issued by the Under Secretary as provided in this section and § 25.9 of this part) in defense against, response to, or recovery from any Act of Terrorism that occurs on or after the effective date of the Certification applicable to such PO 00000 Frm 00020 Fmt 4700 Sfmt 4700 Technology, provided that the sale of such Technology was consummated by the Seller on or after the earliest date of sale of such Technology specified in such Certification (which shall be determined by the Under Secretary in his discretion, and may be prior to, but shall not be later than, such effective date) and prior to the expiration or termination of such Certification. (c) Establishing Applicability of the Government Contractor Defense. The Under Secretary will be exclusively responsible for the review and approval of anti-terrorism Technology for purposes of establishing the government contractor defense in any product liability lawsuit for claims arising out of, relating to, or resulting from an Act of Terrorism when Qualified AntiTerrorism Technologies approved by the Under Secretary, as provided in this final rule, have been deployed in defense against or response or recovery from such act and such claims result or may result in loss to the Seller. The Certification of a Technology as an Approved Product for Homeland Security shall be the only evidence necessary to establish that the Seller of the Qualified Anti-Terrorism Technology that has been issue a Certification is entitled to a presumption of dismissal from a cause of action brought against a Seller arising out of, relating to, or resulting from an Act of Terrorism when the Qualified Anti-Terrorism Technology was deployed in defense against or response to or recovery from such Act of Terrorism. This presumption of dismissal is based upon the statutory government contractor defense conferred by the SAFETY Act. § 25.9 Procedures for Certification of Approved Products for Homeland Security. (a) Application Procedure. An applicant seeking a Certification of antiterrorism Technology as an Approved Product for Homeland Security under § 25.8 shall submit information supporting such request to the Under Secretary. The Under Secretary shall make application forms available at https://www.safetyact.gov, and copies may also be obtained by mail by sending a request to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. An application for a Certification may not be filed unless the applicant has also filed an application for a Designation for the same Technology in accordance with § 25.6(a). Such applications may be filed simultaneously and may be reviewed simultaneously by the Department. E:\FR\FM\08JNR1.SGM 08JNR1 cprice-sewell on PROD1PC66 with RULES Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations (b) Initial Notification. Within 30 days after receipt of an application for a Certification, the Under Secretary or his designee shall notify the applicant in writing that: (1) The application is complete and will be reviewed, or (2) That the application is incomplete, in which case the missing or incomplete parts will be specified. (c) Review Process. The Under Secretary or his designee will review each complete application for a Certification and any included supporting materials. In performing this function, the Under Secretary or his designee may, but is not required to: (1) Request additional information from the Seller; (2) Meet with representatives of the Seller; (3) Consult with, and rely upon the expertise of, any other Federal or nonFederal entity; and (4) Perform or seek studies or analyses of the Technology. (d) Action by the Under Secretary. (1) Within 90 days after receipt of a complete application for a Certification, the Under Secretary shall take one of the following actions: (i) Approve the application and issue an appropriate Certification to the Seller; (ii) Notify the Seller in writing that the Technology is potentially eligible for a Certification, but that additional specified information is needed before a decision may be reached; or (iii) Deny the application, and notify the Seller in writing of such decision. (2) The Under Secretary may extend the time period one time for 45 days upon notice to the Seller, and the Under Secretary is not required to provide a reason or cause for such extension. The Under Secretary’s decision shall be final and not subject to review, except at the discretion of the Under Secretary. (e) Designation is a Pre-Condition. The Under Secretary may approve an application for a Certification only if the Under Secretary has also approved an application for a Designation for the same Technology in accordance with § 25.4. (f) Content and Term of Certification; Renewal. (1) A Certification shall: (i) Describe the Qualified AntiTerrorism Technology (in such detail as the Under Secretary deems to be appropriate); (ii) Identify the Seller(s) of the Qualified Anti-Terrorism Technology; (iii) Specify the earliest date of sale of the Qualified Anti-Terrorism Technology to which the Certification shall apply (which shall be determined by the Under Secretary in his discretion, VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 and may be prior to, but shall not be later than, the effective date of the Certification); and (iv) To the extent practicable, include such standards, specifications, requirements, performance criteria, limitations, or other information as the Department in its sole and unreviewable discretion may deem appropriate. (2) A Certification shall be valid and effective for the same period of time for which the related Designation is issued, and shall terminate upon the termination of such related Designation. The Seller may apply for renewal of the Certification in connection with an application for renewal of the related Designation. An application for renewal must be made using the ‘‘Application for Certification of an Approved Product for Homeland Security’’ form issued by the Under Secretary. (g) Application of Certification to Licensees. A Certification shall apply to any other person, firm, or other entity to which the applicable Seller licenses (exclusively or nonexclusively) the right to manufacture, use, or and sell the Technology, in the same manner and to the same extent that such Certification applies to the Seller, effective as of the date of commencement of the license, provided that the Seller notifies the Under Secretary of such license by submitting, within 30 days after such date of commencement, a ‘‘Notice of License of Approved Anti-terrorism Technology’’ form issued by the Under Secretary. The Under Secretary shall make this form available at https:// www.safetyact.gov and by mail upon request sent to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. Such notification shall not be required for any licensee listed as a Seller on the applicable Certification. (h) Transfer of Certification. In the event of any permitted transfer and assignment of a Designation, any related Certification for the same anti-terrorism Technology shall automatically be deemed to be transferred and assigned to the same transferee to which such Designation is transferred and assigned. The transferred Certification will continue to apply to the transferor with respect to all transactions and occurrences that occurred through the time at which such transfer and assignment of the Certification became effective. (i) Issuance of Certificate; Approved Product List. For anti-terrorism Technology reviewed and approved by the Under Secretary and for which a Certification is issued, the Under Secretary shall issue a certificate of PO 00000 Frm 00021 Fmt 4700 Sfmt 4700 33167 conformance to the Seller and place the anti-terrorism Technology on an Approved Product List for Homeland Security, which shall be published by the Department. (j) Block Certifications. (1) From time to time, the Under Secretary, in response to an application submitted pursuant to § 25.9(a) or at his own initiative, may issue a Certification that is applicable to any person, firm or other entity that is a qualified Seller of the Approved Product for Homeland Security described in such Certification (a ‘‘Block Certification’’). All Block Certifications shall be published by the Department within ten days after the issuance thereof at https://www.safetyact.gov, and copies may also be obtained by mail by sending a request to: Directorate of Science and Technology, SAFETY Act/room 4320, Department of Homeland Security, Washington, DC 20528. Any person, firm, or other entity that desires to qualify as a Seller of an Approved Product for Homeland Security under a Block Certification shall complete only such portions of the application referenced in § 25.9(a) as are specified in such Block Certification and shall submit such application to the Department in accordance with § 9(a). Applicants seeking to be qualified Sellers of an Approved Product for Homeland Security pursuant to a Block Certification will receive expedited review of their applications and shall not be required to provide information with respect to the technical merits of the Approved Product for Homeland Security that has received Block Certification. Within 60 days (or such other period of time as may be specified in the applicable Block Certification) after the receipt by the Department of a complete application, the Under Secretary shall take one of the following actions: (i) Approve the application and notify the applicant in writing of such approval; or (ii) Deny the application, and notify the applicant in writing of such decision, including the reasons for such denial. (2) If the application is approved, commencing on the date of such approval, the applicant shall be deemed to be a Seller under the applicable Block Certification for all purposes under the SAFETY Act, this part, and such Block Certification. A Block Certification shall be valid and effective for the same period of time for which the related Block Designation is issued. A Block Certification may be renewed by the Under Secretary at his own initiative or in response to an application for E:\FR\FM\08JNR1.SGM 08JNR1 33168 Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules and Regulations renewal submitted by a qualified Seller under such Block Certification in accordance with § 25.9(g). Except as otherwise specifically provided in this paragraph, a Block Certification shall be deemed to be a Certification for all purposes under the SAFETY Act and this part. § 25.10 Confidentiality and Protection of Intellectual Property. cprice-sewell on PROD1PC66 with RULES (a) General. The Secretary, in consultation with the Office of Management and Budget and appropriate Federal law enforcement and intelligence officials, and in a manner consistent with existing protections for sensitive or classified information, shall establish confidentiality procedures for safeguarding, maintenance and use of information submitted to the Department under this part. Such protocols shall, among other things, ensure that the Department will utilize all appropriate exemptions from the Freedom of Information Act. (b) Non-Disclosure. Except as otherwise required by applicable law or regulation or a final order of a court of competent jurisdiction, or as expressly authorized in writing by the Under Secretary, no person, firm, or other entity may: (1) Disclose SAFETY Act Confidential Information (as defined above) to any person, firm, or other entity, or (2) Use any SAFETY Act Confidential Information for his, her, or its own benefit or for the benefit of any other person, firm, or other entity, unless the applicant has consented to the release of such SAFETY Act Confidential Information. (c) Legends. Any person, firm, or other entity that submits data or information to the Department under this Part may place a legend on such data or information indicating that the submission constitutes SAFETY Act Confidential Information. The absence of such a legend shall not prevent any data or information submitted to the Department under this Part from constituting or being considered by the Department to constitute SAFETY Act Confidential Information. Dated: June 2, 2006. Michael Chertoff, Secretary. [FR Doc. 06–5223 Filed 6–5–06; 2:16 pm] BILLING CODE 4410–10–P VerDate Aug<31>2005 15:35 Jun 07, 2006 Jkt 208001 DEPARTMENT OF AGRICULTURE Animal and Plant Health Inspection Service 7 CFR Part 301 [Docket No. APHIS–2006–0033] RIN 0579–AC05 Citrus Canker; Compensation for Certified Citrus Nursery Stock Animal and Plant Health Inspection Service, USDA. ACTION: Interim rule and request for comments. AGENCY: SUMMARY: We are amending the citrus canker regulations to establish provisions under which eligible commercial citrus nurseries may, subject to the availability of appropriated funds, receive payments for certified citrus nursery stock destroyed to eradicate or control citrus canker. The payment of these funds will reduce the economic effects on commercial citrus nurseries that have had certified citrus nursery stock destroyed to control citrus canker. DATES: This interim rule is effective June 8, 2006. We will consider all comments that we receive on or before August 7, 2006. ADDRESSES: You may submit comments by either of the following methods: Federal eRulemaking Portal: Go to https://www.regulations.gov and, in the lower ‘‘Search Regulations and Federal Actions’’ box, select ‘‘Animal and Plant Health Inspection Service’’ from the agency drop-down menu, then click on ‘‘Submit.’’ In the Docket ID column, select APHIS–2006–0033 to submit or view public comments and to view supporting and related materials available electronically. Information on using Regulations.gov, including instructions for accessing documents, submitting comments, and viewing the docket after the close of the comment period, is available through the site’s ‘‘User Tips’’ link. Postal Mail/Commercial Delivery: Please send four copies of your comment (an original and three copies) to Docket No. APHIS–2006–0033, Regulatory Analysis and Development, PPD, APHIS, Station 3A–03.8, 4700 River Road Unit 118, Riverdale, MD 20737–1238. Please state that your comment refers to Docket No. APHIS– 2006–0033. Reading Room: You may read any comments that we receive on this docket in our reading room. The reading room is located in room 1141 of the USDA South Building, 14th Street and PO 00000 Frm 00022 Fmt 4700 Sfmt 4700 Independence Avenue, SW., Washington, DC. Normal reading room hours are 8 a.m. to 4:30 p.m., Monday through Friday, except holidays. To be sure someone is there to help you, please call (202) 690–2817 before coming. Other Information: Additional information about APHIS and its programs is available on the Internet at https://www.aphis.usda.gov. FOR FURTHER INFORMATION CONTACT: Mr. Stephen R. Poe, Operations Officer, Program Support Staff, PPQ, APHIS, 4700 River Road Unit 36, Riverdale, MD 20737–1231; (301) 734–8899. SUPPLEMENTARY INFORMATION: Background Citrus canker is a plant disease that affects plants and plant parts, including fresh fruit, of citrus and citrus relatives (Family Rutaceae). Citrus canker can cause defoliation and other serious damage to the leaves and twigs of susceptible plants. It can also cause lesions on the fruit of infected plants, which render the fruit unmarketable, and cause infected fruit to drop from the trees before reaching maturity. The aggressive A (Asiatic) strain of citrus canker can infect susceptible plants rapidly and lead to extensive economic losses in commercial citrus-producing areas. The regulations to prevent the interstate spread of citrus canker are contained in §§ 301.75–1 through 301.75–14 of ‘‘Subpart-Citrus Canker’’ in Title 7 of the Code of Federal Regulations. These regulations restrict the interstate movement of regulated articles from and through areas quarantined because of citrus canker and provide conditions under which regulated fruit may be moved into, through, and from quarantined areas for packing. These regulations were promulgated pursuant to the Plant Protection Act (7 U.S.C. 7701–7772). The regulations in §§ 301.75–15 and 301.75–16 (referred to below as the regulations) of ‘‘Subpart-Citrus Canker’’ provide for compensation to owners of commercial citrus groves for losses due to citrus canker eradication activities under certain conditions. Section 301.75–15 addresses compensation for commercial citrus trees and § 301.75–16 focuses on compensation for the recovery of lost production income. These regulations were promulgated to implement the appropriations statutes enacted in 2000. In February 2003, Congress appropriated funds ‘‘* * * to compensate commercial citrus and lime growers in the State of Florida for lost E:\FR\FM\08JNR1.SGM 08JNR1

Agencies

[Federal Register Volume 71, Number 110 (Thursday, June 8, 2006)]
[Rules and Regulations]
[Pages 33147-33168]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 06-5223]



========================================================================
Rules and Regulations
                                                Federal Register
________________________________________________________________________

This section of the FEDERAL REGISTER contains regulatory documents 
having general applicability and legal effect, most of which are keyed 
to and codified in the Code of Federal Regulations, which is published 
under 50 titles pursuant to 44 U.S.C. 1510.

The Code of Federal Regulations is sold by the Superintendent of Documents. 
Prices of new books are listed in the first FEDERAL REGISTER issue of each 
week.

========================================================================


Federal Register / Vol. 71, No. 110 / Thursday, June 8, 2006 / Rules 
and Regulations

[[Page 33147]]



DEPARTMENT OF HOMELAND SECURITY

Office of the Secretary

6 CFR Part 25

[USCG-2003-15425]
RIN 1601-AA15


Regulations Implementing the Support Anti-terrorism by Fostering 
Effective Technologies Act of 2002 (the SAFETY Act)

AGENCY: Office of the Secretary, Department of Homeland Security.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: This final rule implements Subtitle G of Title VIII of the 
Homeland Security Act of 2002--the Support Anti-terrorism by Fostering 
Effective Technologies Act of 2002 (``the SAFETY Act'' or ``the Act''), 
which provides critical incentives for the development and deployment 
of anti-terrorism technologies by providing liability protections for 
providers of ``qualified anti-terrorism technologies.'' The purpose of 
this rule is to facilitate and promote the development and deployment 
of anti-terrorism technologies that will save lives. The final rule 
amends the interim rule to incorporate changes resulting from the 
comments.

DATES: This final rule is effective July 10, 2006.

ADDRESSES: You may submit comments identified by Coast Guard docket 
number USCG-2003-15425 or RIN 1601-AA15, to the Docket Management 
Facility at the Department of Transportation, by one of the following 
methods:
    (1) Web Site: https://dms.dot.gov.
    (2) Mail: Docket Management Facility, U.S. Department of 
Transportation, 400 Seventh Street, SW., Washington, DC 20590-0001.
    (3) Fax: 202-493-2251.
    (4) Delivery: Room PL-401 on the Plaza level of the Nassif 
Building, 400 Seventh Street, SW., Washington, DC, between 9 a.m. and 5 
p.m., Monday through Friday, except Federal holidays. The telephone 
number is 202-366-9329.
    (5) Federal eRulemaking portal: https://www.regulations.gov. 
Instructions: Comments and materials received from the public, as well 
as documents mentioned in this preamble as being available in the 
docket, are part of docket USCG-2003-15425 and are available for 
inspection or copying from the Docket Management Facility, U.S. 
Department of Transportation, room PL-401, 400 Seventh Street, SW., 
Washington, DC, between 9 a.m. and 5 p.m., Monday through Friday except 
Federal holidays. You may also find this docket on the Internet at 
https://dms.dot.gov. You may also access the Federal eRulemaking Portal 
at https://www.regulations.gov.

FOR FURTHER INFORMATION CONTACT: If you have questions on this final 
rule, contact the Director of the Office of SAFETY Act Implementation, 
Science and Technology, Department of Homeland Security, telephone 703-
575-4511. If you have questions on viewing or submitting material to 
the docket, call Dorothy Beard, Chief, Dockets, Department of 
Transportation, telephone 202-366-5149.

SUPPLEMENTARY INFORMATION: Capitalized terms appearing in this preamble 
shall have the meanings ascribed to such terms in Sec.  25.2 of this 
final rule. This section is organized as follows:

Table of Contents

I. Analysis of the SAFETY Act
    A. Background
    B. Statutory and Regulatory History and Analysis
    C. Government Contractor Defense
    D. Exclusive Federal Jurisdiction and Scope of Insurance 
Coverage
    E. Relationship of the SAFETY Act to Indemnification Under 
Public Law 85-804
II. Discussion of Changes and Comments
    A. Confidentiality of Information
    B. Application Preparation Burden
    C. Certifying ``accuracy and completeness''
    D. Conditions on Designations
    E. Significant Modification to a Qualified Anti-
TerrorismTechnology
    F. Exclusive Responsibility for Government Contractor Defense, 
Definitions of Fraud and Willful Misconduct
    G. Definition of an ``Act of Terrorism''
    H. Retroactive Designation
    I. Bias Toward Product-Based Anti-Terrorism Technologies
    J. Scope of Insurance Coverage
    K. Interactions With Public Law 85-804
    L. Prioritization of Evaluations
    M. Standards
    N. Expiration of Designations
    O. Appeal/Review of Decisions Regarding SAFETY Act Applications
    P. Coordination With Government Procurements
    Q. Pre-Application Consultations
    R. Developmental Test & Evaluation Designations
    S. Seller's Continuing Obligations With Respect to Maintaining 
Insurance
    T. Block Designations and Block Certifications
    U. Reciprocal Waivers
    V. Deference Due to Other Federal or State Regulatory or 
Procurement Officials
III. Regulatory Requirements
    A. Executive Order 12866
    B. Regulatory Flexibility Act
    C. Unfunded Mandates Reform Act of 1995
    D. Executive Order 13132--Federalism
    E. Paperwork Reduction Act

I. Analysis of the SAFETY Act

A. Background

    Congress was clear, both in the text of the SAFETY Act and in the 
Act's legislative history, that the SAFETY Act can and should be a 
critical tool in expanding the creation, proliferation and use of anti-
terrorism technologies. On July 11, 2003, the Department of Homeland 
Security (``DHS'') published its first proposed rules for 
implementation of the SAFETY Act (Notice of Proposed Rulemaking 
entitled ``Regulations Implementing the Support Anti-terrorism by 
Fostering Effective Technologies Act of 2002 (the SAFETY Act)'' (68 FR 
41420), laying out its fundamental interpretive approach to the Act and 
requesting comment. On October 16, 2003, an interim rule governing 
implementation of the SAFETY Act was promulgated making certain changes 
to the proposed rules but again embracing many of the fundamental 
interpretive approaches proposed several months earlier (68 FR 59684). 
Subsequently, the Department published detailed procedural mechanisms 
for implementation of the Act and announced additional details relating 
to the process for filing and adjudicating applications.

[[Page 33148]]

    The SAFETY Act program is now in its third year, and the Department 
has a substantial record of program performance to evaluate. While the 
Department concludes that the Department's core legal interpretations 
of the Act's provisions are fundamentally sound, experience in 
administering the program has demonstrated that certain of the 
procedural processes built to administer the Act can be improved. 
Shortly after being sworn in, Secretary of Homeland Security Michael 
Chertoff stated: ``There is more opportunity, much more opportunity, to 
take advantage of this important law, and we are going to do that.'' In 
the past year, the Department has instituted process improvements which 
have yielded positive initial results. In the first sixteen months of 
the SAFETY Act program, from October 2003 to February 2005, six 
technologies were designated Qualified Anti-Terrorism Technologies 
under the SAFETY Act. By contrast, since March 2005, 68 additional 
technologies have received SAFETY Act protections. This is a greater 
than ten-fold increase in SAFETY Act approvals in the past 14 months. 
In addition, the Department has instituted a program to run SAFETY Act 
reviews in parallel with key anti-terrorism procurement processes.
    Despite these recent improvements, further changes to Department 
rules and processes are necessary to ensure that the program achieves 
the results that Congress intended. With this final rule, the 
Department:
    1. Further clarifies the liability protections available under the 
SAFETY Act;
    2. States with greater specificity those products and services that 
are eligible for Designation as a Qualified Anti-Terrorism Technology;
    3. Clarifies the Department's efforts to protect the confidential 
information, intellectual property, and trade secrets of SAFETY Act 
applicants;
    4. Articulates the Department's intention to extend SAFETY Act 
liability protections to well-defined categories of anti-terrorism 
technologies by issuing ``Block Designations'' and ``Block 
Certifications;''
    5. Discusses appropriate coordination of SAFETY Act consideration 
of anti-terrorism technologies with government procurement processes; 
and
    6. Takes other actions necessary to streamline processes, add 
flexibility for applicants, and clarify protections afforded by the 
SAFETY Act.
    While this rule is indeed final, the Department remains committed 
to making future changes to the implementing regulation or to any 
element of the program that interferes with the purposes of the SAFETY 
Act. To that end, the Department seeks further comment on the specific 
issues identified herein.
    Section I of this preamble reviews the Department's longstanding 
legal interpretation of the SAFETY Act's provisions and reviews the 
Act's statutory and regulatory history. Section II addresses regulatory 
changes and outlines additional improvements in SAFETY Act processes 
and procedures that the Department will implement in the coming months 
that will improve administration of the Act. Section III addresses this 
rule's compliance with other regulatory requirements.

B. Statutory and Regulatory History and Analysis

    As part of the Homeland Security Act of 2002, Public Law 107-296, 
Congress enacted liability protections for providers of certain anti-
terrorism technologies. The SAFETY Act provides incentives for the 
development and deployment of anti-terrorism technologies by creating a 
system of ``risk management'' and a system of ``litigation 
management.'' The purpose of the Act is to ensure that the threat of 
liability does not deter potential manufacturers or sellers of anti-
terrorism technologies from developing, deploying, and commercializing 
technologies that could save lives. The Act thus creates certain 
liability limitations for ``claims arising out of, relating to, or 
resulting from an act of terrorism'' where Qualified Anti-Terrorism 
Technologies (as such term is defined in 6 CFR 25.2) have been 
deployed.
    Together, the risk and litigation management provisions provide the 
following protections:
     Exclusive jurisdiction in Federal court for suits against 
the sellers of ``Qualified Anti-Terrorism Technologies'' (Sec.  
863(a)(2));
     A limitation on the liability of sellers of Qualified 
Anti-Terrorism Technologies to an amount of liability insurance 
coverage specified for each Qualified Anti-Terrorism Technology, 
provided that sellers cannot be required to obtain any more liability 
insurance coverage than is reasonably available ``at prices and terms 
that will not unreasonably distort the sales price'' of the technology 
(Sec.  864(a)(2));
     A prohibition on joint and several liability such that 
sellers can only be liable for the percentage of noneconomic damages 
that is proportionate to their responsibility (Sec.  863(b)(2));
     A complete bar on punitive damages and prejudgment 
interest (Sec.  863(b)(1));
     The reduction of a plaintiff's recovery by the amount of 
collateral source compensation, such as insurance benefits or 
government benefits, such plaintiff receives or is eligible to receive 
(Sec.  863(c)); and
     A rebuttable presumption that sellers are entitled to the 
``government contractor defense'' (Sec.  863(d)).
    The Secretary's designation of a technology as a Qualified Anti-
Terrorism Technology (QATT) confers each of the liability protections 
identified above except the rebuttable presumption in favor of the 
government contractor defense. The presumption in favor of the 
government contractor defense requires an additional ``Certification'' 
by the Secretary under section 863(d) of the Act. In many cases, 
however, SAFETY Act Designation and Certification are conferred 
contemporaneously.
    As noted above, the Designation of a technology as a Qualified 
Anti-Terrorism Technology confers all of the liability protections 
provided in the SAFETY Act, except for the presumption in favor of the 
government contractor defense. The Act gives the Secretary broad 
discretion in determining whether to designate a particular technology 
as a Qualified Anti-Terrorism Technology, although the Act sets forth 
the following criteria for consideration of a particular technology: 
(1) Prior United States Government use or demonstrated substantial 
utility and effectiveness; (2) availability of the technology for 
immediate deployment; (3) the potential liability of the Seller; (4) 
the likelihood that the technology will not be deployed unless the 
SAFETY Act protections are conferred; (5) the risk to the public if the 
technology is not deployed; (6) evaluation of scientific studies; and 
(7) the effectiveness of the technology in defending against acts of 
terrorism. It is not required that applicants satisfy all of the 
preceding criteria to receive SAFETY Act protections. Moreover, these 
criteria are not exclusive--the Secretary may consider other factors 
that he deems appropriate. The Secretary has discretion to give greater 
weight to some factors over others, and the relative weighting of the 
various criteria may vary depending upon the particular technology at 
issue and the threats that the particular technology is designed to 
address. The Secretary may, in his discretion, determine that failure 
to meet a particular criterion justifies denial of an application under 
the SAFETY Act. However, the Secretary is

[[Page 33149]]

not required to reject an application that fails to meet one or more of 
the criteria. Rather, the Secretary may conclude, after considering all 
of the relevant criteria and any other relevant factors, that a 
particular technology merits Designation as a Qualified Anti-Terrorism 
Technology even if one or more particular criteria are not satisfied. 
The Secretary's considerations will also vary with the constantly 
evolving threats and conditions that give rise to the need for the 
technologies.
    The SAFETY Act applies to a broad range of technologies, including 
products, services, and software, or combinations thereof, as long as 
the Secretary, as an exercise of discretion and judgment, determines 
that a technology merits Designation. The Secretary may designate a 
system containing many component technologies (including products and 
services) or may designate specific component technologies 
individually. Further, as the statutory criteria suggest, a Qualified 
Anti-Terrorism Technology need not be newly developed--it may have 
already been employed (e.g. ``prior United States government use''') or 
may be a new application of an existing technology.
    The SAFETY Act provides that, before designating a Qualified Anti-
Terrorism Technology, the Secretary will examine the amount of 
liability insurance the Seller of the technology proposes to maintain 
for coverage of the anti-terrorism technology at issue. Under section 
864(a), the Secretary must certify that the coverage level is 
appropriate ``to satisfy otherwise compensable third-party claims 
arising out of, relating to, or resulting from an act of terrorism when 
qualified anti-terrorism technologies have been deployed.'' Sec.  
864(a)(1). While the Act provides the Secretary with significant 
discretion in this regard, the Secretary may not require the Seller to 
obtain liability insurance of more than the maximum amount of liability 
insurance reasonably available from private sources on the world 
market. Likewise, the Secretary may not require a Seller to obtain 
insurance, the cost of which would unreasonably distort the sales price 
of Seller's anti-terrorism technologies. Sec.  864(a)(2). Although the 
Secretary may permit the Seller to self-insure, he may not require the 
Seller to self-insure if appropriate insurance is unavailable. Sec.  
864(a)(2).
    The Secretary does not intend to set a ``one-size-fits-all'' 
numerical requirement regarding required insurance coverage for all 
technologies that have been designated as QATTs. Instead, as the Act 
suggests, the inquiry will be specific to each application and may 
involve an examination of several factors, including without limitation 
the following: (i) The amount of insurance the Seller has previously 
maintained; (ii) the amount of insurance maintained by the Seller for 
other related technologies or for the Seller's business as a whole; 
(iii) the amount of insurance typically maintained by Sellers of 
comparable technologies; (iv) data and history regarding mass casualty 
losses; and (v) the particular technology at issue. Once the Secretary 
concludes the analysis regarding the appropriate level of insurance 
coverage (which typically will include discussions with the Seller), 
the Secretary will provide a description of the coverage appropriate 
for the particular Seller of a Qualified Anti-Terrorism Technology to 
maintain. The Seller's insurance certification may identify an 
appropriate amount of insurance coverage available under a 
comprehensive general liability policy or other liability insurance 
program. The insurance certification also may specify that the amount 
of insurance required to be maintained will be the amount of coverage 
available under the terms of the specific policy at issue. If, during 
the term of the Designation, the Seller desires to request 
reconsideration of that insurance certification due to changed 
circumstances or for other reasons, the Seller may do so and the 
Secretary is authorized to use the discretion described above to adjust 
insurance requirements appropriately. If the Seller fails to maintain 
coverage at the certified level, the liability protections of the Act 
will continue to apply, but the Seller's liability limit will remain at 
the certified insurance level. The Department recognizes that the 
market for insurance might change over time and seeks further comment 
on how the Department can and should address changes in insurance 
availability.

C. Government Contractor Defense

    The SAFETY Act creates a rebuttable presumption that the government 
contractor defense applies to those Qualified Anti-Terrorism 
Technologies ``approved by the Secretary'' in accordance with certain 
criteria specified in Sec.  863(d)(2). The government contractor 
defense is an affirmative defense that immunizes Sellers from liability 
for certain claims brought under Sec.  863(a) of the Act. See Sec.  
863(d)(1). The presumption of this defense applies to all ``approved'' 
Qualified Anti-Terrorism Technologies for claims brought in a ``product 
liability or other lawsuit'' and ``arising out of, relating to, or 
resulting from an act of terrorism when qualified anti-terrorism 
technologies * * * have been deployed in defense against or response or 
recovery from such act and such claims result or may result in loss to 
the Seller.'' Id. While the government contractor defense is a 
judicially-created doctrine, section 863's express terms supplant the 
requirements in the case law for the application of the defense. First, 
and most obviously, the Act expressly provides that the government 
contractor defense is available not only to government contractors, but 
also to those who sell to State and local governments or the private 
sector. See Sec.  863(d)(1) (``This presumption of the government 
contractor defense shall apply regardless of whether the claim against 
the Seller arises from a sale of the product to Federal Government or 
non-Federal Government customers.'') Second, Sellers of Qualified Anti-
Terrorism Technologies need not design their technologies to federal 
government specifications in order to obtain the government contractor 
defense under the SAFETY Act. Instead, the Act sets forth criteria for 
the Department's Certification of technologies. Specifically, the Act 
provides that before issuing a Certification for a technology, the 
Secretary will conduct a ``comprehensive review of the design of such 
technology and determine whether it will perform as intended, conforms 
to the Seller's specifications, and is safe for use as intended.'' 
Sec.  863(d)(2). The Act also provides that the Seller will ``conduct 
safety and hazard analyses'' and supply such information to the 
Secretary. Id. This express statutory framework thus governs in lieu of 
the requirements developed in case law for the application of the 
government contractor defense. Third, the Act expressly states the 
limited circumstances in which the applicability of the defense can be 
rebutted. The Act provides expressly that the presumption can be 
overcome only by evidence showing that the Seller acted fraudulently or 
with willful misconduct in submitting information to the Secretary 
during the course of the Secretary's consideration of such technology. 
See Sec.  863(d)(1) (``This presumption shall only be overcome by 
evidence showing that the Seller acted fraudulently or with willful 
misconduct in submitting information to the Secretary during the course 
of the Secretary's consideration of such technology under this 
subsection.'')
    The applicability of the government contractor defense to 
particular technologies is thus governed by these express provisions of 
the Act, rather than by the judicially-developed criteria

[[Page 33150]]

for applicability of the government contractor defense outside the 
context of the SAFETY Act. While the Act does not expressly delineate 
the scope of the defense (i.e., the types of claims that the defense 
bars), the Act and the legislative history make clear that the scope is 
broad. For example, it is clear that any Seller of an ``approved'' 
technology cannot be held liable under the Act for design defects or 
failure to warn claims, unless the presumption of the defense is 
rebutted by evidence that the Seller acted fraudulently or with willful 
misconduct in submitting information to the Secretary during the course 
of the Secretary's consideration of such technology. In Boyle v. United 
Technologies Corp., and its progeny, the Supreme Court has ruled that 
the government contractor defense bars a broad range of claims. For 
example, the Supreme Court in Boyle concluded that ``state law which 
holds Government contractors liable for design defects'' can present a 
significant conflict with Federal policy (including the discretionary 
function exception to the Federal Tort Claims Act) and therefore ``must 
be displaced.'' Boyle v. United Technologies Corp., 487 U.S. 500, 512 
(1988). The Department believes with the SAFETY Act that Congress 
incorporated government contractor defense protections outlined in the 
Supreme Court's Boyle line of cases as it existed on the date of 
enactment of the SAFETY Act, rather than incorporating future 
developments of the government contractor defense in the courts. 
Indeed, it is difficult to imagine that Congress would have intended a 
statute designed to provide certainty and protection to Sellers of 
anti-terrorism technologies to be subject to future developments of a 
judicially-created doctrine. In fact, there is evidence that Congress 
rejected such a construction. See, e.g., 148 Cong. Rec. E2080 (November 
13, 2001) (statement of Rep. Armey) (``[Companies] will have a 
government contractor defense as is commonplace in existing law.'') 
(emphasis added).
    Procedurally, the presumption of applicability of the government 
contractor defense is conferred by the Secretary's Certification of a 
Qualified Anti-Terrorism Technology specifically for the purposes of 
the government contractor defense. This Certification is an act 
separate from the Secretary's issuance of a Designation for a Qualified 
Anti-Terrorism Technology and confers additional benefits to Sellers. 
Importantly, Sellers may submit applications for both Designation as a 
Qualified Anti-Terrorism Technology and Certification for purposes of 
the government contractor defense at the same time, and the Secretary 
may review and act upon both applications contemporaneously. The 
distinction between the Secretary's two actions is important, however, 
because the approval process for the government contractor defense 
includes a level of review that is not required for the Designation as 
a Qualified Anti-Terrorism Technology. In appropriate cases, Sellers 
may obtain the protections that come with Designation as a Qualified 
Anti-Terrorism Technology even if they have not satisfied the 
additional requirements for the government contractor defense.
    In an effort to provide greater clarity, the Department intends to 
publish guidance regarding its interpretation of the government 
contractor defense and the Supreme Court's Boyle line of cases as it 
existed on the date of enactment of the SAFETY Act.

D. Exclusive Federal Jurisdiction and Scope of Insurance Coverage

    The Act creates an exclusive Federal cause of action ``for any 
claim for loss of property, personal injury, or death arising out of, 
relating to, or resulting from an act of terrorism when qualified anti-
terrorism technologies have been deployed in defense against or 
response or recovery from such act and such claims result or may result 
in loss to the Seller.'' Sec.  863(a)(2); See also Sec.  863(a)(1). 
This exclusive ``Federal cause of action shall be brought only for 
claims for injuries that are proximately caused by sellers that provide 
qualified anti-terrorism technology.'' Sec.  863(a)(1). The best 
reading of Sec.  863(a), and the reading the Department has adopted, is 
that
    (1) Only one cause of action exists for loss of property, personal 
injury, or death for performance or non-performance of the Seller's 
Qualified Anti-Terrorism Technology in relation to an Act of Terrorism,
    (2) Such cause of action may be brought only against the Seller of 
the Qualified Anti-Terrorism Technology and may not be brought against 
the buyers, the buyers' contractors, downstream users of the Qualified 
Anti-Terrorism Technology, the Seller's suppliers or contractors, or 
any other person or entity, and
    (3) Such cause of action must be brought in Federal court. The 
exclusive Federal nature of this cause of action is evidenced in large 
part by the exclusive jurisdiction provision in Sec.  863(a)(2). That 
subsection states: ``Such appropriate district court of the United 
States shall have original and exclusive jurisdiction over all actions 
for any claim for loss of property, personal injury, or death arising 
out of, relating to, or resulting from an act of terrorism when 
Qualified Anti-Terrorism Technologies have been deployed in defense 
against or response or recovery from such act and such claims result or 
may result in loss to the Seller.'' Id. Any presumption of concurrent 
causes of action (between state and Federal law) is overcome by two 
basic points. First, Congress would not have created in this Act a 
Federal cause of action to complement State law causes of action. Not 
only is the substantive law for decision in the Federal action derived 
from State law (and thus would be surplusage), but in creating the Act 
Congress plainly intended to limit rather than increase the liability 
exposure of Sellers. Second, the granting of exclusive jurisdiction to 
the Federal district courts provides further evidence that Congress 
wanted an exclusive Federal cause of action. Indeed, a Federal district 
court (in the absence of diversity) does not have jurisdiction over 
State law claims, and the statute makes no mention of diversity claims 
anywhere in the Act.
    Further, it is clear that the Seller is the only appropriate 
defendant in this exclusive Federal cause of action. First and 
foremost, the Act unequivocally states that a ``cause of action shall 
be brought only for claims for injuries that are proximately caused by 
sellers that provide qualified anti-terrorism technology.'' Sec.  
863(a)(1). Second, if the Seller of the Qualified Anti-Terrorism 
Technology at issue were not the only defendant, would-be plaintiffs 
could, in an effort to circumvent the statute, bring claims (arising 
out of or relating to the performance or non-performance of the 
Seller's Qualified Anti-Terrorism Technology) against arguably less 
culpable persons or entities, including but not limited to contractors, 
subcontractors, suppliers, vendors, and customers of the Seller of the 
technology. Because the claims in the cause of action would be 
predicated on the performance or non-performance of the Seller's 
Qualified Anti-Terrorism Technology, those persons or entities, in 
turn, would file a third-party action against the Seller. In such 
situations, the claims against non-Sellers thus ``may result in loss to 
the Seller'' under Sec.  863(a)(2). The Department believes Congress 
did not intend through the Act to increase rather than decrease the 
amount of litigation arising out of or related to the deployment of 
Qualified Anti-Terrorism Technology. Rather, Congress balanced the need 
to provide recovery to plaintiffs against the need to

[[Page 33151]]

ensure adequate deployment of anti-terrorism technologies by creating a 
cause of action that provides a certain level of recovery against 
Sellers, while at the same time protecting others in the supply chain.

E. Relationship of the SAFETY Act to Indemnification Under Public Law 
85-804

    The Department recognizes that Congress intended that the SAFETY 
Act's liability protections would substantially reduce the need for the 
United States to provide indemnification under Public Law 85-804 to 
Sellers of anti-terrorism technologies. The liability protections of 
the SAFETY Act should, in many circumstances, make it unnecessary to 
provide indemnification to Sellers. The Department recognizes, however, 
that there are circumstances in which both SAFETY Act coverage and 
indemnification are warranted. See 148 Cong. Rec. E2080 (statement by 
Rep. Armey) (November 13, 2002) (stating that in some situations the 
SAFETY Act protections will ``complement other government risk-sharing 
measures that some contractors can use such as Pub. L. 85-804''). In 
recognition of this close relationship between the SAFETY Act and 
indemnification authority, in section 73 of Executive Order 13286 of 
February 28, 2003, the President amended the existing Executive Order 
on indemnification-Executive Order 10789 of November 14, 1958, as 
amended. The amendment granted the Department of Homeland Security 
authority to indemnify under Public Law 85-804. At the same time, it 
requires that all agencies--not just the Department of Homeland 
Security--follow certain procedures to ensure that the potential 
applicability of the SAFETY Act is considered before any 
indemnification is granted for an anti-terrorism technology. 
Specifically, the amendment provides that Federal agencies cannot 
provide indemnification ``with respect to any matter that has been, or 
could be, designated by the Secretary of Homeland Security as a 
qualified anti-terrorism technology'' unless the Secretary of Homeland 
Security has advised whether SAFETY Act coverage would be appropriate 
and the Director of the Office of Management and Budget has approved 
the exercise of indemnification authority. The amendment includes an 
exception for the Department of Defense where the Secretary of Defense 
has determined that indemnification is ``necessary for the timely and 
effective conduct of United States military or intelligence 
activities.''

II. Discussion of Changes and Comments

    The Department received 16 sets of comments to the interim rule 
during the comment period and has made substantive and stylistic 
changes in response to those comments. The Department considered all of 
the comments received and the Department's responses follow.

A. Confidentiality of Information

    Eight commenters expressed dissatisfaction with the Department's 
stated policy with regard to safeguarding proprietary information 
(including business confidential information) submitted as part of a 
SAFETY Act application. Some commenters desired the Department to 
declare that SAFETY Act application contents are ``voluntary 
submissions'' for purposes of determining whether the Critical 
Infrastructure Information Act applies. Commenters also noted that 
Exemption 4 of FOIA protects ``trade secrets or commercial or financial 
information from a person [that is] privileged or confidential.''
    The Department remains committed to the vigorous protection of 
applicants' submissions and confidential information. One applicant 
suggested that the Department ``adopt a general presumption of 
confidential treatment of all SAFETY Act applications, evaluations and 
studies of such applications, underlying decisional documentation, and 
application rejection notices.'' This has been the Department's 
intention, policy, and practice from the outset. DHS is committed to 
taking all appropriate steps to protect the proprietary information of 
applicants consistent with applicable FOIA exemptions and the Trade 
Secrets Act (18 U.S.C. 1905). As an example of this commitment, those 
engaged in evaluating applications are required to enter into 
appropriate nondisclosure agreements. In addition, prior to being 
granted access to any proprietary information associated with an 
application or its evaluation, each potential evaluator is examined for 
potential conflicts of interest. Finally, the Department's conflict of 
interest and confidentiality policies apply to everyone associated with 
SAFETY Act implementation.
    Underlying this commitment to protect an applicant's information 
are various Federal civil and criminal laws that potentially apply to 
unauthorized disclosure of SAFETY Act confidential materials, including 
the Trade Secrets Act and 18 U.S.C. Chapter 90 (Protection of Trade 
Secrets, especially section 1831--Economic Espionage, and section 
1832--Theft of Trade Secrets). These laws establish criminal penalties 
for disclosing proprietary data under various circumstances. There are 
also relevant state laws, including versions of the Uniform Trade 
Secrets Act adopted in the District of Columbia, the State of Maryland, 
the Commonwealth of Virginia, and 39 other states. In addition, 
sensitive homeland security information, including information 
regarding vulnerabilities of critical infrastructure can be entitled to 
certain statutory protections under sections 892(a)(1)(B), 892(b)(3), 
892(f) of the Homeland Security Act of 2002, Sensitive Security 
Information under 49 U.S.C. 40119, 49 CFR part 1520 and FOIA Exemption 
3 (among other FOIA exemptions).
    The Department also believes that all information that is submitted 
as part of an application, including the fact that a particular entity 
has submitted an application, is confidential commercial information 
under the tests established in National Parks & Conservation 
Association v. Morton, 498 F.2d 765 (D.C. Cir. 1974), and its progeny. 
In particular, much or all of this information qualifies as 
confidential under both the ``competitive harm'' prong of the test, and 
the ``third prong'' of government interest and program effectiveness.
    The Department will assert appropriate exemptions (including, as 
applicable, FOIA Exemptions 1 through 4) in declining to disclose under 
FOIA any information concerning the source of a SAFETY Act application 
or the contents of applications. This policy is now reflected in the 
rule at section 25.10 of this final rule. In addition, the Department 
will work with applicants to ensure that no proprietary information is 
published in connection with an announcement of a Block Designation 
(pursuant to Sec.  25.6(i) of this final rule), DHS's publication of 
the Approved Product List for Homeland Security (pursuant to Sec.  
25.8(k) of the final rule) or the voluntary publication by DHS of 
issued Designations. Moreover, the Government does not, at this time, 
intend to ``portion mark'' information contained in the application, or 
associated case file, to delineate between protected proprietary 
information (also referred to as ``SAFETY Act Confidential 
Information'') and other less sensitive data in the application. 
Instead the entirety of the application will be treated as confidential 
under appropriate law. It is the Department's

[[Page 33152]]

belief that requiring the reviewer to portion mark at the time of 
submission would greatly impact efficiency and applicants' confidence 
in the integrity of protections for proprietary information, and that 
such a practice does not reflect the requirements of applicable 
confidentiality protections.
    The Department has established internal security procedures for 
handling technical, business, and insurance information that is 
submitted in connection with a SAFETY Act application. Certain of the 
measures the Department has instituted to safeguard proprietary 
information are reflected in 6 CFR 25.10. All applications, whether 
paper or electronic, will be subject to stringent safeguards. In 
obtaining the input of subject matter experts and evaluators that 
analyze SAFETY Act applications, the Department will only seek input 
from individual experts or evaluators and will not consult any 
committee in the process of reviewing SAFETY Act applications. Finally, 
the Department recognizes that information submitted in SAFETY Act 
applications may constitute Protected Critical Infrastructure 
Information pursuant to sections 211-215 of the Homeland Security Act 
of 2002. The Department is in the process of revising its Protected 
Critical Infrastructure Information regulations and anticipates 
providing further information on this subject in the near future.

B. Application Preparation Burden

    Six commenters expressed concern that the amount and type of 
information required by the SAFETY Act Application Kit is extremely 
burdensome, if not prohibitively so, and that only large companies have 
the resources necessary to respond to each of the questions. Commenters 
also expressed the opinion that some of the information being 
requested-- particularly financial information--is not relevant to the 
evaluation of applications against the criteria of the Act.
    The Department recognizes that the SAFETY Act Application Kit 
utilized to date poses significant burdens for applicants. We are very 
sensitive to concerns about the application process and the difficulty 
of preparing and submitting a SAFETY Act application. The Department 
specifically solicited comments on the SAFETY Act Application Kit and 
application process set forth in the interim rule. In addition, the 
Department released for comment a revised SAFETY Act Application Kit in 
December 2004. Based on both the comments received concerning the 
SAFETY Act Application Kit as well as the experience of the Office of 
SAFETY Act Implementation (``OSAI'') with the applications filed to 
date, OSAI has published numerous Frequently Asked Questions on its Web 
site as well as undertaken a substantial revision of the SAFETY Act 
Application Kit. The Department plans to publish a revised SAFETY Act 
Application Kit, which will account for the changes contained in this 
final rule and which will state with greater specificity the 
information required to properly evaluate a SAFETY Act application. For 
example, the Department agrees that some of the financial information 
requested in the original SAFETY Act Application Kit is not essential 
to the evaluation of every application. The Department, therefore, will 
limit the amount of financial information requested as part of the 
initial submission and to supplement the information as needed 
throughout the evaluation process.
    The Department believes that the streamlining of the SAFETY Act 
Application Kit will result in further efficiencies and time 
reductions. We anticipate making a revised SAFETY Act Application Kit 
available as soon as practicable.

C. Certifying ``accuracy and completeness'

    Two commenters expressed the opinion that it is unreasonable to 
require applicants to certify the application as ``accurate and 
complete'' under penalty of perjury when some of the questions require 
the applicant to provide answers on a ``best guess'' basis. In 
particular, the answers to the questions related to threat estimates, 
potential casualties, and potential casualty reductions were cited as 
questions whose answers may be essentially unknowable.
    The Department agrees that it would be unreasonable to expect 
applicants to certify the accuracy of their speculative or predictive 
estimates of future events and risks. The language of the completeness 
certification is qualified, however, by the phrase ``to the best of my 
knowledge and belief.'' Since the applicant either knows or is able to 
obtain accurate factual information about the applicant's anti-
terrorism technology and business enterprise, the Department believes 
the application's completeness certification is appropriate as to 
factual information and the application will so state. Conversely, 
since estimates are by definition not factual information, the 
Department's position is that the completeness certification requires 
only that estimates be provided in good faith with a reasonable belief 
they are as accurate as possible at the time of submission. The 
Department will add this explanation as to estimates to the application 
form, and will consider all forms presented to date as incorporating 
this explanation.

D. Conditions on Designations

    Two commenters took exception to the inclusion of limitations on 
SAFETY Act Designations (as such term is defined in 6 CFR 25.2) or 
Certifications (as such term is defined in 6 CFR 25.2), suggesting that 
the liability protections presented by the SAFETY Act potentially could 
be bypassed through a claim that such limitations imposed by the 
Department as a condition of SAFETY Act Designation were not met.
    The Department is aware of this concern and understands that 
undependable or uncertain liability protections would not have the 
desired effect of fostering the deployment of anti-terrorism 
technologies. Further, the Department is aware of the difficulty of 
crafting language for limitations that is not subject to multiple 
interpretations. As a general matter, the Department does not intend to 
impose conditions on SAFETY Act Designations and Certifications. If a 
question arises regarding the functionality of a technology, generally 
the Department will address and resolve that question in the course of 
the application process.

E. Significant Modification to a Qualified Anti-Terrorism Technology

    Section 25.5(i) of the interim final rule has been the focus of 
significant attention, both by commenters and by members of Congress. 
That provision provided for automatic termination of SAFETY Act 
protection if a ``significant modification'' was made to a QATT, 
defined as a modification that could significantly reduce the 
technology's safety or effectiveness, unless the Seller notified the 
Under Secretary and received approval of the modification. Several 
commenters have argued that the rule improperly suggests that a SAFETY 
Act Designation or Certification could terminate without notice if a 
``significant modification'' is made to the QATT. Commenters have 
argued that, in hindsight, any routine, non-substantive or immaterial 
change in use, implementation, components, manufacturing process or 
other facet of a Technology might later be regarded as a ``significant 
modification.'' If such a change might be used later in litigation to 
invalidate SAFETY Act coverage retroactive to the time of the change, 
they argue, the value of a SAFETY Act Designation or Certification is 
minimal. The American Bar Association, Public

[[Page 33153]]

Contract Law Section commented, for instance, that: ``the regulations 
should be clear that the designation cannot be stripped away after the 
fact by a claimant alleging a significant change * * *'' ``Because the 
SAFETY Act covers all parties in the stream of commerce who rely on the 
designation and certification, it makes sense that their justifiable 
reliance not be undermined by retroactive effect back to the time of 
the change * * *'' Other commenters were even more direct: ``This 
requirement is misplaced in several respects and undermines the intent 
of the SAFETY Act to provide certainty and protection for those 
afforded coverage under the Act.'' ``[T]he language of this provision 
is so broad that some unanticipated future change in operation, 
maintenance or methodology by a downstream user of the technology, 
totally outside the control of the QATT Seller, might ultimately be 
construed to terminate the Seller's SAFETY Act coverage. This is 
particularly problematic for technologies involving technical 
services--almost every new application of these technologies will 
encounter unique circumstances and variations in operation, 
installation, implementation that, in retrospect, might be construed to 
be `significant.' '' Commenters indicated that section 25.5(i) was thus 
a ``grave concern,'' and that ``it is essential that this provision be 
altered.''
    The American Bar Association proposed regulatory language to 
address this issue, including the following: ``The termination of the 
Designation will apply prospectively and will only affect products or 
services deployed after the DHS notice of termination * * *'' In 
addition, commenters and certain members of Congress have raised 
concerns about the tension between the statutory provision in Sec.  
863(d) of the SAFETY Act and the text of the section 25.5(i) of the 
interim final rule. Section 863(d) of the SAFETY Act provides that a 
SAFETY Act Certification is entitled to a presumption that the 
Government Contractor Defense applies, and specifies that a 
Certification may only terminate for one reason:

    This presumption shall only be overcome by evidence showing that 
the Seller acted fraudulently or with willful misconduct in 
submitting information to the Secretary during the course of the 
Secretary's consideration of such technology under this subsection. 
Sec.  863(d)(1)

Thus, the argument goes, because the statute specifies one and only one 
means to terminate a certification, the regulations cannot add a second 
route to termination through the ``significant modification'' 
provision.
    The Department has carefully considered all of these comments and 
the legal arguments above. Section 25.5(i) of the interim final rule 
was intended to serve an important purpose--to provide the Department 
with knowledge of and the ability to address significant modifications 
that diminish the capability of a QATT. While the Department needs to 
preserve the intended function of this provision of the interim final 
rule, it agrees that changes to the provision are necessary to address 
the legal and policy concerns raised above.
    The final rule eliminates language from section 25.5(i) of the 
interim final rule that could suggest that a Designation or 
Certification could terminate automatically and retroactively to the 
time of change and without notice, and replaces such language with a 
portion of the suggested text from the ABA commentary, and with 
procedures similar to those recommended by other commenters. To be 
clear, modifications that do not cause the QATT to be outside the scope 
of the QATT's Designation or Certification will not adversely affect 
SAFETY Act coverage, nor are such modifications required to be notified 
to the Department. The final rule does not, however, eliminate the 
requirement that a Seller provide notice to the Department if the 
Seller intends to make, or has made, a modification that would cause 
the QATT to be outside the scope of a Designation or Certification.
    The Department recognizes that many modifications to components, 
processes, use, implementation or other aspects of a technology occur 
from time to time during the life of a technology, and that many 
modifications either will have no consequence for the functionality of 
the Technology or will improve it. While certain proposed significant 
modifications should require review, many routine or non-significant 
modifications will not. The Department needs a rapid system for 
prospectively reviewing significant modifications that could reduce the 
effectiveness of a QATT. Such a system must recognize that routine 
changes may occur to components or processes that do not reduce the 
safety or effectiveness of the Technology.
    This final rule modifies the procedure for Sellers to notify the 
Department of modifications or proposed modifications to a QATT and for 
the Department to respond quickly to such notifications with 
appropriate instructions for the Seller. Immaterial or routine 
modifications that are within the scope of the Designation will not 
require notice. It is important, however, and required, that the 
Department be informed of any significant modifications that the Seller 
makes or intends to make to a QATT. A significant modification is one 
that is outside the scope of a Designation. The Under Secretary will 
make the language of Designations and Certifications as precise as 
practicable under the circumstances to ensure that Sellers and other 
parties have fair notice of the scope of coverage, and in that regard 
the Department calls attention to the revisions in sections 25.6(e) and 
25.9(f) of the final rule.
    Whether notice to the Department is required for a change to a 
particular QATT will depend on the specific nature of the QATT and the 
terms of the Designation or Certification applicable to the QATT. If 
notice of a modification is required, review of the notice will also be 
undertaken in a reasonable time. If the Department does not take action 
in response to the notice, SAFETY Act coverage of the Technology as 
modified will be conclusively established. If the Department ultimately 
does not approve of the proposed changes, it will so notify the Seller 
and may discuss possible remedial action to address the Department's 
concerns or take other appropriate action in the discretion of the 
Under Secretary, as provided in section 25.6(l) of the final rule. In 
no event will a Designation terminate automatically or retroactively 
under this provision.
    It is also important to recognize that the ``significant 
modification'' provisions may require notice by the Seller to the 
Department only when the modifications are made to a QATT by the Seller 
or are made to a QATT with the Seller's knowledge and consent. The rule 
does not require that a Seller notify the Department of changes to a 
QATT made post-sale by an end-user of the QATT, and any such change by 
an end-user cannot result in loss of SAFETY Act protection for the 
Seller or others protected by the Seller's Designation or 
Certification.

F. Exclusive Responsibility for Government Contractor Defense, 
Definitions of Fraud and Willful Misconduct

    The Act is clear in allocating to the Secretary the exclusive 
responsibility for establishing the government contractor defense under 
section 861. The Act does not permit judicial review of the Secretary's 
exercise of discretion in this context. When the Secretary determines 
that a Certification is appropriate, that decision creates a

[[Page 33154]]

rebuttable presumption that the government contractor defense applies. 
This presumption may only be rebutted ``by clear and convincing 
evidence showing that the Seller acted fraudulently or with willful 
misconduct in submitting information to the Department during the 
course of the consideration of such Technology.'' See section 25.8(b).
    Two commenters expressed concern over the lack of a concrete 
standard of evidence for determining ``fraud'' or ``willful 
misconduct.'' One commenter specifically suggested adoption of the 
``clear and convincing evidence'' standard from common-law civil fraud 
jurisprudence.
    The Department agrees that the statutory presumption should only be 
overcome by evidence demonstrating an intentional effort to deceive the 
Department during the Certification process. This is the clear import 
of the statutory language and legislative history of the Act. Also, the 
traditional common law ``clear and convincing evidence'' standard is 
appropriate for evaluating a claim of fraud or willful misconduct in 
the SAFETY Act context.

G. Definition of ``Act of Terrorism''

    Two commenters expressed uncertainty concerning whether an act on 
foreign soil could be deemed an ``Act of Terrorism'' for purposes of 
the SAFETY Act. One commenter additionally requested clarification of 
the role of the Secretary in declaring whether a given event was or was 
not an ``Act of Terrorism'' for purposes of the SAFETY Act.
    The definition of the term ``Act of Terrorism'' set forth in the 
SAFETY Act provides that any act meeting the requirements specified in 
the Act, as such requirements ``are further defined and specified by 
the Secretary,'' may be deemed an ``Act of Terrorism.'' In the interim 
rule, the Department presented its view that the term ``Act of 
Terrorism'' potentially encompasses acts that occur outside the 
territory of the United States. The Department stated that the basis 
for that view is ``there is no geographic requirement in the 
definition; rather, an act that occurs anywhere may be covered if it 
causes harm to a person, property, or an entity in the United States.'' 
The Department confirms its prior interpretation. The statutory 
requirements for what may be deemed an ``Act of Terrorism'' address the 
legality of the act in question, the harm such act caused, and whether 
instrumentalities, weapons or other methods designed or intended ``to 
cause mass destruction, injury or other loss to citizens or 
institutions of the United States'' were employed. The statutory 
requirements are focused on the locus where harm was caused, the intent 
of the perpetrators and the victims of the particular act. See Sec.  
865(2)(B)(ii). The Department does not interpret the language of the 
Act to impose a geographical restriction for purposes of determining 
whether an act may be deemed an ``Act of Terrorism.'' In other words, 
the Act is concerned more with where effects of a terrorist act are 
felt rather than where on a map a particular act may be shown to have 
occurred. Accordingly, an act on foreign soil may indeed be deemed an 
``Act of Terrorism'' for purposes of the SAFETY Act provided that it 
causes harm in the United States. The Department interprets ``harm'' in 
this context to include harm to financial interests. It is certainly 
possible that terrorist acts occurring outside the United States could 
be intended to cause, and may result in, devastating financial harm in 
the United States.
    The focus of the ``Act of Terrorism'' definition on where harm is 
realized is appropriate in light of the possibility that an Act of 
Terrorism may be the result of a series of actions occurring in 
multiple locations or that the locus of the terrorist act may not be 
readily discernible. This is especially the case with respect to acts 
of cyber terrorism.

H. Retroactive Designation

    Five commenters found the distinction between ``sales'' and 
``deployments,'' as expressed in the interim rule, to be confusing. The 
commenters expressed concern that similar deployments of identical 
QATTs might not be similarly protected, depending on when the 
deployment was made. In particular, failing to extend SAFETY Act 
liability protections retroactively may incentivize Sellers to remove 
or nullify existing deployments, only to make identical new deployments 
at significant cost to the Seller and/or its customers.
    The Department believes these commenters may have misunderstood the 
language of the interim rule. As part of each Designation or 
Certification, the Department will specify the earliest date that 
deployments of the QATT will be accorded the protections of that 
Designation or Certification. The Seller supplies the information 
concerning the earliest date the technology was deployed.

I. Bias Toward Product-Based Anti-Terrorism Technologies

    Despite the assurances of the interim rule, particularly in the 
responses to comments on the Notice of Proposed Rulemaking, four 
commenters thought that the language of the interim rule and of the 
SAFETY Act Application Kit implicitly assumed that all anti-terrorism 
technologies would be product-based and not service-based or analysis-
based.
    To avoid any confusion on this issue, the definition of 
``Technology'' set forth in this final rule clearly and unequivocally 
states that a Technology for SAFETY Act purposes includes ``any 
product, equipment, service (including support services), device, or 
technology (including information technology) or any combination of the 
foregoing.'' In particular, design services, consulting services, 
engineering services, software development services, software 
integration services, program management and integration services, 
threat assessments, vulnerability studies, and other analyses relevant 
to homeland security may each be deemed a Technology under the SAFETY 
Act. Corresponding changes will be incorporated into the revised SAFETY 
Act Application Kit. Further, this concern is not manifest in the 
operating history of the Act. Multiple anti-terrorism services have 
received SAFETY Act Designation to date.

J. Scope of Insurance Coverage

    Several commenters suggested there is no reason for the insurance 
required to be purchased by Sellers pursuant to the Act to cover claims 
brought against the Seller's supply and distribution chains since a 
plaintiff's sole point of recovery with respect to claims implicating 
the SAFETY Act would be the Seller. Furthermore, commenters pointed out 
that insurance policies offering coverage for a Seller and the Seller's 
contractors, subcontractors, suppliers, vendors and customers are not 
currently available on the open market.
    The Department recognizes that an action for recovery of damages 
proximately caused by a QATT that arises out of an Act of Terrorism may 
only be properly brought against a Seller. Accordingly, the Department 
has specified, and will continue to specify in particular Designations, 
that the liability insurance required to be obtained by the Seller 
shall not be required to provide coverage for the Seller's contractors, 
subcontractors, suppliers, vendors or customers.

K. Interactions With Public Law 85-804

    Three commenters believed that the language in the interim rule 
concerning Public Law 85-804, and its relationship with the SAFETY Act, 
was unclear, especially in light of Executive Order 13286. In 
particular, the commenters

[[Page 33155]]

sought clarification with respect to the circumstances in which both 
SAFETY Act Designation and indemnification under Public Law 85-804 
might be available. One commenter suggested that DHS implement a 
mechanism for simultaneous SAFETY Act and Public Law 85-804 
consideration in association with a procurement.
    Commenters also expressed concern with the availability of Public 
Law 85-804 indemnification for technologies for which Sellers do not 
apply for (or receive) SAFETY Act Designation. They suggested that the 
phrase ``any matter that has been, or could be, designated by the 
Secretary of Homeland Security as a Qualified Anti-Terrorism 
Technology'' in Executive Order 13286 is a potential source of 
confusion and an obstacle to otherwise appropriate indemnification for 
Sellers who do not seek, and would not merit, Designation.
    Section 73(b) of Executive Order 13286 revises Executive Order 
10789 to state that no technology that has been, or could be Designated 
as a QATT, can be considered for indemnification under Public Law 85-
804 (except by the Department of Defense) until ``(i) the Secretary of 
Homeland Security has advised whether the use of the authority provided 
under [the SAFETY Act] would be appropriate, and (ii) the Director of 
the Office and Management and Budget has approved the exercise of 
authority under this order.''
    The Department is sympathetic to the notion that separate processes 
in multiple agencies for Public Law 85-804 and SAFETY Act review could 
consume inordinate time and expense. The Department is supporting 
interagency efforts to find a solution to speed and ease the burden of 
both processes.
    The Department acknowledges that some anti-terrorism technologies 
involve unusually hazardous risk, independent of an act of terrorism, 
and that indemnification under Public Law 85-804 might appropriately be 
made available under such circumstances. In those circumstances, both 
the SAFETY Act and Public Law 85-804 could be applicable to the same 
technology for different risks at the same time, and one process should 
not slow progress in the other. Executive Order 10789, as amended by 
section 73 of Executive Order 13286, allows for such a solution with 
the concurrence of the Director of the Office of Management and Budget.
    Where appropriate, the Department will entertain letter requests 
for a ``Notice of Inapplicability of SAFETY Act Designation,'' which 
would allow entities to obtain a statement from the Department 
regarding the inappropriateness of SAFETY Act Designation for a 
particular technology in a particular context, outside of the 
established SAFETY Act application process. In this process, the 
Department expects that submitters will include sufficient information 
within their letter request to allow for a determination of 
inapplicability to be made. The Department will, however, reserve the 
right either to request additional information of the type included in 
the SAFETY Act application if it determines that the request does not 
adequately describe the Seller's technology before a determination of 
applicability or inapplicability, as the case may be, can be made.

L. Prioritization of Evaluations

    Three commenters noted the importance of an appropriate process for 
expediting SAFETY Act applications associated with government 
procurements that are ready to proceed and where the need for immediate 
deployment is urgent and compelling. They also asked that the 
Department publish guidance describing how it plans to prioritize 
application reviews.
    The Department will expedite the review of SAFETY Act applications 
that it deems particularly urgent and that involve government 
procurements and will publish guidance on how SAFETY Act applications 
and the government procurement process may best be aligned (See 
``Coordination with Government Procurements'' below and section 25.6(g) 
of the rule).

M. Standards

    Three commenters expressed concern about standards and suggested 
proposed changes to the interim rule in this area. The gist of these 
suggestions was to ensure that proprietary standards are not treated 
inappropriately by the Department, and that the Department not 
needlessly develop new standards in competition with existing, widely-
accepted, proprietary standards. In addition, several commenters felt 
that adherence to certain existing standards, or to Federal 
certifications of various kinds, should be deemed conclusive evidence 
of compliance with certain SAFETY Act evaluation criteria.
    The Department reiterates that it intends to protect proprietary 
and other protected information to the maximum extent possible. No 
copyrighted or otherwise protected intellectual property will be 
distributed by the Department without the express permission of the 
owner, unless the Department's rights in that data have been acquired 
through some other manner. Where specific proprietary standards are 
relevant to the SAFETY Act evaluation process, the Department will 
advise applicants of the appropriate channels for obtaining copies of 
such standards.
    The Department has to date and will continue to work closely with 
standard-setting organizations that have sought SAF
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.