Incident Data Sample Clauses

Incident Data. ‌ The incident data shall be retained for a minimum of twelve (12) months after the incident has been closed. When requested by Customer or CALNET CMO, the Contractor has up to ten
AutoNDA by SimpleDocs
Incident Data. Freeway incident data are available from three sources in Washington State: the WSDOT IR teams, the Washington State Patrol (WSP), and the WSDOT Transportation Systems Management Center (TSMC). Data collected by the WSDOT IR teams are stored in the Washington Incident Tracking System (WITS). This data set contains only information pertaining to the incidents for which WSDOT IR teams were present. Washington State Patrol data are stored in its Computer Aided Dispatch (CAD) database. This database contains information on all incidents reported to and handled by the WSP. The TSMC maintains its own incident log file with incidents observed by traffic surveillance video cameras. When the researchers determined which set of incident data would best serve the purposes of this study, three pieces of information were considered critical: incident start time, end time, and location. While both the CAD database and the WITS database contain these data items, the WITS database is preferable because of its higher data quality. Although the CAD data set has more data items than the WITS data set, it frequently misses critical pieces of information such as the beginning and clear times. Furthermore, the CAD data set is more difficult to obtain, as it includes drivers’ private data. Incidents recorded in the 2009 WITS database were therefore used in this study. State Route ID, direction, and mile post jointly define an incident’s location. Notification time records the time when an incident was reported to the IR program. Since most incidents were reported through mobile phones nowadays, notification time should be very close to the start time of an incident in metropolitan areas. Arrival time stores the time when an IR truck arrived at the incident location. All lanes open time is the time when all lanes became open to traffic. Clear time is the time when the incident had been fully cleared and the IR teams left the incident scene. In this study, an incident’s duration was defined as the time when traffic is under the impact of the incident. In the 2009 WITS data, this is labeled as Clearance Time. This can also be easily checked by periodically calculating IID with the proposed approach. When IID stops growing, impacts from the incident have ended.

Related to Incident Data

  • STUDENT DATA Contractor acknowledges that student data is protected by both federal and state law. See Wis. Stat. § 118.125; 20 U.S.C. § 1232g(b); 34 C.F.R. § 99.1

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Internet Warnings If the Settling Entity offers for sale any of the Products to California consumers through websites such as xxxxxx.xxx that are not reformulated as set forth in subsection 2.2 above, it shall ensure that the required warning (with the language set forth in subsection 2.3 above) is prominently displayed to the purchaser prior to completion of the transaction without requiring the potential buyer to use considerable effort to be made aware of the health hazard advisory. The warning (or a clearly marked hyperlink to the warning using the word “WARNING”) given in conjunction with the online sale of the Products may appear either: (a) prominently placed on a webpage in which the Product’s photograph, price, or “add to cart” section are displayed; (b) on the same webpage as the order form for the Product; or (c) on any webpage displayed to the purchaser during the checkout process and prior to its completion for any purchaser with a California shipping address. The symbol “” may be placed adjacent to the signal word. The internet warning may use the Short-Form Warning content described in subsection 2.3(b). The URL "xxx.X00Xxxxxxxx.xx.xxx" in the Warning may be substituted with an equivalent reference to the official "Proposition 65 Warnings Website."

  • Services and Third Party Materials A. The tvOS Software may enable access to Apple’s iTunes Store, App Store, Game Center, iCloud and other Apple and third party services, and web sites (collectively and individually, “Services”). Such Services may not be available in all languages or in all countries. Use of these Services requires Internet access and use of certain Services may require an Apple ID, may require you to accept additional terms and may be subject to additional fees. By using this software in connection with an Apple ID, or other Apple Service, you agree to the applicable terms of service for that Service, such as the latest iTunes Store Terms and Conditions, which you may access and review at xxxx://xxx.xxxxx.xxx/legal/itunes/ ww/.

  • Internet Connection In order to ensure the proper functioning of the Production Monitor and the Consumption Monitor, if possible, you must provide the Solar System with continuous access to a functioning broadband internet connection with one (1) wired Ethernet port and standard electrical outlet, at your cost. If you are unable to provide the Solar System with an internet connection in accordance with the foregoing sentence, the Home must be located in an area with cellular service that is acceptable to us in our discretion.

  • Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Student Data to Be Provided In order to perform the Services described in this Article and Exhibit “A”, LEA shall provide the categories of data described in the Schedule of Data, attached hereto as Exhibit “B”.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

Time is Money Join Law Insider Premium to draft better contracts faster.