First Responder Laptop Security Program
When First Responders are working, the availability of sensitive data in the field is often a matter of life and death.
Providing a secure system to protect sensitive data while making it readily usable in the field is a national priority. To
assist First Responders with the deployment of the latest and most reliable technologies to protect Laptop computers
in the field, WideBand Corporation has partnered with GoldKey Security Corporation and the International Academy of
Science to develop a comprehensive field security program.
The First Responder Laptop Security Program utilizes GoldKey Security and AES strong encryption to provide a
robust system to protect computers deployed in the field. The program objective is to provide a security solution that
adequately secures data while allowing convenient access to authorized personnel. The program consists of the
following steps and components:
Step 1 -- Design of Custom Security System, Programming of Masters, and Plan of Deployment
The first step in the program is to design a custom security system for the organization. While the program is primarily
focused on the deployment of mobile laptop computers, it can also be expanded to cover other computer systems
deployed by the First Responder organization. To accomplish this step, a security expert makes an on-site visit of the
First Responder location. During the visit, the unique security needs and requirements of the organization are
assessed through interviews with key personnel. Working closely with the organization, a security system is designed
and programmed including the GrandMaster, Departmental Masters, and security tokens for users in the field.
Security user groups are created as necessary and programmed into the system. Finally, a plan of deployment is
created tailored to fit the needs of the specific organization.
Step 2 -- Organizational Training at the Administrative and User Levels
An online training program is set up to provide technical training to administrators, and other personnel that will be
involved in the deployment of the security program. The training will be delivered via computer, based on the Acellus
Learning Program of the International Academy of Science. It will efficiently familiarize administrative personnel of the
steps and techniques required to maintain and operate the advanced security system. It will also provide First
Responder training regarding the use of the security system while in the field.
Step 3 -- Technical Support of Deployment and Operation of the Advanced Security System
Finally, the program provides telephone and email technical support to help overcome problems and to keep the
system operating at peak levels for a period of one year. Additional on-site support is also available if necessary for an
additional support fee.