Back to top
Module 1 - Identifying Access Constraints
Menu
Module 1
Module 1
Title page locked
Title page
Introduction locked
Introduction
The situation in Itsari locked
The situation in Itsari
Your mission locked
Your mission
Your actions locked
Your actions
About PCM locked
About PCM
Using Project Cycle Management locked
Using Project Cycle Management
Gathering information locked
Gathering information
Identify access constraints locked
Identify access constraints
Defining Access Variables locked
Defining Access Variables
Plan for needs assessment locked
Plan for needs assessment
Don’t forget security! locked
Don’t forget security!
Scoping and Needs Assessment locked
Scoping and Needs Assessment
Access constraints in Village 1 locked
Access constraints in Village 1
Access constraints in Village 2 locked
Access constraints in Village 2
Access constraints in Village 3 locked
Access constraints in Village 3
Planning for access locked
Planning for access
End locked
End
Resources
link
Access Variables — Humanitarian Access Overview
link
Programming Modalities — Remote Humanitarian Management and Programming: Guidance Note
pdf
Stakeholder Engagement / Negotiations — Aide Memoir Engaging NSAG
link
Stakeholder Engagement / Negotiations — Civilian Military Coordination in Humanitarian Response
link
Stakeholder Engagement / Negotiations — UN-CMCoord Field Handbook
link
Principles and Normative Frameworks — OCHA on Message: Humanitarian Principles
link
Principles and Normative Frameworks — Rule 55: Access for Humanitarian Relief
link
Principles and Normative Frameworks — Global Protection Cluster - GPC
link
Principles and Normative Frameworks — Protection Principles
link
Coordinating Structures — Note on IASC Coordinating Structures at Country Level
pdf
Coordinating Structures — OCHA General Assembly Resolution 46/182 of December 1991
Module 1 - Identifying Access Constraints
Module 1 - Identifying Access Constraints
Module 1 - Identifying Access Constraints
M
M