Stakeholder Database Sample Clauses

Stakeholder Database. In summary • Working group stakeholders (WGS). As part of the co-design initiative, COACCH worked with around 40 stakeholders who were involved in the co-design of the project. These organisations were invited to join the working groups, attending four working group meetings during the project (months 6, 24, 36, 42). The aim was to develop the design and research focus, then continue to provide advice to ensure the research stays relevant to the needs and interests of stakeholders. • Deep engagement stakeholders (DES). From this larger group, around 10 organisations were offered the opportunity to be involved more closely in the project. These so-called ‘deep engagement stakeholders’ benefit from more targeted-research and co-production (within the boundaries of the project), helping to guide case study analysis to provide insights of direct relevance. This focused on practice orientated research, with a bilateral programme of detailed co-design, co-production and co-dissemination. This was anticipated to involve approximately at least one additional bilateral meeting a year (in addition to the workshop) to co-design and co-produce a deep engagement case study, to help ensure the relevance and user-orientation of the research, and to discuss the synthesis material and outputs from the work.
AutoNDA by SimpleDocs
Stakeholder Database. Creation of two main types of stakeholder: WGS and DES. • Identification of other individuals of interest for dissemination purposes. • While it is possible to identify a group of representative stakeholders, maintaining and holding onto a balanced and representative group is something that needs to be actively monitored and managed. • Much greater success was found - in terms of collaboration and use of the COACCH results - when a deep engagement process was followed. • However, the distinction between types of stakeholders (‘working group’ or ‘deep engagement’) may cause unnecessary confusion as well as leading to heterogenous experiences of project engagement (i.e. for those not selected). • For a truly ‘representative’ group, it is important to target specific people as well as an organisation. Engaging with multiple people from an organisation can increase the extent and impact of knowledge co-production as well as minimising the risk of stakeholder ‘bottlenecks’ or drop-out.
Stakeholder Database. To develop the overall process for the co-production process. A co-production pathway/roadmap will be completed in advance of the first workshop, to set out the proposed process, goals and outcomes. • To identify roles and responsibilities. Based on the proposal, it is proposed that PWA and Ecologic Institute act as the boundary agents for the overall co- production process and that each stakeholder is assigned a ‘relationship manager’ from across the consortium. Additional roles will be discussed and agreed at the first workshop. • To identify potential user needs and decisions. This has been progressed through the development of a stakeholder template, completed for all stakeholders (in Deliverable 1.1). Further user needs will be discussed at the first workshop and key decisions will be identified through the Deep Engagement Stakeholder meetings.
Stakeholder Database. Update the stakeholder database at regular intervals and provide to RCTC upon request.

Related to Stakeholder Database

  • Contractor Sensitive Information 17.1 The Authority must:

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • NOXIOUS WEEDS DISCLOSURE Buyers of property in the State of Montana should be aware that some properties contain noxious weeds. The laws of the State of Montana require owners of property within this state to control, and to the extent possible, eradicate noxious weeds. For information concerning noxious weeds and your obligations as an owner of property, contact either your local County extension agent or Weed Control Board.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Processing Personal Data 40.1. The Company is the data controller in the relevant jurisdiction. You hereby acknowledge and agree to the collection and processing of personal data provided by you in connection with the opening of a trading account for the purpose of performing our obligations under these Terms and Conditions and for administering the relationship between you and us.

  • Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit B.

  • Information Safeguards Business Associate will develop, document, implement, maintain and use appropriate administrative, technical and physical safeguards to preserve the integrity and confidentiality of and to prevent non-permitted use or disclosure of PHI created for or received from Recipient or its Subsidiaries. These safeguards must be appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. Business Associate agrees that these safeguards will meet any applicable requirements set forth by the U.S. Department of Health and Human Services, including (as of the effective date or as of the compliance date, whichever is applicable) any requirements set forth in the final HIPAA security regulations. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate resulting from a use or disclosure of PHI by Business Associate in violation of the requirements of this Addendum.

  • Safeguarding Information Not to use or disclose any information concerning a recipient of services under this contract for any purpose not in conformity with state and federal law except upon written consent of the recipient, or the responsible parent or guardian when authorized by law.

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.

Time is Money Join Law Insider Premium to draft better contracts faster.