menu icon

Interface: NYSDOT Region 8 HVTMC Transportation Management - NYSDOT STICC (Statewide Transportation Information and Coordination Center)

NYSDOT Region 8 HVTMC Transportation Management to NYSDOT STICC (Statewide Transportation Information and Coordination Center) Interface Diagram

Information Flow Definitions

alert notification (Existing) Selected Comm Solution

Notification of a major emergency such as a natural or man-made disaster, civil emergency, or child abduction for distribution to the public. The flow identifies the alert originator, the nature of the emergency, the geographic area affected by the emergency, the effective time period, and information and instructions necessary for the public to respond to the alert. This flow may also identify specific information that should not be released to the public.

alert status (Existing) Selected Comm Solution

Information indicating the current status of the emergency alert including identification of the traveler and driver information systems that are being used to provide the alert.

incident information (Existing) Selected Comm Solution

Notification of existence of incident and expected severity, location, time and nature of incident. As additional information is gathered and the incident evolves, updated incident information is provided. Incidents include any event that impacts transportation system operation ranging from routine incidents (e.g., disabled vehicle at the side of the road) through large-scale natural or human-caused disasters that involve loss of life, injuries, extensive property damage, and multi-jurisdictional response. This also includes special events, closures, and other planned events that may impact the transportation system.

incident information for public (Existing) Selected Comm Solution

Report of current desensitized incident information prepared for public dissemination.

threat information (Existing) Selected Comm Solution

Threats regarding transportation infrastructure, facilities, or systems detected by a variety of methods (sensors, surveillance, threat analysis of advisories from outside agencies, etc.