Mobile Data Terminal Traffic Sample Clauses

Mobile Data Terminal Traffic. On November 21, 2012, the Office of Inspector General initiated its ninth annual audit of the Department’s use of Mobile Data Terminals (MDT). The purpose was to examine the content of car-to-car message transmissions and ensure that user-generated messages do not violate Department policy, local and/or federal laws. The auditor reviewed the content of MDT data logs and user generated messages. There were 115 individual messages transmitted in the 305 days covered by this audit, with an average of one message every 2.65 days. This year the number of messages transmitted per day was 0.38; this was an increase of 40% from last year. Last year there were 0.27 messages per day, in 2010 there were 0.92 transmissions per day, and in 2009 there were 1.21 transmissions per day. During this audit period, 31 members transmitted car-to-car messages. None of the messages reviewed were found to contain inappropriate language, wording that constitutes a policy violation, or lengthy conversations unrelated to work. The MDSM, with the assistance of the ITU staff, is responsible for monitoring and archiving MDT transmissions. The ITU downloads MDT transmission reports monthly to the secure “MDT” shared drive, which can only be accessed by authorized personnel. The MDSM utilizes the “MDT” shared drive to review the monthly reports and takes appropriate action if necessary. On completion of the monthly review, the MDSM sends an email memorandum to the OIG documenting the date of review and findings. The ITU retains the reports on the “MDT” shared drive for a period of five years. The audit team noted that at the time this audit was initiated, there was a delay in the review of the monthly reports. However, all reviews were completed prior to the close of this audit. Officer Involved Shootings The Office of Inspector General hired an external audit consultant, Xxxx X. Xxxxxxxxxx Training, Inc., to complete an audit of the Department’s Officer Involved Shooting Investigations (OIS). The audit reviewed and analyzed 14 OIS incidents chosen by the Oakland Police department (OPD). The investigations occurred between 2010 and 2012 and included instances where suspects were killed, wounded or shot at and missed. In each of these cases, the Auditor was directed to examine the cases for compliance with Negotiated Settlement Agreement (NSA) Task #30, OPD policy, industry standards and best practices that might apply. The Auditor was also tasked with determining themes, patterns and beh...
AutoNDA by SimpleDocs
Mobile Data Terminal Traffic. 2. Refusal to Accept or Refer Citizen ComplaintsTask 6 3. Disclosure of Possible Investigator Bias – Task 12

Related to Mobile Data Terminal Traffic

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • User Data In addition to any disclosures authorized by Section 24, You and Your Authorised Users consent and agree that the RIM Group of Companies may access, preserve, and disclose Your or Your Authorised Users' data, including personal information, contents of your communication or information about the use of Your BlackBerry Solution functionality and the services or software and hardware utilized in conjunction with Your BlackBerry Solution where available to RIM ("User Data"), to third parties, including foreign or domestic government entities, without providing notice to You or Your Authorized Users under the laws of countries where the RIM Group of Companies and its service providers, other partners and affiliates are located in order to: (i) comply with legal process or enforceable governmental request, or as otherwise required by law; (ii) cooperate with third parties in investigating acts in violation of this Agreement; or (iii) cooperate with system administrators at Internet service providers, networks or computing facilities in order to enforce this Agreement. You warrant that You have obtained all consents necessary under applicable law from Your Authorised Users to disclose User Data to the RIM Group of Companies and for the RIM Group of Companies to collect, use, process, transmit, and/or disclose such User Data as described above.

  • Information Services Traffic 5.1 For purposes of this Section 5, Voice Information Services and Voice Information Services Traffic refer to switched voice traffic, delivered to information service providers who offer recorded voice announcement information or open vocal discussion programs to the general public. Voice Information Services Traffic does not include any form of Internet Traffic. Voice Information Services Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information services Traffic is not subject to Reciprocal Compensation as Local Traffic under the Interconnection Attachment.

  • Usage Data 7.1. The parties shall supply data on usage of the Licensed Work that is available to them during the term of this Licence. Notwithstanding the foregoing, the parties shall neither assemble nor provide data from which an individual user could be identified.

  • Transit Traffic The following rates will apply:

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Hosted Services We shall use commercially reasonable efforts to make the Hosted Services you have purchased available 24 hours a day, 7 days a week, except for: (a) planned downtime under our direct control (of which we shall give at least 8 hours notice via the Hosted Services and which we shall schedule to the extent practicable during the weekend hours from 6:00 p.m. Pacific time Friday to 3:00 a.m. Pacific time Monday), (b) to the extent we are notified by third party service providers of planned downtime (of which we shall provide such notice to you via the Hosted services as soon we can reasonably do so), or (c) any unavailability caused by circumstances beyond our reasonable control, including, without limitation, acts of God, acts of government, flood, fire, earthquakes, civil unrest, acts of terror, strikes or other labor problems, internet service or third party hosting provider failures or delays ("Force Majeure"). Hosted Services are provided in accordance with applicable laws and government regulations.

  • Voice Information Service Traffic 5.1 For purposes of this Section 5, (a) Voice Information Service means a service that provides [i] recorded voice announcement information or [ii] a vocal discussion program open to the public, and (b) Voice Information Service Traffic means intraLATA switched voice traffic, delivered to a Voice Information Service. Voice Information Service Traffic does not include any form of Internet Traffic. Voice Information Service Traffic also does not include 555 traffic or similar traffic with AIN service interfaces, which traffic shall be subject to separate arrangements between the Parties. Voice Information Service Traffic is not subject to Reciprocal Compensation charges under Section 7 of the Interconnection Attachment.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

Time is Money Join Law Insider Premium to draft better contracts faster.