Port of Seattle Police Vehicles and Portable Radios Sample Clauses

Port of Seattle Police Vehicles and Portable Radios. At the Chiefs discretion, a Global Positioning System (GPS) will be installed in selected Port of Seattle Police vehicles and Portable Radios. The Department may use GPS data as evidence in an official Department Investigation providing the data is of a specific incident. GPS data can also be used for training purposes. GPS queries will not be routinely or randomly used to monitor a Sergeant's performance. The Department may review GPS data of a specific incident when there is an articulable reason for justifying such review. Articulable reasons for reviewing a Sergeant's GPS include, but are not limited to: (1) capturing specific evidence for use in a criminal prosecution, (2) a civil claim has been filed against the Port involving the incident, (3) a complaint has been made against a Sergeant regarding the incident, (4) the incident included a use of force, (5) the incident included a vehicle pursuit, (6) the incident included a vehicular collision, or (7) the incident involved a serious injury or death. Notwithstanding the other provisions of this section, Sergeants may review the GPS of probationary trainees in the Field Training Program and any commissioned personnel can advise dispatch to broadcast GPS data when an articulable reason exists (for example, locating a Sergeant for safety purposes). GPS review log will be kept and must be maintained. The log must include the date, time, reviewer, and reason for the review.
AutoNDA by SimpleDocs
Port of Seattle Police Vehicles and Portable Radios. At the Chief’s discretion, a Global Positioning System (GPS) will be installed in selected Port of Seattle Police vehicles(GPS) and Portable Radios. GPS queries will not be routinely or randomly used to monitor a Sergeant’s performance. The Department may review GPS data of a specific incident when there is an articulable reason for justifying such review. Articulable reasons for reviewing a Sergeant’s GPS include, but are not limited to: (1) capturing specific evidence for use in a criminal prosecution, (2) a civil claim has been filed against the P o r t involving the incident, (3) a complaint has been made against a Sergeant regarding the incident, (4) the incident included a use of force, (5) the incident included a vehicle pursuit, (6) the incident included a vehicular collision, or (7) the incident involved a serious injury or death. Notwithstanding the other provisions of this section, S e r g e a n t s may review the GPS of probationary trainees in the Field Training Program and any commissioned personnel can advise dispatch to broadcast GPS data when an articulable reason exists (for example, locating a Sergeant for safety purposes). GPS review log will be kept and must be maintained. The log must include the date, time, reviewer, and reason for the review.

Related to Port of Seattle Police Vehicles and Portable Radios

  • Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Conditions & Requirements

  • Cloud Computing State Risk and Authorization Management Program In accordance with Senate Bill 475, Acts 2021, 87th Leg., R.S., pursuant to Texas Government Code, Section 2054.0593, Contractor acknowledges and agrees that, if providing cloud computing services for System Agency, Contractor must comply with the requirements of the state risk and authorization management program and that System Agency may not enter or renew a contract with Contractor to purchase cloud computing services for the agency that are subject to the state risk and authorization management program unless Contractor demonstrates compliance with program requirements. If providing cloud computing services for System Agency that are subject to the state risk and authorization management program, Contractor certifies it will maintain program compliance and certification throughout the term of the Contract.

  • Additional Requirements for Sleeping Rooms The Contractor shall provide departing Attendees a secured area for storing belongings.

  • Wire Unbundled DS1 Digital Loop This is a designed 4-wire Loop that is provisioned according to industry standards for DS1 or Primary Rate ISDN services and will come standard with a test point, OC, and a DLR. A DS1 Loop may be provisioned over a variety of loop transmission technologies including copper, HDSL-based technology or fiber optic transport systems. It will include a 4-Wire DS1 Network Interface at the End User’s location.

  • Voice Grade Unbundled Copper Sub-Loop Unbundled Sub-Loop Distribution – Intrabuilding Network Cable (aka riser cable)

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.1.3.1 Definition 4.1.3.2 Notwithstanding BellSouth’s general duty to unbundle local circuit switching, BellSouth shall not be required to unbundle local circuit switching for <<customer_name>> when <<customer_name>> serves end-users with four (4) or more voice-grade (DS-0) equivalents or lines in locations served by BellSouth’s local circuit switches, which are in the following MSAs: Atlanta, GA; Miami, FL; Orlando, FL; Ft. Lauderdale, FL; Charlotte-Gastonia-Rock Hill, NC; Greensboro-Winston Salem-High Point, NC; Nashville, TN; and New Orleans, LA, and BellSouth has provided non-discriminatory cost based access to the Enhanced Extended Link (EEL) throughout Density Zone 1 as determined by NECA Tariff No. 4 as in effect on January 1, 1999. 4.1.3.3 In the event that <<customer_name>> orders local circuit switching for a single end user account name at a single physical end user location with four (4) or more 2-wire voice-grade loops from a BellSouth central office in an MSA listed above, BellSouth shall charge <<customer_name>> the market based rate in Exhibit C for use of the local circuit switching functionality for the affected facilities. 4.1.3.4 A featureless port is one that has a line port, switching facilities, and an interoffice port. A featured port is a port that includes all features then capable or a number of then capable features specifically requested by <<customer_name>>. Any features that are not currently then capable but are technically feasible through the switch can be requested through the NBR/BFR process. 4.1.3.5 BellSouth will provide to <<customer_name>> customized routing of calls: (i) to a requested directory assistance services platform; (ii) to an operator services platform pursuant to Section 10 of Attachment 2; (iii) for <<customer_name>>’s PIC’ed toll traffic in a two (2) PIC environment to an alternative OS/DA platform designated by <<customer_name>>. <<customer_name>> customers may use the same dialing arrangements as BellSouth customers. 4.1.3.6 Remote Switching Module functionality is included in Switching Capability. The switching capabilities used will be based on the line side features they support. 4.1.3.7 Switching Capability will also be capable of routing local, intraLATA, interLATA, and calls to international customer’s preferred carrier; call features (e.g. call forwarding) and Centrex capabilities. 4.1.3.8 Where required to do so in order to comply with an effective Commission order, BellSouth will provide to <<customer_name>> purchasing local BellSouth switching and reselling BellSouth local exchange service under Attachment 1, selective routing of calls to a requested directory assistance services platform or operator services platform. <<customer_name>> customers may use the same dialing arrangements as BellSouth customers, but obtain a <<customer_name>> branded service.

  • Reactive Power and Primary Frequency Response 9.6.1 Power Factor Design Criteria

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to: (1) Limit system access to the types of transactions and functions that authorized users, such as students, parents, and LEA are permitted to execute; (2) Limit unsuccessful logon attempts; (3) Employ cryptographic mechanisms to protect the confidentiality of remote access sessions; (4) Authorize wireless access prior to allowing such connections; (5) Create and retain system audit logs and records to the extent needed to enable the monitoring, analysis, investigation, and reporting of unlawful or unauthorized system activity; (6) Ensure that the actions of individual system users can be uniquely traced to those users so they can be held accountable for their actions; (7) Establish and maintain baseline configurations and inventories of organizational systems (including hardware, software, firmware, and documentation) throughout the respective system development life cycles; (8) Restrict, disable, or prevent the use of nonessential programs, functions, ports, protocols, and services; (9) Enforce a minimum password complexity and change of characters when new passwords are created; (10) Perform maintenance on organizational systems; (11) Provide controls on the tools, techniques, mechanisms, and personnel used to conduct system maintenance; (12) Ensure equipment removed for off-site maintenance is sanitized of any Student Data in accordance with NIST SP 800-88 Revision 1; (13) Protect (i.e., physically control and securely store) system media containing Student Data, both paper and digital; (14) Sanitize or destroy system media containing Student Data in accordance with NIST SP 800-88 Revision 1 before disposal or release for reuse; (15) Control access to media containing Student Data and maintain accountability for media during transport outside of controlled areas; (16) Periodically assess the security controls in organizational systems to determine if the controls are effective in their application and develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities in organizational systems; (17) Monitor, control, and protect communications (i.e., information transmitted or received by organizational systems) at the external boundaries and key internal boundaries of organizational systems; (18) Deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception); (19) Protect the confidentiality of Student Data at rest; (20) Identify, report, and correct system flaws in a timely manner; (21) Provide protection from malicious code (i.e. Antivirus and Antimalware) at designated locations within organizational systems; (22) Monitor system security alerts and advisories and take action in response; and (23) Update malicious code protection mechanisms when new releases are available.

  • Amendments and Supplements to Permitted Section 5(d) Communications If at any time following the distribution of any Permitted Section 5(d) Communication, there occurred or occurs an event or development as a result of which such Permitted Section 5(d) Communication included or would include an untrue statement of a material fact or omitted or would omit to state a material fact necessary in order to make the statements therein, in the light of the circumstances existing at that subsequent time, not misleading, the Company will promptly notify the Representatives and will promptly amend or supplement, at its own expense, such Permitted Section 5(d) Communication to eliminate or correct such untrue statement or omission.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!