Include vulnerability

Results: 23



#Item
11Management / Security / Safety / Disaster preparedness / Humanitarian aid / Federal Emergency Management Agency / Hazard / Emergency / Social vulnerability / Risk / Public safety / Emergency management

2013 Washington State Enhanced State Hazard Mitigation Plan Element A ELEMENT A: PLANNING PROCESS Requirement [The plan must include] Description of the planning process used to develop the §201.4(c)(1)

Add to Reading List

Source URL: www.emd.wa.gov

Language: English - Date: 2013-11-26 16:36:44
12Containerization / Port / San Francisco Bay Area / Transport / Container terminals / Oakland /  California

Port of Oakland - Seaport Vulnerability and Risk Profile The Port of Oakland’s maritime facilities include berth terminals, railway terminals, 20 deep water berths, and 35 container cranes, and the site is served by lo

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2013-03-26 17:33:04
13San Francisco Bay Area / California / Geography of California / Hayward Shoreline Interpretive Center / San Francisco Bay

Parks and Recreation Vulnerability and Risk Profile Parks and recreation areas in the ART subregion provide a wide variety of services to the public. Resources and activities at these sites include scenic views; walking,

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2013-03-26 17:32:35
14San Francisco Bay Area / Bay Area Rapid Transit / Infrastructure / Current sea level rise / Tunnel / San Francisco Municipal Railway / Groundwater / Transportation in California / Transportation in the United States / California

  Ground Transportation Vulnerability and Risk Profile There are significant national, regional and local ground transportation assets within the ART project area. The ground transportation assets analyzed include two

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2013-03-26 17:49:11
15Human sexuality / Human behavior / Cybertip.ca / Adolescence / Peer-to-peer / Sexual intercourse / Child abuse / Educational psychology / Behavior

If your child has been involved in a self/peer exploitation incident, you are likely feeling a wide range of emotions. This may include embarrassment, shame, anger, and a certain degree of vulnerability and uncertainty a

Add to Reading List

Source URL: www.uneportegrandeouverte.ca

Language: English - Date: 2013-11-14 10:35:34
16Risk management / Actuarial science / Security / Evaluation / Risk assessment / Social vulnerability / Emergency management / IT risk management / Risk / Management / Ethics

Scoping Paper for GAR 15 Call for Papers Risk Assessment HFA Core Indicators: PFA2CI1: National and local risk assessments based on hazard data and vulnerability information are available and include risk assessmen

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2013-08-06 07:46:15
17Emergency management / Hazard analysis / Occupational safety and health / HAZUS / Social vulnerability / Federal Emergency Management Agency / Hazard / Disaster / Geographic information system / Management / Public safety / Risk

Section 3.0 – Risk Assessment The following requirement(s) are met throughout this section: • §201.4(c)(2): [The State plan must include a risk assessment] that provides the factual basis for activities proposed in

Add to Reading List

Source URL: www.dhses.ny.gov

Language: English - Date: 2011-04-04 08:34:39
18Cyberwarfare / Vulnerability / Risk / Information technology audit / Information technology audit process / Information security / Auditing / Internal control / Computer security

Addendum P2[removed]P2[removed]d Examples of Internal Control Activities include:

Add to Reading List

Source URL: www.dfa.arkansas.gov

Language: English - Date: 2014-03-27 19:54:48
19Climate change / Environment / Social vulnerability / Psychological resilience / Vulnerability / Sociology / Economics of global warming / Climate Change Science Program / Risk / Adaptation to global warming / Global warming

Background on climate change adaptation, vulnerability, and adaptive capacity Adaptation to climate change: • Can include any activity that reduces the negative impacts of climate change and/or takes advantage of new o

Add to Reading List

Source URL: questcanada.org

Language: English - Date: 2014-06-02 14:37:59
20Risk management / Actuarial science / Data security / Computer security / HITRUST / ISO/IEC 27001 / Vulnerability / ISO 31000 / IT risk management / Security / Management / Risk

Comment (Include rationale for comment) Suggested change *There are several important steps missing for companies to Get Started (bolded).

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-12-03 13:41:15
UPDATE