My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
FOUNTAIN VALLY, CITY OF 2
Clerk
>
Contracts / Agreements
>
INACTIVE CONTRACTS (Originals Destroyed)
>
E-F (INACTIVE)
>
FOUNTAIN VALLY, CITY OF 2
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
12/3/2015 4:43:07 PM
Creation date
6/6/2006 9:45:04 AM
Metadata
Fields
Template:
Contracts
Company Name
CIty of Fountain Valley
Contract #
A-2005-310-16
Agency
Police
Council Approval Date
9/19/2005
Destruction Year
2012
Jump to thumbnail
< previous set
next set >
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
305
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Attachment C <br />Section 13 Terrorism Incident Prevention Equipment <br />AEL Ref No Title /Description <br />SMSP/ LETPP MMHS EMPU <br />UAS/ <br />Fall 2004 <br />SEL Ref Number <br />13.1 <br />Software, Data collection/ Information Gathering <br />000❑ <br />13.2 <br />Software, Data Synthesis <br />goo❑ <br />13.3 <br />Joint Regional Information Exchange System (JRIES) <br />000❑ <br />13.4 <br />System, Alert/Notification 04MA-02-ALRT <br />J❑ V <br />(] ❑ <br />Alert and notification equipment that allows for real-time dissemination of <br />information & intelligence. Examples of this equipment include cellular <br />phones, pagers, text messaging, etc. <br />13.5 <br />Hardware, software and internet-based systems that <br />allow for information exchange and dissemination <br />000❑ <br />13.6 <br />Software, Facial Recognition 04SW-02-FACR <br />r] ❑�r <br />n ❑ <br />Facial recognition software for access control, identification of criminal actors <br />(IFF), etc. <br />(NOTE: DHS has adopted INCITS 3852004, Information technology - Face <br />Recognition Format for Data Interchange. ONLY SOFTWARE COMPLIANT <br />WITH THIS STANDARD WILL BE ALLOWABLE.) <br />13.7 <br />Fees for use of databases containing terrorist threat <br />information <br />❑ <br />One-time or recurring fees for the use of commercial databases containing <br />terrorist threat information. <br />(NOTE: GRANTEES SHOULD COORDINATE WITH THEIR ASSIGNED <br />ODP PREPAREDNESS OFFICER TO DETERMINE THE APPROPRIATE <br />ALLOWABLE COST CATEGORY FOR THESE PURCHASES.) <br />13.8 <br />Equipment, Law Enforcement Surveillance <br />❑J ❑N <br />V ❑ <br />Surveillance equipment, including electronic equipment. Use is subject to <br />the prohibitions contained in Title 111 of the Omnibus Crime and Control and <br />Safe Streets Act of 1968 (the "Wiretap Act"), 18 U.S.C. §§ 2510-2521. <br />13.9 <br />PIN Registers <br />❑./ ❑ <br />Equipment capable of capturing incoming and outgoing phone numbers, <br />along with the duration of calls, without listening to the actual conversations. <br />Use is subject to the prohibitions contained in Title III of the Omnibus Crime <br />and Control and Safe Streets Act of 1968 (the "Wiretap Act"), 18 U.S.C. §§ <br />2510-2521. <br />Interactive versions of this appendixand the Fa112004 SEL are available on-line at www.rkb.mipt.org. <br />Wednesday, April 27, 2005 Full AEL: Page 64 of 79 <br />
The URL can be used to link to this page
Your browser does not support the video tag.