Loading...
HomeMy WebLinkAboutAGMT - Orange County (800MHz Maintenance and Coordination)A 4 I t 1 p 1 [ 1 f I G 1 11 1 1 1 1 141 t 1 41 I A IO 1 a 3 4 i • 600 MHS Elackboa4 Coal Skating =CO4tAllaenilons b4atd 9n Radio COYnl4 FY 21.22 COST ALLOCATION riI• LD i Limit LAW FIRE D PW CITYLAOENGY EQUIP. EQUIP. EQUIP. EQUIP. TOTAL +':1•:: 217913117+Drm+:Y Y MFO II / BACKBONE .oculi. ALLOCATION INFRALIT I. 000121105 PERCENT (501401 OPERATIONS (1) IUNO(t) TOILL awipM ""'al TOTAL310N01 Ruta COV.! lunsh7 19nnnACi- Aficcllnlent#2 - M R}y 3co• 2710514 S i,ar arms) claims 7T 1123 i AL13 %Wm 6 0.41% $17101 M. I4) TAH 116 lots* f 11.073 6% O f (1063 i AAHEm loilT I= it.u% ub7M9 171,40 57010' 357tou 7000367 f [90.4021.01 11 T Ifa33]1 i BIH. 137 w zoos lake•+1 5/4334 $*.in 1107.132 5122230 S Loom! 331 16 3 Of IO UUEHAPARK Ibl t.to% f0D30s 117AW 15.574 MtAOI 5/012112 7 NAS 791 a 1 4 tl it COSTAMESA 66 405% $155214) 320.734 317211] sloTa i 3713307 3 !01.014 6D 0 3 (m701 u Gvm66 0 147 1.34% 112ma sum 13•590 Y.l.loo IWAI1 3 60[04 Ito 1 1 17.1$11 q DAYAPOill -3i Oa 041% 10.61 27A07. it'll. $1 FAIL 020.146 S "DIV N 4 S Its I0. FoOMIAIIVNIEY 04 M{ 137% t91A01 310.343 KOO. I'AN31 568721 3 0,017 361 1 1 S .."l IS flNEltldlut 114 a NLOt 16% 1177A11 12AM 10:10 315)1211 3170.700 1 100.01.1 600 3 1 l7M 7 1•amurm aNONi 4M 140 341% 1111100 510.79{ OA00 1ttiD)7 316303 3 140.640 421 0 f +7Afo Il IIUIITOIDYONREADi bit aha 173% 1730301" AV.O71 110.381 1ichila $337;117 f 7070/7 Fol I f 11+.017 M emir bla 135 e41% 113.10 $1[1210 MAID 3710310 5765265 S 171= 100 ih 1 161{) it mi IAwmas 741 7217% 10t:039 11065 S721kt Stlum 5773371 3 1111.51 370 3 1 10•IVDI 7o LAOVIUILTLS 4 43 32% slelot EMS 1006 $17010 314.650 3 13,710 N 0 f 0011 31 tAGVNAMUUEt 60 DAa% 421.161 m" Sl.m 2-153 SlQOD 1 -1-7.w A6 O f 6X91 11 tXGtJNAWDODS It a 11 ROP% 17A76 tW us, MA71]filo 11 O 1 11157 n tM474hE11 0 oiG% 31.300 uALF 31.131 60 -301 1 Witi 0O S IL(101 is {A{I.ADMA 172 T4 -0 711 ISM 350011 "Am 11.011 171211 STA.744 f 17.110 211 0 1 10191 11 LAPALVA _-0 1 A O.K% 3!1,710 MoM 3117" S2to77s &xol 3 22,117 it 0 1 11.115 2A LMALAWl06 61' t"Qa% st7215 2.017 1071 3H216 311714 1 MIA OI 0 5 VIM 7) ua510 WEJO It Q i1D OAa% slum SIAo4 4730 17kii4 SAO"! -1 30A I 110 7 1 i12N I/ AEs4C111O CII m 122 023 410% $140310 17.6.310 111.054 MM.133 3710 7 IDI oil I 3 110370 71 ONAVOE 653 3Dt% tH0.180 $10.670 1172123 slou.1 Mi8,85a '1 2)02104 064 101 1 1170571 3 PUCGNIN 700 tot% 3D.IM -$* 44 33611 tMDI! SW/AS S 4 fid I15 lL 3 14.311' ]3 IW101DEARAYMp/nITA 0 032% 110,131 31St0 3205 07,DID llla2 1 1374 47 a 1 II aNicumu R" 10 021006 M0. 34.311 $Lm IAA* 3002117 1 '11326 Ica O 1 {1,0651 11 BIt/nINtCA'WIIfA10 41 031% 39.000 IDia 4163 117.113 SI{240 $ Mail 40 1 7 3351 34 SAIIAAU 700 m0%1197.1(411143? $16,301 Motion ST77AU 740337 160 ID (ORO, " smLIPAOI 141 IW 1.21% imaii. 1bAn 33,231 150.17 v.15=1 5 63.134 100 III IZ31ol is 5TINIONOIL0. fiD {0 MSM 11,6*1 070 027,70 f 73,307 i0 D 3 $12721 )7 IItBT01 ia7 TAI% 304214 1155155 17;114 90.AV1 ioznd S 03AII 141 2. 1 [10121 3t AU PANT ! 0.W% 1,08] 3700 1131 1710 MA73 2711 1 0 7 (111 ]) 'NEDIMSt07Efl 75 1.921 fOL01l 110.36 64.401 710 1"Am f SQA31 Ri 1 3 n.13/1 o tt 1,0104 lot -D I-4 124.m 34313 1.05 MASS 1 31,027 ImI 3 t2e91 It Wi1f10NEi a SAM 31192) 41.210 11.04A510511 31010] 3 Wwl Da 0 / (6141 uT- 41 CnTlOTAL I+m 1 113 +403 Ri It 0.7 -133=211v n 4{s 6205.001 W76.ti1 37d01;ata a 40 tOf 1076 in 1 ilmll a{ u OOFA 0 IA10 0 0 12170 14AY6 1420" 374.02] .701 3513819 360}2117 3 6400"S IAai 721 f 111265 se OCU Q 0 0 026 124 ODA% 1022172 35.047 37]75 7743 $41913 i 110,214 174 0 f 13th Q OCLIIEOLMBIOTAL 0 0 N O N ails WALL 47.1(0 N.Ou SI6777 1,0.134 MOJP 31 0 1 0.13 q CDASTEDMll1P11TYGOILEGEULWHOUi 11 0 0 0 It 5.0% 37000 St4D 17w 02,003 fa.lea f ]TVi t7 .0 1 Ilm At 41VWEVAILYCOLLECEPOLLM 7] a 0 0 21 0.11% 15.01 1771 314) 30 $1.181 1 t,774 ri 0 3 1016 fA BAaMEA MLEEOr1cAWgIap0* 14 0 0 O to 0.11% Siam tin D45 1.401 [3151 1 AWD to ill $' Imil S! CALWAIEFUtERION '10 0 0 a '!0061% 110.776 14A55 llAtis Mza12 124AO 1 7407 7o 0 f 10111 14 M SAIfAANAUVIF.30131131.IV3Laas a a a N o2-% 3/02135 tza4! 11.745 "121)17174317 3 72.170 0 24 3 11,1141 SI $4 CO3tAMESAMNItAlYU3IRq 0 8 00% f1.P74 s3" 3131 17,40 M71U 1 7.533 a 0 f list SI EAST OIWIRUCOVIRYWATERDISTRICT i I 007. 31.0."' 3765 SW{ sl.ma, 37A31 3 2314 1 '0 1 filli ]! ELIOUO%VAtEODLS110C1 7 2 007% I 11a1 Mf U1' 1 133 AU 7 0 1 1311 $1 ODtDM 5TAIEWAITROIYPAIY / 1 0.91% $710 1 SID um 134/ 3 710 1 0 lA it E I1A(CIIVIAIVILlLT711CI "p '4 4 ON% 300,7 111[1 5T7 73X0 Si,300 1 12% A O 1 al $9 t1011I N1IMMATEROVONO! 1 1 0.917. 1710 Hl 310 10 1241 f 710 f O f f0 6o YIDWAYMMMTAa RZD6I=t 1 1 O.DI% 3 t0 1 3iD 0200 -11,50} 4)1/ f 310 1 0 1 1p at YE"WhISIDIMIRCT > a QUI% 3[701 126 00 71.7]7 1 1,64) o "O ti 61 MIROPW.IIAY WATER O(S2RIDTOF 40.0 l I 0.01% I 61 110 f7N 531 1 7L0 t O 3 101 63 GOLINIYWAYEROLSTRICT I L act% 1740 311 149 3701 "IT 1 310 1 o S tW ti gMIALWtDADi'WAMRt"ft C3 a 43321 107 310.1 f7! 1'211 $121=4 3 J1a 7 3 4 834 U $OM11DRAl0EGOWITYWAIERA1l110N 4 ♦ 6-0-1W-30t VOL 11/ 31 i1.3m S 1.706 t 0 1 161 4 MRANOY/ANT2445111Ut f s CD2% 7240 HI $19 1701 3317 1 710 1 Q f 1101 41 1RAOUCOCAiNDMWATTRUISTAIO7 7 2 007% 3163 Tal 028 1401 t 310 t 1 3 zzt u U1014TAi VlAIERDItliRIOTOf.IIC SOD D 6 OOl% f+.101 5701 SW $1,212 f1TJI 1 1.611 4 0 f l0 SI YDAMMUALMMIDISiMICT U 7 7 4117% SI1'I Mt 318 Spot 3006 3 415 2 a $ 1.171 M _ 71 tlM1Yd0FAMILM701iV01a0CMILAUN1AT ' 7.630 'l!2- "SDS. 2,024 ' . '3361 c,10D0%: 53.11].634 + -=1074311 •. Bltb9 M,fu Ml MA08A37 3" 'Mtiq 134H -730 1 4114AM u 11 52H10RF 7.714 O 0 0 77" 67021 11,1"y t0 3{]9400 1T.7A.514 OAO7 f 12114]61 72156 0 3 154133 7t 03USMAiiQ7A£Y 770 0 0 0 733 4.001 574430 10 511.110 I319A7F 561= 1 MA25 731 > 1 4111 it I+floahtlON tD6 a 0 0 D61 DIM% Mlal. SO .13t]DD . Mu I. fri7Ala 1 333,101 all 171 1 I.VAI.I 16 CEO 4 0 0 J 7 0.06% 11351 50 &IN 311405 $1.017 S I'm 71 RT.E391RNtflf WIGI33 D a D t0 10 104% $41,131 M f.r,t a 60.055 W.ra 4.2102 103 O l 7.7071 2t IMNEnWdraW1111h 0 O 0 26 75 0211% 102177 S4 1t33t t\1714 162147 8,117 M O 3 am 1t IICAK:mtt001ut1116t1tDOnb4a c 0 0 24 74 SAM 110,61n SO 11276 1112{9 303.+0 1 -1.10 2. D f Win q IKiI£1ary 11+1+YA 0 0 0 170 170 ZbM %tax 0 some t00.H) 113205 1 O4est Ira O 1 1321213 31 IIGNBInitvmlam D 0 0 a1 0 tnA 174110 M 3243 5to "1.582 1 ]7.241 0 0 S 11.1141 u CaKa•„IY E+Oafh00MAemWCLOtN 0 O 0 0.7 al 1.00% 021706' 34.416 NO.T6 170717 t 17.1$11'7 -71.51 O 7 174)] q X111WAMS, 141149(17 151 0 a O 157 330% 16,453 0 1m0u UlAt 2WA30 3 fel D +-01J. 14401 tl OGILHCWgfA00H.i Lt34amaP+{saa 0 D n v1' 2/b -040% 3114aDs f0 3/41f9 Islos l 14kpi3 1 10?3T 771 1191 (30:+31 AS ooftw WwS+llnlgn tlfKlM[Alnpad. 0 0 0 to 10 O.IUL .111 to $515 1,m 413 3 4.095 40 0 f (724 u 0^J'+Y WAtEN9HOMDYi .YGR, a 0' Q f2 M 423% 332105 0 NIo " 54.1121. f 0 t7 5 4Dri 0.1 N OC I1M4W0u IN..106D105• Pula DGPVut W4fs FanXnO 0 4 a 0 0 0 0 D 0 Q' 0,a% 0.10% ".16/ MPSI 1e 70 t0 125] 14331 DAM f U34i 7721 S 0 0 a 3• 5 3 4.217 z34) as I10I'u+feWUW Twd 0 0 D 1 7 Ali% 37A7p 3700 M7eJ 52431 f 0 t 3 3705 n DCPNA•E.511.9 OEYI:IlT11EGI10V G 0 0 f0 to 031% i0 13 10 1074 17ta7. 15.437 f O 16 1 MILY q OWWNLOail. III1YOIAMIraR 0 0 0 13 3 0.24% S5A73 10 300 10051 14513 f 0 13 1 401 it 300212113 0 0 0 01' 05 OA3% "10.0" M M5OOD 3702011 it ./05 S 021 05 0 1 141741 q ILPAFMA1f14+41AIMPOon a 0 0 0 3 'O 11.751 59 2" 11.403 iIA3 1 0.455 IS 10 f Metal is OCWAU1 i1 0 O C if 31 0.00% 51710 SD S2.t10 110,111 111230 1 IOSJ7 31 7 t 7370 q 9321 0 0 0 29 29 0.0% rl-mn 31.191 NAb1 SiOAlI 3 ]7303 N 1 { lilt( M COLOI7T.T02AL' '2.762 4 0 53 0.133 le9ADL+ ' mul'ou ' so "51774 "401021 SS1737,61D 3 [510 i3 974 Tl 1 10 in Its ORAND7oTAL 11141 wi, 791. It It 161.111 4)q 105 101 1. 24) tm TOS LOS Ip Vat to' 3Y.11.12 1 O SNtIOm DaG000f Gte1 71%11 OYnW FY0493 MIaWt6F9v1 RANO OPAL+ t+..t•t�tts31. c."Aa MAL 1412% f.4vOf0n tlrtlD.OM �337Aft Is�3iA3i 11,510.04 3].TilAfo �- •w.•+,w 101/3. Car YA34R "t4 u I338] D7 11.51121 ....ww.rrWt n3n ' ce.1+1 40,11% /21141,04 '. D' 12.1$1,101 •+r'NI n D mY 611• 170521 t 1NPD Attachment A - Joint Agreement for 800 MHz CCCS Page 1 of 83 JOINT AGREEMENT FOR THE OPERATION, MAINTENANCE AND FINANCIAL MANAGEMENT OF THE ORANGE COUNTY 800 -MEGAHERTZ COUNTYWIDE COORDINATED COMMUNICATIONS SYSTEM This agreement is entered into on �� 021, by and between the executing Partner agencies. This agreement replaces the 2005 Agreements amended, and to the extent there is a conflict, this Agreement controls. RECITALS: Whereas, the Next Generation installation and implementation of the 800 MHz Countywide Coordinated Communications System (800 MHz CCCS) has been completed; and, Whereas, the original Joint Agreement for the Operation, Operation Maintenance, and Financial Management of the Change County 800 MHz Countywide Coordinated Communications System was executed September 19, 1995, and related Amendments Nos. 1, 2, 3, 4, 5, and appropriate change orders thereto followed (the "1995 Joint Agreement"), and; Whereas, a subsequent Joint Agreement for the Operation, Operation Maintenance, and Financial Management of the Orange County 800 MHz Countywide Coordinated Communications System was executed in November 2005, and related Amendments Nos. l and appropriate change orders thereto followed (the "2005 Joint Agreement"), thereby superseding the original 1995 Joint Agreement, and; Whereas, the Partner agencies now desire to execute a new Joint Agreement (the "2021 Joint Agreement") to supersede all previous Joint Agreements; and, Now, therefore, in consideration of the mutual covenants, conditions, agreements, and stipulations hereinafter expressed, the Partner agencies hereby agree as follows: 1 ., Hnacnmeni H - joini ,ygreemenr Tor twu iwriz L t L o rage z or bJ Contents 1.0 GENERAL........................................................................................................................................ 4 1.1 System...........................................................................................................................................4 1.2 Definition of Terms....................................................................................................................... 4 1.3 Amendment Process...................................................................................................................... 6 1.4 Liability.........................................................................................................................................6 2.0 GOVERNANCE COMMITTEE...................................................................................................... 7 2.1 Governance Committee Authority................................................................................................7 2.2 Governance Committee Member Appointment............................................................................ 7 2.3 Governance Committee Purpose....................................................................................................7 3.0 MEMBERS TO THE SYSTEM....................................................................................................... 8 3.1 Lead Agency................................................................................................................................. 8 3.2 Partner Agencies........................................................................................................................... 8 3.2.1 New Partner Agencies........................................................................................................... 8 3.2.2 Sponsored Agencies.................................................................................................................. 9 3.3 Mutual Aid Agencies.................................................................................................................... 9 3.3.1 Mutual Aid Agency Approval Process: ................................................................................ 9 3.3.2 Mutual Aid Agency Access and Limitations......................................................................10 3.3.3 Mutual Aid Agency Financial Responsiblities...................................................................10 4.0 SYSTEM ADMINISTRATION.....................................................................................................10 4.1 System Equipment......................................................................................................................10 4.2 System Subscriber Equipment....................................................................................................10 4.3 Dispatch Centers.........................................................................................................................10 4.3.1 Dispatch Center Equipment...................................:............................................................11 4.3.1.1 Dispatch Center Required Equipment Upgrades............................................................11 4.3.1.2 Dispatch Center Non -Required Equipment Upgrades....................................................11 4.4 System Modifications.................................................................................................................11 4.4.1 System Modifications requiring Governance Cominittee Approval...................................11 4.4.2 System Modification by Lead Agency................................................................................12 4.4.3 System Modifications requested by Partners Agencies......................................................12 4.5 Security.......................................................................................................................................12 4.6 Maintenance & Service Contracts...............................................................................................13 4.7 System Standard Operating Procedures......................................................................................13 4.8 Partner Agency Operational Policies and Procedures.................................................................13 2 5 /-,r<acnmenT H - joini Hgreemeni Tor uuu ivir-iz rage a or u3 5.0 FINANCIAL ADMINISTRATION...............................................................................................13 5.1 Governance Committee Financial Authority..............................................................................13 5.2 Partner Agencies Financial Obligations......................................................................................13 5.2.4 Mutual Aid Agencies..........................................................................................................14 5.3 System Operations Budget..........................................................................................................15 5.3.1 Partner Agency Cost...........................................................................................................15 5.3.2 Payment Remittance...........................................................................................................15 5.4 Year End Settlement...................................................................................................................15 5.5 Ten -Year Plan.............................................................................................................................15 5.6 Reserve Fund..............................................................................................................................16 5.6.1.1 Contributions by Partner Agencies.....................................................................................16 5.6.1.2 System Entry Fees..............................................................................................................16 5.6.1.3 System Operation Budget Surplus......................................................................................16 5.7 System Modification Cost...........................................................................................................16 3 /-umcnmeni H - JOInT Hgreemenr Tor tsuu iviNz L t -L o 1.0 GENERAL rage 4 or u,s 1.1 System The 800 MHz Countywide Coordinated Communications System (800 MHz CCCS) will be referred to as the "System." The System shall be maintained by the Orange County Sheriff - Coroner Department's Technology Division (hereinafter referred to as "Lead Agency"). 1.2 Definition of Terms • "System" is defined as a multichannel digital trunked radio communications system enabling interoperability among all participating City and County law, fire, public works, and lifeguard/marine safety departments. The System components also include transmitting /receiving sites, microwave networks, IP networks, dispatch consoles, control stations, and field equipment (mobile and portable radios). • "Governance Committee" is established by the Board of Supervisors and Partner Agencies to the Joint Agreement to facilitate the operation, maintenance, and financial management of the system. The Governance Committee is comprised of nine (9) members as identified in the Governance Committee Bylaws, attached hereto as Attachment A. • "Governing Authorities" are the City Councils, the Orange County Board of Supervisors, and the Orange County Fire Authority Board of the Partner Agencies, responsible for approving certain substantive modifications or amendments to this agreement where such approval authority has not been expressly delegated to the Governance Committee. • "Law Enforcement Agency" is defined as all governmental Law Enforcement Agencies operating primarily within the limits of Orange County, including, but not limited to: Orange County Sheriff -Coroner Department, Orange County City Police Departments, Orange County District Attorney's Office, and Orange County Probation Department. • "Lead Agency" is designated to be the Orange County Sheriff's Department (OCSD) Technology Division that will be responsible to manage, maintain, and enhance the System and its respective Standard Operating Procedures (SOP). • "Marine Safety" is defined as and shall include all governmental and private lifeguard agencies operating primarily within the limits of Orange County. 4 /-umcnmeni H - aoini Hgreemeni Tor uuu ivir-iz ut-La rage o or oo • "Member Agency" is defined as an agency authorized by the Governance Committee to use the System. Members include the Lead Agency and Partner Agencies. • "Mobile Radio" is defined as two-way radio equipment installed in a vehicle to provide communications for the vehicle operator. • "Mutual Aid Provider" is any governmental organization not otherwise defined in this Agreement that will provide short term assistance across jurisdictional boundaries during an emergency or planned event that exceeds local resources. Mutual aid use of the System will be restricted to the timeframe of the mutual aid incident. • "New Partner Agency" are Partner Agencies added after the adoption of this Joint Agreement. • "Parties" are all those entities that are authorized users of the System and have signed this agreement. • "Partner Agency" are authorized subscribers to the system who agree to share in the System Operational Costs to administer, maintain, and upgrade the technology by providing recurring rate schedule payments. • "Portable Radio" is a two-way radio equipment that is rechargeable, and handheld or belt carried. • "Radio Site" is defined as a location, which consists of a building, systems within the building, and a tower. • "Sponsored Agency" is any agency approved to use the System under sponsorship of a Partner Agency. • "Sponsoring Partner Agency" is a Partner Agency that wishes to sponsor a Sponsored Agency. • "Subscriber Unit" is defined as the subscriber radios and other devices that utilize the System. This includes dispatch operator positions, mobile radios, portable radios, cellular based devices and any other device that allows a user to communicate over the System. • "System infrastructure" is defined as all associated radio and support equipment required to establish a radio network on which user radios can operate to communicate throughout the County of Orange. System infrastructure includes, but is not limited to, servers, switches, routers, data lines, base station radios, microwave technology, and firewalls. • "System Operational Costs" are the expenses required to administer, maintain, and update the System. 5 Httacnmeni H - aoini Hgreemeni Tor tsuu iviriz rage b or bs • "System Modification" is any change in operational procedure or technology that requires alteration to the System. • "System Subscriber Equipment" is defined as all equipment used to support user access to the System including Subscriber Units and other supporting equipment such as dispatch center console equipment, antennas, batteries, etc. • "System User" is defined as an individual or agency authorized to access the System. • "System Watch Network Operation Center" is a Lead Agency staffed support center responsible for the 24/7 support of the System. This includes but not limited to, live monitoring, notifications, troubleshooting, callouts, and repair. • "Talkgroups" are used to identify groups of users who communicate together on a trunked radio system. 1.3 Amendment Process The Governance Committee is authorized to make future updates, amendments, or modifications to the Agreement and its attachments without further action of the Governing Authorities, so long as the updates, amendments, or modifications to the Agreement and its attachments would result in minor, non -substantive changes that do not create or increase the financial obligations of the Partner Agencies. Where the Governance Committee is authorized to make such updates, amendments, or modification, such delegated authority shall be expressly granted in this agreement. This agreement may also be amended or modified by the consent of all of the Governing Authorities representing the Partner Agencies. 1.4 Liability Each Party of this Agreement (the "Indemnitor") shall indemnify, defend, and hold all other Parties, and their agents and employees (the "Indemnitees") harmless from all claims, liabilities, damages, and losses to the Indemnitees arising out of any acts or omissions of itself and its agents and employees in connection with the performance of this agreement which acts or omissions constitute gross negligence. 1.5 Withdrawal from System Any Party may withdraw from this Agreement by serving written notice to the Governance Committee of their intent to withdraw. Due to the cost distribution model used to fund the operation of the System, any Party withdrawing from this Agreement will financially impact the remaining Parties. As such, Parties wishing to withdraw from this Agreement shall do the following: 1) Withdrawing Party provides written notice twelve months prior of withdrawal after meeting its financial obligations under this agreement. M Hr<acnmeni H - jomi Hgreemeni Tor uuu imriz LLL,,.) gage i or ua 2) Withdrawing Party will attend the Governance Committee meeting following their submittal to discuss withdrawal process. 3) Withdrawing Party will work with the Lead Agency to effect the withdrawal. 4) Withdrawing Party will make all Operational Cost payment obligations for the full fiscal year of the withdrawal. 5) Withdrawing Party will be responsible for all Lead Agency Costs associated with the withdrawal process. Withdrawing Party will not be responsible for any financial obligations assumed by the other Partner agencies subsequent to withdrawal and upon fulfillment of existing financial obligations. Similarly, it is understood that the County of Orange has ownership of the System and certain sites as well as FCC licenses presently issued to the County, and upon any withdrawal by any Parties to the Agreement, any and all right, title, and interests in the System, those sites and FCC licenses shall remain with the County. Should the County of Orange wish to withdraw, an orderly transition to the remaining Parties must be affected. 2.0 GOVERNANCE COMMITTEE 2.1 Governance Committee Authority The Governance Committee shall be governed in accordance with the Governance Committee Bylaws attached hereto as Attachment A. Any future updated revisions or amendments to the Governance Committee Bylaws shall be deemed adopted by this agreement without further action of the Governing Authorities. 2.2 Governance Committee Member Appointment The Governance Committee shall be comprised of nine (9) members, as identified below. It will also be responsible for coordinating with their appropriate associations/agencies on issues involving the appropriate Governing Authorities approvals: • Four City Managers appointed by the Orange County City Managers' Association • Orange County Chief Executive Officer, or Designee • Orange County Sheriff -Coroner, or Designee • Orange County Public Works Deputy Director, or Designee • Orange County Chief of Police & Sheriffs Association (OCCOPSA) Chief or Designee not from a city currently represented on the governance committee • Orange County Fire Chiefs Association (OCFCA) Fire Chief or Designee not from a city currently represented on the governance committee 2.3 Governance Committee Purpose The Governance Committee oversees all aspects of the implementation, operation, and fiscal management of the system, including but not limited to, the following: • Approving System operational policies • Addressing System operational issues 7 Htiacnmeni H - JOlni Hgreemenr Tor t5uu Iviriz L L.L.J rage is or W • Resolving operational policy or fiscal matter disputes of Partner Agencies. • Addressing System facilities development • Reviewing and approving modification and enhancement plans • Approving contract pricing changes • Approving Annual System Operational Budget and Cost Sharing Allocations. • Approving 10 year capital plans and allocation of Reserve Fund for required upgrades. • Approving New Partner Agencies. • Approving Sponsored Agencies. 3.0 MEMBERS TO THE SYSTEM Members are all agencies authorized by the Governance Committee to use the system and who have signed this agreement. 3.1 Lead Agency The lead agency is designated to be the Orange County Sheriff's Department Technology Division and will manage, maintain, and enhance the system. Lead Agency is responsible for System Administration as outlined in Section 4 below. 3.2 Partner Agencies Partner Agencies are authorized subscribers to the System who have signed this Joint Agreement or added as New Partner Agencies via the process outlined in 3.2.1 below. Partner agencies agree to share in the System Operational Costs and System Maintenance Costs as outlined in Section 5 below. 3.2.1 New Partner Agencies Agencies that wish to become an authorized subscriber to the System may be added as a New Partner Agency via the following steps: 1) The prospective New Partner Agency submits an official request, in writing, to the Lead Agency requesting to join as a Partner Agency. 2) Lead Agency gathers additional information from requesting New Partner Agency to determine the feasibility of the request and the potential impact on the System operation and the existing Members. 3) The Lead Agency processes the request to obtain approval. 4) Lead Agency presents the request to the Governance Committee along with previous approvals from appropriate Governing Authorities. Governance Committee will determine final approval or denial of the request. 5) Once all approvals have been obtained, requesting New Partner Agency will execute a copy of this agreement along with the associated New Partner Agency forms identified in Attachment B. 6) The approved New Partner Agency will purchase necessary radio equipment and arrange to pay associated New Partner Agency costs described in in 5.2 below. E. Huacnmeni H - joint Hgreemeni Tor t5uu iiiriZ VVt,a rage a or tsa 3.2.2 Sponsored Agencies Partner Agencies may, with Lead Agency review and Governance Committee Approval, sponsor non -partner agencies to participate in the system. 3.2.2.1 Sponsored Agencies Approval Process: 1) Sponsoring Partner Agency submits to the Lead Agency an official written request to add a Sponsored Agency. 2) Lead Agency gathers relevant information from Sponsoring Partner Agency to determine the feasibility of the request and the potential impact on the System Operation and the existing Members. 3) Lead Agency reviews all available information to determine the feasibility of the request to add the Sponsored Agency. Lead Agency shall work with the Sponsoring Partner Agency to determine the additional costs to the Sponsoring Partner Agency. 4). Lead Agency presents the request to the Governance Committee at a Governance Committee Meeting. Governance Committee shall approve or deny the addition of the Sponsored Agency. 3.2.2.2 Sponsored Agency Access and Limitations Sponsored Agencies are only allowed access to use the common talkgroups/channels and select agency specific talkgroups/channels of the sponsoring Partner Agency, as recommended by the Lead Agency and approved by the Governance Committee. Sponsored Agencies do not have a role in defining the operation of the System. The inclusion or exclusion of Sponsored Agencies in the System will be determined by the Governance Committee and will be reviewed annually or as needed. Partner Agencies shall be responsible for any System use by a Sponsored Agency. Sponsored Agencies must use the same common talkgroups as the sponsoring Partner Agency. 3.2.2.3. Sponsored Agency Financial Responsibilities Sponsored Agency financial responsibilities are outlined in section 5.2.4 below. 3.3 Mutual Aid Agencies Certain governmental agencies may, with Lead Agency review and Governance Committee Approval, be granted access to the System for the express purpose of providing mutual aid to Partner Agencies. Mutual Aid agencies are limited to and identified within ATTACHMENT C 3.3.1 Mutual Aid Agency Approval Process: 1) Any Partner Agency may submit to the Lead Agency an official written request to add a Mutual Aid Agency. /-umcnmeni H - joini Hgreemeni Tor ouu Mriz Lew rage .1 u or us 2) Lead Agency gathers relevant information to determine the feasibility of the request and the potential benefit to existing Partner Agencies and overall public safety in Orange County. 4) Lead Agency presents the request to the Governance Committtee at a Governance Committee meeting. The Governance Committee shall approve or disapprove the addition of the Mutual Aid Agency. 3.3.2 Mutual Aid Agency Access and Limitations Mutual Aid Agencies are only allowed access to use the common talkgroups/channels and the mutual aid channels associated with other systems that are included in our radio programming. Mutual Aid Agency use of the System is restricted to the actual duration of a mutual aid incident. Mutual Aid Agencies do not have a role in defining the operation of the System. The inclusion or exclusion of Mutual Aid Agencies in the System will be determined by the Governance Committee and will be reviewed annually or as needed. 3.3.3 Mutual Aid Agency Financial Responsiblities Mutual Aid Agency financial responsibilities are outlined in section 5.2.5 below: 4.0 SYSTEM ADMINISTRATION The Lead Agency shall have the authority and responsibility to maintain the proper operation of the System. The Lead Agency shall be responsible for maintaining, managing, and operating the System, which includes staffing the System Watch Network Operations Center on a continual basis (e.g., 24x7x365), assuring the seamless operation of the System. 4.1 System Equipment The Lead Agency shall approve and evaluate all equipment and new technology for use with the system to ensure that it meets the requisite technical standards and requirements. Approved equipment must meet the standards set by the Federal Communication Commission as well as any Federal, State, and Local Laws. 4.2 System Subscriber Equipment Each Member Agency is responsible for the maintenance, management, and operation of its System Subscriber Equipment. A Member Agency may establish a System Subscriber Equipment maintenance contract with the Lead Agency. Prior to making any modifications to System Subscriber Equipment, including but not limited to adding radios or alteration to dispatch center equipment, Member Agencies must request such modifications to be reviewed and approved by the Lead Agency as outlined in section 4.4. 4.3 Dispatch Centers Member Agencies may operate their own Dispatch Centers at their discretion. Individual Member Agencies that manage their own Dispatch Centers shall be responsible for the day to day maintenance, management, and operation of those Dispatch Centers, equipment and associated facilities. Day to day dispatch operations and protocols shall be left to the individual Members 10 /-macnmeni H - joint Hgreemeni Tor uuu iviriz t,L.La rage .i .i OT us Agencies. The Lead Agency will not be responsible for the maintenance or management of Members Agencies' individual Dispatch Centers unless a Member User contracts with the Lead Agency for maintenance, management, or operations. 4.3.1 Dispatch Center Equipment Dispatch Center Equipment must meet the technical standards as outlined in Section 4.1. 4.3.1.1 Dispatch Center Required Equipment Upgrades The Governance Committee may mandate equipment upgrades for Member Agencies Dispatch Center Equipment. If the Governance Committee mandates an Equipment Upgrade to Members Agencies' Dispatch Center Equipment, then the Members Agencies must upgrade their equipment as directed by the Governance Committee. 4.3.1.2 Dispatch Center Non -Required Equipment Upgrades Members Agencies may upgrade their Dispatch Center equipment and associated facilities at their own cost without coordination with the Lead Agency so long as the upgrade will not adversely affect the System itself. However, Member Agencies must coordinate with the Lead Agency as outlined in the System Modifications section 4.4, below, when upgrading or modifying any Dispatch Center equipment vital to the operation of the System. Dispatch Center Equipment modification requiring coordination with the Lead Agency includes, but is not limited to: computer equipment, software, consoles, routers, switches, gateways, firewalls, control stations, and antenna systems. 4.4 System Modifications The System will require occasional routine modifications, which shall be conducted as outlined in this section. 4.4.1 System Modifications requiring Governance Committee Approval The following System Modifications require the pre -approval of the Governance Committee, as outlined in the Governance Committee By -Laws: A. Addition of any New Member Agencies to the System. B. Any modification that adds a financial burden shared by the Member Agencies. C. Any modification that would affect a System User other than the requesting Member Agency. The Lead Agency is required to provide a report and recommendation to the Governance Committee on any proposed System Modification that requires Governance Committee approval. The Lead Agency report and recommendation must provide a financial analysis of the System Modification, if appropriate, and an estimated timeline to complete the System Modification. The Lead Agency is responsible for implementing any Governance Committee approved modification. 11 Hriacnmeni H - aoini HgreemenT Tor uuu roriz LLL,a rage -iz or us 4.4.2 System Modification by Lead Agency The Lead Agency is authorized to perform System Modifications, as necessary. The Lead Agency has the discretion to implement System Modifications without prior Governance Committee Approval, so long as the modification does not require Governance Committee approval as listed in Section 4.4.1 of this agreement, and does not cause unanticipated or unbudgeted costs to Member Agencies. 4.4.3 System Modifications requested by Partners Agencies Partner Agencies may request system modifications. System Modification requests from Partner Agencies must be submitted in writing to the Lead Agency for review and approval. If the Lead Agency grants a Partner Agency modification request, and the request does not require Governance Committee Approval as outlined in Section 4.4.1, then the Lead Agency shall provide the Partner Agency with a formal approval, including all costs of the requested modification. If a Member Agency agrees with the official permission, the Member Agency may request the Lead Agency to implement the System Modification. Any and all costs associated with implementing the System Modification will be the sole responsibility of the System User requesting the modification. If a Member Agency modification request requires Governance Committee approval per Section 4.4.1 above, then the Lead Agency and the Member Agency requesting the modification shall present the modification request to the Governance Committee for approval. The modification request shall include the reason for the modification, the Lead Agency's recommendation and cost analysis of implementing the modification. 4.4.4 Appeal of Modification Request Denial If the Lead Agency denies a Member Agency's modification request, the Lead Agency shall provide the Member Agency, in writing, the reasons for the denial. Members Agencies may submit a written appeal of the decision of the Lead Agency to the Governance Committee within 90 days of the denial notification. The Lead Agency will ensure the appeal is added to the next Governance Committee meeting agenda for action. 4.4.5 Notification of System Modifications to Governance Committee Lead agency is required to provide a list of implemented, pending and requested System Modifications at each Governance Committee Meeting. 4.5 Security The Lead agency has in place a Security Plan for the System (Attached as Attachment D.) Member Agencies and System Users are required to protect the security of the System as set forth in the Security Plan. System Users are required to contact System Watch for any actual or potential security breach to the System as soon as the actual or potential security threat is known. The Lead Agency must evaluate any reported security breaches and is authorized to implement measures to remediate the 12 ,Q. /-umcnmeni H - aoinr Hgreement Tor uuu iviriz rage -i,s or ua security breach. If appropriate, the Lead Agency shall inform the Governance Committee of any reported breach and steps taken to remediate. 4.6 Maintenance & Service Contracts Within approved and adopted budget, the Lead Agency is authorized to enter into contracts with vendors as needed for the ongoing execution of this agreement. Such contracts include, but are not limited to, the purchase or lease of equipment, installation of equipment, service and/or maintenance of equipment, and System upgrades. All contracts shall comply with applicable law and purchasing policies and guidelines. Appropriate shared costs will be included in System Operational Costs cost-sharing allocations. The Lead Agency shall negotiate and enter into contracts with vendors as intended in this agreement and shall make payments due and payable under such contracts on behalf of the parties. The Lead Agency will serve as an administrative liaison between the other Member Agencies and the contracted vendors. 4.7 System Standard Operating Procedures The Lead Agency is responsible for the development and maintenance of the Standard Operating Procedures ("SOP") (Attachment E) for the system. The Lead Agency shall coordinate with System Users, including but not limited to Law Enforcement, Fire Services, Marine Safety, and Public Works in developing and updating the SOP. The SOP, and any amendments to the SOP, must be approved by the Governance Committee. All Member Agencies must follow the SOP and any amendments to the SOP once approved by the Governance Committee. 4.8 Partner Agency Operational Policies and Procedures Member Agencies must inform the Lead Agency of any changes to their operational policy or procedures, in writing and prior to any implementation of such changes, if the change of operational policy or procedure affects or may affect the System. The Lead Agency will work with Member Agencies to ensure that operational policies and procedures are compatible with the System. The Lead Agency shall work collaboratively with Member Agencies to settle any disputes regarding Member Agency Operational Policies and Procedures. The Lead Agency shall bring any dispute to Member Agency Operational Policies and Procedures to the Governance Committee for review and resolution if a dispute cannot be resolved between the Lead Agency and the Member Agency. 5.0 FINANCIAL ADMINISTRATION 5.1 Governance Committee Financial Authority The Governance Committee shall have the authority to allocate available budgeted funds as they deem appropriate for the operation, maintenance, and management of the system. Governance Committee has the authority to approve the System Operations Budget, set rates and fees, and approve use of the Reserve Fund for necessary expenditures and upgrades. Governance Committee has the authority to approve capital expenditure funding and approved sources of the reserve fund. 5.2 Partner Agencies Financial Obligations Partner Agencies and New Partner Agencies are responsible for certain financial obligations including, but not limited to, the following. 13 Hnacnmeni H - JOlnt Hgreement Tor t uu Mriz VVVa rage -14 OT i5J 5.2.1 System Operational Costs All Partner Agencies shall contribute to the System Operational Costs via the Systems Operations Budget and administered as described in section 5.3 below. 5.2.2 System Entry Fees/Upgrade Fees Some Partner Agencies must pay System Entry Fees when they enter/register a radio into the System for activation based on the System Entry Fee established by the Governance Committee. The Lead Agency shall submit their recommendation of the System Entry Fees for Governance Committee approval at the same time the System Operations Budget (Section 5.3) is submitted for approval annually. The System Entry Fees are necessary to recoup/offset costs that were required during the previous System upgrade Partner Agencies that financially contributed to the previous System Upgrade are not required to pay System Entry Fees. Legacy Partner Agencies that are not required to pay System Entry Fees are listed in attachment C. Partner Agencies not listed in attachment C and any New Partner Agencies are required to pay the System Entry Fee for each radio they add to the System. System Entry Fees are billed on a per radio basis. The Lead Agency shall invoice the Partner Agency or New Partner Agency for any System Entry Fees at the approved per radio rate when a new radio is entered into the System on behalf of that Partner or New Partner. System Entry fees shall be deposited into the Reserve Fund as outlined in section 5.6 below. Over -the -air upgrade programming of radio equipment will not be charged and limited to two annually per Member Agency. Any additional upgrades past the two annually will incur a cost. 5.2.3 Miscellaneous Rates and fees As stated in 5.1 above, the Governance Committee has authority to set rates and fees as necessary. The Lead Agency may charge Partner Agencies and New Partner Agencies via invoice. Partner Agencies shall pay invoice within thirty (60) days of the date of the invoice. Governance Committee shall set any Miscellaneous Rates and Fees annually. Lead Agency shall submit their recommendation for Miscellaneous Rates and Fees at the same time they submit the System Operations Budget (Section 5.3) for approval. 5.2.4 Mutual Aid Agencies Mutual Aid Agencies are not authorized to use the System for day-to-day communications but are limited to use of the System only when providing emergency assistance to Partner Agencies. As such, Mutual Aid Agencies are not included in the System Operations cost share calculations or System Entry Fees. Mutual Aid Agency equipment and programming costs will be the responsibility of the Mutual Aid Agency. 14 Ht<acnmeni H - aoini Hgreemeni Tor tsuu ivit iz c,L ut, rage -i o or zso 5.2.4 Sponsored Agencies The sponsoring Partner Agency is responsible for the costs, rates, and fees of any Sponsored Agency it sponsors on the System, unless otherwise approved by the Governance Committee. System Entry Fees per 5.2.2 above shall not apply to System Subscriber equipment for a Sponsored Agency. 5.3 System Operations Budget The Lead Agency will submit the proposed System Operations Budget for approval to the Governance Committee no later than one hundred and twenty (120) days prior to the beginning of the fiscal year. Governance Committee shall be responsible for approving the System Operation Budget no later than ninety (90) days prior to the fiscal year. 5.3.1 Partner Agency Cost The Lead Agency shall submit the Partner Agency Cost Share to the Governance Committee along with the System Operations Budget in 5.2 above. The Governance Committee shall be responsible for approving the Partner Agency Cost Share, along with the System Operations Budget. Partner Agency Cost Share shall be calculated based on the number of Subscriber Units each agency operates on the System as a percentage of the total number of Subscriber Units operating on the System. This will determine the agency's share of the annual System Operations Budget. 5.3.2 Payment Remittance Partner Agencies are required to remit payments to the Lead Agency for their contribution for use of the System. The Lead Agency shall invoice Partner Agencies quarterly. Lead Agency shall issue invoices no later than thirty (30) days after the beginning of each quarter. Partner Agencies shall pay invoice within thirty (30) days of the date of the invoice. 5.4 Year End Settlement At the end of each fiscal year, the Lead Agency shall submit a financial review with the actual System Operational Costs from the previous fiscal year to the Governance Committee. The findings of the financial review shall be reported in writing to the Partner Agencies on the system. Thereafter, to the extent there have been contributions made by the Partner Agencies which exceed the actual System Operations Costs, the number of said excess contributions shall be deposited into the Reserve Fund (see 5.5), unless the Governance Committee deems otherwise. In the event of a shortfall, each Partner Agency shall be billed its pro -rata share of the shortfall, which shall be paid in the first quarter payment for the next fiscal year following the fiscal year of the shortfall. 5.5 Ten -Year Plan The Governance Committee, in conjunction with the Lead Agency, will be responsible for evaluating and planning for future upgrades. Doing so will ensure the continued structural 15 Hnacnmeni H - aomi Hgreement Tor uuu iviriz LL.La rage -10 0T?J-3 integrity of System equipment and Sites and any necessary maintenance or repairs, and allocating for unforeseen events which may lead to additional expenses outside of the standard operational costs. Such items will be defined within a Ten -Year Plan, which will be presented to and approved annually by the Governance Committee. The Lead Agency shall submit an updated Ten -Year Plan to the Governance Committee annually for review and approval. 5.6 Reserve Fund The Governance Committee shall review and approve a long-term financial plan to ensure funds are available for the System's capital needs as defined in the annually updated Ten -Year Plan, as well as for any unforeseen emergency expenses. A Reserve Fund has been established to ensure adequate funds are available for ongoing maintenance, upgrades, and unforeseen expenses which may arise outside of operational costs. 5.6.1 The Reserve Fund shall be funded in the following manner: 5.6.1.1 Contributions by Partner Agencies The Partner Agencies are responsible for providing funds for deposit to the Reserve Fund. The Lead Agency shall submit the cost of each Partner Agency along with the Fiscal Year Budget described in section 5.3. The Governance Committee shall approve the Reserve Fund contributions as part of the annual budget review and adoption process. 5.6.1.2 System Entry Fees All System Entry Fees collected per 5.2.2 of this Agreement shall be deposited into the Reserve Fund. 5.6.1.3 System Operation Budget Surplus In the event of a System Operation Budget Surplus at the Year -End Settlement, that System Operation Budget Surplus shall be deposited into the Reserve Fund. 5.7 System Modification Cost Any costs associated with System Modifications shall be addressed as outlined is section 4.4 of this agreement. 16 Attachment A - Joint Agreement for 800 MHz CCCS Page 17 of 83 IN WITNESS WHEREOF, the Partner agencies hereto have set their hands and seals on the date set forth opposite their respective signatures on identical counterparts of this instrument, each which shall for all purposes be deemed an original thereof. COUNTY OF ORANGE By: Board of Supervisors, (;�1L1t�Yhovt�. Dated: Approved As to Form: County Counsel APPROM AS TO FORA COUNiYCIIUNMOF MGECUUXR CAUf" CITY OF: City Clerk Dated: Approved As to Form: City Attorney G Chairman ATTEST:' Dated: of �2� ln 17 FACSIMILE SIGNATURE AUTHORIZED PER G.C. SEC. 25103, RESO 79-15:•3 SIGNED AND CERTIFIED THAT COPY C THIS DOCUMENT HAS BEEN DELIVERE6 �C't °f Ort TO THE CHAIR OF THE BOARD o ,'n ATTEST. i ROBIN STIELER CLERK OF THE BOARD OFSUPERVISORS ORANGE COUNTY, CALIFORNIA 0 Httacnment H - joini Hgreemeni Tor tsuu iviriz LLL,,.) APPROVED AS TO FORM: Dated: ATTEST: Authority Counsel Clerk of the Authority rage -10 or 65 ORANGE COUNTY AGENCY LIM Dated: ATTEST: Chairman Clerk of the Authority APPROVED AS TO FORM: APPROVED AS TO FORM: In Authority Counsel Dated: LI -A Dated: Authority Counsel 18 Hnacnmeni H - joint Hgreemeni Tor tsuu iviriz uuua rage -i a or tso BYLAWS 800 MHz GOVERNANCE COMMITTEE Page 1 Article 1 Name Section 1. The name of this body is the 800 MHz GOVERNANCE COMMITTEE, hereinafter referred to as the "Governance Committee." Article 2. Purpose and Authority Section 1. It is the purpose of the Committee to oversee implementation and operation of the 800 MHz Countywide Coordinated Communications System (the "System"), including Member Agency compliance with payment schedules, addressing operational issues affecting System operation and site development, reviewing and approving conversion, modification and enhancement plans, approving contract pricing changes, resolving disputes between Member Agencies, operational and fiscal matters necessary for the operation and maintenance of the System, and performing any other responsibilities required to implement the Joint Agreement. The Governance Committee shall be responsible for approving the 800 MHz Project System Operations Budget operating and Reserve Fund that are jointly funded by the Parties to the Joint Agreement. Section 2. The Governance Committee was established November 23, 2004, and amended June 2, 2015, by the Orange County Board of Supervisors (the "Board") and Parties to the Joint Agreement to facilitate the operation, maintenance and financial management of the 800 MHz CCCS. Section 3. This Governance Committee will operate under the revised Board authorization of the re -written Joint Agreement to facilitate the operation, maintenance, and financial management of the 800 MHz CCCS established on Article 3. General Operating Mandated Regulations and Statutes Section 1. The Governance Committee must adhere to all local, state and federal regulations and statutes that may, from time to time, apply. Section 2. The Committee shall be subject to the provisions of The Brown Act (commencing with Section 54950 of the Government Code) relating to public meetings of local governmental advisory boards. Section 3. The Governance Committee must comply with the County's non-discrimination and zero tolerance sexual harassment policies. Section 4. The Governance Committee must comply with the County's Code of Ethics, which outlines the County's clear expectations for behavior in relation to the members' duties as public servants. Hnacnmeni H - joini Hgreemeni Tor uuu Mriz uuua rage zu or 0.3 BYLAWS 800 MHz GOVERNANCE COMMITTEE Page 2 Section 5. The Governance Committee shall operate strictly within its designated purpose. Article 4. Membership and Term of Office Section 1. Appointment. The Committee shall be comprised of nine (9) members, as identified below, and will also be responsible for coordinating with their appropriate associations/agencies on issues involving the appropriate Governing Authorities approvals: • Four City Managers appointed by the Orange County City Managers' Association • County Executive Officer, County of Orange, or Designee • Sheriff -Coroner, or Designee • Orange County Public Works Resources and Development Management Department Director, or Designee • Orange County Chief of Police & Sheriffs Association (OCCOPSA) Executive Director, or Designee • Orange County Fire Chiefs Association (OCFCA) Fire Chief or Designee Each member must designate and name an alternate as a voting member if member cannot attend. Section 2. Terms. Committee members shall be appointed for a two (2) year term. Members may serve for multiple additional two (2) year terms upon reappointment to each new term in accordance with Article 4, Section 1 above. Section 3. Removal. The Governance Committee, by majority vote, may remove members of the Committee any time without cause. In addition, if a committee member misses three (3) consecutive Governance Committee meetings (whether regular or special meetings), said Governance Committee member will be deemed automatically removed without further Governance Committee action. Section 4. Vacancies. A vacancy on the Governance Committee shall be filled by majority vote of the Governance Committee in accordance with Article 4, Section 1 above. Such vacancy should, if possible, be filled within 30 days of vacancy. Article 5. Meetings Section 1. Regular meetings shall be held on a quarterly basis. Governance Committee meetings shall be fixed on the first month of each quarter (January, April, July, and Hnacnmeni H - joini Hgreement Tor uuu iviriz ut-t,a rage /n or 06 BYLAWS 800 MHz GOVERNANCE COMMITTEE Page 3 October) on the fourth Wednesday at 1:30 PM unless a majority of the Committee members determine that an alternate fixed meeting day and time within the designated months is required to maximize member attendance. At least 72 -hours prior to a regular meeting, an agenda shall be posted that contains a brief general description of each item to be covered in the meeting. Section 2. Special meetings may be held on 24-hour public notice, including a binding agenda with brief general description of items to be covered at the meeting. Any special meeting notice must be publicly posted in accordance with all applicable laws and must be received by Committee members at least 24 hours in advance (Government Code Section 54956). Section 3 A majority five (5) of the members shall constitute a quorum to conduct business. Section 4. Only Governance Committee members may vote on items on the Agenda and each member may have only one vote. Section 5., Governance Committee meetings may be rescheduled or canceled in accordance with the Brown Act. Orange County Sheriff Technology staff shall act as the Clerk of the Board for meeting rescheduling purposes. Article 6. Officers Section 1. The officers shall consist of a Chairperson and Vice Chairperson. The elected Chairperson shall conduct the meetings. Section 2. The elected Vice Chairperson shall conduct regular Governance Committee meetings in the absence of the Chairperson; and do everything necessary to assist the Chairperson in related duties. In the event that both the Chairperson and the Vice Chairperson are absent from the same committee meeting, the remaining Governance Committee members present may appoint one of them to be the Chairperson for that meeting. Section 3. Elections for Chairperson and Vice Chairperson shall be conducted by the full Governance Committee and shall occur in April of each year. The Chairperson shall call for nominations from the Governance Committee members and the Chairperson will initiate a vote. A majority vote of the Committee members present is required for each candidate to be elected as Chairperson and Vice Chairperson. Article 7. Staffing Section 1. Orange County Sheriff Technology staff secretary will provide secretarial support to the Governance Committee. Orange County Sheriff Technology staff secretary shall prepare and publish the Committee's agenda for each meeting. Orange County /-xnacnmeni H - joint Hgreement Tor uuu ivwr-iz rage zz or ?5s BYLAWS 800 MHz GOVERNANCE COMMITTEE Page 4 Sheriff Technology staff shall call for attendance at the beginning of each meeting, keep the minutes, and perform other clerical duties as appropriate to the position. He/she shall retain the attendance records including the minutes. Article 8. Compensation Section 1. Governance Committee members shall receive no compensation for their service. Article 9. Amendments. Review, Dissolution and Effective Date Section 1. This Committee will operate as established by the Board of Supervisors on November 23, 2004 and revised by the Board of Supervisors in , 2021 Section 2. These Bylaws shall supersede all previous Bylaws and shall become effective on upon the approval of the Board of Supervisors. Section 3. These Bylaws shall remain in effect until amended, revised or terminated by the Board of Supervisors and Parties to the Joint Agreement. Section 4. The Board of Supervisors and Parties to the Joint Agreement may make amendments to the Bylaws at any time. Section 5. This Governance Committee can be terminated at any time, without cause, by action of the Board of Supervisors and Parties to the Joint Agreement. Httacnment H - joint Hgreemeni Tor isuu ivityz LL.L.a rage z,s or us .SNERtFp Project No: Project Name: Project Location: NEW PARTNER AGENCY RIDER TO JOINT AGREEMENT FOR THE OPERATION, MAINTENANCE AND FINANCIAL MANAGEMENT OF THE ORANGE COUNTY 800 MEGAHERTZ COUNTYWIDE COORDINATED COMMUNICATIONS SYSTEM This New Partner Agency Rider ("NPA Rider") is entered into on , ("Effective Date"), by and between (hereinafter referred to as "NEW PARTNER AGENCY") and the Orange County 800 Megahertz Countywide Coordinated Communications System Governance Committee (hereinafter referred to as "GOVERNANCE COMMITTEE). For the purposes of this agreement, the GOVERNANCE COMMITTEE represents the Partners (hereinafter referred to as "JOINT AGREEMENT PARTNERS") of the Joint Agreement for the Operation, Maintenance and Financial Management of the Orange County 800 Megahertz Countywide Coordination Communications System (hereinafter referred to as "JOINT AGREEMENT") (Section 1.4.1 of the JOINT AGREEMENT). GOVERNANCE COMMITTEE and NEW PARTNER AGENCY may be referred to individually herein as a "Partner" or collectively as the "Partners." RECITALS I. WHEREAS, JOINT AGREEMENT PARTNERS entered into the JOINT AGREEMENT in 2020; and, II. WHEREAS, NEW PARTNER AGENCY, executed a copy of the JOINT AGREEMENT in accordance with Section 12.1 of the JOINT AGREEMENT on ; and, III. WHEREAS, NEW PARTNER AGENCY executed a copy of the New Partner Agency Agreement per Section 3.2.1 of the JOINT AGREEMENT on ; and, IV. WHEREAS, Section 2.1,"Governance Committee Authority", and Section 3.2.1, "Adding New Partner Agencies", of the JOINT AGREEMENT grants the GOVERANANCE COMMITTEE the authority to enter into a separate agreement with NEW PARTNER AGENCY to establish additional terms, conditions, and costs for entry into the Countywide Coordinated Communications System (the "CCCS")• and, V. WHEREAS, the JOINT AGREEMENT in Section 1.4 "Liability" provides for indemnification only between those Partners listed in Exhibit A of the JOINT AGREEMENT (and would not include NEW PARTNER AGENCY); and, VI. WHEREAS, Section 1.4.1 of the JOINT AGREEMENT, "New Agency Liability Rider", grants the GOVERNANCE COMMITTEE the authority to enter into a Liability Rider that shall, for all intents and purposes, make the NEW PARTNER AGENCY, a Partner in Section 1.4. Page 1 of 3 Rider to Joint Agreement for the Operation, Maintenance and Financial Management of the Orange County 800 Megahertz Countywide Coordination C.nmmimientinnq gvcte.m HtZacnmeni H - joint Hgreemeni Tor uuu iviriz Lt.L,a rage z4 oT oo VII. WHEREAS, the GOVERNANCE COMMITTEE and NEW PARTNER AGENCY now desire to enter into a separate agreement (this NPA Rider) to establish additional terms and conditions by including NEW PARTNER AGENCY in the indemnity provision of the JOINT AGREEMENT per Section 1.4; NOW THEREFORE, in consideration of the Recitals above, the receipt of which the Partners acknowledge herein, and which are incorporated herein by this reference, and the mutual covenants and agreements hereinafter contained, the GOVERNANCE COMMITTEE and NEW PARTNER AGENCY do hereby agree as follows: A. NEW PARTNER AGENCY LIABILITY. NEW PARTNER AGENCY shall now be included as a Partner as stated in Section 1.4 of the JOINT AGREEMENT. Except as otherwise expressly set forth herein, all terms and conditions contained in the JOINT AGREEMENT, including any amendments/modifications, are hereby incorporated herein by this reference as if fully set forth herein and shall remain in full force and effect. THE REMAINDER OF THIS PAGE WAS INTENTIONALLY LEFT BLANK Page 2 of 3 Rider to Joint Agreement for the Operation, Maintenance and Financial Management of the Orange County 800 Megahertz Countywide Coordination C.nmmnniratinna Cvctrm Httacnmeni /-\ - ,Joint Hgreemeni Tor tsuu sysriz L.t,L,a rage zo OT60 IN WITNESS WHEREOF, the Partners have executed this New Partner Agency Rider on the day and year first written above. GOVERNANCE COMMITTEE NEW PARTNER AGENCY 0 Date: Date: Page 3 of 3 Rider to Joint Agreement for the Operation, Maintenance and Financial Management of the Orange County 800 Megahertz Countywide Coordination C'.nmmimiratinm Cvctrm Hnacnmeni H - jomi ,ygreement Tor tsuu ivir-iz uuw rage zt) or ts.s A. LEGACY PARTNER AGENCIES — Partner Agencies that financially contributed to the previous System Upgrade: Aliso Viejo, Anaheim, Brea, Buena Park, Costa Mesa, Cypress, Dana Point, Fountain Valley, Fullerton, Garden Grove, Huntington Beach, Irvine, La Habra, La Palma, Laguna Beach, Laguna Hills, Laguna Niguel, Laguna Woods, Lake Forest, Los Alamitos, Metronet, Mission Viejo, Newport Beach, Orange, Placentia, Rancho Santa Margarita, San Clemente, San Juan Capistrano, Santa Ana, Seal Beach, Stanton, Tustin, Villa Park, West -Comm, Westminster, Yorba Linda, Orange County Fire Authority, CEO, District Attorney, Health Care Agency, John Wayne Airport, Animal Control, OC Lifeguard, OC Parks, OC Waste & Recycling, OC Public Works, Probation, OC Sheriff, Social Services Agency, Orange County Transportation District, Irvine Valley College Police, Santa Ana Unified School District Police, Saddleback College Police B. MUTUAL AID AGENCIES ATF, CA State Parks, California Corrections & Rehabilitation, CHP, Downey Fire, Lake Mission Viejo LG, Loaners, Long Beach Fire, Long Beach PD, Los Alamitos Armed Forces Reserve, LA County Fire, LA Sheriff, San Diego Sheriff Aviation, Santa Fe Springs Fire, Signal Hill PD, DOJ, UCI Irvine, US Marshals, USMC Camp Pendleton Fire Httacnment H - joint Hgreemeni Tor mu nnr-iz uuua COUNTY OF ORANGE CALIFORNIA 800 MHz CCCS rage z t oT us (Countywide Coordinate Communications System) STANDARD OPERATING PROCEDURES PREPARED AND DISTRIBUTED BY: ORANGE COUNTY LEAD AGENCY January 2021 Httacnmeni H - joini Hgreement ror ow ivwriz LLLa rage zo or 03 Table of Contents January2021.............................................................................................................................................1 1.0 INTRODUCTION ..........................................................................................................................4 2.0 PURPOSE.......................................................................................................................................4 2.1 Governance...............................................................................................................................4 2.2 Users Group..............................................................................................................................5 2.3 800 MHz CCCS Radio System.............................................................................................5 2.4 Eligible Users............................................................................................................................5 2.5 Acceptable Usage/Radio Discipline.................................................................................5 3.0 SCOPE............................................................................................................................................. 6 3.1 SOP Approval...........................................................................................................................6 3.2 SOP Change Process..............................................................................................................6 4.0 RADIO SYSTEM MANAGEMENT.............................................................................................7 4.1 Radio System Architecture................................................................................................. 7 4.2 Radio System Management................................................................................................8 4.3 Network Management..........................................................................................................9 4.4 Advanced System Keys........................................................................................................10 4.5 Database Management......................................................................................................11 4.6 Subscriber Radio Inventory/Fleetmap.........................................................................12 4.7 Lost or Stolen Radio Notifications.................................................................................12 4.8 System Management Access............................................................................................13 4.9 Requesting System Access...............................................................................................14 4.10 Alias List Standards.........................................................................................................15 4.11 Member Agency Operational Policy Changes........................................................15 4.1.2 Infrastructure Equipment Standards........................................................................16 4.13 Subscriber Equipment Standards...............................................................................18 4.14 System Administrator Standards................................................................................18 4.15 Dispatch Center Personnel Training..........................................................................19 4.16 Incident / Tactical Dispatcher Training....................................................................20 4.17 Radio (Subscriber) User Training...............................................................................21 4.18 Interoperability and non-CCCS Radio Users..........................................................22 4.19 System Upgrade Notification.......................................................................................23 HT[acnmeni H - joini Hgreemeni Tor uuu iviriz uuuo rage zy or 03 4.20 In -building Coverage (Bi -Directional Amplifiers)................................................23 4.21 Aircraft Radio Installations and Operation.............................................................24 4.22 In -building Coverage..........................................................................................................26 5.0 CONFIGURATIONS AND ALLOCATION.............................................................................27 5.1 Zone and Talkgroup Naming Standards......................................................................27 5.2 Radio IU1D Allocation.........................................................................................................28 5.3 Fleetmap Standards............................................................................................................28 5.4 Subscriber Template Management................................................................................30 5.5 Talkgroup Assignments......................................................................................................31 5.6 Talkgroup Sharing....................:...........................................................................................32 5.7 Talkgroup and Radio User Priorities.............................................................................33 5.9 Failsoft Assignments...........................................................................................................33 5.10 Scanning..............................................................................................................................34 5.11 Emergency Button.............................................................................:..............................35 5.12 Encryption...........................................................................................................................36 6.0 INTEROPERABILITY STANDARDS......................................................................................37 6.1 Interoperable Communications Requirements.........................................................37 6.2 Radio Console Patching of Talkgroups/Channels....................................................3s 6.3 Use of the Statewide and National Interoperability Channels ............................40 6.4 Control Station Usage on Interoperability Channels..............................................41 6.5 Required Monitoring of Interoperability Channels..................................................43 7.0 MAINTENANCE RESPONSIBILITIES..................................................................................43 7.1 System Maintenance...........................................................................................................43 7.3 Maintenance / Repair Notifications..............................................................................45 7.4 System Coverage..................................................................................................................47 7.5 Repair Parts Inventory.......................................................................................................48 7.6 Disaster Recovery................................................................................................................4s 8.0 SITE AND SYSTEM SECURITY...........:..................................................................................49 8.1 Site Security...........................................................................................................................49 8.2 Network Operational Security.........................................................................................50 8.3 Software, Firmware and Document Security.............................................................51 9.0 APPENDIX....................................................................................................................................52 /-umcnmem H - JOIni Hgreement Tor t5uu iviriz l.uuzl rage ou or tsa 9.1 Lead Agency Contact Information ................................................................................. 52 9.2 Glossary — Definitions and Acronyms...........................................................................53 1.0 INTRODUCTION The 800 MHz Countywide Coordinated Communications System (CCCS) Standard Operating Procedures (SOP) provides National Incident Management System (NIMS) compliant procedures that are applicable to multi -agency, multi -discipline, all -hazard responses throughout the County of Orange. This SOP ensures consistent protocols and formalizes the operation and usage of the 800 MHz Radio System (System). This SOP will be utilized by CCCS emergency response and support personnel, communications operational and technical personnel, local/State/Federal government representatives, non-governmental organizations, and other System users as authorized by 800 MHz CCCS Governance Committee. All System users shall comply with this SOP. 2.0 PURPOSE The System is an 800 MHz trunked simulcast radio communications system designed to meet the needs of Orange County law enforcement, fire, lifeguard and public works responders and any other authorized users who are supporting these services. This SOP addresses procedural and operational aspects of the System to include: • Operational guidelines. • Technology specifications and requirements. • Usage guidelines. • Training and exercises. • Maintenance and repair. 2.1 Governance The CCCS is governed by the 800 MHz CCCS Governance Committee which was established November 23, 2004 and amended June 2, 2015, by the Orange County Board of Supervisors and Parties to the Joint Agreement to facilitate the operation, maintenance and financial management of the 800 MHz CCCS. The Governance Committee is comprised of nine members including four City Managers, and designees from the County Executive Officer, Sheriff -Coroner, Public Works Director, Orange County Chiefs' of Police & Sheriff's Association and Orange County Fire Chief's Association. The Governance Committee responsibilities include the establishment and enforcement of these Standard Operating Procedures. Additional information on the 800 MHz CCCS Governance Committee membership and responsibilities are documented in the 800 MHz CCCS Governance Committee Bylaws. Httacnment H - joini Hgreemeni Tor uuu iviriz LL.w rage ,s'i or us 2.2 Users Group The 800 MHz CCCS Users Group meetings occur once each quarter. The Users Group meetings allow for the sharing of information from the Lead Agency (Orange County Sheriff's Department Technology Division) regarding the System operations and any upgrade or enhancement projects proposed or in progress. These meetings also allow for Partner Agencies to discuss current concerns or provide input regarding future enhancements. All Partner Agencies are welcome to participate in the quarterly 800 MHz Users Group meetings. 2.3 800 MHz CCCS Radio System The 800 MHz CCCS Radio System (System) is an advanced digital radio communications system built to the Association of Public -Safety Communications Officials (APCO) Project 25 (P25) digital radio standards. The System utilizes radio frequencies in the 800 MHz radio spectrum under the rules and regulations of the Federal Communications Commission (FCC). The System Consists of the following major components: • Radio Communications sites located throughout the County (towers, equipment shelters, generators & site security). • Radio infrastructure (transmitters, receivers, combiners, antennas, etc). • Radio spectrum in the 800 MHz frequency band and microwave radio frequency spectrum. • Microwave radio links between the radio sites and the Loma Ridge Master Site. • Subscriber Units (mobile radios, portable radios, control stations, dispatch consoles). • System Watch Network Operations Center (NOC). The System is designed to provide 95% portable radio coverage, 95% of the time within the Orange County operating area. 2.4 Eligible Users The primary purpose for the System is to support Orange County public -safety and local government agencies' day-to-day operations by providing dependable, interoperable radio communication. Orange County public safety and local government agencies as well as applicable State and Federal government agencies may be eligible for access to the System. System access will be determined by the 800 MHz CCCS Governance Committee in compliance with the 800 MHz CCCS Joint Agreement and with consideration of System capacity. 2.5 Acceptable Usage/Radio Discipline All System users shall follow these policies. The System is to be used for day-to-day operations, emergency response calls, incidents, missions and disasters. The System may also be utilized for planned events, training and exercises with consideration of channel capacity and available talkgroups. This policy clearly defines the discipline for agencies and individuals to follow when using radios on the System. Each Agency is responsible for ensuring their users adhere to proper radio discipline. Hnacnmeni A - joini Agreement Tor uuu iviriz uuua rage sz or u s Misuse of the System shall be reported to the Lead Agency Director to handle directly with the Department Head of the agency involved. The reporting party's contact information should be provided in the notification. No profanity, playing music, personal conversations or activities not directly related to agency business will be permitted on the System. All agencies and individuals shall utilize these communications resources professionally and keep radio conversations as concise as possible. All agencies and individuals utilizing the System must abide by all FCC regulations as stated in Title 47 Part 90 Land Mobile Communications. 3.0 SCOPE This SOP applies to the operational, technical and usage aspects of the System. It is therefore applicable to any user of the System, and applies to government agencies at the local, County, State and Federal levels, as well as authorized non-government users. 3.1 SOP Approval This SOP and subsequent revisions require approval of the 800 MHz CCCS Governance Committee after review by the Lead Agency. 3.2 SOP Change Process Annual Review Requirement The SOP will be reviewed on an annual basis to assess the need for updates or revisions. The Lead Agency Director or designee will be assigned the task of reviewing the SOP, identifying applicable updates, and submitting a draft of the revised SOP for Governance Committee approval. Operational Context The 800 MHz CCCS Governance Committee is charged with approving standards, protocols and procedures for optimal operations between and among the users of the System. Submitting Change Requests Requests to delete, add, and/or change adopted standards, policies and/or procedures may be submitted in writing to the Governance Committee at any time. If the requested change is time critical, the Governance Committee may direct a request for immediate consideration to the Lead Agency Director. Change Request Contents A written request for any change to the SOP submitted to the Governance Committee shall include: • A full description of the deletion, addition, or change including section and subsection references. • The reason for the change (including the potential consequences if the request is not approved). Hnacnmeni H - joint ,ygreement Tor twu ivim rage as 0T?J6 • A preliminary assessment of impact on other System users and an estimate of associated costs, if any. The Governance Committee may direct the Lead Agency Director to conduct an assessment to address: • Technical impact to current and future System performance including which system or subsystems will be or may be affected. • Operational impact to current and future system performance including effects on System capacity and determination of those systems or subsystems that will be or may be affected. • Degree of conformance with Governance Committee approved plans and standards. • Cost impact to current participants. • Potential alternatives. The Lead Agency Director shall forward the completed assessment to the Governance Committee along with recommendations including strategies to mitigate negative impacts, if appropriate. The Governance Committee shall notify all agencies of all requests along with potential impact and invite their comments. The Governance Committee will approve, deny, or modify the requested SOP change. If approved, the Governance Committee will incorporate the applicable SOP modifications and inform System users. Management of Change Process The Governance Committee Chair will manage this process. 4.0 RAD 10 SYSTEM MANAGEMENT 4.1 Radio System Architecture The System is an advanced digital radio communications system built to the Association of Public -Safety Communications Officials (APCO) Project 25 (P25) digital radio standards. The P25 System is a standards based system, and different vendor subscriber radios may be able to access and use it. Due to manufacturer differences outside of the defined P25 standard, not all manufacturer radio features may work with the System. Some radios may interact differently with the existing infrastructure and can potentially exhibit undesirable operational characteristics. As a result, the following procedures must be followed: • All manufacturer's radios must be tested and approved by the Lead Agency prior to being used on the System. • A listing of tested and approved radio models will be maintained by the Lead Agency. Operational Context Auacnmem H - joini /Agreemeni ror t5uu ivimz L.L L b rage .34 or t56 The System is dedicated primarily to public safety agencies, the agencies that support public safety and public utility and service agencies. Protocol / Standard The System utilizes the APCO Project 25 Phase 1 digital radio standard for the voice and control channels. The microwave radio system is a digital system that adheres to Telecommunications Industry Association (TIA) / Electronic Industry Alliance (EIA) standards. 4.2 Radio System Management The Lead Agency is responsible for System administration and the day-to-day management, operation and oversight of the System and for the maintenance of this SOP. While their specific duties are not detailed in this document, their general duties include: • Monitoring the System and components for normal operations. • Diagnosing System performance, problems, and developing corrective action recommendations. • Dispatching appropriate repair services in the event of a malfunction of System equipment. • Managing the database elements, including subscriber IDs, talkgroup IDs, and the various parameters that relate to their effective operation. • Working with all agencies and their technical staff to diagnose and resolve problems that involve radio operations, maintenance or repair of the equipment. • Serving as the point of contact (POC) with equipment manufacturers for issues related to the radio System. • Providing timely information to System users on issues that arise, or repair/maintenance issues related to System equipment that would affect normal radio operations. • Monitoring System databases for normal operations and conducting regular database backups. • Programming of all subscriber radios and dispatch consoles with System access. • Encryption management including managing and maintaining encryption keyloaders. The Lead Agency makes decisions on issues related to the day-to-day operation of the System and addresses urgent or emergency operational, maintenance, or repair decisions. An urgent or emergency situation is one where immediate decision authority is needed to allow the System as a whole, or any of the subsystem components, to continue supporting normal wide -area voice communications services. It is recognized that Lead Agency may have to obtain authorizations from the CCCS Governance Committee to make longer-term or non -emergency capital or repair expenditure decisions. Due to the complexity and distributed administration and maintenance of the System, problems can typically occur when changes are made to hardware or software. In order to keep all System users informed of any updates, notifications will be sent to all dispatch centers and designated User Agency contacts when the following actions occur: Hnacnmeni H - joini Hgreement Tor uuu iviriz L.L.w rage oo or t5o • Planned maintenance work is being performed on the System that will impact performance or System operations • Equipment malfunctions or failures that affect System performance or operation • Configuration changes in equipment or software by any user agency that may impact operations of any other agency 4.3 Network Management Purpose or Objective Defines the responsibilities for network management. Technical Background The System is comprised of, but not limited to, channel banks, hubs, switches, routers, servers, local area networks, and wide area network links connecting sites together. The network sites are interconnected by usage of microwave radio equipment, fiber, Ethernet or telecom T1 circuits. The radio network is monitored with network management tools provided by the equipment manufacturers and/or other vendors. The radio System architecture is primarily constructed around the APCO Project 25 standard. The microwave system is composed of industry standard equipment, which also provides flexibility and a large variety of management and diagnostic tools. The System network is complex. Unusual problems may be difficult to identify and resolve. System documentation shall be kept up to date or it will lose its value in supporting the System network. The System is protected from all other agency data networks to manage the security and functionality of the System. If there is a connection to another data network, it shall be through a manufacturer specified and configured firewall, and approved by the Lead Agency. Operational Context The components of the System are considered as "owned" by the Partnership with responsibility for maintenance of the sites and equipment delegated to the Lead Agency by the authority of the 800 MHz CCCS Governance Committee and the 800 MHz CCCS Joint Agreement. Any required maintenance contractor agreements will be negotiated by the Lead Agency and presented to the 800 MHz CCCS Governance Committee for approval. The backbone of the System is structured on an integrated network. Any infrastructure hardware and software upgrades or changes that may impact the System require reasonable discussion, approval and oversight by the Lead Agency, and the 800 MHz CCCS Governance Committee. All maintenance work being scheduled that may affect System performance is preceded by reasonable and appropriate notification to the user agencies. Hnacnmem H - joini Hgreemeni ror uuu iviriz uut-a rage an or ?JJ The configurations for each of the components of the System are .documented primarily for the purpose of maintenance, but also affect future planning. The manufacturer provides the original 'as -built' documentation. The other defined standards for maintenance, documentation, notification, changes, security, and training also pertain to the network portion of the System. Procedure The methods for performing detailed System operations are defined in the technical resource manuals and training documentation for the System. The technical resource manuals are classified as 'Restricted Information' and are not available to the general public except by formal written request approved by the 800 MHz CCCS Governance Committee, the Lead Agency and County Counsel. Management The Lead Agency is responsible for managing the System network. 4.4 Advanced System Keys Purpose or Objective To outline the procedures for the production, and usage of both the Software and Advanced System Keys (ASK) for the System. Technical Background A system key allows for the programming of a radio for use on the System and is used to maintain System security. The System key keeps unauthorized units from gaining access to the System. Most radio equipment manufacturers provide a software based system key unique to each trunked radio system. The System key is required for a radio (subscriber unit) to be programmed so that the radio can be recognized by the System and the user can access the System. Operational Context The Lead Agency will maintain and safeguard all Master ASKs, regardless of manufacturer and is responsible for the production and issuing of all secondary keys to authorized users. Manufacturers' radios that do not require a system key will not be approved for operation on the System. An agency using subscriber radios other than the System manufacturer (Motorola) must acquire and provide to the Lead Agency the manufacturer's Master ASK for the 800 MHz System and all necessary software and key hardware to program secondary keys as needed. The safeguarding of these keys is paramount and should at all times be treated as restricted, public safety sensitive information with access closely guarded. Management Httacnment H - JOlni Hgreement Tor mu Ivlriz l..uuo rage o t or u,s The Lead Agency Director is responsible for maintaining the security of and access to the System keys. 4.5 Database Management Purpose or Objective Defines the aspects and assignment of responsibilities for managing the System's databases. Technical Background The management of the System and subsystem databases is assigned to Lead Agency staff with responsibility for the various aspects of the System operations. The databases contain information for the System and subsystems defining the operational characteristics of: • Subscriber Radios • Radio Users • Talkgroups • Profiles for Radio Users and Talkgroups • System portion of the fleet map programming • System and Subsystem equipment operational parameters • Security Group structures • Login User accounts and privileges The databases contain the operational personality of the entire System. Because of this critical function, the data must be properly managed for System functionality and archived regularly in case of data loss or corruption. Operational Context The System databases are partitioned to facilitate the distributed management of the data contained in them. The database management responsibilities of the Lead Agency include the following: • The Lead Agency is responsible for maintaining and archiving copies of all radio codeplug data and System databases. • Database backups are made once per week and are stored "off-site" on a backed -up server in the event of a disaster. • Database restoration will be performed by trained technical staff and only in the event of System software reloading and version changes, System database corruption, or as defined in the Disaster Recovery Plan. • Database restoration is performed when a non-critical condition exists and if approved by the Lead Agency Director. • The Lead Agency notifies agencies of any database issues that adversely impact their normal operations. Procedure Hnacnmeni H - joini Hgreement Tor uuu mriz uuw rage .Sts OT 6.5 The methods for performing the database operations are defined in the manufacturer's technical resource manuals. The technical resource manuals are classified as `Restricted Information' and are not available to the general public except by formal written request to the Lead Agency. The procedure for this standard is at the discretion of the Lead Agency. Management The Lead Agency is responsible for managing the data attributes and is responsible for backing up the System databases. 4.6 Subscriber Radio Inventory/Fleetmap Purpose or Objective Establishes the policy to ensure all radios activated on the System are properly accounted for, assigned, and managed. Technical Background Each radio operating on the System must be assigned a unique 7 -digit IUID number allowing the radio to affiliate and communicate on the System. The System's controller provides individual access to the System for each assigned radio. Operational Context The Lead Agency manages the subscriber radio inventory and is responsible for assigning and tracking all IUID numbers. Each 7 -digit IUID number can only be used with an individual radio and shall not be duplicated or "cloned" to another radio. IUID management and subscriber radio inventory are critical to the operational integrity of the System. Accurate subscriber radio inventory is also important as this is the basis for the equitable distribution of the costs associated with System operations and maintenance. Protocol / Standard The Lead Agency is the only authorized source for IUID assignment and subscriber radio programming. The Lead Agency establishes and maintains the Fleetmap Inventory database and conducts annual inventory verification with each Partner Agency. This annual inventory is also provided to Lead Agency Financial for use in the various budget and billing calculations for Partner Agencies. Management The Lead Agency is responsible for IUID issuance and management of the subscriber radio inventory/Fleetmap. 4.7 Lost or Stolen Radio Notifications Purpose or Objective Anacnmeni A - joint Agreement Tor t5uu Ivltiz L L.l.6 rage JU or 6J Establishes the policy to ensure the System's operational integrity and security by providing users with a procedure for reacting to incidents of missing, lost or stolen radio units. Each agency shall develop internal guidelines for dealing with incidents of lost, stolen or missing radio equipment, to include notification to the Lead Agency. Technical Background The System's controller provides individual access to the System for each assigned radio. The controller provides the ability to disable the radio altogether with the `inhibit' feature. The target radio must be turned on and affiliated with the System for the actions to be processed. If the target radio is not active, the requested action can be put into the passive mode. When the target radio does attempt to affiliate with the System, the pending action is initiated. Operational Context All agencies are required to make immediate notification to the Lead Agency upon receiving information, notification, or recognition that an assigned radio is misplaced, lost or stolen. Delay in providing notification could result in unauthorized persons causing interference and/or receiving confidential information. Protocol/Standard The Lead Agency shall be immediately notified of the situation by a phone call and submission of a Lost/Stolen Radio Report Form. The request to inhibit a lost/stolen radio must be specified on the Lost/Stolen Radio Report and must be accompanied by a copy of the Police report. Lost and stolen radio information will be passed on to user agencies and local radio shops in case the radio is located or turned in. The Lead Agency will invoice the agency for the replacement cost of the radio if owned by the Lead Agency (ie., a loan pool radio). Management The Lead Agency is responsible for managing this policy. 4.8 System Management Access Purpose or Objective Defines the types and areas of individual access to the management functions of the System. Technical Background Every login user of the System has a minimum of one login account and possibly more if multiple levels of access rights are needed for different purposes, such as administrative or general use. Every account can be individually set with the security and application rights needed to meet the needs of each user. All user account IDs shall be unique as the System's Hnacnmeni H - joini Hgreement Tor tsuu ruiriz uuw rage 4u or M5 databases do not permit the use of duplicate IDs. The user login aliases are limited to a specific length. Operational Context Personnel who log into the systems to use management applications and support tools are referred to as "Login Users". These are technical support staff such as the System Manager, administrators, technicians, etc. This is different that "Radio User" as referred to in other standards. Every user's login ID on the system is unique. Every login user of the System has a user ID that is only for that specific agency's or individual's use. Based on the types of access required an individual may need more than one login ID. The types of access fall into the following areas: • System Management • Infrastructure Maintenance • Subscriber Administration • Dispatch Management • Asset Management The areas of access are based on the physical locations of the equipment and individual need. Access to System, Network, and Asset Management terminals will be limited to Lead Agency staff and approved vendors. Lead Agency may review personnel with System access at any time to ensure that only the appropriate levels of access have been granted based on their currently assigned business needs. Protocol Each Login User account must be requested from and approved by the Lead Agency Director. The account will be assigned a login name and access level based on the requirements of the request. Access will be immediately rescinded for any unauthorized actions or change of employment status. Management The Lead Agency is responsible for the creation of administrative accounts, designating the areas of access allowed for each account, and the review of access granted. 4.9 Requesting System Access Purpose or Objective To establish the procedure for an eligible agency to apply to participate on the 800 MHz CCCS. Operational Context The 800 MHz CCCS Governance Committee has determined the requirements and procedure for potential new applicants desiring access to the 800 MHz CCCS. Those procedures are documented in the 800 MHz CCCS Joint Agreement. Hnacnmeni H - jomi Hgreement Tor uuu iwriz uuuo, rage 4-1 or u,s Management The Lead Agency Director is responsible for managing the process of potential new System User applications in accordance with protocols established by the Governance Committee and documented in the 800 MHz CCCS Joint Agreement. 4.10 Alias List Standards Purpose or Objective To establish a standard for the use of Subscriber alias for identifying radio users. Operational Context An alias is a common alphanumeric name used to identify a radio, talkgroup, site, etc. rather than referencing the assigned 7 -digit IUID number. The Lead Agency does not maintain alias names for Partner Agencies. Each Partner Agency shall maintain their own alias database and their alias names will only appear on their local dispatch consoles and subscriber radios. Management Each User Agency is responsible for establishing and maintaining any alias lists used by that agency. 4.11 Member Agency Operational Policy Changes Purpose or Objective Defines a process to mitigate negative impact to this SOP, other Member Agencies or the overall operation of the System when Member Agencies make changes to their individual Agency operational policies. Operational Context The 800 MHz CCCS Governance Committee is charged with approving standards and determining protocols and procedures for optimal operations between and among the users of the System. Member Agency operational policies must not be contrary to this established SOP nor should they knowingly impact other Member Agencies in a negative manner. There will be occasions or incidents that might result in the need for a Member Agency to make changes to their operational polices. Member Agencies must ensure that any change made to their internal operational policies harmonizes with the established SOP and fellow Member Agencies. Protocol Member Agencies are expected to understand the potential for their policies to impact other Agencies on an integrated communications system. As a result, any Member Agency planning to make changes to their operational policy must take into account the impact on the System. If the operational policy change is likely to have an impact on the System and/or on other Httacnmenr H - joinr Hgreemenr Tor tsuu iviriz uuua rage 4z or u.5 Member Agencies, or, if it is unknown whether the change will have such an impact, the Agency planning to make the change shall submit the planned policy change in writing to the Lead Agency for evaluation. The Lead Agency will address Member Agency policy change notices with respect to their impact on the System and other Agencies. The Lead Agency will inform the Governance Committee Chair of the decision regarding the policy change if it is determined that the change will impact the System or other Member Agencies. A written notice of any planned operational policy change submitted to the Lead Agency shall include: • Description of the policy being changed • Reason for the planned policy change (including the potential consequences if the request is not approved) • Preliminary assessment of impact to other System users, and an estimate of any associated costs to implement the request An assessment shall be conducted by the Lead Agency technical and management staff and shall address: • Technical impact to the current and future System performance including which systems or subsystems are affected • Operational impact including capacity impact to current and future System performance • The degree of conformance with established policies and standards • Cost impact to current participants • Potential alternative solutions The Lead Agency Director shall forward the completed assessment to the requesting Member Agency along with recommendations including ways to mitigate negative impact where applicable. If the assessment reveals a negative impact to the System or to other Member Agencies, the Lead Agency will advise the requesting Agency against enacting the change. The requesting Agency may appeal the decision to the Governance Committee for resolution if desired. The Governance Committee shall then review the requested policy change and approve, deny or modify the request. If approved or modified, the Governance Committee shall set forth operational and/or financial responsibility as appropriate and notify all affected parties of the decision. Management The Lead Agency Director, acting on behalf of the Governance Committee, shall manage this process. 4.12 Infrastructure Equipment Standards Purpose or Objective Hnacnment H - joint Hgreemenl Tor t5uu Mtiz l,l,l,J rage 4a 01700 Sets the minimum technical and performance standards for infrastructure equipment operating on or interfacing with the System and establishes a policy preventing premature obsolescence of the same. Technical Background The 800 MHz CCCS is an APCO P25 standards-based System constructed by Motorola Solutions, Inc. It consists of radio communications sites utilizing 800 MHz radio spectrum. The Master Site is located at the Loma Ridge Facility where the Lead Agency Radio Microwave Unit is collocated along with the County Emergency Operations Center and the OCSD PSAP/Dispatch Center. Microwave links between the Master Site and the radio sites utilize redundant methods in the construction of the System to provide for a public safety grade of service. Vendors' equipment often utilizes different operating software and may interact differently with the existing infrastructure which can potentially exhibit undesirable operational characteristics. It is also possible that new, untested radios, equipment and/or software can exhibit performance and functionality characteristics that are destructive to the performance, capacity and/or security of the System. Operational Context Participants desiring to connect or interface with the System any type of fixed equipment such as a radio or console product must receive approval from the Lead Agency. Prior to approval, the System manufacturer must prove equipment compatibility. All equipment must be installed in compliance with all rules, regulations and codes applicable to its operation and location. Industry accepted radio site installation and equipment grounding practices, such as R56 or approved equivalent in effect at the time of installation, shall be used. Protocol To ensure the reliability of the System, all infrastructure equipment directly interfaced with the System's core must maintain the same level of software revision. Requests shall be submitted in writing to the Lead Agency signed by the requesting agency director or department head. Procedure The request shall provide an outline of plans the requesting agency has developed for equipment integration. The written request shall indicate the name and contact information for the person designated to lead the project. The Lead Agency Director will review the request and make the final decision. If a technical use plan is already in place, the agency shall submit the plan to the Lead Agency for review to ensure compliance and compatibility with CCCS policy, standards and procedures. If a technical use plan is not in place, Lead Agency shall assist the requesting agency in developing a plan. Costs associated with the development of a technical plan are borne by the requesting agency. When the plan is complete it is submitted to the Lead Agency Director, who shall review the plan for compliance and compatibility with CCCS policies and procedures. Hr[acnmeni H - JOlni Hgreemeni Tor t5uu iviriZ l..Vw rage 44 oT 66 Management The Lead Agency is responsible for management of infrastructure equipment standards and integration. 4.13 Subscriber Equipment Standards Purpose or Objective Sets the minimum technical and performance standards for subscriber radios operating on the System including: • Establishing a policy to prevent premature obsolescence of subscriber radios. • Establishing procedures for Lead Agency to measure, test, certify and publish a list of subscriber radios that are approved for use on the System. • Ensuring that decommissioned subscriber radios are properly deprogrammed before disposal to prevent interference with public safety communications. Technical Background The System utilizes digital communication technology with the primary use being voice communications using the APCO P25 Phase 1 protocol with 9600 -baud control channels. Subscriber radios from various vendors often utilize different operating software providing a variety of services, features, functionality and performance to the users. Many of these radios interact differently with the infrastructure and can potentially exhibit undesirable operational characteristic. It is possible that untested radios and/or software can exhibit performance and/or functionality characteristics that are destructive to the overall performance, capacity and/or security of the System. Users are prohibited from using radios or accessories that may be destructive to the System. Partner Agencies shall deliver any retired radio subscriber equipment to the Lead Agency for decommissioning and deprogramming. Decommissioned radios that are not properly deprogrammed could pose interference issues with public safety communications. Radios removed from the System for decommissioning purposes shall be deprogrammed so as to remove all System related information, ID's, and conventional channels, leaving only an idle frequency of 851.0000 MHz to prevent potential interference issues with public safety communications. Management The Lead Agency is responsible for maintaining all testing, managing radio equipment manufacturer initiated submittals, coordinating activities of the test team, and the proper deprogramming of subscriber radios. Any Agency purchasing new subscriber equipment is encouraged to work with the Lead Agency first to ensure the new equipment meets System standards and is properly equipped to operate on the System. 4.14 System Administrator Standards Purpose or Objective Hnacnmeni /-x - joini Hgreemeni Tor uuu iviriz t,uua rage 4o or tib Establishes the minimum training standards for System administration and staff. This ensures that System functionality and integrity are maintained by restricting System administrative functions to trained, qualified and authorized personnel only. Protocol The Lead Agency is responsible for maintaining System configuration databases for System or subsystem infrastructure, subscriber databases and console configuration databases. 4.15 Dispatch Center Personnel Training Purpose or Objective Establishes minimum training standards for the public -safety dispatch center personnel with access to System resources. This ensures that personnel performing communications dispatch operations are properly trained by the Lead Agency. Operational Context System functionality and integrity shall be maintained by ensuring that only qualified personnel perform dispatch functions using console equipment connected to the System core. Protocol/Standard Public safety dispatch center personnel shall be familiar with all applicable mutual aid requirements, interoperability requirements, trunk system patching and all established SOPs. Other recommended training that each agency's communications center personnel should have include: • COML. • ICS courses 100, 200, 700.13, 800 or others as required by employing agency Recommended Procedure This policy does not contain specific training procedures or training modules. Management The communications / 9-1-1 center manager within each agency is responsible to ensure personnel with radio console access to resources on the System comply with the following: • Public safety communications / 9-1-1 center personnel receive the appropriate training before accessing System resources. • Public safety communications / 9-1-1 center personnel maintain familiarity with features and functions of communications consoles in order to rapidly and effectively Httacnmeni H - jomi Hgreement Tor buu iviriz ��t,a rage 4n or tss communicate with public safety personnel and are able to identify and establish interoperability solutions when appropriate or directed. • Only qualified personnel perform dispatch functions on System resources. • Public safety communications / 9-1-1 center personnel maintain familiarity with all applicable sections of the SOP. 4.16 Incident / Tactical Dispatcher Training Purpose or Objective Establishes minimum training standards for those performing incident or tactical dispatch functions with access to System resources. This ensures that System communications incident/tactical dispatcher operations are performed by properly trained dispatch personnel. Operational Context System functionality and integrity shall be maintained by ensuring that only qualified personnel perform incident/tactical dispatch functions. Protocol or Standard Incident/tactical dispatch personnel shall successfully complete appropriate training on the console system, mobile radios or control stations in the Mobile Command/Communications Units. Appropriate training shall, at a minimum, include formal training either by an incident/tactical dispatch trainer who has completed the training from a qualified instructor or by a qualified radio technical staff member familiar with the Mobile Command/Communications Unit's (MCU) operations. Incident/tactical dispatch personnel shall be familiar with all applicable mutual aid requirements, interoperability requirements, trunked system patching, gateway and other communications equipment in the MCU as well as all established standard operating procedures. Other recommended incident/tactical dispatcher training should include: • COML. • COMT. • ICS courses 100, 200, 300, 400, 700.6, 800 or others as required by their employing agency. • Any other developmental, technical or safety courses deemed necessary by employing agency. Procedure This policy does not contain specific training procedures or training modules. Management The Communications Center Manager within each agency is responsible to ensure personnel with access to MCU resources on the System comply with the following: • Incident/tactical dispatch personnel or those acting in that capacity receive the appropriate training before accessing System resources. maacnmeni H - joini Hgreement Tor tsuu iwr-iz L.L.w rage 4 / OT 0.5 • Incident/tactical dispatch personnel maintain familiarity with features and functions of MCU in order to rapidly and effectively communicate with public safety personnel and are also able to identify and establish interoperability solutions when appropriate or directed. • Only qualified personnel perform incident/tactical dispatch functions on System resources. • Incident/tactical dispatch personnel maintain familiarity with all applicable sections of the SOP. 4.17 Radio (Subscriber) User Training Purpose or Objective Establishes the minimum training standards for radio users, which ensures proper operation of radios on the System. Operational Context System functionality and integrity shall be maintained by ensuring that only trained personnel operate radio equipment. Protocol/Standard Radio users shall successfully complete appropriate training on assigned radios before being allowed to operate on the System. Appropriate training shall include formal training from a qualified instructor or approved media and, at a minimum, include the following • Radio users shall be trained on the technical operation of assigned radios. Training will be required biennial. • Radio users shall be trained on how to operate the radio within the System along with any special features of the System they will use, e.g., emergency button, call alert, etc. • Radio users shall be trained on and demonstrate proficiency with all applicable mutual aid and interoperable communications resources and standard operating procedures. • Radio users shall maintain awareness of the mutual aid, interoperability channels or talkgroups in their radios, as well as how to navigate to them when necessary. • User agencies will make an effort to conduct ongoing refresher training for radio users periodically following their initial training (e.g., build into in-service training, dispatch centers conduct random tests, roll call training, on -shift training, etc.). Lead Agency staff assists user agencies in identifying training needs and implementing training programs to meet those needs. The Lead Agency also employs a qualified training officer who is available to provide this training to authorized System users. Procedure This SOP does not contain specific training procedures or training modules, however, Lead Agency staff assists with radio user training when requested. Management Hnacnmeni H - joini Hgreement Tor uuu nnriz uuuo rage 4t5 or ?J6 Each User Agency is responsible to ensure that: • Personnel assigned radios shall receive the appropriate training with emphasis on awareness of and how to navigate to mutual aid and interoperability channels or talkgroups (initial and ongoing refresher training). • Only trained and qualified personnel shall operate radio equipment. • Radio users are familiar with sections of the SOP. 4.18 Interoperability and non-CCCS Radio Users Purpose or Objective Establishes the minimum training standards for radio users having access to interoperable resources of the System. This ensures the proper operation of radios on the System and safeguards against improper utilization of interoperability resources. Operational Context System functionality and operability is maintained by ensuring that only properly trained personnel use the interoperable resources on the System for mutual aid communications. If agencies do not have appropriate training, then communications failure or a degradation of the System resources may occur. Protocol/Standard Radio users shall have a demonstrated knowledge of Section 6 Interoperability Standards, and have successfully completed appropriate initial and ongoing refresher training including: • User training emphasizing: o The use of interoperable channels and how to navigate their radio. o How a user's radio experiences can be affected by the selected interoperability channel (digital, analog, non -trunked, etc.). • Dispatch and supervisory training emphasizing: o The use of interoperable channels. o The use of patching and patch channels. o The use of cross band repeaters and gateway devices. o The use of RF control stations. o How a user's radio experiences can be affected by the selected interoperability channel (digital, analog, non -trunked, etc.). Radio users with access to interoperable channels must be familiar with all applicable mutual aid and interoperable requirements and procedures. Procedure This SOP does not contain specific training procedures or training modules. Management The Lead Agency will provide training materials upon request for initial training and ongoing refresher training. Additionally, as resources permit, the Lead Agency will assist user agencies Httacnment H - joini Hgreemeni Tor uuu iviriz L.L.L o rage 4y or oo with developing plans and methods on incorporating ongoing radio refresher training into various activities for the most effective delivery to personnel. The Lead Agency also employs a qualified training officer who is available to provide this training to authorized System users. Agencies requesting and/or using the interoperable talkgroups are responsible to ensure that: • The use of mutual aid/interoperability channels and talkgroups is properly coordinated and approved through the Control One. • Radio users successfully complete appropriate initial and on-going refresher training and demonstrate knowledge of proper communications procedures before being allowed to operate the interoperable resources. • Radio users are familiar with all applicable interoperable sections of this manual. • Radio users are familiar with all applicable mutual aid requirements and interoperable sops. 4.19 System Upgrade Notification Purpose or Objective Establishes notification procedure prior to major System upgrades. Protocol/Standard System software upgrades will be performed as needed contingent upon available funding and/or technical requirements. The Lead Agency will be responsible for ensuring that all System user agencies that may be impacted by the upgrade are notified by email and/or other written form. Recommended Procedure Planned upgrade procedures will be communicated to all System users as follows: • At least 30 days prior to a planned major System upgrade that will cause a System or site outage, the Lead Agency will notify all System user agencies that may be impacted by the upgrade. • The Lead Agency will send an email reminder to all potentially impacted System user agencies a week prior to the System upgrade. • Control One will communicate upgrade instructions and status to all System users before, during and upon completion of the upgrade. User agencies must notify the Lead Agency Director in writing if the planned upgrade dates will interfere with any major planned events. Management The Lead Agency is responsible for managing System upgrades and the necessary notifications associated with each upgrade. 4.20 In -building Coverage (Bi -Directional Amplifiers) Purpose or Objective Httacnmeni A - uoini Hgreemeni Tor uuu iviriz uL L,a rage ou or u,s Establishes policy on usage of Bi -Directional Amplifiers (BDA) and awareness of all locations utilizing BDAs for the purpose of mitigating interference issues. Technical Background The System is designed for mobile and portable radio coverage but cannot provide 100% coverage in all places. BDAs are a device that aims to improve radio access within a confined space such as high-density buildings. Although the use of a BDA may improve in -building coverage, it may also create interference issues with the overall System. Tracking the locations of all BDAs will aid in quickly locating offending BDA equipment. Protocol/Standard It is not the intent for the Lead Agency or Governance Committee to approve or regulate BDAs. It is important for the Lead Agency to maintain a list of facilities that do have BDAs used with the System. Any agency or department installing a BDA will provide the Lead Agency with the location of the device prior to installation if possible. This will include the physical address, emergency contact information, building name, location within the building, manufacturer and model number. It is the responsibility of the equipment/facility owner to comply with all requirements of the FCC, including licensing, location reporting, and interference mitigation. Recommended Procedure Agencies installing BDAs will submit to the Lead Agency a list of locations where BDAs are installed that are supplementing the System. BDAs not supplementing the System do not need to be reported. This list will be updated periodically. Management The Lead Agency will maintain the list of BDAs supplementing the System. Each agency will maintain a list of BDAs within their jurisdiction along with contact information for the equipment/facility owner to allow access should the BDA interfere with the System. 4.21 Aircraft Radio Installations and Operation Purpose or Objective Sets the policy regarding aircraft subscriber radio installation, programming, and operation on the System. Technical Background Due to the elevated altitude of operation, aircraft radios have a greater coverage footprint. This allows a radio operated in the air to access sites as far away as 150 to 200 miles, while mobile radios operated in vehicles on the ground typically have ranges limited to 30 to 40 miles. Radios in aircraft operating with the System function slightly different than radios on the ground. /-umcnment H - joini Hgreemeni Tor mu nnr-iz u -w rage w 0T?J6 Due to the interference potential from the larger coverage footprint of aircraft operated radios, the FCC rules for operation of these radios limits the output power to help reduce interference, as frequency reuse is applicable in the CCCS and other radio systems. Installation of aircraft mounted radios is governed by the Federal Aviation Administration (FAA) and permanent installations must be performed by FAA certified personnel. Operational Context Subscribers that acquire a large coverage footprint due to high altitude operations need to take into consideration potential interference due to frequency reuse in other systems. This could cause interference to their users. This interference could appear as an interruption, loss of communications, or as tailgating to other talkgroup transmissions on other sites. Protocol/Standard All permanently installed aircraft radios shall comply with the FCC 90.423 power output limitation of 10 watts, the Effective Radiated Power (ERP) being no more than 5 watts. Only unity gain antennas will be allowed. Permanently mounted aircraft radios should be programmed with the following: • BER threshold of 2.5% For aircrews that are assigned portable radios, these portable radios should be programmed for the following: • 2.5% or 2.9% BER threshold These settings apply for both aircraft installed radios using remote mounted mobile or portable radios and Tech nisonic-type aircraft control panel mounted avionics packages using internal portable radios. Procedures for landing zone areas where communications with ground personnel are conducted are recommended on a simplex, non -trunked, channel. In addition to the SOP training requirement, training for users of aircraft radios shall include a description of the issues surrounding airborne operation of System radios including: • Issues of potential interference to other systems due to frequency reuse; • Personnel using portable radios in a limited capacity (observers, guests, etc.) and the potential for FAA and FCC rule violation, and interference. Recommended Procedure Installation and programming should be performed as outlined in this section. Operation of Aircraft landing zone coordination should be performed as outlined in this section. In-flight transmissions should be as brief as possible due to the potential interference. Management Attachment A - JOlnt Agreement Tor wu iviriz C.L L.J rage oz OT us The Lead Agency Director will be responsible for the oversight and compliance of this standard. Due to the potential of interference issues to expand beyond a specific region or into another County, Lead Agency staff should also be notified if any interference is detected and is believed to have originated from a CCCS radio equipped aircraft. 4.22 In -building Coverage Purpose or Objective Establishes policy on the approval, usage and regulation of in -building coverage enhancement devices on System frequencies and the tracking of all locations utilizing these devices for the purpose of mitigating interference issues. In -building coverage systems include Emergency Responder Radio Communications Systems (ERRCS), Bi -Directional Amplifiers (BDA), and Distributed Antenna Systems (DAS). Technical Background The System is designed for mobile and portable radio coverage but cannot provide 100% coverage in all places. In -building coverage devices aim to improve radio access within a confined space such as high-density buildings. Although the use of in -building coverage devices may improve in -building coverage, it may also create interference issues with the overall System. Tracking the locations of all in -building coverage devices will aid in quickly locating offending equipment. Protocol/Standard The Lead Agency must approve and regulate in -building coverage systems on frequencies licensed to the County of Orange. It is important for the Lead Agency to maintain a list of facilities that have in -building coverage devices used with the System. Any agency or department planning to install an in -building coverage system will submit their plans to the Lead Agency as described in the current OCSD ERRCS Guidelines document. This will include the physical address, emergency contact information, building name, location within the building, manufacturer and model number. The Lead Agency must review and approve operation of the installed in -building coverage system to ensure proper installation and operation and to mitigate any adverse effect on the System. It is the responsibility of the equipment/facility owner to comply with all requirements of the National Fire Protection Association (NFPA), California Fire Code (CFC) and Federal Communications Commission (FCC) including licensing, location reporting, and interference mitigation. Attachment A - jomi Agreement Tor mu iviriz uuua rage om or 60 Recommended Procedure Agencies planning to install an in -building coverage system shall contact the Lead Agency for guidance and to begin the approval process. All agencies shall submit to the Lead Agency a list of locations where BDA, DAS or other ERRCS systems are installed that are supplementing the System. In -building coverage devices not supplementing the System do not need to be reported. This list will be updated periodically. Management The Lead Agency will manage the In -Building Coverage policy and maintain the list of in - building devices supplementing the System. Each agency will maintain a list of in -building coverage devices within their jurisdiction along with contact information for the equipment/facility owner to allow access should the equipment interfere with the System. 5.0 CONFIGURATIONS AND ALLOCATION 5.1 Zone and Talkgroup Naming Standards Purpose or Objective A well-defined method of naming radio programming zones and talkgroups/channels aids in user interoperability by allowing all users to understand the designated use of individual talkgroups/channels and how to find those talkgroups/channels in their radio. Operational Context In addition to agency -specific zones and talkgroups, all System users have certain talkgroups/channels programmed into their radios that are common to all System users to allow for operational interoperability. The ability to quickly locate these common talkgroups/channels for interoperability requires a uniform programming methodology to place the talkgroups/channels in specific zones in all radio on the System. Protocol /Standard The Lead Agency, in conjunction with User Agencies, and with the authority of the Governance Committee has established the zone and talkgroup naming structure used by all System users. The zone/talkgroup/Channel names and radio template structure is provided in the Official Communications Handbook (Radio Code Book) for each System Discipline (Law, Fire, Lifeguard/Marine Safety, Public Works). Requests for additional zones or talkgroups must be submitted to the Lead Agency for consideration and analysis as to their potential impact on the System. Management HlLacnmeni H - JOlni /igreemem Tor mu iviriz l..L L b rage o4 OT?5,5 The Lead Agency shall maintain the Official Communications Handbook and associated records related to zone and talkgroup/channel naming. 5.2 Radio I UID Allocation Purpose or Objective Allocates radio Item Unit Identification number (IUID) ranges for the individual agencies. This allows the Lead Agency to manage the pool of IUIDs as radio users and console positions are configured. This simplifies the management of the IUIDs and provides an easier.indication of what IUIDs belong to which agency in the event that a radio user alias is not available. Technical Background These IUIDs are the same IUIDs that users type in for call alert pages. Also, these are the IUIDs that are displayed on the subscriber radios if the "ID Display" feature is enabled. These IUIDs are also displayed at the console if the console alias feature is not available. Operational Context The Lead Agency will allocate radio IUID ranges to agencies based on the number of units the agency will have active on the System and will be shown on the master agency IUID list. Protocol/Standard Only radio IUIDs allocated to an individual agency can be used in the programming of that agency's radios and consoles. The Lead Agency is responsible for the programming of all radios on the System. Procedure The Lead Agency maintains the master list of IUID distribution and will allocate IUIDs to agencies based on each agency's radio count and need. If an agency requires additional IUIDs beyond the initial allocation, a request shall be made to the Lead Agency. The Lead Agency will evaluate the request and conduct an analysis to determine impact to the System. Upon completion of the analysis, the Lead Agency may approve or deny the request, or ask for additional information. Management The Lead Agency manages the IUID ranges for day-to-day activities, and manages the IUID ranges for reserve or future allocation. 5.3 Fleetmap Standards Purpose or Objective Defines the process used to document the Fleetmap information for the effective management of the System. System Fleetmap configuration information is classified as 'Restricted Information' and is not released to the public. r Hrracnmem H - joini Hgreemeni ror ow iviriz LLt,%:) rage oa or us Technical Background The Fleetmap is parameter information programmed into the System infrastructure and into the subscriber radios to control how those radios perform on the System. The Fleetmap spreadsheet is a documented matrix of the talkgroups in the System and the departments or agencies that use and control user access to these talkgroups. The Fleetmap contains the following information: • Talkgroup Name — Name of the talkgroup as it is programmed into the System. • Talkgroup Alias — Abbreviated naming of the talkgroup to fit within the 8 or 14 character radio display. • Talkgroup ID — Numerical designation of the talkgroup in decimal and/or hexadecimal. • Failsoft Channel — The System channel designated for the talkgroup when in the failsoft mode. • Owner — The primary user agency with access control of the talkgroup. • Priority — Priority level of the talkgroup. • On Console — If the talkgroup is available as a console resource. • Trunked Alternate — A talkgroup to be used when the user's primary system is unavailable. Operational Context The Lead Agency will establish and manage the Fleetmap database information for all users of the System. Protocol/Standard A detailed matrix is maintained by the Lead Agency on the System database. Each agency's radio representative maintains a Fleetmap spreadsheet containing data on their talkgroups and the users for whom they are responsible. Procedure If an individual agency desires to make updates and changes to their Fleetmap standards, the changes shall be requested through the Lead Agency. • The Lead Agency will evaluate any requests for changes and conduct an analysis_ to determine its feasibility and impact on the System. • The Lead Agency will decide if the request will be approved or denied and proceed accordingly with notification to the requesting agency. The disclosure of the Fleetmap configuration information, including talkgroup IDs, user IDs, user privileges and other related System information could substantially jeopardize the security of the System. This disclosure makes it more susceptible to sabotage and unauthorized access to the contents of confidential voice and data communications. Therefore, the master Fleetmap data shall be classified as 'Restricted Information' and is not available to the general public except by formal written request to the 800 MHz CCCS Governance Committee. Management Hnammeni H - jomi Hgreemeni Tor tsuu mr-iz uuua rage on or zsS The Lead Agency manages the Fleetmap and System programming for all agencies. 5.4 Subscriber Template Management Purpose of Objective Defines the process that is used to document the radio subscriber template information for the effective management of the System. The System contains a large number of talkgroups to support the various agencies that subscribe to the System. Subscriber template configuration information is classified as `Restricted Information' and is not released to the general public. Technical Background The subscriber template is "parameter information programmed into the individual subscriber radios to control how those radios perform on the System. An agency's subscriber template is developed and maintained by the Lead Agency with the input of each agency's radio representative. This is to ensure the agency gets the talkgroups, features, and functionality desired from the radios, while maintaining the overall functionality and integrity of the System. The radio subscriber template is usually specific to a particular agency, but an agency can elect to have different versions of the template based on the department's needs and operations. The templates normally contain the following information: • Radio Configuration — Specific information related to a particular model of radio, including but not limited to: button assignment, display options,. menu items, and other radio wide parameters. • Conventional — Personality information that determines the radio's operation in the conventional mode such as frequencies, tones, and signaling options. • Trunking — Identifies System and talkgroup specifics that the subscriber radio has access to, as well as System and unit -specific ID numbers relating to the radios operation. • Scan — Defines the limits and lists of the subscriber radio's scan function, when equipped. • Zone Assignment — Where talkgroups are combined into specifically labeled 'zones' within the radio that represent or reflect operations of a particular agency or operation. The zone designation reflects an acronym, which should easily identify the zone as belonging to a particular agency. Operational Context The Lead Agency creates and manages all subscriber templates to ensure uniformity anal proper operation on the System. Protocol/Standard User Agencies may have multiple subscriber templates based upon their operational needs. The Lead Agency shall maintain a subscriber template spreadsheet for each of the agency's template versions. Httacnmeni H - joinr Hgreemem Tor rsuu mriz uuw rage o t or u.s The Lead Agency will work with each user agency to develop the subscriber templates for that agency. All subscriber template creation and modification shall be done by the Lead Agency. The Lead Agency shall maintain all associated documentation for each subscriber template. Procedure If individual agencies desire to make updates and/or changes to their subscriber templates, those change requests shall be submitted to the Lead Agency for review. The Lead Agency will approve or deny the request after reviewing impact to the System and other users. If approved, the costs for template change and subsequent reprogramming of subscriber radios will be borne by the requesting agency. The disclosure of the subscriber template configuration information, including talkgroup IDs, user IDs, user privileges and other related System information could substantially jeopardize the security of the System. This disclosure makes it more susceptible to tampering, sabotage, unauthorized use, jamming, hacking, unauthorized access to the contents of confidential voice and data communications. Therefore, the subscriber template spreadsheets shall be classified as 'Restricted Information' and are not available to the general public except by formal written request to the 800 MHz CCCS Governance Committee. Management The Lead Agency manages all subscriber templates and programming for all agencies and maintains records of the process. Access is strictly controlled and is considered 'Restricted Information'. 5.5 Talkgroup Assignments Purpose or Objective Defines the assignment/usage of agency -specific, common and interoperable/mutual aid talkgroups and resources, and provides a standard so that the Lead Agency will have a firm guideline on allowing particular talkgroups programmed into radios. Operational Context Talkgroups are considered assigned by the agency for which the talkgroup was specifically created. The process for pre -defined sharing authorizations is explained in Section 5.6. Recommended Protocol/Standard There are three types of talkgroups that are programmed into the System: • Agency -Specific — Created for, and controlled by, individual agencies for their day-to- day operations. These talkgroups cannot be accessed by other System users without express permission granted by the assigned agency. The process for obtaining this permission is outlined in Section 5.6. • Common Resources — Talkgroups/channels created for common use among discipline specific agencies (law, fire, general) as needed. These talkgroups/channels are not controlled by any individual agency but are available for use by all Partner Agencies and are coordinated by the Control One. Httacnment H - jomi Hgreemeni Tor tsuu ivsriz uuuz) rage Sts OT06 • Interoperable/Mutual Aid Resources — These talkgroups/channels are established interoperable or mutual aid resources available to all System users based upon specific discipline (law, fire, general) and allow communications with non-CCCS System agencies as needed. These talkgroups/channels include the ability to be patched to non -800 MHz resources for greater interoperability. These talkgroups/channels are coordinated locally through the Control One. Procedure The Lead Agency will control all talkgroup generation and access parameters. Agencies shall immediately notify the Lead Agency when changes to an agency -specific talkgroup are required or the talkgroup is no longer required. Management The Lead Agency is responsible for the management of the Talkgroup Ownership policy. 5.6 Talkgroup Sharing Purpose or Objective Defines how System Partner Agencies can permit other agencies to access to their agency - specific talkgroups. Technical Background Radios must be P25 compliant and compatible with the System. Refer to Section 4.13 of this SOP for additional details on subscriber equipment standards. Operational Context Partner agencies have the authority and control to define who is allowed access to their agency - specific talkgroups/channels. This process is accomplished with a formal written request to the Lead Agency from the requesting agency which is passed to the agency -specific talkgroup owner for approval. The request should include the specific talkgroup name desired and the intended purpose and potential users of the talkgroup. Protocol /Standard Agency -specific talkgroups/channels shall not be programmed into any other radios without the written permission from the controlling agency. Documented written approval letters shall be maintained by the Lead Agency for each talkgroup sharing agreement. Procedure The Lead Agency working with the talkgroup 'owner' will process the request and, upon approval, make the necessary modifications to the requesting agency template. The Lead Agency will maintain all supporting documentation regarding the requested change. All costs associated with the template change and reprogramming will be borne by the requesting agency. Management Hnacnmeni H - joint Hgreemeni Tor uuu ivirtz LL L b rage oa or us The Lead Agency is responsible for the management of this procedure. 5.7 Talkgroup and Radio User Priorities Purpose or Objective Establishes varying priority levels for talkgroups to assure the most critical talkgroups on the System are granted a channel as quickly as possible when the System is experiencing busy conditions. Technical Background The System priorities can be managed both at the radio user level and at the talkgroup level. Operational Context Priority levels in the System are managed at the talkgroup level. The goal is to distribute priorities across the System talkgroups in a way that maximizes the ability for critical groups to communicate and minimizes the number of talkgroups with high priority. 5.9 Failsoft Assignments Purpose or Objective Creates and assigns System resources in a manner which maximizes System utility to users consistent with each user's mission and needs for radio communications during certain System failure situations. Technical Background When the System's main controllers detect certain failure conditions in the radio System, all available channels revert from a trunking mode into a conventional repeater type of operation that is given the term 'failsoft'. During failsoft, talkgroups are assigned to a specific radio channel (frequency) if so programmed, which allows the users to continue voice communication while repairs are made to the System. There are a limited number of channels available in the System, which results in a number of talkgroups being combined on each channel while in failsoft. This requires the radio users to share those channels between numerous agencies. This congestion of radio traffic happens only during the failsoft condition. If a talkgroup is not given a failsoft assignment, radios using that talkgroup will hear the low pitched 'out -of -range' tone when the System is in failsoft, and will not be able to communicate on that talkgroup. Operational Context The radio programming template failsoft assignments are configured to balance the ability for users to achieve an acceptable level of communications while maintaining the individual agency's privacy when possible. While in the failsoft condition, effected radios will display the Hitacnmeni H - joini Hgreemem Tor tsuu mriz L.L.w rage ou 0T?JJ word `FAILSOFT' on the radio display and emit a short high-pitched tone every 10-15 seconds to indicate to the user that normal trunked operation is unavailable. Protocol/Standard It is the policy of the Lead Agency to provide a failsoft assignment for every 'primary' talkgroup on the System to prevent loss of communications for users. Failsoft channel assignments are based on the needs of System users consistent with each user's mission and need for radio communications. The Lead Agency makes determinations concerning Failsoft channel assignments. During a Failsoft condition, dispatchers may need to announce instructions to radio users and remind them that operations may be combined among several agencies and to implement radio discipline to reduce radio traffic. Management The Lead Agency is the responsible authority for failsoft assignments and management. Agencies desiring additional information on failsoft assignments may request the information from the Lead Agency. 5.10 Scanning Purpose or Objective Identifies operational procedures and responsible authorities governing scanning System talkgroups. Technical Background The network infrastructure and subscriber units are configured to permit managed user scanning of talkgroups. Including a talkgroup in a non-priority scan list does not necessarily result in the user hearing traffic on that talkgroup. Talkgroups are only active if there is at least one user affiliated who has the talkgroup of interest as their selected channel. Subscriber units can scan a talkgroup, a talkgroup in another zone, or another trunked radio system if compatible. An entire radio can be set up as receive only. Operational Context Scanning by multiple subscriber units can quickly overwhelm a trunked radio system creating system busies. As a result, scanning on the System has been limited to the Fire Services as a legacy feature allowing scanning of their Dispatch Talkgroup and primary tacticals. Protocol/Standard Before scanning and/or monitoring of System talkgroups is allowed, permission must be obtained from the Lead Agency and the agency `owning' the talkgroup. Scanning must also be approved by the requestor's agency in their template design. Scanning can only be enabled in the programming template by the Lead Agency. Httamment H - jomi Hgreement Tor uuu Mriz LL.La rage e -i or W Management The Lead Agency is responsible for authorizing, programming and managing scanning in subscriber templates. 5.11 Emergency Button Technical Background The emergency button feature allows a radio user to send an emergency notification by pressing a button on the radio. The notifications audibly and visually alert dispatch console positions that have the initiating radio's talkgroup in their active configuration. Other subscriber radios on the same talkgroup also receive the emergency notification once the 'emergency' radio is keyed which will display the IUID (or alias if available) of the radio generating the emergency. Emergency calls are also automatically assigned the highest priority available by the System controller and are the first available from the queue if the System is in a busy situation. Operational Context The orange button on a portable or mobile radio will be programmed with the emergency feature for all agencies. Each agency should establish their own policy on how this feature might be used, taking into consideration how it will impact the System and other users including the Control One. The emergency feature can be used to alert dispatch and other users of an emergency situation and simultaneously allow the activated radio to have priority over other subscriber radios on the same talkgroup. Protocol /Standard The use of the emergency button as an emergency signaling option shall be available to any agency on the System, subject to certain conditions and provisions including: • Agencies must provide training to all users to ensure the safe and effective use of this feature. The Lead Agency can also provide training and training materials. • It is the individual agency's responsibility to determine how an emergency alarm will be deployed for their operation and the subsequent response to the alarm. • If a user is temporarily assigned a radio other than their normal issued equipment, it is essential that their designated monitoring point be made aware of the radio identification to cross-reference it to the correct user in the event an emergency button activation occurs. • All agencies implementing the emergency feature shall have a plan in place to respond to emergency button activation. All emergency button response plans must include the following: • An established radio monitoring point with the necessary console hardware/software to receive, display and acknowledge the alert. • Established monitoring point must be capable of identifying which radio user pushed the button and capable of responding to the user in need. (Dispatch Center, or Control One) Hnacnmeni H - joini Hgreement Tormu imriz LL L b rage uz or us • In the event that the monitoring point is not the same agency as the radio user, an agreement on policy, monitoring, use, and response, shall be in place among the agencies. • Established monitoring points shall be available during any/all hours that personnel are using the System, or have an established after-hours arrangement with another monitoring point. • No dispatcher shall clear an emergency without ascertaining what action is necessary to handle said emergency and taking the appropriate actions to do so. Control One receives all emergency button activations and will contact originating radio user's agency for follow-up when activations occur on common/interoperable talkgroups that are not assigned specifically to the agency in question. Management The Lead Agency will manage the overall Emergency Button policy. Agencies desiring to use the emergency key function shall coordinate with agency resources that receive the emergency calls. The receiving agencies shall have an appropriate plan in place and documented as to the process to handle the emergency calls. 5.12 Encryption Purpose or Objective Establishes guidelines for the use of encryption on the System. Technical Background Encryption is an option on digital radio equipment that must be specially ordered and manually configured. System users may or may not be capable of encryption depending on their equipment configuration and operational needs. AES is the approved standard for encryption on the System. Operational Context The use of encryption in the System is strapped to the specific talkgroups determined by the System users to provide secure communications. Encryption is not a feature that can be enabled or defeated at the user level. Each talkgroup is pre -determined to be either encrypted or clear and is programmed as such in the subscriber template. Radios transmitting with encryption cannot be heard by non -encrypted radios. An encrypted talkgroup that is patched to a non -encrypted talkgroup or channel is no longer considered secure communications as the encrypted audio is decrypted when pushed over the patched non -encrypted talkgroup/channel. Likewise, audio fed to an internet streaming application will not be secure. Protocol/Standard Only the Lead Agency is authorized to program encryption into radios on the System. Hr[acnmem H - joini Hgreemeni Tor ow iviriz uuua rage na MOO Each agency shall determine if encryption will be used on its own agency -specific talkgroups. Certain common/interoperable talkgroups allocated to specific disciplines such as law/fire will be encrypted in all System radios. Non -encrypted common/interoperable talkgroups will also be available to System users who do not have encrypted radios. Care should be taken when assigning encrypted talkgroups to incident communications to ensure all applicable users have encrypted radios. Management The Lead Agency manages the encryption policy and the programming of encryption into all radios on the System. 6.0 INTEROPERABILITY STANDARDS 6.1 Interoperable Communications Requirements Purpose or Objective Establishes a minimum requirement for interoperable communications resources for all radios using the System. Technical Background For the purpose of this document, the terms 'mutual aid' and `interoperability' will be used interchangeably. The term 'channel' will refer to a conventional resource. The planners of the System recognized the need to make common interoperable talkgroups available to all subscribers primarily for interagency and incident command communications. Therefore, in addition to agency -specific talkgroups, the System also provides talkgroups that are common to like -disciplined agencies (law, fire, public works, lifeguard) as well as talkgroups that are available to all System users to provide interoperability between disciplines. In addition to common System talkgroups, subscriber radios will also be programmed with local, state and national conventional interoperable channels. Most of these conventional interoperable channels are not encrypted but there are a few 700MHz encrypted channels available in encryption -capable radios. Operational Context Interoperable talkgroups & channels are used when there is a need to coordinate activities between different agencies and/or personnel assigned to work an event. Efforts should be made to utilize the lowest level of interoperable talkgroup/channel first if possible. For example, OC law agencies needing to coordinate with other law agencies should use the CCCS law interoperability talkgroups/channels before considering national level interoperable channels. If the coordination includes agencies that do not have access to the CCCS interoperable law talkgroups, statewide or national interoperable channels would be selected. Additional information on the operational use of these interoperable talkgroups/channels can be found in the 'Official Communications Handbook' (Radio Code Book). Auacnment H - joint Hgreement Tor ouu ivimz L uub rage b4 OT i56 Protocol/Standard All radios will be programmed to include the 'general use' interoperable talkgroups and channels located in specific zones in the radio template. These talkgroups and channels will be programmed into predetermined specific zones in all System radios to provide uniformity in programming for ease of locating the talkgroups/channels when needed. Radio templates will also include discipline -specific interoperable talkgroups (ie. Orange, Gray, Black talkgroups for Law) in templates for all like -discipline agencies (law, fire, lifeguard, public works). These discipline -specific interoperable talkgroups/channels will be programmed into predetermined specific zones in all like -disciplined agency radios to provide uniformity in programming and ease of use. Additional information on the location of these interoperable talkgroups/channels in the radio programming templates can be found in the `Official Communications Handbook' (Radio Code Book) for each discipline. Procedure Coordination of all interoperable talkgroups and channels in Orange County is managed by the Control One. Any agency requiring interoperable talkgroups or channels should contact Control One for assistance with selecting and. reserving these resources to meet their needs. Management The Lead Agency is responsible for managing this policy and ensuring interoperable channels are available and operational. The Countywide Coordinated Communication Center (Control One) is responsible for managing the assignment and use of the interoperable talkgroups and channels in Orange County. 6.2 Radio Console Patching of Talkgroups/Channels Purpose or Objective Establishes policy for use of a console patch between System talkgroups and/or other resources on the dispatch console. Technical Background Most public safety communications/9-1-1 centers have the capability to initiate a console patch but patches that include a common System resource shall be accomplished on a console at Control One. Console patches can be established between multiple System talkgroups and/or between a System Talkgroup and a non -System resource. The resources can be conventional or trunked but must be an existing radio resource on the dispatch console. Patches can be established without a radio dispatch console by using a deployable audio gateway, such as an ACU -1000. Approval is required prior to creating any patch. A talkgroup can only be in one patch at a time. A conventional channel can only be in one patch at a time. /-mcnmeni H - joini Hgreement Tor uuu iviriz utLa rage uo or u3 Great care must be used in deciding what talkgroups and other resources can be patched together as a patch can have an unexpected consequential impact on other System resources. The patch shall be monitored for continued coordination through Incident Command and/or dispatch personnel. Operational Context Console Patches should only be used when there is an operational need for communications between personnel that cannot be accomplished using common communications resources. Use of conventional resources in a patch must be in compliance with the rules governing mutual aid channel usage. Console patching will only be permitted when approved by agency Watch Commander/Incident Commander and after notification to the Control One supervisor. A patch involving agency -specific talkgroups/channels can be initiated on the local agency's console with approval by that agency's Watch Commander. Any patch involving a common System resource should be initiated by Control One. Protocol/Standard Each agency must develop written console patch and/or gateway device patch procedures addressing their unique operation and resource capabilities. These procedures shall be consistent with this policy. All communications center personnel shall receive initial and continuing training on the use of this procedure. Procedure When an incident requires interagency coordination that is not available on a common talkgroup or channel, a request for a patch can be initiated. If the desired resource to be patched is a local agency resource and their agency -specific talkgroup/channel, the requesting agency can initiate the patch on their local console with their Watch Commander's approval and notification to Control One. If the desired resource to be patched is a common System resource, the patch request must be directed to Control One after obtaining local agency Watch Commander approval. Control One will then initiate the patch from their console. Before initiating a System patch, check to make sure the radio resource being patched is not already being used by another agency. Radio console patches shall be used only if other suitable means for interagency communicating are unavailable or insufficient. Any time a console patch has been established, someone in the requesting agency's communications center must continually monitor the patch to address and mitigate communications problems. Management Hiiacnmeni H - JOIni Hgreement Tor z5uu IVIriz VLw rage on 0T?JJ The Lead Agency is responsible for managing this policy. All agencies electing to use console patching are responsible for establishing and managing internal patch procedures and complying with this policy. 6.3 Use of the Statewide and National 1 nteroperability Channels Purpose or Objective Defines the procedures for the use of the conventional Statewide and National interoperable radio channels for communications between radio users of disparate radio systems and/or different frequency bands. Technical Background The FCC has designated certain VHF, UHF, 700 MHz & 800 MHz frequency pairs to be used exclusively for conventional interoperable communications between public safety radio users. Each frequency band includes a calling/hailing channel to be used in contacting the coordination center for the local operational area. Additionally, each frequency band includes channels for tactical operations in both repeater and direct "talkaround" modes. In the Orange County Operational Area, these channels are coordinated by the Control One. All CCCS Partner Agency radios include many of the 700 MHz and 800 MHz interoperability channels in their standard radio programming template. Additional information on these channels, including channel names and general use, can be found in the discipline specific Orange County Official Communications Handbook (Radio Code Book) available to 'Partner Agencies through the Lead Agency. The Lead Agency also maintains repeater systems with Interoperable channels in the VHF and UHF frequency bands which are available to CCCS Partner Agency users through a gateway patch on the Control One radio console. This allows CCCS radio users to be patched to a non - 800 MHz radio system for interoperable communications with the users of that system. Operational Context These designated interoperable communications resources can be used for day-to-day interagency coordination, for urgent or emergency mutual aid situations, and/or for other purposes where coordination between radio users on separate 800 MHz radio systems or non - 800 MHz radio systems must communicate to perform assigned duties. These channels shall not be used for regular communications between radio users with full access to the CCCS, except when authorized and assigned by Incident Command. Protocol/Standard The 700 MHz and 800 MHz interoperability channels are programmed into the radio template of all CCCS subscriber radios. These channels may be used when traveling outside the coverage area of the CCCS System and are used to communicate with another 800 MHz radio system with base and/or mobile radios on those channels. HiTacnmem H - joini Hgreemeni Tor tsuu mr-iz L.LL,a rage u or tsa Control One shall monitor the interoperability hailing/calling channels at all times. Procedure When an incident requires the use of a Statewide or National 700 MHz or 800 MHz interoperability resource, the requesting unit or agency will contact Control One to request the assignment of an interoperable tactical channel. Control One will assign an appropriate channel and monitor for any issues. When an incident requires the use of a Statewide or National VHF or UHF interoperability resource, the requesting unit or agency will contact Control One to request the assignment of a tactical radio channel in the appropriate frequency band. Control One will initiate a patch between the requested VHF or UHF resource and the 800 MHz talkgroup/channel used in the patch. Control One shall monitor all interoperability hailing/calling channels 24/7 to provide immediate assistance when requested. Management The Lead Agency will manage this policy and the coordination and maintenance of interoperable radio resources in Orange County. CCCS agencies are responsible for providing training to their personnel on the proper use of these Statewide and National Interoperable communications resources. 6.4 Control Station Usage on 1 nteroperability Channels Purpose or Objective Establishes procedures for the use of control stations for gateway patching. Technical Background A control station is a radio that is set up like a portable or mobile radio, typically with a limited number of talkgroups or conventional radio channels. It can be connected to a radio console or used stand alone. A control station can function on only one talkgroup or conventional channel at a time. Use of a control station with a radio console to patch System resources can have a wide area impact. This type of patch can be easily accomplished, but may take up multiple trunked radio channels, causing the System to experience busies or possibly create radio interference. Control station usage must comply with parameters listed on the agency's FCC license. Operational Context There are a number of uses for control stations including: • Installed at an agency that does not have a dispatch console to communicate with a conventional repeater or trunked radio system. • Connected to a dispatch console at a communications center. Hnacnmeni H - joini HgreemenT Tor uuu imriz LLL,a rage ot5 or t56 • Installed in a Mobile Communications Unit/Vehicle. • Installed at an Incident Communications Center or Command Post. Protocol/ Standard Radio control stations are permissible in the following circumstances: Connected to a radio console to be used to access the System by non -System user agencies for interoperability purposes. • Installed in a MCU/MCV. • Installed temporarily in an Incident Communications Center or Command Post. • Connected to a radio console to be used to access the System by user agencies for interoperability purposes. • Used with an audio logger to record transmitted or received audio. All communications personnel performing the dispatch function shall be trained on the usage and constraints of the control station. They should receive continued training to maintain proficiency, and understanding of the procedures. A radio technician, COMT or other authorized person shall be involved in the configuration, installation and testing of control stations, whether a temporary or permanent installation. Limitations • Control stations should not be used to patch a System talkgroup to another System talkgroup except when approved by the Communications Center Supervisor and the Control One Supervisor. • Control station antennas must not exceed 20' in height. If an antenna requires more height than 20' to access the System or mutual aid repeater, then a FCC license is required. • No control station antenna may exceed 200' in height. • Control stations should use Yagi (directional) antennas when possible. • Antennas should use the lowest gain possible. • Control station power should be kept as low as possible. Procedure Any agency wanting to use one or more control stations at the same location is only permitted to use that configuration if the design is compliant with this SOP. The process for obtaining permission is to submit a written request for control station usage to the Lead Agency Director. • The request shall describe the location, desired talkgroups/channels, antenna height, power, antenna type, antenna gain and feed line type of each control station. • The Lead Agency may approve, deny or request modifications to the request. Management The Lead Agency will manage this policy. Hrracnmeni H - joinr Hgreemeni ror uuu ivihz uuua rage by or 00 Each Dispatch Agency Manager will ensure their personnel are properly trained on the use of control stations for gateway patching. 6.5 Required Monitoring of Interoperability Channels Purpose or Objective Establishes procedures for monitoring mutual aid/interoperability channels at communications centers and command posts. Operational Context Monitoring of mutual aid channels is imperative for the benefit of users needing assistance. Many channels have been identified to use for interoperability but not all of them will be monitored when not in use. Due to the fact that these Statewide and National interoperable channels do not belong to any one agency, there is no channel `owner' monitoring them. As a result, a designated monitoring center should be established in each Operational Area. Protocol/Standard Control One is the designated monitoring center in Orange County for all Statewide and National interoperability calling/hailing channels available. Control One will monitor and respond to any unit requesting assistance on the calling/hailing channel and assign an appropriate tactical channel as necessary. Dispatch Centers are responsible for monitoring any Statewide or National Interoperable channel assigned to them for an incident. The local Dispatch Center will monitor and respond to any communications traffic on the assigned interoperable channel until the completion of the incident. Once the incident has been terminated and the interoperable resource is no longer needed, the Dispatch Center will notify Control One and release their responsibility for monitoring the tactical channel. Management The Lead Agency will manage this policy. The Emergency Communications Coordinator will work with Control One to identify specific interoperable channels to be monitored 24/7 by Control One. Each Dispatch Agency Manager will ensure their personnel are properly trained on the use of Statewide and National interoperability resources. 7.0 MAINTENANCE RESPONSIBILITIES 7.1 System Maintenance Purpose or Objective Httammem H - joini Hgreement Tor tsuu ivihz LLw rage t or tsa Defines the System maintenance responsibilities and roles. The maintenance levels for the 800 MHz Radio System and its subsystems shall be set to a standard to protect the overall functionality and integrity of the System for all users. Operational Context The 800 MHz CCCS System is a complex network of radio sites and equipment that require highly trained engineering and technical personnel to constantly monitor the System and intervene as required to prevent System failure and quickly restore the System should any equipment experience failure. The CCCS Governance Committee has designated the Lead Agency as the primary agency responsible for the maintenance of the System. Agreements between the Lead Agency and maintenance contractors are at the Lead Agency's discretion, but the Lead Agency is ultimately responsible for the System maintenance. Recommended Procedure Any maintenance issues affecting the System will be addressed and resolved by the Lead Agency. The Lead Agency may, at its discretion, involve contract vendors in the process as necessary For emergency and urgent repairs, the Lead Agency may request and expect cooperation from support resources (e.g. — support staff and/or parts) from other agencies to restore equipment/systems to normal operation. For day-to-day maintenance, the Lead Agency or its contract vendor shall maintain the equipment. Repair of any equipment not normally maintained by the Lead Agency requires the notification and consent of the owning agency. The Lead Agency and/or their contracted service providers are responsible for: • FAA registrations, FCC ASR registrations and FCC licenses, ensuring that equipment is properly licensed and copies of the licenses are posted at the sites as required by regulations. • Maintaining equipment within the limits of County of Orange FCC licenses. • Notifying the responsible personnel of equipment and location issues that require attention. • Managing the inventory of the radio subscriber and infrastructure equipment. • Ensuring that equipment at the tower sites that is not part of the System inventory shall be clearly labeled to indicate agency ownership. • Routine equipment maintenance logs are kept at the sites. • Maintaining current copies of all as -built documentation at each site and at the Lead Agency office. Lead Agency is responsible for ensuring the accuracy of all as -built data related to the infrastructure equipment and any changes shall be immediately documented. Lead Agency shall distribute the updated information as required. • Coordinating, implementing and/or overseeing configuration changes affecting the System infrastructure. Httacnment H - joint Hgreemeni Tor mu iviriz LLL,,,, rage i.i or ua • Any work being scheduled affecting the System and/or subsystems performance and reasonable notification to the System's users of same. • Ensuring all technicians assigned to work on System equipment have successfully completed appropriate training on the equipment. Training requirements are referenced in the training section of the SOP. • Following a preventive maintenance plan as defined in the preventative maintenance section of the manufacturers' manuals. • Maintaining a list of the qualifications and contact information of technical staff in the event of an emergency. • Maintaining a list of the available spare parts/equipment pertaining to the System and subsystems. • Ensuring any equipment upgrades or changes affecting normal operations of the System are discussed and approved by the Governance Committee. • Determining how critical an equipment failure is operationally, determining the appropriate action, and escalating or de-escalating the repair process as needed. Management The Lead Agency is responsible for managing the maintenance of the System equipment and sites and managing the repair responsibilities in emergency situations. 7.3 Maintenance / Repair Notifications Purpose or Objective Defines the procedure for notifications of scheduled and unanticipated maintenance activities having an impact on normal System operations, System interruptions, and System outages. It is the policy of the Lead Agency to provide guidelines for user notifications for any maintenance actions having a potential for System interruptions. Technical Background Typically, equipment functionality can change when hardware and software configuration alterations or other maintenance activities are performed. Advanced notification of planned maintenance activities that impact the normal operation of the System allows user agencies and subscribers to make preparations as needed. Notification will also be made to user agencies when a catastrophic failure happens. If the notification process is difficult and lengthy, it can become a barrier to making notification to user agencies. Failure to make proper notification to user agencies can result in unneeded confusion, disruption or loss of public safety communications, and possible compromise of any special operations communications. Operational Context Httacnment H - joini Hgreement ror 6UU ivihz LLL,a rage it or ua Affected agencies shall be notified of maintenance activities that impact their subscribers on the System. Agency notification of radio maintenance activities to their individual subscribers is at the discretion of the user agency's designated representative. Protocol / Standard The Lead Agency is responsible for monitoring the System on a 24-hour basis, through various methods including on-site staff in the System Watch unit. Maintenance activities, planned or unplanned, that could impact the subscribers usage of the System requires notification to the affected agency's radio representatives. In the event of planned maintenance,, all efforts should be made to conduct this type of activity during off-peak hours where radio utilization is as low as possible. If an emergency or high priority incident is in progress at the time of scheduled maintenance, it may be necessary to reschedule or delay the maintenance until the situation has stabilized and can be safely moved to alternate talkgroups or channels. Procedure A reasonable advance notice shall precede planned maintenance activities that affect the agencies using the System. The notification methods shall be by phone, e-mail, radio, or any combination of the same. The notification will consist of: • The type of planned maintenance activity. • When the maintenance will be conducted. • The amount of time anticipated to complete the activity. • The anticipated impact to the System and subsystems. If a known activity has a significant operational impact upon any specific agency, a confirmation of receipt of notification shall be obtained. It is the responsibility of the Lead Agency to ensure that all affected users are notified will in advance of any such operations. Whenever possible, these operations shall be scheduled when the normal radio traffic is slowest. Prior to commencing the maintenance operation, personnel from the Lead Agency shall coordinate with Control One to contact each affected dispatch center's supervisor for a last minute situational briefing. Once maintenance operations begin, if dispatch operations recognize a need to terminate the operation, or if unexpected problems occur, a communications supervisor must call Control One to have the technical staff notified of the situation. Unanticipated maintenance or equipment failures affect the agencies on the System and require notification to the affected agency's radio representative. Upon notification of an equipment outage, Lead Agency technical staff is expected to: • Determine the impact of the impairment to the operation of the System. A minor failure is something that either does not affect or minimally affects user functionality. A major failure is something that seriously affects or risks user functionality of the System. Httamment A - jomi Hgreement Tor tsuu mmz LL.w rage i3 or ts,i • Determine if there are internal or external factors that alter the priority of System impairment, such as weather, subscriber loading unique public safety activities or impending events, etc. • Determine if manual intervention is required. A serious failure requires initiating repair processes regardless of the time of day. Minor failures can wait until normal business hours or other convenient time before repair. The determination is at the discretion of the Lead Agency, and shall be based on internal System functionality and external subscriber needs. • Determine if additional external resources are required. Once the operation or repairs are complete, Lead Agency personnel shall contact Control One for an update and user feedback. When requested by the Governance Committee, the details of the recovery processes may be reviewed for improvements. Management The Lead Agency is responsible for maintaining this policy and ensuring representatives from all affected agencies are notified as appropriate. Each agency's radio representatives are responsible for notifications within their respective agencies. 7.4 System Coverage Purpose or Objective Establishes the requirements for regular outdoor testing and verification of System signal quality and coverage. Technical Background Signal coverage of the System fluctuates constantly and is influenced by many conditions including but not limited to: • Terrain. • Weather. • Vegetation. • Building Construction. • Equipment Condition. • Location. Regular sampling of signal quality and strength at pre -designated locations will help to confirm adequate coverage, or if a problem might have developed in certain locations due to changes in one of the above conditions. Operational Context Periodic coverage testing is a critical component of System operation and maintenance, and will continue toward identifying and mitigating any signal coverage issues, including any potential effects of new building construction and development. /-\t[acnment H - joini Hgreemeni Tor mu iviriz uuua rage i4 or W Protocol / Standard Lead Agency staff performs comprehensive signal coverage test to evaluate the System's signal strength and quality across the service area. The locations and number of individual test points shall be based on the area's building density and known areas of poor coverage. The results of each test will be compared to previous results and monitored for signal degradation. Test results will be stored on a shared data server for historical comparisons. Management The Lead Agency Director oversees the process, evaluates the results, develops remediation strategies, and reports significant findings to the Governance Committee. 7.5 Repair Parts Inventory Purpose or Objective Establishes an inventory control procedure for infrastructure and subscriber repair parts. It is the policy of the Lead Agency to ensure that planning is in place and available resources identified to expedite the recovery of the System and related components in the case of disaster, catastrophic failure or other major incident that affects operations of the System. Operational Context Lead Agency will maintain an inventory of spare parts for regular repairs to the System and subscriber radios. Protocol / Standard The spare parts inventory for infrastructure and subscriber units shall be kept at Lead Agency facilities for ready access when needed. Management The Lead Agency maintains and manages the repair parts inventory. 7.6 Disaster Recovery Purpose or Objective Establishes the minimum requirements for a System disaster recovery plan. It is the policy of the Governance Committee and Lead Agency to ensure that planning is in place and resources identified and available to expedite the recovery of the System and related components in the case of disaster, catastrophic failure or other major incident that affects operations of the System. Operational Context Lead Agency personnel will maintain a comprehensive plan for restoration of the System during times of disaster. If the Operational Area EOC is activated, the Emergency Communications Httacnmeni H - joinr Hgreemeni Tor wu iviriz uu-a rage io or ua Coordinator (ECC) must be notified of any System problem so that it can be logged into WebEOC. Management The Lead Agency maintains and manages the Disaster Recovery Plan. 8.0 SITE AND SYSTEM SECURITY 8.1 Site Security Purpose or Objective Establishes the minimum requirement to provide site security and protect the integrity of the System's radio towers equipment shelters and equipment. Technical Background Security measures have the overall benefit of protecting the functionality, integrity and operation of the System. Details of specific security measures cannot be placed within a public document as this would compromise measures used in monitoring and maintaining security. Operational Context The physical security of equipment, facilities, and structures making up the core of the radio System infrastructure is paramount to the reliability and availability of communications carried on the System. Each site is within a fenced, gated and locked compound, with shelter entry monitored and reported to a central monitoring point. A remote controlled camera systems are installed and monitored for any unauthorized entry or security concerns. Protocol / Standard Access to the sites are tightly controlled and entry to those sites is granted only to those personnel with proper authorization from the Lead Agency. All personnel requiring site access must be accompanied by Lead Agency staff. Unaccompanied access to any System site is not authorized. Entry alarms for the remote sites are received at Systems Watch and sent immediately to Lead Agency technical support staff. Procedure Notification to Lead Agency Technical staff and Systems Watch is required of all agencies and vendors prior to gaining site access. Any person requiring access to the tower sites for any reason shall have full clearance from the Lead Agency and be accompanied and monitored by Lead Agency personnel while on site. Law enforcement personnel will be immediately notified and dispatched to any site with unexpected or unexplained alarms or unidentified personnel viewed remotely from the camera systems. Any agency or vendor requiring access to any tower site or equipment location shall make immediate notification to the Lead Agency of urgent issues such as discharged employees or cancelled contracts. Hnacnmeni H - joint Hgreement Tor rsuu iviriz uuw rage 113 or uS When a site has been vandalized or broken into, the jurisdictional law enforcement agency should be notified. The person who discovers the event has the responsibility to preserve the crime scene and not contaminate it. He/she should have Systems Watch log the time when the event was discovered and any other pertinent information relating to the site/scene. Systems Watch should notify the appropriate local law enforcement agency as well as the Orange County Sheriff's Department Watch Commander and Control One. Other agencies may be notified if they own equipment at the site. Lead Agency will notify all affected agencies as soon as possible. When the site is off the air due to a crime, the technician should refrain from making entry unless permission has been given by the Lead Agency Director due to extreme circumstances taking place that requires coverage from the site. If a radio technician should arrive at a site and an unauthorized vehicle or person is on the property, they should back off, notify Systems Watch and call 911. The technician should give the 911 call taker the street address and advise them of the situation. If there is no cell service on site, the technician should radio the information to Systems Watch and request law enforcement response. Systems Watch personnel should immediately contact the appropriate law enforcement agency to request response. Systems Watch personnel will also notify Lead Agency supervisors and management. At no time should the technician put themselves at risk of harm. If a technician has to respond to a vandalized remote site after normal business hours, it is recommended for safety reasons that a minimum of two persons respond to the site. Law enforcement may be requested to go to the site with the technician. Management The Lead Agency Director is responsible for managing this procedure. 8.2 Network Operational Security Purpose or Objective Establishes the specific security measures for System and subsystem equipment and to define site security policy. Technical Background Security measures have the overall benefit of protecting the functionality, integrity and operation of the System. Details of specific security measures cannot be placed within a public document as this would compromise measures used in monitoring and maintaining security. Protocol / Standard All items identified as 'Restricted Information' will be maintained in secure areas within the control of the Lead Agency and is not available outside of the Lead Agency except by formal written request. Technical information that can compromise System security is considered 'Restricted Information'. /-umcnment H - joint Hgreemeni Tor twu ivir-iz uu-b rage t t OT us The System's network is protected from other data networks by isolation or by using System manufacturer specified and configured firewall with the approval of the Lead Agency. All remote access points to the System are kept secure and are coordinated with the Lead Agency. Passwords protect the System and subsystem equipment for the purpose of preventing unauthorized access to equipment. The Lead Agency issues and manages the passwords. User login accounts are protected with passwords providing an appropriate level of protection. If a password is suspected of being compromised, it must be immediately updated or the user account will be disabled pending resolution. External devices (computers, modems, routers, data storage, etc.) shall not be connected to the System network, computers, or consoles without the approval of the Lead Agency Director. Any such device must also be supplied, supported, and maintained by the user Agency's Information Technology department or service provider to ensure the most current device security software and virus protection is in place. At no time will any personally owned device be connected to any port or connector on the System. Any such action may result in the immediate revocation of access privileges for the offender and/or agency. It is recommended that computers used for programming or maintenance not be connected to the internet to help reduce possibility of virus infection. A 'Group Policy' shall be implemented on the System to prevent the use of external USB ports on all dispatch consoles. Procedure All agencies, contractors, and personnel that require access to Lead Agency controlled sites, equipment or networks must pass a comprehensive background check before access is allowed and must be accompanied by Lead Agency staff while on site. Violations of System security policy or procedures may jeopardize the System and result in the loss of a technician's, agency's or vendor's privileges to access the System. System documentation is classified as 'Restricted Information'. Management The Lead Agency Director is responsible for the network, equipment, and site security of the System. 8.3 Software, Firmware and Document Security Purpose or Objective Establishes the minimum security measures and procedures to protect the integrity of the System software and programming. Hrracnmeni H - joini Hgreemenr Tor uuu ivir-iz L uuz) rage t or u,s Technical Background The documentation, service and technical manuals, databases, spreadsheets and software of the System contain critical operational and technical information that could compromise the System if obtained by unauthorized personnel and is classified as 'Restricted Information'. Operational Context The documentation and software of the System changes as the System evolves. Those changes and revision must be documented and maintained in a central location for quick and easy access for the technical support staff. Protocol Standard In the best interest of public safety, all documentation, service and technical manuals, databases, spreadsheets and software of the System are considered 'Restricted Information'. Software relating to the programming of any System component shall only be installed on authorized government owned computers or Lead Agency authorized contractors' computers. Procedure All items identified as 'Restricted Information' will be maintained in secure areas within the control of the Lead Agency Director. These items will only be shared with those who require knowledge of it for operational purposes. This information. is not available to anyone outside of the Lead Agency. An exception may be made with a formal written request and approval from the Governance Committee. This information is not to be released to any personnel who do not have a legitimate and appropriate need for it. Management The Lead Agency Director is responsible for managing this procedure. 9.0 APPENDIX 9.1 Lead Agency Contact Information Normal Working Hours — Monday -Friday 7:30AM — 4:30PM Customer Service — 714-704-7999 • Radio repair request • Radio programming request • Radio/accessories purchase request • Dispatch console repair request Systems Watch — 714-628-7020 • Lost/Stolen radio notification • Radio deactivation • Radio transmission history/statistics After Normal Working Hours Hnacnmeni H - JOlnt Plgreement Tor t5uu Ivimz LLLb Systems Watch — 714-628-7020 • Lost/Stolen radio notification • Radio System coverage issues • Emergency radio repair requests • Emergency dispatch console repair requests Control One — 714-834-7008 • Operational issues • Request restricted talkgroup assignment • Interoperability assistance • Emergency radio or console repair requests Physical Address: OCSD/Technology Division — Administration & Radio Repair 840 N. Eckhoff St. Suite 104 Orange, CA 92868 9.2 Glossary - Definitions and Acronyms Item/Acronym Definition rage I& oT ts,s For Public Safety LMR, digital P25 voice radio channels between 769/775 MHz 700MHz and 799/805 MHz. Channels have 30 MHz seperation between Tx & Rx when repeated. FCC designated low power channels can be used analog voice. 7CALL / 7TAC Nationwide 700 MHz Calling and Tactical channels For Public Safety LMR, analog or digital voice or data radio channels between 800MHz 806/816 and 851/860 MHz. Channels have 45 MHz seperation between Tx & Rx when repeated. 8CALL / 8TAC Nationwide 800 MHz Calling and Tactical channels An audio gateway device capable of connecting disparate radio systems, ACU -1000 channels, or talkgroups together during on -scene operations, similar to a console patch between talkgroups AES Advanced Encryption Standard Alias A common alphanumeric name used to identify a radio, talkgroup, site, etc. rather than referencing the assigned 6 digit ID number ANSI American National Standards Institute APCO Association of Public -Safety Communications Officials APCO P25 A public -safety digital radio standard Airacnment A - jomi Agreement Tor ouu ivimz LL.L.a rage uu or u,s Item/Acronym ASK Definition Advanced System Key BDA Bi -Directional Amplifier, relays radio signals into and out of a building BER Bit Error Rate CCCS Countywide Coordinated Communications System Channel A pair of frequencies, transmit and receive, that are used for a single communications path Channel Bank A device that combines multiple data and/or audio inputs into TDMA format so that it can be transmitted over microwave or T1 circuit and shared between transmitter sites Code plug The file containing a specific radio's programming parameters COMC Communications Coordinator COML Communications Unit Leader COMT Incident Communications Technician Console Patching Ability to connect channels via dispatch consoles Consolette A mobile radio mounted into a case with power supply and converted for desk- top use Control Station An installed radio unit, sometimes a mobile radio, normally found at a desk or common work area indoors or directly connected to a console or other fixed transmitting location DAS Distributed Antenna System, relays radio signals into and out of a building Digial radio Digital radios turns sound (by signal processing) into patterns of digits (numbers) rather than the radio waves which are used for analog transmissions. Dispatch Console A fixed radio operator position with multiple radio resources and features that can access any subset of talkgroups and/or conventional channels ECC Emergency Communications Coordinator EIA Electronic Industry Alliance EMS Emergency Medical Services EOC Emergency Operations Center FAA Federal Aviation Administration FCC Federal Communication Commission Fixed Radio equipment that is installed at a radio site or dispatch center Fleetmap The master spreadsheet plan of the talkgroups, zones, Failsoft assignments, alias information and other pertinent System and radio programming FM Frequency Modulation Gateway A device that allows two or more radio or voice devices to be connected together IAP Incident Action Plan HnacnmenT H - joini Hgreemenr Tor uuu ivihz uuua rage u -i or ua Item/Acronym IC Definition Incident Command ICALL Calling Channel for ITAC ICC Incident Communications Center ICP Incident Command Post ICS Incident Command System ICS 205 Incident Radio Communications Plan ICS 217 Communications Resource Availability Worksheet ID Identification Infrastructure All of the fixed electrical and mechanical equipment, towers and building structures, generators, transmitters, controllers, antennas, microwave and ancillary equipment that comprise the operational backbone of the radio System Inter -agency Located or occurring between two or more agencies Interoperability The ability of Public Safety responders to share information via voice and data communications systems on demand, in real time, when needed, and as authorized. Interoperable Ability of a system to use the parts or equipment of another system ITAC Conventional mutual aid channel 800 Mhz ITS Information Technology Services IUID Item Unit Identification number is a unique number assigned to each individual subscriber radio authorized to have access to the System. Lead Agency Agency primarily responsible for maintenance, management, operation and enhancement of the CCCS System. The CCCS Governance Committee has designated the Orange County Sheriff Department Technology Division as the Lead Agency.. LMR Land Mobile Radio Logging The act of recording radio conversations for replay as required MCC Mobile Communicaiton Center MCU Mobile Communications Unit MCV Mobile Communications Vehicle MHz Abbreviation for megahertz. 5 MHz = 5,000,000 Hz or 5,000 kHz. A unit of measure for the number of times a frequency makes one complete cycle in one second Mission Critical For mission critical applications, users have an expectation of "Immediate" communication with their dispatch or command center and little to no end-to- end audio delays. Mobile Radio A vehicular mounted radio with an power source and antenna Mutual Aid Personnel, equipment, or services provided to another jurisdiction Httacmmem H - joini Hgreement Tor uuu iviriz uLLa rage uz or u,s Item/Acronym Radio Frequency NECP National Emergency Communications Plan NGOs Non -Governmental Organizations NIMS National Incident Management System OCCOPSA Orange County Chiefs of Police and Sheriff's Association OTAP Over the Air Programming OTAR Over the Air Rekeying SOW A suite of standards for digital radio communications for use by federal, state P25 and local public safety agencies in North America to enable them to System User communicate with different vendor radio systems using a common platform Patch Electrically connecting two or more radio channels or talkgroups so that those users of those separate resources are able to communicate with each other POC Point of Contact Portable A lightweight, completely self-contained radio unit usually worn on user's belt An agency, department, or individual directly involved with the health, safety, Public Safety and/or security of the public including, but not limited to police, fire, emergency management, and medical personnel and responders An agency, department, or individual involved with providing non -emergency Public Service type services to the public including, but not limited to utilities, transportation, education, and other governmental services, supporting public safety Documentation, service and technical manuals, databases, spreadsheets and software of the System containing critical operational and technical information that could compromise the System if obtained by unauthorized personnel. Restricted Information All items identified as 'Restricted Information' will be maintained in secure areas within the control of the Lead Agency and is not available outside of the Lead Agency except by formal written request. RF Radio Frequency SCIP Statewide Communications Interoperability Plan SEOC State Emergency Operations Center Simplex Radio to radio communications on one frequency. Also called Direct Simulcast A type of radio communications in which voice communications are transmitted from multiple radio sites and can be received simultaneously by field units to provide wide area coverage Site The physical location of an antenna tower, equipment shelter and radio System infrastructure equipment SOP Standard Operating Procedure SOW Site on Wheels Subscriber Unit A mobile, hand held or control station radio used on a trunked radio system System User An individual operating a radio authorized to access the System. Hnacnmeni H - joini Hgreement Tor uuu Mriz uuuo rage bo or ?jj Item/Acronym Lead Agency unit responsible for 24/7 monitoring of CCCS and responding to System Watch any System issues. This includes notifications, troubleshooting, callouts, repair, etc., resulting in System restoration. TAC Tactical on scene operation Radio to Radio communications on one frequency, usually the same frequency Talk Around on which a repeater transmits. Simular to Direct or Simplex Term ususally used with trunked radio systems. A talkgroup is a predefined list Talkgroup of radios/users assigned a unique ID which allows them to communicate with each other over a trunked radio system. Abbreviated naming of the talkgroup to fit within the 8 or 14 Talkgroup Alias character radio display Talkgroup Failsoft The system channel designated for a talkgroup when in the failsoft mode Channel Numerical designation of the talkgroup in decimal and/or Talkgroup ID hexadecimal Talkgroup Name Name of the talkgroup as it is programmed into the system TIA Telecommunications Industry Association The automatic and dynamic sharing of a number of communications channels Trunking/Trunked between large numbers of radio users Ultra High Frequency — Range of 300 to 3,.000 MHz for public safety LMR usually UHF refers to two bands. 380 to 460 MHz (low) and 460 to 512 MHz (high). Uninterruptible Power Source — a battery back-up device that provides UPS emergency power to connected equipment when utility power is not available. User Agency An agency authorized to operate a radio on the System. Very High Frequency — For public safety LMR, usually refers to VHF High Band VHF with a range of 136 to 164MHz. VHF Low Band has a frequency range below 100MHz. An area in the radio / template containing positions for 16 individual talkgroups Zone or conventional radio channels which is normally labeled by an acronym that closely represents the owner agency IN WITNESS WHEREOF, the Partner`ageriL hereto have set their hands and seals on the. date. set forth opposite their respective signatures°.qn identical•',counterparts<of this. instrument; each which shall for aRpurposes be deemed, an original;:thereof. [City of Seal' Beach] x s [City Manager] Dated: A [C