Turn to our security experts for a variety of lock, vulnerability, and security legal services. It’s important for us to understand the liability legal services that entail with us security solutions. Whether you need information about security patents or our lectures, we can happily assist you. For additional information about the general use of our services, please read the information down below to learn more.
GENERAL TERMS AND CONDITIONS FOR RELEASE OF CONFIDENTIAL INFORMATION AND REPORTS AND INFORMATION CONTAINED IN LSS+, DAME, AND HIGH-SECURITY SUPPLEMENT
WARNING:
Device Security Analyses Reports and LSS+ Government edition contain confidential information, and release is restricted. Reports will be available to registered users of this site, with access security clearances: Locksmith or Government, depending upon the classification of the report or information. All reports, text, and all graphics are copyrighted to Investigative Law Offices, and Security Laboratories. No part of any report may be distributed, duplicated, reproduced, retransmitted, or copied in any form, without the prior express written permission of the author. All United States and International rights are reserved by the author.
DESIGN DEFECTS DEFINITION
For the purpose of all reports issued by Investigative Law Offices and Security Laboratories, unless otherwise defined, the term DESIGN DEFECTS has the following meaning, and no other meaning is intended or is to be construed by the recipient of a report from any statements contained within a report, or video presentation supplied with a report.
“Design Defects” in the context of locks and safes, relates to any design of the container, lock, electronics, mechanics, or bolt actuation mechanism, which allows the bypass of active critical components that will ultimately allow control of the bolt actuating mechanisms to effect an opening. Such defects must allow for bypass in a rapid, simple, and non-destructive manner, using implements or tools of ordinary design, available to virtually anyone, at modest cost. The design defect must be one that could and should have been foreseen or discovered by competent design engineers at the time of development, manufacture, and sale of the product. The defect must be one that would or should be obvious to one skilled in the art of lock and safe design, and bypass. The design defect should be one that could be relatively easily discovered in a due diligence security examination of a product. Finally, in order to be deemed a mechanical design defect, the bypass of such product must be accomplished by one not skilled in the art, with minimal training in bypass of the specific product.
In summary, the criteria established by Investigative Law Offices and Security Laboratories, to denote a defective security product encompasses the following criteria:
Subscriber understands and agrees to the definition of “defective product” and ”defective design”, as used by Investigative Law Offices and Security Laboratories, to describe products which may be bypassed.
QUALIFICATIONS TO RECEIVE A REPORT OR TO PURCHASE LSS+ GOVERNMENT EDITION
TO RECEIVE A REPORT, YOU MUST BE AND CERTIFY THAT YOU ARE A PROFESSIONAL BONAFIDE LOCKSMITH, SWORN POLICE OFFICER, FULL-TIME MEMBER OF A LAW ENFORCEMENT AGENCY, FORENSIC LABORATORY, EMPLOYEE OR AGENT OF A GOVERNMENT INVESTIGATIVE OR INTELLIGENCE AGENCY, CONTRACT SECURITY CONSULTANT TO A LAW ENFORCEMENT AGENCY, PROFESSIONAL SECURITY OFFICER, WITH MANAGEMENT LEVEL RESPONSIBILITY AND A MEMBER OF ASIS OR EQUIVALENT ORGANIZATION, AS DETERMINED BY INVESTIGATIVE LAW OFFICES.
LIABILITY FOR BREACH OF CONDITIONS OF DISCLOSURE
Each subscriber, by downloading a copy of any report, graphics, video, or other information deemed confidential by Investigative Law Offices, and which requires a security access clearance for release, agrees to hold harmless Investigative Law Offices, Security Laboratories, and the author from any and all liability which may arise in connection with such distribution to subscriber, and agrees to indemnify Investigative Law Offices, Security Laboratories, and the author from the following acts resulting from the conduct of the subscriber, in the control, distribution, and use of the information received:
· improper or illegal use of the information contained in a report
· disclosure to individuals or other entities not authorized to receive such information, either by virtue of their need to know, or intended use of the information, or that they do not meet the registration requirements of this site, for the class of information obtained
· commission of a crime, while utilizing the information contained in this report
· providing said information so as to encourage others to commit a crime
· engaging in tortious conduct, constituting a civil wrong against an owner, manufacturer, or user of the product, or encouraging others to do so
VENUE OF PUBLICATION
Subscriber agrees that publication of this report occurred in Sioux Falls, South Dakota, United States, and that any action which may be brought by such subscriber, its’ employees or agents, as a result of such publication, shall be valued in Sioux Falls, South Dakota, and that the laws of the State of South Dakota shall be controlling, as well as case law and precedent of the South Dakota Supreme Court.
The material contained in reports was developed independently of the manufacturer and without their knowledge or permission. The report, and all information contained therein, is based upon the analyses of one or more separate devices, produced by the manufacturer.
The reader is cautioned that because of the limited evaluation samples available to Security Laboratories, it shall be up to the individual reader to reach any conclusions regarding the security of other similar products produced by a specific manufacturer. The author believes, based upon the products which have been analyzed in the preparation of any report, that such samples constitute a true and accurate representative sample of the product which is presently in service, and which may be expected to have similar mechanical characteristics.
All reports have been prepared for law enforcement and security professionals, charged with the responsibility of advising clients regarding security; for burglary investigators and forensic scientists, who have the responsibility to investigative losses; intelligence agencies, who require the expertise to be able to covertly bypass locks and safes; and legal counsel, who are charged with the responsibility of advising clients, especially hotels, of their potential liability in the event of a loss.
ACKNOWLEDGMENT OF TERMS AND CONDITIONS FOR RELEASE OF INFORMATION
You will be deemed to have acknowledged the terms and conditions of release of information in order to view any report in the SECURITY/REPORTS area of this site.