EMPLOYER / OVERVIEW

Read CEO Pendland's Latest Whitepaper for Executives
EMPLOYER / overview / GLS258NAW4EU6COMZ3X9VDTQR7B5HKF1

01

02

03

04

Minimize Risk
Maximize Trust

Respond Properly
Protect Property

Employees Are Your
First Responders

Peace Through Strength
Invest in Your Own People

Instead of Systems That Make
Clients Feel Like Criminals

Universal Results From
Safe & Trusted Employees

Build Trust + Deter Crime
— At The Same Time

Armada | Atrisk

Employee Terminal

The all-in-one safety/security
training and service suite

Interface for employee
tools and services

"Employee Terminal is the gateway to turning every employee into a more confident, safe, trusted, and productive participant in your organization’s safety and security. With the all-in-one suite, employees are equipped with tools and knowledge to handle critical situations, creating a culture of readiness and responsiveness. This empowerment goes beyond traditional training, embedding a sense of duty and awareness into the everyday workplace."

Software Frontend
Human Backend

"Integrate seamlessly with any existing policies and procedures, enabling a painless transition with an immediate enhancement to security integrity and resilience. This integration extends the capabilities of your workforce, allowing them to access vital information and support without disrupting their workflow. It’s not just about having resources; it’s about making them accessible and effective within the environments your employees already navigate."

Your workforce is the
security system

"Make employees feel like special agents, with duty and honor; the Employee Terminal serves as the center for continuous exposure to safety and security, including the on-board library of Training Materials, Trend Reports, and more. Depending on their Clearance Level, employees have round-the-clock access to the tools and services; this in part ensures that your workforce not only knows the latest information but is also ready to respond with a plan instinctively."

LIDAR EMERGENCY PLANNING

Workplace LIDAR for planning
and preparedness training

Interactive 3D
safety mapping

"Transform your approach to emergency/incident preparedness. Utilizing LIDAR technology, your Dedicated Developer creates annotated and navigable 360° models of facilities, emphasizing critical safety features including emergency exits, fire extinguishers, first aid supplies, assembly points, etc. These maps are not only detailed but also interactive, allowing employees to explore their environment virtually to better understand their roles in emergency scenarios. This level of detail ensures that all employees are familiar with the location layout and safety protocols, enabling more efficient, effective, and organized responses to future workplace emergencies."

Recognize and respond
to every incident properly

"This revolutionizes how employees perceive their surroundings in critical situations. LIDAR scans are initially collected by any employee that works at the location, in under five minutes, collected data is then sent for modeling, annotation, and integration. This allows employees to visualize the escape routes and safety equipment locations from their desks, offices, workstations, etc. Atrisk LIDAR modeling gives employees an X-ray view of their location, for engaging and enjoyable visualization of their safest exit routes and their spatial relationship to the fire extinguishers, medical supplies, fire alarms, and more within their location."

Explore with AR, VR,
and holograms

"This technology provides a dynamic space for employees to engage and interact with their work environment in ways that are both educational and highly engaging. These models are also made to be AR, VR, and Hologram-ready, for an even more immersive planning experience. AR and VR versions of the models can be accessed and interacted with using a modern smartphone, or with specialized viewing devices. Whether displayed as augmented reality on a phone, experienced as a virtual reality simulation, projected as a hologram, or viewed on a desktop, laptop, tablet, or phone, these models offer an engaging way to train for and visualize responses."

HERO Platform

Emergency services, incident
reporting, live capture, etc.

Become a HERO,
use emergency services

"The HERO Platform is your emergency command center, offering employees the power to act swiftly and effectively during emergencies. From dialing emergency services to reporting incidents, this platform provides a unified interface that simplifies critical communication. Its intuitive design ensures that employees, regardless of their technical skill, can navigate and utilize features under pressure, making safety a collective and accessible responsibility."

Capture evidence
for investigations

"Improved response and documentation with Emergency Capture, allowing employees to livestream incidents directly to the cloud. This real-time cloud backup functionality is crucial during emergencies as it ensures footage is always being continuously uploaded, even if the recording device loses connection or is compromised. By safeguarding this real-time data, the platform provides a reliable "Digital Witness" that can be instrumental in investigations, capturing critical moments for security, legal, insurance. and other purposes."

Ultimate response
and recovery

"With the ability for every employee to automatically capture and upload incidents to the cloud, the HERO Platform acts as a vital tool for securing visual evidence. This capability is essential for accurately documenting incidents, identifying perpetrators, and providing undeniable proof for legal and insurance claims. It ensures that all recorded footage is preserved, providing a transparent and accountable record of events as they unfold."

Training Materials

Browse training documents,
recordings, versions,
etc.

Foundations for
self-assured employees

"Training Materials form the backbone of the security strategy, providing a robust library of resources designed to educate and inform. From detailed document guides to interactive simulations, these materials are crafted to ensure that every employee is well-versed in the latest safety protocols. The broad spectrum of formats, from audio to digital, ensures that learning is adaptable and accessible to all, regardless of their preferred learning style or technological proficiency."

Always know what to do,
before it happens to you

"Practical, flexible, and accessible information is central to all effective responses by employees, and Training Materials are developed with this in mind. Including Scenario Blueprints, featuring social engineering Transcript Simulations, these materials offer employees a first-person POV into navigating criminal encounters and various emergencies, including medical. This not only improves engagement, but also builds confidence, enabling employees to act decisively and appropriately when faced with real-life challenges."

Updates for
evolving threats

"As emerging threats evolve, so must our understanding of what they are and how to respond to them. This is, in part, why Advisors work to make sure that existing Training Materials are continually upgraded to reflect the latest safety and security trends. This commitment to current content helps employees stay informed about emerging threats and new compliance requirements, fostering an environment of ongoing vigilance and proactive adaptation."

Individual Briefings

Talk through your personal
questions and concerns

Personal consultation
for every employee

"Individual Briefings offer a unique opportunity for employees to engage in one-on-one, private, and safe conversations, tailored to address their concerns and questions. This direct, pseudo-personal interaction ensures that every employee feels heard and supported, fostering a deeper understanding of safety protocols and enhancing personal responsibility within the security framework."

Building confidence
through dialogue

"At the core of Individual Briefings is the promotion of open communication and questions. These sessions are designed to encourage honest dialogue, where employees can freely discuss their safety and security questions without fear of judgment. This approach not only clarifies individual roles in crisis situations but also builds the confidence necessary for employees to act decisively and effectively when needed."

Sustained training
and engagement

"Individual Briefings are more than just informational sessions, they are a cornerstone of the Atrisk framework of continuous development and engagement in workplace safety/security. By requesting these briefings, employees stay updated on the latest strategies and changes in the safety/security landscape, maintaining a high level of readiness and adaptability across the entire organization."

Asterion [Assistant]

Simplified AI assistant for
rudimentary questions

Security assistance
at your command

"Asterion [Assistant] is designed for simplicity and efficiency, offering employees immediate access to answers for their safety and security questions. This AI-driven assistant is always ready to provide detailed, easy-to-understand explanations on a wide array of topics, from questions about how to handle medical incidents to navigating potential security threats; Asterion is the always-available, go-to resource for quick, simplified information."

Accessible, actionable
understanding

"Asterion [Assistant] is fine-tuned to deliver responses that are not only accurate but also tailored to the user's understanding and context. This customization ensures that every interaction with Asterion is relevant, insightful, and actionable. By adapting to the user’s level of knowledge and specific queries, Asterion enhances learning and application of safety protocols for rudimentary questions."

Internal classroom
for shared learning

"Asterion [Assistant] is more than a query tool, it is an ideal entry-point for employees with only passing knowledge of safety and security. It fits easily into their daily operations, providing a seamless interface for these employees to interact with as part of their routine. This integration helps in building a technologically empowered workforce that leverages AI efficiency to maintain high safety standards, ensuring that best practices are just a question away."

Asterisk [Unfiltered]

Entirely unfiltered AI assistant for
high-risk scenario exploration

Unfiltered insights for
complex scenarios

"Asterisk [Unfiltered] offers a unique, unfiltered perspective on high-risk safety and security scenarios, providing employees, with the set required Clearance Level, detailed explorations of potential threats. Asterisk [Unfiltered] is designed to handle the most sensitive and complex inquiries with precision and depth, offering insights that go beyond conventional advice. Asterisk empowers employees to understand and prepare for the nuances of critical situations, allowing for an unfiltered approach to safety/security."

Deep analysis for
informed decisions

"With the capability to delve into intricate details of any scenario, Asterisk [Unfiltered] serves as a crucial tool for approved employees facing ambiguous or high-stakes situations. This assistant provides thorough analyses and scenario evaluations, enabling employees to make more informed decisions based on a comprehensive and unfiltered understanding of the advanced risks involved."

Platform for advanced
problem solving

"Asterisk [Unfiltered] is not only an assistant; it provides a unfiltered space for high-risk problem solving. By engaging with complex queries and providing detailed, uncensored responses, Asterisk challenges employees to think critically and strategize effectively. This level of interaction fosters a proactive mindset among cleared employees, equipping them with the knowledge and skills to handle threats with clear eyes."

Aiko [Companion]

Friendly AI companion for
anxiety and stress
relief

Your supportive
digital companion

"Aiko [Companion] offers a friendly and supportive AI companion, specifically designed to assist employees with managing stress and anxiety in the workplace. As a compassionate companion, Aiko offers comforting interactions and personalized support, helping employees navigate the emotional aspects of their job. This emotional support is crucial in maintaining a healthy, productive work environment where employees feel valued and understood."

Always there to
listen and assist

"Aiko [Companion] is always available to listen, providing a non-judgmental space for employees to express their feelings and concerns. This constant availability ensures that employees have a reliable outlet for their stress, anytime they need it. Aiko's interactions are designed to be empathetic and uplifting, fostering a sense of realistic safety and well-being among employees."

Improving productivity
and wellness

"By addressing the emotional and mental health needs of employees, Aiko [Companion] plays a vital role in enhancing overall workplace morale. Its presence helps reduce burnout and increase engagement by ensuring that employees feel supported both professionally and personally. Aiko’s comforting dialogue and stress-relief strategies contribute to a more harmonious and supportive work environment, promoting employee satisfaction and retention."

Trend Reports

Learn about current/emerging
crime trends, methods, etc.

Stay ahead with
insight and intelligence

"Trend Reports are essential within the Atrisk framework, providing detailed analyses of current and emerging crime trends and safety threats. These reports are crafted to help employees and management stay informed about the evolving security landscape. By understanding these trends, your workforce can preemptively adjust strategies and enhance their preparedness for potential threats, keeping one step ahead in safeguarding the organization."

Recognize and respond
to new crime trends

"Equipped with insights from Trend Reports, employees adopt a more proactive and informed approach to their daily security-related decisions. These documents analyze not only crime patterns but also anticipate shifts in methods and tactics used by potential threats. By staying informed about these changes, your team can develop more effective defenses and response protocols, ensuring that safety measures are not just reactive but also anticipatory."

Empowering decisions
with data

"Trend Reports serve as an important decision-making tool by providing data-driven insights that influence safety and security strategies across the served organization. This empowerment through knowledge fosters a culture of security that is dynamic and responsive. With Trend Reports, your team doesn’t just react to security challenges—they anticipate and prepare for them, ensuring workforce resilience and adaptability in fast-changing circumstances."

Scenario Blueprints

Prepare for important scenarios
with guides, simulations, etc.

Practical, passive,
precise preparation

"Scenario Blueprints provide a strategic and tactical edge by preparing employees for specific safety and security incidents with detailed, step-by-step guides. These blueprints are designed to simulate real-world situations, offering clear, actionable strategies for a wide range of scenarios. By practicing these guided simulations, employees not only understand what to do but also gain confidence in their ability to handle complex situations effectively."

Real-world
understanding

"The effectiveness of training often hinges on practical application. Scenario Blueprints bridge the gap between theoretical knowledge and practical skills through transcript-based simulations that mimic real-life interactions and emergencies. This learning tool allows employees to compare their own responses, for example a social engineering attempt, sharpening their instincts and improving their understanding and decision-making under pressure."

Continuous
scenario evolution

"As the threat landscape changes, so do the requirements for effective preparedness. Advisors check that Scenario Blueprints are regularly updated to incorporate new information and emerging risks, ensuring that employees are  always equipped with the most current and relevant strategies. This approach to scenario planning means that your workforce is not just prepared for today’s challenges but also understands and is adaptable to tomorrow’s uncertainties."

Compliance Postings

Material information required by
OSHA, DOJ, DOL, EEOC, etc.

Streamlined compliance,
enhanced awareness

"Compliance Postings serve as a constant reminder and guide for maintaining basic workplace safety standards and legal requirements. By providing clear, concise, and accessible postings on essential regulations from OSHA, DOJ, DOL, EEOC, and more, ensuring that employees and management have the required information about their duties and rights. These postings help foster a culture of compliance that protects the organization and empowers its workforce."

Accessible information,
empowered decisions

"Compliance Postings and developed to be more than just mandatory notices; they reinforce the Atrisk framework while also providing the required understanding and engagement with workplace laws and safety regulations. Available in various formats, including digital and print, these resources are tailored to meet the diverse needs of your workforce, ensuring that important information is both accessible and actionable."

Integration with
daily operations

"The strategic placement and integration of Compliance Postings within the workplace ensure that these important resources are more than just background noise. Making compliance part of the daily conversation it helps embed these standards into the everyday operations, promoting a continuous and proactive approach to workplace safety and the required legal adherence. This integration not only aids in compliance but also enhances the overall safety culture within the organization."

Website Monitors

Centralized web performance
metrics, reports, status,
etc.

Optimal performance,
uninterrupted service

"Website Monitors are integral to maintaining the high performance and continuous operation of your online presence. By providing metrics on web performance, including response times and uptime, these tools ensure that your digital operations remain efficient and accessible to both employees and customers. This seamless operation is crucial for sustaining user satisfaction and actual business operations, for example a 'contact us' or 'locations' page."

Analytics for digital
health management

"The features of Website Monitors allow employees to be aware of potential issues by informing them to fluctuations in performance and downtimes. Centralized analytics and reports lead to better informed and deployed fixes, minimizing disruptions and maintaining a stable online environment. With these tools, your team can address issues before they impact users, protecting the operational integrity of web services."

Downtime reports
for technical teams

"Website Monitors not only help your digital operations stay operational, but also provide valuable insights into their performance over time. These accessible insights are useful for strategic decision-making, allowing your organization to optimize web resources effectively. By understanding trends in web usage and performance, you can make informed decisions that protect user experience and lead to more informed digital operations."

Personal Analyses

Describe your circumstances
for analysis, guidance, etc.

Tailored guidance
for unique needs

"Personal Analyses provide individualized safety and security guidance, tailored to the circumstances and roles of each employee. By evaluating individual job descriptions, associated risks, and personal situations, Advisors deliver analyses that are not only insightful but also highly applicable. This approach ensures that every employee is equipped with knowledge and strategies to specific environments and responsibilities."

Informing personal
safety decisions

"The core of Personal Analyses is data-driven insight. With detailed examinations of potential workplace differences and personal risk factors, offering employees actionable advice and strategies for mitigating threats. This empowers individuals to make informed decisions about their safety, enhancing their confidence and ability to react effectively and properly in make-or-break scenarios."

Meaningful support
and follow-up

"Commitment to employee safety extends beyond the initial analysis. With options for follow-up briefings and ongoing consultations, employees receive continuous support in their safety journey. This iterative process not only helps in refining strategies over time but also ensures that employees remain informed and prepared as their functions or workplace environments change."

Incident Repository

Submit reports or explanations
to your Advisor for tracking

Consistent and unified
documentation

"The Incident Repository is a key component of the Atrisk infrastructure, designed to document and track all incidents. This centralized system ensures that every detail, from minor discrepancies to major emergencies, should be recorded and accessible for review. By creating consistent and thorough records, the repository aids in the immediate and accurate response to incidents, while also providing a database for future reference and analysis."

Respond to incidents
with historical data

"With the Incident Repository, your organization benefits from a historical archive of all submitted safety and security events. This accumulation of data allows for trend analysis and pattern recognition, enabling your security team to enhance response strategies based on past incidents. Understanding these patterns is essential for predicting and mitigating future incidents, and making employee responses to incidents even more proactive and informed."

Streamlined advisor
comms and reporting

"The Incident Repository also plays a vital role in improving communication between employees and their Atrisk Advisor. By providing Advisors with comprehensive incident reports and AIR Codes, they can offer more targeted advice and support. This feature ensures that each incident is not just a record but a learning opportunity, promoting continuous improvement in safety protocols and personal preparedness."

Existing Integration

Upload preexisting resources for
optimization
and integration

Seamless integration
with existing resources

"Existing Integration allows for the seamless incorporation of any preexisting safety and security materials into the framework and infrastructure. This process is designed to ensure that all available resources are optimized and aligned with current safety standards and strategies, enhancing their usability and effectiveness. By integrating existing resources, it also helps to maintain continuity and familiarity, reducing the learning curve for existing employees while also maintaining the integrity of the safety/security framework."

Improving effectiveness
through optimization

"During the integration process, the Advisor evaluates and optimizes any existing training materials to enhance their effectiveness and to integrate them into the ecosystem. The evaluation looks at the accuracy, usability, and relevance of the materials, ensuring they meet the rigorous standards required for impactful safety training and response. This meticulous approach not only preserves valuable existing investments but also ensures that they are adapted to meet current and future circumstances."

Distributed access and
continuous improvement

"Existing Integration provides organized and efficient access to all training materials through the Terminal, ensuring that employees have consistent and easy access to essential information. This organization aids in the smooth functioning of safety protocols and supports continuous improvement by allowing for updates and additions to the materials. This streamlined access and process facilitates a familiar yet dynamic environment that adapts to new challenges and opportunities for improvement."

Internal Advocacy Procurement Portal
Share
Subscribe
Start your review of Armada
Return Home
Search XB2A1
Thread Verification

ATRISK THREAD VERIFICATION

Thread XB2A1 (xb2a1-intref-urg-risk)
by Garrett Archambault (Advisor)

Thread:

xb2a1-intref-urg-risk

Identifier:

XB2A1

Source:

Internal (Employee)

Urgent:

True (8)

Callsign:

RISK (https://alarm.atrisk.us)

Advisor:

Garrett Archambault

Status:

ACTIVE

Compliance & Identifiers
ISNI
VS 0000 0005 1367 5143
Verified LEI
VS 2549002K5Q8WU...
Managing LOU
VS 5493001KJTIIGC8Y...
S&P Global ID
VS 671947
IDO200
VS 671947
SIC Code
VS 7382
Wikidata ID
VS Q124343310
OpenCorporates ID
VS 7481692
NASDAQ Reserved
Stock Symbol
VS ATSK
Business Registrar & Registry Identifier
VS RA000602 7481692
Regulatory Oversight Committee (ROC)
VS Good Standing
NAICS Code
VS 56162
Third-Party Documentation

Atrisk Corporation (Atrisk)[16][17] (/ˈætˈrɪsk/ 🔊 ) is an ultra-private[1][2] American security company
headquartered in Wilmington, Delaware,[4][5] and founded by Nicolas Pendland.[3][4] The company is
registered as a Delaware Corp,[8][9] the structure used by 66% of the Fortune 500[18] because of its
corporate secrecy and being considered a domestic corporate haven.[a][19] The company operates
within the United States, United Kingdom, Middle East, Eastern Europe, and is publicly known to
serve corporate and institutional clients,[20] focusing on at-risk, enterprise employers.[6][21] The
company started by offering "Compliance Postings," which involved legally redeveloping and
redesigning the federally-required notices of the United States Government[22][23] and other
regulatory agencies, including the Occupational Safety and Health Administration (OSHA),[24]
Department of Defense (DOD), Department of Justice (DOJ), Department of Labor (DOL),[25][26]
Equal Employment Opportunity Commission (EEOC),[27] among others. And most recently, "Atrisk
Payments," division of the company,[15] developed the cryptocurrency payment processor known as
AtriskPay,[28] which currently only supports Bitcoin (BTC)[29] and transacting with the company itself.

Training Materials, "Materials," within the context of ‎Employers & Institutions: Products & Motives,
serve as the safety/security framework of the company. These Materials are available in multiple
formats, including documents, audio files, and digital-use versions, and are designed to provide
instruction on safety/security matters. The purpose is to inform and educate employees within the
client organization, and their content attempts to encompass a spectrum of safety/security subjects.

The presentation of their information was designed to be "clear and accessible," intending for the
information to be easily understood by a diverse audience. A frequently noted characteristic of the
Materials is "adaptability," meaning they are designed to be relevant in numerous scenarios and in
reaction to changing "security circumstances." This could decrease the need for content retractions
or redistributions. Their topic variety attempts to address both general and specific safety/security
concerns, depending on the operational danger to the employer. Their distribution is facilitated
through the Platform and "situation-specific" partner content delivery networks (CDN).[6][30]

Individual Briefings, "Briefings," are one-on-one conversations between the Atrisk Advisor and an
employee. These meetings are scheduled and conducted via the Platform, and focus on providing
personal safety/security guidance. The text-based communication format is intended to encourage
an "honest dialogue," so employees may express any safety/security questions to their Advisor.

This structure is also intended to allow for "open communication," and thereby the employees are
encouraged to openly discuss their personal safety/security questions or concerns without "fear of
judgment or misunderstanding." As reported, Advisors conduct these Briefings with the focus being
"constructiveness" and based on each employee's circumstances and understanding. The Briefings
incorporate real-time, two-way communication, allowing employees to receive immediate responses
and answers to their questions or concerns. This interactive style is paired with Personal Analyses,
which could enhance the overall usefulness of the safety/security information provided.[6][30]

Scenario Blueprints, "Blueprints," are step-by-step instructional guides designed to assist
employees in handling various safety/security scenarios. They offer the framework to support
employees during realistic security incidents. The topic selection includes how to "recognize and
respond" properly to the forms of social engineering, including phishing attacks and impersonation,
in both digital and physical environments. Additionally, Blueprints provide strategies for identifying
medical emergencies and outline their best practices for managing these sensitive situations.

The scope of scenarios addressed within these Blueprints is intentionally broad, with the purpose of
preparing employees for critical situations they may encounter. A prominent feature is the inclusion
of "transcript simulations," which attempt to replicate or recreate real-life scenarios. The transcript
simulations demonstrate various social engineering techniques, including baiting, pretexting, and
quid pro quo. Through understanding the transcript simulations, employees should gain practical
knowledge about the tactics or methods used in the featured social engineering scenarios, which
thereby should improve their ability to "recognize and respond" properly. Seemingly especially for
these Blueprints, the ease of access and availability to employees is highly emphasized, they are
provided as a large percentage of Training Materials. However, even though their accessibility is
stressed, employers may still choose to suppress or restrict access via Access Controls.[6][30]

Trend Reports, "Reports," are documents that analyze "current and emerging" safety/security
trends that may impact operations. They include subjects such as changing FBI crime patterns,
potential political instability, and emerging crime trends and "methods," to anticipate unexpected
increases in incidents. An important part of Reports is their examination of "emerging" methods
and techniques, as there would especially be within the fields of social engineering and fraud.

Atrisk logo (converted from light-on-dark)

Atrisk headquarters at 300 Delaware Ave

Trade name

Atrisk
ISNI 0000000513675143

Company
type

Private
NASDAQ Reserved
LEI 2549002K5Q8WUKP21B56

Traded as

Nasdaq: ATSK (Reserved)
^IXIC component (Reserved)
COMP component (Reserved)
S&P Global 8058644

Industry

SIC 7382
Security | Defense | Intelligence |
Managed services | Information
technology

Founded

United States

Founder

Nicolas Pendland

Headquarters

300 Delaware Ave,
Wilmington, Delaware
19801, United States

Areas served

United States | United Kingdom |
Middle East | Eastern Europe

Key people

Nicolas Pendland (CEO)
Jackson Dorchester (CLO)
Lovette Dobson (ELC)

Products

NAICS 56162
Software | Consulting | Infrastructure |
Artificial intelligence | Cryptocurrency
payments

Revenue

US$ Unknown (2023)

Net income

US$ Unknown (2023)

Total assets

US$ Unknown (2023)

Divisions

Atrisk Employers
Atrisk Institutions
Atrisk Payments
Atrisk Fulfillment
Atrisk Intelligence
Atrisk Infrastructure

Website

atrisk.us
atrisk.co

Footnotes / references

[1][2][3][4][5]
[6][7][8][9][10]
[11][12][13][14][15]

Their purpose is to provide employers/employees with insights into any developing threats to aid them in implementing "pragmatic strategies" for
preparing for and preventing incidents that could compromise their "physical or financial security," while maintaining privacy and accessibility.[6][30]

Compliance Postings, "Postings," are documents that address regulatory requirements in the workplace. These include required or recommended
content from the previously mentioned U.S. Government regulatory bodies, including the Occupational Safety and Health Administration (OSHA),[32]
Department of Defense (DOD), Department of Justice (DOJ), Equal Employment Opportunity Commission (EEOC), and Department of Labor (DOL),[33]
[26] among others.[34] The distribution and display of the information, whether "Compliance Postings" or not, is legally required.

Atrisk is responsible for accurately redeveloping and recreating Postings, ensuring they meet legal recognition standards. The recreated Postings are
then categorized as "required materials" within the Training Materials browser, inside of the Platform, to provide employers/employees with "organized
and efficient" access to compliance resources, offering them in various formats, including print, digital, audio, and "digital-use," to improve their ease of
access and to accommodate different content consumption preferences. Postings operate by fulfilling regulatory obligations regarding required
information dissemination and reinforcing other services or teachings, such as Individual Briefings or Personal Analyses, by providing third-party,
standardized, and authoritative information on similar protocols. They are also included directly within the Training Materials on the Platform. Their
relevance is optimized by aligning them with specific needs, such as varying state requirements. Postings thus provide a "consistent and compliant"
approach for employers/employees to meet regulatory posting obligations while improving employee awareness of legally required or recommended
safety/security guidelines, workers' rights, and other necessary topics.[6][30]

Asterion, "Atrisk/OpenAI," is the simplified (compared to Asterisk Uncensored) AI assistant developed by Atrisk under OpenAI, tailored for employee use.
Its primary role is to offer "detailed and immediate" explanations for questions about a variety of safety/security topics. The Asterion knowledge base is a
blend of the Atrisk principles from Training Materials and the data provided by OpenAI, which allows it to cover a range of topics. These topics are known
to include, but are not limited to, medical emergencies, fraud prevention, phishing or impersonation, social engineering, customer-involved incidents, and
threats of harm. Asterion was trained (machine learning) to generate specialized transcript simulations and expand on specific safety/security questions.

The user interface was designed for simplicity and "ease of use," with an intent of allowing users to interact with Asterion without the need for "technical
experience" or any "prompt engineering knowledge." It should handle "many–most" safety/security questions and topics. Asterion was also seemingly
developed to support a high number of concurrent users as it does accommodate usage up to the total number of registered employees within the
organization, for use in various "applications or initiatives" that an employer could, possibly upon the guidance of the Advisor, implement.[6][30]

Existing Integration, "Integration," "Upload," involves the review, potential redesign, and technical incorporation of any "existing training resources" into
the Platform. At the beginning of the "Integration process," employers/employees upload any resources using the file-explorer interface. These uploads
can include a variety of file types, such as documents and audio formats, similar to Training Materials. The reported goal of Integration is to effectively
"utilize and enhance" any preexisting training resources that the employer may already possess.

The Integration process involves evaluation of the submitted files, this evaluation examines the accuracy of the actual information, the "usability" of the
resources, and their "compatibility" with the Atrisk safety/security framework. After this evaluation, there often will be the redesign phase, which focuses
on standardizing and optimizing the resources to increase effectiveness. The redesign phase also attempts to retain any original messaging identified in
the resources and ensuring they align with any requirements, and the before mentioned safety/security framework. After any optimizations are finished,
they are then finally integrated into the Platform, and their partner Content Delivery Networks (CDN). They are organized into corresponding Training
Material sections to maintain "continuity" and accessibility.[6][30]

Server Monitors, "Monitors," provide employers/employees with information regarding the web performance and status (uptime) of the domain (DNS) and
pages of their website. This monitoring focuses on web parameters such as response time, status metrics, and downtime reports, which are important for
maintaining an "optimal user experience." A primary function of the Monitors is the ability to check their website response times. This involves measuring
the speed at which a website responds to user requests, which is a major indicator of server efficiency and usability. Monitoring response times helps in
identifying potential performance issues early for quick fixes.

Another major component is performance and status metrics, which offers an overview of website availability and optimization, providing insights into the
"operational function" of the website and its pages. Additionally, they incorporate the monitoring and reporting of any/all website downtime, detailing the
error codes and durations of any periods when a website or individual page is unavailable. This information may be used by employers/employees to
identify and address any internal issues that may be impacting website performance.[6][30]

Personal Analyses, "Analyses," are risk-analysis reports that offer employees safety/security guidance based on their "personal circumstances." The
Analyses are developed based on each employee's personal circumstances, including their job description, associated risks, and individual situations.
The objective is to provide guidance that is relevant to the unique conditions of each employee. The process of creating an Analysis involves "detailed
examination" of the associated risks with an employee's position within their workplace, this includes assessing threats and/or hazards related to their
specific duties and responsibilities.

The risk-analysis report also offers certain guidance on mitigating these risks. Overall, their purpose is to prepare employees for both the current and
anticipated workplace risks. After receiving an Analysis, employees are "often" given an opportunity for a follow-up Individual Briefing with the Advisor,
which would allow the employee to ask questions directly, explain any personal factors, and further improve their understanding of the safety/security
information provided in their Analysis.[6][30]

Incident Tracking, "Incidents," provided by the Advisor, focuses on the documentation of safety/security incidents within the workplace via an "Incident
Repository" which includes incident reports, Atrisk Incident Reporting Codes (AIR Codes), and other reports from third-party or internal sources. The
tracking process begins when an incident is submitted by directly communicating with the Advisor. Any submitted reports should include detailed
information about the incident, including a title, description, the individuals involved, witnesses, and the specific location where it occurred.

After receiving this information, the Advisor enters the incident into the logging system and determines its own "AIR Code." This code is used to identify
the incident and should hasten communication between the employer, employees, and their Advisor. This service emphasizes "thorough documentation"
of each incident, as the information logged includes a name for the incident, a brief title summarizing the incident, the date and location, and its "AIR Code."
Additional recorded incident report details include information about the affected individuals, witnesses, and a detailed description. This "tracking system"
maintains the previously mentioned "incident repository," and offers a chronological record of any and all workplace incidents. This could aid in identifying
any patterns or recurring issues, and it also serves as a reference for Advisors in their consulting and analyses.[6][30]

Access Controls, "Controls," applied by the employer, are mechanisms designed to manage and regulate employee access to various sections of the
Platform. This feature enables employers/employees to allocate, restrict, or customize "Clearance Levels" for employees. Each section of the Platform
can be accessed via the corresponding "Clearance Level's" Personal Identification Number (PIN) and URL, depending on the settings of the employer.
This access control system allows employers/employees to set various levels of access depending on the roles and responsibilities of different groups.

For example, an internally well-known and simple PIN/password may be used for sections such as "Individual Briefings," to allow all employees to have
authorization, whereas more sensitive areas, like "Incident Tracking," could be limited to a higher Clearance Level only for authorized personnel, with an
obscure, complex PIN/password. Employers modify these Controls for the Platform, including the URLs, PINs, and Rules to access different sections. To
make changes, employers submit a "change request" to their Advisor, who oversees the implementation of the changes and ensures that they meet the
minimum requirements. This clearance-based access control attempts to ensure that employees only have authorization for appropriate sections.[6][30]

Atrisk Corporation (ATSK), the respective legal and trading names of Atrisk, headquartered at 300 Delaware Ave, may be identified by its International Standard Name Identifier (ISNI) of 0000 0005 1367 5143, its Legal Entity Identifier (LEI) of 2549002K5Q8WUKP21B56, its Managing LOU of 5493001KJTIIGC8Y1R12 (Bloomberg Finance), its S&P Global Company ID of 8058644, its Copyright Clearance Center IDO200 Ringgold ID of 671947, its OpenCorporates ID of us_de/7481692, its Global Legal Entity Identifier Foundation (GLEIF) XML Verification of 2549002K5Q8WUKP21B56, its Standard Industrial Classification (SIC) Code of 7382, its North American Industry Classification System (NAICS) Code of 56162, its Business Registry of RA000602 (DE-US), its Business Registry Identifier of 7481692, its Legal Form of Corporation (XTIQ), its Legal Industry of Security Systems Services, its Entity Status of Active, its Compliance Status of Good Standing, among other entity and attribute identifiers, either publicly listed on the 2024-2025 Compliance & Investor Factsheet or available via legal@atrisk.us

+1 855-ATRISK-1
© 2024 Atrisk Corporation. All rights reserved.
We're Hiring: https://career.atrisk.us

Hello. Are you an employee? https://alarm.atrisk.us
Atrisk Corporation (ATSK), the respective legal and trading names of Atrisk, headquartered at 300 Delaware Ave, may be identified by its International Standard Name Identifier (ISNI) of 0000 0005 1367 5143, its Legal Entity Identifier (LEI) of 2549002K5Q8WUKP21B56, its Managing LOU of 5493001KJTIIGC8Y1R12 (Bloomberg Finance), its S&P Global Company ID of 8058644, its Copyright Clearance Center IDO200 Ringgold ID of 671947, its OpenCorporates ID of us_de/7481692, its Global Legal Entity Identifier Foundation (GLEIF) XML Verification of 2549002K5Q8WUKP21B56, its Standard Industrial Classification (SIC) Code of 7382, its North American Industry Classification System (NAICS) Code of 56162, its Business Registry of RA000602 (DE-US), its Business Registry Identifier of 7481692, its Legal Form of Corporation (XTIQ), its Legal Industry of Security Systems Services, its Entity Status of Active, its Compliance Status of Good Standing, among other entity and attribute identifiers, either publicly listed on the 2024-2025 Compliance & Investor Factsheet or available via legal@atrisk.us

+1 855-ATRISK-1
© 2024 Atrisk Corporation. All rights reserved.
We're Hiring: https://career.atrisk.us

Hello. Are you an employee? https://alarm.atrisk.us