Stakeholder Database Sample Clauses

Stakeholder Database. In summary • Working group stakeholders (WGS). As part of the co-design initiative, COACCH worked with around 40 stakeholders who were involved in the co-design of the project. These organisations were invited to join the working groups, attending four working group meetings during the project (months 6, 24, 36, 42). The aim was to develop the design and research focus, then continue to provide advice to ensure the research stays relevant to the needs and interests of stakeholders. • Deep engagement stakeholders (DES). From this larger group, around 10 organisations were offered the opportunity to be involved more closely in the project. These so-called ‘deep engagement stakeholders’ benefit from more targeted-research and co-production (within the boundaries of the project), helping to guide case study analysis to provide insights of direct relevance. This focused on practice orientated research, with a bilateral programme of detailed co-design, co-production and co-dissemination. This was anticipated to involve approximately at least one additional bilateral meeting a year (in addition to the workshop) to co-design and co-produce a deep engagement case study, to help ensure the relevance and user-orientation of the research, and to discuss the synthesis material and outputs from the work.
AutoNDA by SimpleDocs
Stakeholder Database. Creation of two main types of stakeholder: WGS and DES. • Identification of other individuals of interest for dissemination purposes. • While it is possible to identify a group of representative stakeholders, maintaining and holding onto a balanced and representative group is something that needs to be actively monitored and managed. • Much greater success was found - in terms of collaboration and use of the COACCH results - when a deep engagement process was followed. • However, the distinction between types of stakeholders (‘working group’ or ‘deep engagement’) may cause unnecessary confusion as well as leading to heterogenous experiences of project engagement (i.e. for those not selected). • For a truly ‘representative’ group, it is important to target specific people as well as an organisation. Engaging with multiple people from an organisation can increase the extent and impact of knowledge co-production as well as minimising the risk of stakeholder ‘bottlenecks’ or drop-out.
Stakeholder Database. Update the stakeholder database at regular intervals and provide to RCTC upon request.
Stakeholder Database. Consultant shall create a stakeholder database that includes key agencies, residents, property owners, schools, and businesses. This database shall include stakeholder name and contact information, as well as the preferred method of contact and potential key concerns and/or areas of Project interest.
Stakeholder Database xlsx format)
Stakeholder Database. To develop the overall process for the co-production process. A co-production pathway/roadmap will be completed in advance of the first workshop, to set out the proposed process, goals and outcomes. • To identify roles and responsibilities. Based on the proposal, it is proposed that PWA and Ecologic Institute act as the boundary agents for the overall co- production process and that each stakeholder is assigned a ‘relationship manager’ from across the consortium. Additional roles will be discussed and agreed at the first workshop. • To identify potential user needs and decisions. This has been progressed through the development of a stakeholder template, completed for all stakeholders (in Deliverable 1.1). Further user needs will be discussed at the first workshop and key decisions will be identified through the Deep Engagement Stakeholder meetings.
Stakeholder Database. Engineer will develop a database mailing/email list of key community leaders, including multi-cultural, faith-based, environmental business and other leaders, as well as organizations and groups that may be affected by field investigations, proposed pipeline routes, or other aspects of TAP. This is also known as a stakeholder database and it will be in a format acceptable to the City that can be manipulated and sortable to maximize its effectiveness as a tool for contacting stakeholders and other interested parties throughout the course of the project. It will include by way of example Xxxxxx Bridge residents, off-road bicycling club, equestrian clubs, and others who might be impacted by field investigations on District land, parks, and golf courses along the recharge/recovery route.
AutoNDA by SimpleDocs

Related to Stakeholder Database

  • Line Information Database LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, ONS must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Customer Data 5.1 The Customer shall own all rights, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data. 5.2 The Supplier shall follow its archiving procedures for Customer Data as set out in its Back-Up Policy available at XxxxxXXX.xxx or such other website address as may be notified to the Customer as such document may be amended by the Supplier in its sole discretion from time to time the current version of which is set out at Schedule 3 of this Agreement. In the event of any loss or damage to Customer Data, the Customer's sole and exclusive remedy shall be for the Supplier to use reasonable commercial endeavours to restore the lost or damaged Customer Data from the latest back-up of such Customer Data maintained by the Supplier in accordance with the archiving procedure described in its Back-Up Policy. The Supplier shall not be responsible for any loss, destruction, alteration or disclosure of Customer Data caused by any third party (except those third parties sub-contracted by the Supplier to perform services related to Customer Data maintenance and back-up). 5.3 The Supplier shall, in providing the Services, comply with its Privacy and Security Policy as such document may be amended from time to time by the Supplier in its sole discretion. 5.4 If the Supplier processes any personal data on the Customer’s behalf when performing its obligations under this agreement, the parties record their intention that the Customer shall be the data controller and the Supplier shall be a data processor and in any such case: (a) the Customer shall ensure that the Customer is entitled to transfer the relevant personal data to the Supplier so that the Supplier may lawfully use, process and transfer the personal data in accordance with this agreement on the Customer's behalf; (b) the Customer shall ensure that the relevant third parties have been informed of, and have given their consent to, such use, processing, and transfer as required by all applicable data protection legislation; (c) the Supplier shall process the personal data only in accordance with the terms of this agreement and any lawful instructions reasonably given by the Customer from time to time; and (d) each party shall take appropriate technical and organisational measures against unauthorised or unlawful processing of the personal data or its accidental loss, destruction or damage. 5.5 The Supplier and the Customer shall comply with their respective obligations as set out in Schedule 4 of this Agreement

  • Information Sources The Custodian may rely upon information received from issuers of Investments or agents of such issuers, information received from Subcustodians and from other commercially reasonable sources such as commercial data bases and the like, but shall not be responsible for specific inaccuracies in such information, provided that the Custodian has relied upon such information in good faith, or for the failure of any commercially reasonable information provider.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.

  • User Data We will maintain certain data that you transmit to the Services for the purpose of managing the performance of the Services, as well as data relating to your use of the Services. Although we perform regular routine backups of data, you are solely responsible for all data that you transmit or that relates to any activity you have undertaken using the Services. You agree that we shall have no liability to you for any loss or corruption of any such data, and you hereby waive any right of action against us arising from any such loss or corruption of such data.

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!