InvestorsHub Logo
Followers 13
Posts 647
Boards Moderated 0
Alias Born 03/28/2017

Re: None

Friday, 04/12/2019 3:18:25 PM

Friday, April 12, 2019 3:18:25 PM

Post# of 183214
Blast from the past... Viking Telcom slated to be added onto GSA pending approvals and certifications. This is from the 2015 10k.......

Please note the number of countries and potential market size....

Work performed under Viking Telecom, is governed by the Occupational Safety and Health Administration (OSHA). OSHA is a federal organization (part of the Department of Labor) that ensures safe and healthy working conditions for Americans by enforcing standards and providing workplace safety training.

Created in response to the Occupational Safety and Health Act of 1970, OSHA's main goal is to protect the rights and safety of workers by preventing workplace injuries and deaths and holding employers accountable for safe workplaces. OSHA provides workers and employers with information about hazardous working conditions and they offer free assessment for workplace dangers.

There is a strict set of federal safety standards to which all businesses must adhere. These regulations cover things like disposal of hazardous materials, required personal safety equipment such as safety goggles, permitted noise levels and fall protection. OSHA inspects workplaces to ensure they're following all regulations to reduce chances of accident or injury.

Encryption Software is classified as a "dual-use good," meaning that it can be used by both the general public and the military. Export of such goods is regulated by The Wassenaar Arrangement on Export Controls for Conventional Arms and Dual-Use Goods and Technologies (the "Wassenaar Arrangement").

The Wassenaar Arrangement was established in order to contribute to regional and international security and stability by promoting transparency and greater responsibility in transfers of conventional arms and dual-use goods and technologies, thus preventing destabilizing accumulations. Participating States seek, through their national policies, to ensure that transfers of these items do not contribute to the development or enhancement of military capabilities, which undermine these goals, and are not diverted to support such capabilities.

The Participating States of the Wassenaar Arrangement include: Argentina, Australia, Austria, Belgium, Bulgaria, Canada, Croatia, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Japan, Latvia, Lithuania, Luxembourg, Malta, Netherlands, New Zealand, Norway, Poland, Portugal, Republic of Korea, Romania, Russian Federation, Slovakia, Slovenia, South Africa, Spain, Sweden, Switzerland, Turkey, Ukraine, United Kingdom and United States.

In the United States, the Bureau of Industry and Security ("BIS") is responsible for implementing and enforcing the Export Administration Regulations ("EAR"), which regulate the export and re-export of most commercial items. Encryption software is subject to the EAR and other U.S. law, and may not be exported or re-exported to certain countries (currently Cuba, Iran, North Korea, Sudan and Syria) or to persons or entities prohibited from receiving U.S. exports. Because of this, the Company has applied and has received approval for Mass Market Status Export Authorization from the BIS. Mass Market Status is given to encryption products, which have been reviewed and classified by the BIS as exportable under certain rules and regulations, including the mass-market encryption rules of the EAR.

The procurement and use of commercially available security solutions by government, and military agencies is controlled through various regulations. In order to provide or sell a service or product to a government or military agency, a vendor or provider must be approved by and listed with the U.S. General Services Administration (GSA). Additionally, military applications also require that products be certified by the National Security Agency. The Company is pursuing such certifications and accreditations. The Company is also working with Steptoe & Johnson to determine other regulatory requirements for Ecrypt One, its enterprise-level information security soft-appliance.