Food Security Program Design Sample Clauses

Food Security Program Design. Implementation and M&E Improved Guatemala’s FY 2007-2011 MYAPs began in October 2006 and are being implemented by Catholic Relief Services (CRS), Asociación SHARE de Guatemala and Save the Children (SC). These Title II Awardees work in MCHN; water and sanitation; agricultural production; marketing; credit; natural resource management; and strengthening the capacity of local governments in the Departments of Baja Verapaz, Chimaltenango, Huehuetenango, Quiché and San Marcos to deliver services in those sectors in highly food-insecure areas. In Project Year One, FANTA-2 provided TA on interpreting the results of the Awardees’ first year of program monitoring using LQAS, assisted Awardees in planning for their 2010 Mid-Term Evaluation (MTE) and began the process of rolling out the Layers monitoring system (see IR 1.1.3 for a description of Layers). In Project Year Two, FANTA-2 will carry out the following activities: • Building on support provided to the Awardees in Project Year One, FANTA-2 will assist the Awardees in developing the scope of work for their MTE. Discussions in Project Year One led to the decision to include both a quantitative and qualitative component in the MTE. The quantitative component was carried out in August 2009 and the qualitative component will be carried out in Project Year Two. Previous experiences in providing TA for the development and implementation of MTEs in Honduras and Haiti will guide this work. • Contingent on further discussion with USAID/Guatemala and the Awardees, FANTA-2 may provide TA to develop a standard method the Awardees can use to document lessons learned and successful experiences in their respective programs. • FANTA-2 will complete the roll out of the Layers monitoring system by completing the Layers questionnaires, training local partners, collecting data, and generating Layers results for USAID/Guatemala and the Title II Awardees to use to improve MYAP implementation. IR 1.2 MCHN Program Design, Implementation and M&E Improved Since FY 2007, FANTA/FANTA-2 has assisted USAID/Guatemala to carry out an OM survey that collects data on a set of basic health and nutrition indicators in the geographic areas covered by USAID/Guatemala’s Health, Population and Nutrition program (HPN). XXXXX trained personnel of the USAID-funded bilateral health program URC/Calidad en Salud and private firm Centro de Investigaciones en Nutrition y Salud (CIENSA) in the implementation of the 2008 OM Survey. In Project Year One, FANTA...
AutoNDA by SimpleDocs

Related to Food Security Program Design

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Program Contractor will develop and implement an effective security program for the Project Site, which program shall require the Contractor and subcontractors to take measures for the protection of their tools, materials, equipment, and structures. As between Contractor and Owner, Contractor shall be solely responsible for security against theft of and damage of all tools and equipment of every kind and nature and used in connection with the Work, regardless of by whom owned.

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Contractor Licensing, etc. Notwithstanding Section 14.c, District may terminate this Contract immediately by written notice to Contractor upon denial, suspension, revocation, or non-renewal of any license, permit, or certificate that Contractor must hold to provide services under this Contract.

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

  • CONTRACTOR STAFF WITHIN AUTHORIZED USER AGREEMENT The provisions of this section shall apply unless otherwise agreed in the Authorized User Agreement. All employees of the Contractor, or of its Subcontractors, who shall perform under an Authorized User Agreement, shall possess the necessary qualifications, training, licenses, and permits as may be required within the jurisdiction where the Services specified are to be provided or performed, and shall be legally entitled to work in such jurisdiction. All Business Entities that perform Services under the Contract on behalf of Contractor shall, in performing the Services, comply with all applicable Federal, State, and local laws concerning employment in the United States. Staffing Changes within Authorized User Agreement

  • Parent Right to Access and Challenge Student Data The LEA shall establish reasonable procedures pursuant to which a parent, as that term is defined in 105 ILCS 10/2(g), may inspect and/or copy Student Data and/or challenge the accuracy, relevance or propriety of Student Data, pursuant to Sections 5 and 7 of ISSRA (105 ILCS 10/5; 105 ILCS 10/7) and Section 33 of SOPPA (105 ILCS 85/33). The Provider shall respond to any request by the LEA for Student Data in the possession of the Provider when Provider cooperation is required to afford a parent an opportunity to inspect and/or copy the Student Data, no later than 5 business days from the date of the request. In the event that a parent contacts the Provider directly to inspect and/or copy Student Data, the Provider shall refer the parent to the LEA, which shall follow the necessary and proper procedures regarding the requested Student Data.

  • Academic Policies and Student Support Services X. Xxxx College courses offered as dual credit, regardless of where they are taught, follow the same syllabus, course outline, textbook, grading method, and other academic policies and procedures as the courses outlined in the Hill College policy manual, catalog, and student handbook. [TAC 19, Part 1, Chapter 4, Subchapter D, 4.85(g)(1)]

Time is Money Join Law Insider Premium to draft better contracts faster.