Emergency Incident Sample Clauses

Emergency Incident. “Code Red” Response Performance StandardThe Contractor shall respond to ninety percent (90%) of all “Code Red” requests within 9 minutes, 59 seconds. The maximum response time is 14 minutes, 59 seconds on any “Code Red” request. All “Code Red” responses shall be made with lights and sirens in operation.
AutoNDA by SimpleDocs
Emergency Incident. Driving Contractor shall follow the driving regulations listed in the SIIBM (PMS 902). The SIIBM can be found on the Northern Rockies Coordinating Group's website using the following link: xxxxx://xxxx.xxxx.xxx/nrcc/nrcg/committees/business_committee.htm The Contractor is responsible for complying with all other current federal, state, and local driving regulations and must adhere to ICP or camp speed limits as posted.
Emergency Incident. Incident that causes failure of DC-Net data, voice, and/or Wireless LAN service at one or more priority sites.
Emergency Incident. This term is used to describe any natural or manmade occurrence that results in extraordinary levels of mass casualties, property damage, or disruption that severely affects the population, infrastructure, environment, economy, and/or government functions. This term requires that the incident is of a big enough scale that emergency management operations be coordinated via regional intra-county and regional inter- county entities and agreements.
Emergency Incident. Report Shows all emergency incidents and related emergency calls/events within a time period. Report Description Events Report Shows all events within a time period. Group Airtime Usage Summary Report Provides statistics for selected groups across regions and sites. Summary information is also available in graphical format. Message Trunking Call Events Report Shows all message trunking events within a time period. Single User Agency Report Provides statistics for all users with one agency for a selected time period. System Channel Uptime Report Provides statistics for channel uptime (time a channel was fully functional and capable of passing calls), actual airtime usage, and outage percent. System Channel Usage Report Provides the channel statistics for selected regions and sites for a selected time period. The report provides statistics for each channel at a site. Its information is also available in graphical format. System Customized Report Provides statistics for selected regions and sites. The user can choose different call category combinations to generate custom results. System Profiled Statistics Report Shows system usage on an hourly basis. The report provides an hourly overview of the number of units using a site and the percentage of use of certain call types. System Usage Report Illustrates system usage statistics for a specified region. System Usage by Hour Report Displays airtime, average call duration, and call count for each site on a per-hour basis. System Utilization Report Illustrates the summarized call statistics and unit log-on statistics for a region over a selected time period. The report provides the granted and total call results. System Utilization Detail Report Illustrates the summarized statistics for the system over a selected time period. The report provides data in a table format relative to the type of calls sent over a specific site during a specified time period. The report information is also available in graphical format. User Agency Site Summary Report Provides the summarized statistics for one user agency across a region or selected sites for a selected time period. The report information is also available in graphical format. User Agency Summary Provides the summarized statistics for all user agencies across a region or selected sites for a selected time period. The summary information is also available in graphical format. User Airtime Summary Illustrates the statistics for selected units across a region or selected...

Related to Emergency Incident

  • Data Incidents If Apple becomes aware that Personal Data has been altered, deleted, or lost as a result of any unauthorized access to the Service (a “Data Incident”), Apple will notify Institution without undue delay if required by law, and Apple will take reasonable steps to minimize harm and secure the data. Notification of, or response to, a Data Incident by Apple will not be construed as an acknowledgment by Apple of any responsibility or liability with respect to a Data Incident. Institution is responsible for complying with applicable incident notification laws and fulfilling any third-party obligations related to Data Incident(s). Apple will not access the contents of Personal Data in order to identify information subject to any specific legal requirements.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Accident and Incident Investigations An accident, injury, critical injury, or hazardous situation will be investigated in accordance with the CJHSC’s investigation protocol.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!