Violations Data definition

Violations Data means the images and other Violations data gathered by the Redflex System at the Designated Intersection Approaches.
Violations Data means the images and other Violations data gathered by the Speed Monitoring System at the Fixed Speed Site(s) and/or Mobile Speed Van and/or gathered by the Automated Traffic Law Enforcement System at the Designated Intersections.
Violations Data means the images and other Violations data gathered by the Automated Traffic Law Enforcement System for Approaching, Overtaking and Passing a School Bus.

Examples of Violations Data in a sentence

  • The City shall be responsible for all costs associated with the transfer of the Violations Data including but not limited to administrative costs, storage media and storage media authoring device costs, , and internet bandwidth costs incurred in transferring the Violations Data.

  • Except as required by applicable law or as mutually agreed by Redflex and the City, Redflex shall have no obligation to retain Violations Data after termination of this Agreement.

  • Upon completion of the transfer of the Violations Data to the City, Redflex shall have no obligation or responsibility concerning the Violations Data.

  • A request for representation in the due process described in this section shall be in writing and shall specify the nature of the representation (legal or Association).

  • The City shall cause the Authorized Employee to review the Violations Data in timely manner and to determine whether a Citation shall be issued with respect to each Potential Violation captured within such Violations Data, and transmit each such determination in the form of an Electronic Signature to Redflex using the software or other applications or procedures provided by Redflex on the Redflex System for such purpose.

  • If you'd like to skip to a specific section, please use the time bar below or the links in the description box to navigate the chapters.

  • Interact with court and judicial personnel to address issues regarding the implementation of the Redflex System, the development of a subpoena processing timeline that will permit the offering of Violations Data in court and judicial proceedings, and coordination between Redflex, and the City;1.20.

  • Redflex makes no warranty or representation regarding the success of a transfer of the Violations Data and shall no liability or responsibility for any errors or failures that occur during a transfer ofthe Violations Data.

  • Training shall include training with respect to the RedSpeed Automated Traffic Law Enforcement System and its operations, presenting Violations Data in court and judicial proceedings, and a review of the Enforcement Documentation.

  • Interact with court and judicial personnel to address issues regarding the implementation of the Redflex System, the development of a subpoena processing timeline that will permit the offering of Violations Data in court and judicial proceedings, and coordination between Redflex, and the Customer; and2.18.


More Definitions of Violations Data

Violations Data means the images and other Violations Data gathered by the Combined Redflex Photo Red Light & Speed Fixed System and Redflex Photo Speed System at Designated Intersection Approaches and/or streets.
Violations Data means the images and other Violations data gathered by the 3 Vendor System at the Designated Intersection.
Violations Data means the images and other Violations data gathered by the Traffic Control Signal Monitoring System at the Designated Intersections.

Related to Violations Data

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Subject Data As used in this section, “subject data” means recorded information, whether or not copyrighted, that is delivered or specified to be delivered as required by the Underlying Agreement. Examples of subject data include, but are not limited to computer software, standards, specifications, engineering drawings and associated lists, process sheets, manuals, technical reports, catalog item identifications, and related information, but do not include financial reports, cost analyses, or other similar information used for performance or administration of the Underlying Agreement.

  • Privacy Breach means a common law breach of confidence, infringement, or violation of any rights to privacy, including but not limited to breach of the Insured’s privacy statement, breach of a person’s right of publicity, false light, intrusion upon a person’s seclusion, public disclosure of a person’s privacy information, or misappropriation of a person’s picture or name for commercial gain.

  • Confidential Information Breach means, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Violations shall have the meaning assigned to such term in Section 6(a).

  • Data Breaches Party shall report to AHS, though its Chief Information Officer (CIO), any impermissible use or disclosure that compromises the security, confidentiality or privacy of any form of protected personal information identified above within 24 hours of the discovery of the breach. Party shall in addition comply with any other data breach notification requirements required under federal or state law.

  • Third Party Data has the meaning set forth in Section 9.3(a).

  • Serious violation means OCC has made a valid finding when assessing a serious complaint that alleges:

  • Pseudonymous data means personal data that cannot be attributed to a specific natural person

  • Anonymous Data means Personal Data that has been processed in such a manner that it can no longer be attributed to an identified or identifiable natural person.

  • Criminal records data means information about an individual's criminal convictions and offences, and information relating to criminal allegations and proceedings.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Data Breach means the unauthorized access by an unauthorized person that results in the use, disclosure or theft of Customer Data.

  • Restricted Data means data typically exempt from public disclosure requirements under the provisions of applicable state or federal law. Examples of restricted information are regulated and confidential data.

  • Study Data shall have the meaning set forth in Section 8.1.

  • Violation Ticket means a violation ticket as defined in the Provincial Offences Procedures Act (Alberta).

  • Environmental Information Regulations means the Environmental Information Regulations 2004 and any guidance and/or codes of practice issued by the Information Commissioner or relevant government department in relation to such regulations.

  • Personal Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed.

  • Violation means the failure of a structure or other development to be fully compliant with the community's floodplain management regulations. A structure or other development without the elevation certificate, other certifications, or other evidence of compliance required in Articles 4 and 5 is presumed to be in violation until such time as that documentation is provided.

  • GLO Data means any data or information owned by the GLO, including PII or SPI as defined below, that Provider creates, obtains, accesses (via records, systems, or otherwise), receives (from the GLO or on behalf of the GLO), or uses in the performance of the Contract or any documents related thereto.