GENERAL TERMS AND CONDITIONS FOR RELEASE OF CONFIDENTIAL INFORMATION AND REPORTS

WARNING:

Device Security Analyses Reports contain confidential information, and release is restricted. Reports will be available to registered users of this site, with access security clearances Level II or III,  depending upon the classification of the report. All reports, text, and all graphics are copyrighted to Investigative Law Offices, and Security Laboratories. No part of any report may distributed, duplicated, reproduced, re-transmitted, or copied in any form, without the prior express written permission the author. All United States and International rights are reserved by the author.


DESIGN DEFECTS DEFINITION

For the purpose of all reports issued by Investigative Law Offices and Security Laboratories, unless otherwise defined, the term DESIGN DEFECTS has the following meaning, and no other meaning is intended, or is to be construed by the recipient of a report from any statements contained within a report, or video presentation supplied with a report.

"Design Defects" in the context of locks and safes, relates to any design of the container, lock, electronics, mechanics, or bolt actuation mechanism, which allows the bypass of active critical components that will ultimately allow control of the bolt actuating mechanisms to effect an opening. Such defects must allow for bypass in a rapid, simple, and non-destructive manner, using implements or tools of ordinary design, available to virtually anyone, at modest cost. The design defect must be one that could and should have been foreseen or discovered by competent design engineers at the time of development, manufacture, and sale of the product. The defect must be one that would or should be obvious to one skilled in the art of lock and safe design, and bypass. The design defect should be one that could be relatively easily discovered in a due diligence security examination of a product. Finally, in order to be deemed a mechanical design defect, the bypass of such product must be accomplished by one not skilled in the art, with minimal training in bypass of the specific product.

In summary, the criteria established by Investigative Law Offices and Security Laboratories, to denote a defective security product encompasses the following criteria:

· design which allows simple bypass of components, to effect an opening
· design which allows the use of extremely simple tools or implements, which may be constructed, or purchased
· design which does not require physical destruction of components, other than irrelevant or minor obstructions to access, such as plastic guards, curtains, or similar devices
· design which allows bypass within a short time after access to the security device
· design which requires virtually no skill on the part of the operative
· design which allows teaching of the bypass technique through text, graphics, or video, and which does not require hands-on experience with specific product, in order to successfully open a target lock or safe
· design defect which could or should have been foreseen or discovered by one skilled in the art of manufacture or bypass of locks and safes, and which was not discovered or identified by such skilled craftsman


Subscriber understands and agrees to the definition of "defective product" and"defective design", as used by Investigative Law Offices and Security Laboratories, to describe products which may be bypassed.


QUALIFICATIONS TO RECEIVE A REPORT

TO RECEIVE A REPORT, YOU MUST BE, AND CERTIFY THAT YOU ARE A PROFESSIONAL BONA FIDE LOCKSMITH, SWORN POLICE OFFICER, FULL TIME MEMBER OF A LAW ENFORCEMENT AGENCY, FORENSIC LABORATORY, EMPLOYEE OR AGENT OF A GOVERNMENT INVESTIGATIVE OR INTELLIGENCE AGENCY, CONTRACT SECURITY CONSULTANT TO A LAW ENFORCEMENT AGENCY, PROFESSIONAL SECURITY OFFICER, WITH MANAGEMENT LEVEL RESPONSIBILITY AND A MEMBER OF ASIS OR EQUIVALENT ORGANIZATION, AS DETERMINED BY INVESTIGATIVE LAW OFFICES. 


LIABILITY FOR BREACH OF CONDITIONS OF DISCLOSURE

Each subscriber, by downloading a copy of any report, graphics, video, or other information deemed confidential by Investigative Law Offices, and which requires a security access clearance for release, agrees to hold harmless Investigative Law Offices, Security Laboratories, and the author from any and all liability which may arise in connection with such distribution to subscriber, and agrees to indemnify Investigative Law Offices, Security Laboratories, and the author from the following acts resulting from the conduct of the subscriber, in the control, distribution, and use of the information received:

· improper or illegal use of the information contained in a report
· disclosure to individuals or other entities not authorized to receive such information, either by virtue of their need to know, or intended use of the information, or that they do not meet the registration requirements of this site, for the class of information obtained
· commission of a crime, while utilizing the information contained this report
· providing said information so as to encourage others to commit a crime
· engaging in tortious conduct, constituting a civil wrong against an owner, manufacturer, or user of the product, or encouraging others to do so


Recipients of any report may do the following with the information, text, and graphics contained therein:

Utilize the information for bypass of the particular lock or safe, when authorized to do so by the owner of such product, in conjunction with an official law enforcement or security investigation or training, in connection with an official government intelligence operation; pursuant to court order, or for training purposes conducted by an authorized recipient;

Disclose the contents of the report to co-workers, agents, and employees, who have a need-to-know, and who qualify to receive such a report, as defined by our terms;

Disclose the contents of the report to clients who have a direct or potential pecuniary interest in the security of the specific product, resulting from potential legal liability from its’ breach or failure;

Disclose the defect to manufacturers of locks and safes, who have the responsibility to insure that they do not manufacturer similar locks or safes with similar defects in design.


VENUE OF PUBLICATION

Subscriber agrees that publication of this report occurred in Sioux Falls, South Dakota, United States, and that any action which may be brought by such subscriber, its’ employees or agents, as a result of such publication, shall be venued in Sioux Falls, South Dakota, and that the laws of the State of South Dakota shall be controlling, as well as case law and precedent of the South Dakota Supreme Court.

The material contained in reports was developed independently of the manufacturer, and without their knowledge or permission. The report, and all information contained therein, is based upon the analyses of one or more separate devices, produced by the manufacturer.

The reader is cautioned that because of the limited evaluation sample, it shall be up to the individual reader to reach any conclusions regarding the security of other similar products produced by a specific manufacturer. The author believes, based upon the products which have been analyzed in preparation of the report, that such samples constitute a true and accurate representative sample of product which is presently in service, and which may be expected to have similar mechanical characteristics.

All reports have been prepared for law enforcement and security professionals, charged with the responsibility of advising clients regarding security; for burglary investigators and forensic scientists, who have the responsibility to investigative losses; intelligence agencies, who require the expertise to be able to covertly bypass locks and safes; and legal counsel, who are charged with the responsibility of advising clients, especially hotels, of their potential liability in the event of loss.


ACKNOWLEDGMENT OF TERMS AND CONDITIONS FOR RELEASE OF INFORMATION

You will be required to acknowledge the terms and conditions of release of information in order to view any report in the SECURITY/REPORTS area of this site.