INTERFACE TO DB2 MISSING PERSONS CASE MANAGEMENT Sample Clauses

INTERFACE TO DB2 MISSING PERSONS CASE MANAGEMENT. SYSTEM The interface between the DB2 Missing Persons Case Management System and the Missing Persons System will provide for (1) the transfer of descriptor data associated with missing persons, unidentified persons, and body-parts from the DB2 Missing Persons Case Management System to the Missing Persons System; (2) the transfer of Photo IDs from the Missing Persons System to the DB2 Missing Persons Case Management System, and (3) the transfer of case resolution information from the DB2 Missing Persons Case Management System to the Missing Persons System. The DB2 Missing Persons Case Management System will send the following transactions to the Missing Persons System. - Missing Person File Maintenance Transaction - Unidentified Person File Maintenance Transaction - Body-parts File Maintenance Transaction - Solved Case File Maintenance Transaction The Missing Persons System will send the following transactions to the DB2 Missing Persons Case Management System. - Link-Photo-IDs-to-Case Transaction The Department is responsible for modifying the DB2 Missing Persons Case Management system to send/receive these transactions. The transaction protocol and transaction format/content will be defined in the Interface Control Document (ICD) which will be jointly developed by the Buyer and the Seller.
AutoNDA by SimpleDocs

Related to INTERFACE TO DB2 MISSING PERSONS CASE MANAGEMENT

  • Case Management Prompt resolution of any dispute is important to both parties; and the parties agree that the arbitration of any dispute shall be conducted expeditiously. The arbitrators are instructed and directed to assume case management initiative and control over the arbitration process (including scheduling of events, pre-hearing discovery and activities, and the conduct of the hearing), in order to complete the arbitration as expeditiously as is reasonably practical for obtaining a just resolution of the dispute.

  • Compliance Control Services (1) Support reporting to regulatory bodies and support financial statement preparation by making the Fund's accounting records available to the Trust, the Securities and Exchange Commission (the “SEC”), and the independent accountants.

  • Program Management (WBS 1.1) All components of the Project Management Plan as implemented for the Base Contract and Options 1-4 will be reviewed and amended to reflect specific needs for Option 5 and the outcome of continuous process improvement evaluations.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Change Management BNY Mellon shall require that changes to its network or software used to provide the services are tested and applied pursuant to a documented change management process.

  • Account Management A. The repayment account opened by the Borrower with the Lender (the account stipulated in Article 5) is a special capital withdrawal account, which is used to collect the corresponding sales revenue or the planned repayment fund. Where the corresponding sales revenue is settled in a non-cash manner, the Borrower shall ensure that it will be promptly transferred into the capital withdrawal account upon receipt.

  • Relationship Management 1. Provide client service support to the Fund, including access to day-to-day points of contact and to points of escalation as necessary.

  • Incident Event and Communications Management a. Incident Management/Notification of Breach - Transfer Agent shall develop, implement and maintain an incident response plan that specifies actions to be taken when Transfer Agent or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following:

  • Money Market Fund Compliance Testing and Reporting Services Subject to the authorization and direction of the Trust and, in each case where appropriate, the review and comment by the Trust’s independent accountants and legal counsel, and in accordance with procedures that may be established from time to time between the Trust and the Administrator, the Administrator will:

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!