Incident Data Sample Clauses

Incident Data. ‌ The incident data shall be retained for a minimum of twelve (12) months after the incident has been closed. When requested by Customer or CALNET CMO, the Contractor has up to ten
AutoNDA by SimpleDocs
Incident Data. Freeway incident data are available from three sources in Washington State: the WSDOT IR teams, the Washington State Patrol (WSP), and the WSDOT Transportation Systems Management Center (TSMC). Data collected by the WSDOT IR teams are stored in the Washington Incident Tracking System (WITS). This data set contains only information pertaining to the incidents for which WSDOT IR teams were present. Washington State Patrol data are stored in its Computer Aided Dispatch (CAD) database. This database contains information on all incidents reported to and handled by the WSP. The TSMC maintains its own incident log file with incidents observed by traffic surveillance video cameras. When the researchers determined which set of incident data would best serve the purposes of this study, three pieces of information were considered critical: incident start time, end time, and location. While both the CAD database and the WITS database contain these data items, the WITS database is preferable because of its higher data quality. Although the CAD data set has more data items than the WITS data set, it frequently misses critical pieces of information such as the beginning and clear times. Furthermore, the CAD data set is more difficult to obtain, as it includes drivers’ private data. Incidents recorded in the 2009 WITS database were therefore used in this study. State Route ID, direction, and mile post jointly define an incident’s location. Notification time records the time when an incident was reported to the IR program. Since most incidents were reported through mobile phones nowadays, notification time should be very close to the start time of an incident in metropolitan areas. Arrival time stores the time when an IR truck arrived at the incident location. All lanes open time is the time when all lanes became open to traffic. Clear time is the time when the incident had been fully cleared and the IR teams left the incident scene. In this study, an incident’s duration was defined as the time when traffic is under the impact of the incident. In the 2009 WITS data, this is labeled as Clearance Time. This can also be easily checked by periodically calculating IID with the proposed approach. When IID stops growing, impacts from the incident have ended.

Related to Incident Data

  • STUDENT DATA Contractor acknowledges that student data is protected by both federal and state law. See Wis. Stat. § 118.125; 20 U.S.C. § 1232g(b); 34 C.F.R. § 99.1

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Internet Warnings If the Settling Entity offers for sale any of the Products to California consumers through websites such as xxxxxx.xxx that are not reformulated as set forth in subsection 2.2 above, it shall ensure that the required warning (with the language set forth in subsection 2.3 above) is prominently displayed to the purchaser prior to completion of the transaction without requiring the potential buyer to use considerable effort to be made aware of the health hazard advisory. The warning (or a clearly marked hyperlink to the warning using the word “WARNING”) given in conjunction with the online sale of the Products may appear either: (a) prominently placed on a webpage in which the Product’s photograph, price, or “add to cart” section are displayed; (b) on the same webpage as the order form for the Product; or (c) on any webpage displayed to the purchaser during the checkout process and prior to its completion for any purchaser with a California shipping address. The symbol “” may be placed adjacent to the signal word. The internet warning may use the Short-Form Warning content described in subsection 2.3(b). The URL "xxx.X00Xxxxxxxx.xx.xxx" in the Warning may be substituted with an equivalent reference to the official "Proposition 65 Warnings Website."

  • Services and Third Party Materials A. The tvOS Software may enable access to Apple’s iTunes Store, App Store, Game Center, iCloud and other Apple and third party services, and web sites (collectively and individually, “Services”). Such Services may not be available in all languages or in all countries. Use of these Services requires Internet access and use of certain Services may require an Apple ID, may require you to accept additional terms and may be subject to additional fees. By using this software in connection with an Apple ID, or other Apple Service, you agree to the applicable terms of service for that Service, such as the latest iTunes Store Terms and Conditions, which you may access and review at xxxx://xxx.xxxxx.xxx/legal/itunes/ ww/.

  • Internet Connection In order to ensure the proper functioning of the Production Monitor and the Consumption Monitor, if possible, you must provide the Solar System with continuous access to a functioning broadband internet connection with one (1) wired Ethernet port and standard electrical outlet, at your cost. If you are unable to provide the Solar System with an internet connection in accordance with the foregoing sentence, the Home must be located in an area with cellular service that is acceptable to us in our discretion.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • Third Party Websites The Service may contain or reference links to websites operated by third parties ("Third Party Websites"). These links are provided as a convenience only. Such Third Party Websites are not under our control. We are not responsible for the content of any Third Party Website or any link contained in a Third Party Website. We do not review, approve, monitor, endorse, warrant, or make any representations with respect to Third Party Websites, and the inclusion of any link in the Service, Debit Rewards Offers or any other services provided in connection with them is not and does not imply an affiliation, sponsorship, endorsement, approval, investigation, verification or monitoring by us of any information contained in any Third Party Website. In no event will we be responsible for the information contained in such Third Party Website or for your use of or inability to use such website. Access to any Third Party Website is at your own risk, and you acknowledge and understand that linked Third Party Websites may contain terms and privacy policies that are different from ours. We are not responsible for such provisions, and expressly disclaim any liability for them.

  • Internet Traffic Any traffic that is transmitted to or returned from the Internet at any point during the duration of the transmission.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!