Violations Data definition

Violations Data means the images and other Violations data gathered by the Redflex System at the Designated Intersection Approaches.
Violations Data means the images and other Violations data gathered by the Automated Traffic Law Enforcement System at the Designated Location(s).
Violations Data means the images and other Violations data gathered by the Speed Monitoring System at the Fixed Speed Site(s) and/or Mobile Speed Van and/or gathered by the Automated Traffic Law Enforcement System at the Designated Intersections.

Examples of Violations Data in a sentence

  • Interact with court and judicial personnel to address issues regarding the implementation of the Redflex System, the development of a subpoena processing timeline that will permit the offering of Violations Data in court and judicial proceedings, and coordination between Redflex, and the City;1.20.

  • Interact with court and judicial personnel to address issues regarding the implementation of the Redflex System, the development of a subpoena processing timeline that will permit the offering of Violations Data in court and judicial proceedings, and coordination between Redflex, the Customer and, where applicable, juvenile court personnel.

  • Training shall include training with respect to the RedSpeed Automated Traffic Law Enforcement System and its operations, presenting Violations Data in court and judicial proceedings, and a review of the Enforcement Documentation.

  • Except as required by applicable law or as mutually agreed by Redflex and the Customer, Redflex shall have no obligation to retain Violations Data after termination of this Agreement.

  • Interact with court and judicial personnel to address issues regarding the implementation of the Redflex System, the development of a subpoena processing timeline that will permit the offering of Violations Data in court and judicial proceedings, and coordination between Redflex, the City and juvenile court personnel; and1.17.

  • Redflex makes no warranty or representation regarding the success of a transfer of the Violations Data and shall no liability or responsibility for any errors or failures that occur during a transfer of the Violations Data.

  • Violations Data from March 19, 2014-September 25, 2015, show 54% of the violations for Subpart B are for ‘new requirements’ to Part 37 as compared to IC requirements.

  • RedSpeed shall provide the Authorized Officer with access to the RedSpeed System for the purposes of reviewing the pre-processed Violations Data within seven (7) days of the gathering of the Violations Data from the applicable motor vehicle censors working in conjunction with the visual signals on a school bus.

  • See Violations Data Set (as of December 9, 2011), available at http://www.msha.gov/ OpenGovernmentData/OGIMSHA.asp (on file with the Division of Corporation Finance).

  • The Violations Data show possible trends in both effectiveness of the new regulation and clarity issues.


More Definitions of Violations Data

Violations Data means the images and other Violations data gathered by the 3 Vendor System at the Designated Intersection.
Violations Data means the images and other Violations Data gathered by the Combined Redflex Photo Red Light & Speed Fixed System and Redflex Photo Speed System at Designated Intersection Approaches and/or streets.
Violations Data means the images and other Violations data gathered by the Automated Traffic Law Enforcement System for Approaching, Overtaking and Passing a School Bus.
Violations Data means the images and other Violations data gathered by the Traffic Control Signal Monitoring System at the Designated Intersections.

Related to Violations Data

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Subject Data As used in this section, “subject data” means recorded information, whether or not copyrighted, that is delivered or specified to be delivered as required by the Underlying Agreement. Examples of subject data include, but are not limited to computer software, standards, specifications, engineering drawings and associated lists, process sheets, manuals, technical reports, catalog item identifications, and related information, but do not include financial reports, cost analyses, or other similar information used for performance or administration of the Underlying Agreement.

  • Privacy Breach means a common law breach of confidence, infringement, or violation of any rights to privacy, including but not limited to breach of “Your” privacy statement, breach of a person’s right of publicity, wrongful collection, false light, intrusion upon a person’s seclusion, public disclosure of “Private Information”, or misappropriation of a person’s picture or name for commercial gain.

  • Serious traffic violation means a conviction when operating a commercial motor vehicle of:

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Violations shall have the meaning assigned to such term in Section 6(a).

  • Data Breaches Party shall report to AHS, though its Chief Information Officer (CIO), any impermissible use or disclosure that compromises the security, confidentiality or privacy of any form of protected personal information identified above within 24 hours of the discovery of the breach. Party shall in addition comply with any other data breach notification requirements required under federal or state law.

  • Seller Confidential Information has the meaning set forth in Section 6.4.3.

  • Third Party Data has the meaning set forth in Section 9.3(a).

  • Serious violation means OCC has made a valid finding when assessing a serious complaint that alleges:

  • Pseudonymous data means information that cannot be attributed to a specific individual without the use of additional information provided that it is kept separately and subject to appropriate technical and organizational measures to ensure that it is not attributed to the individual.

  • Anonymous Data means Personal Data that has been processed in such a manner that it can no longer be attributed to an identified or identifiable natural person.

  • Criminal records data means information about an individual's criminal convictions and offences, and information relating to criminal allegations and proceedings.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Data Breach means the unauthorized access by an unauthorized person that results in the use, disclosure or theft of Customer Data.

  • Study Data shall have the meaning set forth in Section 8.1.

  • Violation Ticket means a violation ticket as defined in the Provincial Offences Procedures Act (Alberta).

  • Environmental Information Regulations means the Environmental Information Regulations 2004 and any guidance and/or codes of practice issued by the Information Commissioner or relevant government department in relation to such regulations.

  • Buyer Confidential Information has the meaning set forth in Section 6.8(a).

  • Remedy a Violation means to bring the structure or other development into compliance with state and community floodplain management regulations, or, if this is not possible, to reduce the impacts of its noncompliance. Ways that impacts may be reduced include protecting the structure or other affected development from flood damages, implementing the enforcement provisions of the ordinance or otherwise deterring future similar violations, or reducing federal financial exposure with regard to the structure or other development.

  • Purchaser Confidential Information means all confidential or proprietary documents and information concerning the Purchaser or any of its Representatives; provided, however, that Purchaser Confidential Information shall not include any information which, (i) at the time of disclosure by the Company, the Seller Representative or any of their respective Representatives, is generally available publicly and was not disclosed in breach of this Agreement or (ii) at the time of the disclosure by the Purchaser or its Representatives to the Company, the Seller Representative or any of their respective Representatives, was previously known by such receiving party without violation of Law or any confidentiality obligation by the Person receiving such Purchaser Confidential Information. For the avoidance of doubt, from and after the Closing, Purchaser Confidential Information will include the confidential or proprietary information of the Target Companies.

  • Personal Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored, or otherwise processed.

  • Nonpublic Personal Information means nonpublic personal financial information and nonpublic personal health information.

  • Violation means the failure of a structure or other development to be fully compliant with the community's floodplain management regulations. A structure or other development without the elevation certificate, other certifications, or other evidence of compliance required in Articles 4 and 5 is presumed to be in violation until such time as that documentation is provided.

  • GLO Data means any data or information owned by the GLO, including PII or SPI as defined below, that Provider creates, obtains, accesses (via records, systems, or otherwise), receives (from the GLO or on behalf of the GLO), or uses in the performance of the Contract or any documents related thereto.

  • Information Disclosure Requirements means the requirements to disclose information under: