Displaying 1 - 10 of 11

Content type

Anticipate Potential Additional Deployment Time Required for Registering On-Board Units with the Security Credential Management System for Cybersecurity.

Anticipate potential additional deployment time required for registering on-board units (OBU) with the SCMS for cybersecurity. While the SCMS offers a secure and privacy-preserving method for V2X…
Content type
Date Posted
10/30/2023

Understand Time-Intensive Data Requirements for Valid Carpool Verification and Enforcement at Transit Station Parking Lots.

Understand time-intensive data requirements for valid carpool verification and enforcement. In this pilot, the vendor found it challenging and time-intensive to meet the data requirements for…
Content type
Date Posted
09/29/2023

Early CV deployers must assess existing agency systems and networks as well as their change control procedures to accommodate the security needs of CV technology.

The following lessons address changes agencies may have to make to their existing systems and/or operations to accommodate the security needs of CV technology. Emphasis is particularly placed on the…
Content type
Date Posted
05/20/2019

Emphasize financial sustainability in concept development. Keep long-term funding goals in mind when tailoring a concept to meet a short-term budget.

LESSONS LEARNED FROM USDOT PERSPECTIVE:     Program Management (Acquisition Strategy and Outreach) Conduct consistent and organized meetings with the entire acquisition team (federal…
Content type
Date Posted
03/27/2017

Develop public outreach programs based on the cultural and political context of the project location and provide clear, salient, and timely messages about the purpose and benefits of congestion pricing.

Congestion pricing programs face political, institutional, and public acceptance challenges and concerns everywhere in the world. Over a 12-day period, from December 7 to 18, 2009, a…
Content type
Date Posted
10/31/2011

Avoid privacy concerns by ensuring that protecting legislation is in place prior to implementing tolling technologies.

Content references source material no longer available at its original location.
Issues regarding privacy continue to be a common public concern with the use of tolling technologies. As a result, it is crucial that legislation be enacted, ensuring that user privacy be protected…
Content type
Date Posted
06/27/2007

Protect data privacy by implementing user authorization levels for sensitive information.

Ensuring data privacy is essential to the success of an Internet-based border-crossing information system. The IMTC Border Crossing Deployment Project's freight–tracking information system,…
Content type
Date Posted
04/13/2006

Develop written policies that delimit the use and distribution of data.

The value of the MDI operations lay in the data that is generated by the equipment and systems involved. Data policy issues that have been reviewed and tackled by the MDI partners include resolving…
Content type
Date Posted
10/12/2005