We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Incident Data Sample Clauses

Incident Data. ‌ The incident data shall be retained for a minimum of twelve (12) months after the incident has been closed. When requested by Customer or CALNET CMO, the Contractor has up to ten
Incident Data. Freeway incident data are available from three sources in Washington State: the WSDOT IR teams, the Washington State Patrol (WSP), and the WSDOT Transportation Systems Management Center (TSMC). Data collected by the WSDOT IR teams are stored in the Washington Incident Tracking System (WITS). This data set contains only information pertaining to the incidents for which WSDOT IR teams were present. Washington State Patrol data are stored in its Computer Aided Dispatch (CAD) database. This database contains information on all incidents reported to and handled by the WSP. The TSMC maintains its own incident log file with incidents observed by traffic surveillance video cameras. When the researchers determined which set of incident data would best serve the purposes of this study, three pieces of information were considered critical: incident start time, end time, and location. While both the CAD database and the WITS database contain these data items, the WITS database is preferable because of its higher data quality. Although the CAD data set has more data items than the WITS data set, it frequently misses critical pieces of information such as the beginning and clear times. Furthermore, the CAD data set is more difficult to obtain, as it includes drivers’ private data. Incidents recorded in the 2009 WITS database were therefore used in this study. State Route ID, direction, and mile post jointly define an incident’s location. Notification time records the time when an incident was reported to the IR program. Since most incidents were reported through mobile phones nowadays, notification time should be very close to the start time of an incident in metropolitan areas. Arrival time stores the time when an IR truck arrived at the incident location. All lanes open time is the time when all lanes became open to traffic. Clear time is the time when the incident had been fully cleared and the IR teams left the incident scene. In this study, an incident’s duration was defined as the time when traffic is under the impact of the incident. In the 2009 WITS data, this is labeled as Clearance Time. This can also be easily checked by periodically calculating IID with the proposed approach. When IID stops growing, impacts from the incident have ended.

Related to Incident Data

  • STUDENT DATA Contractor acknowledges that student data is protected by both federal and state law. See Wis. Stat. § 118.125; 20 U.S.C. § 1232g(b); 34 C.F.R. § 99.1

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Internet Warnings If the Settling Entity offers for sale any of the Products to California consumers through websites such as xxxxxx.xxx that are not reformulated as set forth in subsection 2.2 above, it shall ensure that the required warning (with the language set forth in subsection 2.3 above) is prominently displayed to the purchaser prior to completion of the transaction without requiring the potential buyer to use considerable effort to be made aware of the health hazard advisory. The warning (or a clearly marked hyperlink to the warning using the word “WARNING”) given in conjunction with the online sale of the Products may appear either: (a) prominently placed on a webpage in which the Product’s photograph, price, or “add to cart” section are displayed; (b) on the same webpage as the order form for the Product; or (c) on any webpage displayed to the purchaser during the checkout process and prior to its completion for any purchaser with a California shipping address. The symbol “” may be placed adjacent to the signal word. The internet warning may use the Short-Form Warning content described in subsection 2.3(b). The URL "xxx.X00Xxxxxxxx.xx.xxx" in the Warning may be substituted with an equivalent reference to the official "Proposition 65 Warnings Website."

  • Internet Connection Certain Solutions may require an active and stable connection to the Internet in order to function. It is therefore your responsibility to ensure that you have at all times an active and stable Internet connection.

  • Third Party Websites The Service may contain or reference links to websites operated by third parties ("Third Party Websites"). These links are provided as a convenience only. Such Third Party Websites are not under our control. We are not responsible for the content of any Third Party Website or any link contained in a Third Party Website. We do not review, approve, monitor, endorse, warrant, or make any representations with respect to Third Party Websites, and the inclusion of any link in the Service, Debit Rewards Offers or any other services provided in connection with them is not and does not imply an affiliation, sponsorship, endorsement, approval, investigation, verification or monitoring by us of any information contained in any Third Party Website. In no event will we be responsible for the information contained in such Third Party Website or for your use of or inability to use such website. Access to any Third Party Website is at your own risk, and you acknowledge and understand that linked Third Party Websites may contain terms and privacy policies that are different from ours. We are not responsible for such provisions, and expressly disclaim any liability for them.

  • Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Student Data to Be Provided In order to perform the Services described in this Article and Exhibit “A”, LEA shall provide the categories of data described in the Schedule of Data, attached hereto as Exhibit “B”.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.