Module 1 - Identifying Access Constraints

  • Module 1 Module 1
    • Title page locked Title page
    • Introduction locked Introduction
    • The situation in Itsari locked The situation in Itsari
    • Your mission locked Your mission
    • Your actions locked Your actions
    • About PCM locked About PCM
    • Using Project Cycle Management locked Using Project Cycle Management
    • Gathering information locked Gathering information
    • Identify access constraints locked Identify access constraints
    • Defining Access Variables locked Defining Access Variables
    • Plan for needs assessment locked Plan for needs assessment
    • Don’t forget security! locked Don’t forget security!
    • Scoping and Needs Assessment locked Scoping and Needs Assessment
    • Access constraints in Village 1 locked Access constraints in Village 1
    • Access constraints in Village 2 locked Access constraints in Village 2
    • Access constraints in Village 3 locked Access constraints in Village 3
    • Planning for access locked Planning for access
    • End locked End
  • link
    Access Variables — Humanitarian Access Overview
  • link
    Programming Modalities — Remote Humanitarian Management and Programming: Guidance Note
  • pdf
    Stakeholder Engagement / Negotiations — Aide Memoir Engaging NSAG
  • link
    Stakeholder Engagement / Negotiations — Civilian Military Coordination in Humanitarian Response
  • link
    Stakeholder Engagement / Negotiations — UN-CMCoord Field Handbook
  • link
    Principles and Normative Frameworks — OCHA on Message: Humanitarian Principles
  • link
    Principles and Normative Frameworks — Rule 55: Access for Humanitarian Relief
  • link
    Principles and Normative Frameworks — Global Protection Cluster - GPC
  • link
    Principles and Normative Frameworks — Protection Principles
  • link
    Coordinating Structures — Note on IASC Coordinating Structures at Country Level
  • pdf
    Coordinating Structures — OCHA General Assembly Resolution 46/182 of December 1991
Module 1 - Identifying Access Constraints
Module 1 - Identifying Access Constraints
Module 1 - Identifying Access Constraints
M M