An Independent Report
of the West Africa Commission on Drugs
UNAIDS 2014 | Guidance Note
This handbook provides an overview of the law applicable to asylum, border management and immigration in relation to European Union (EU) law and the European Convention on Human Rights (ECHR). It looks at the situation of those foreigners whom the EU usually refers to as third-country nationals. Thi...s handbook is designed to assist legal practitioners as well as non-governmental organisations (NGOs) and other bodies that are not specialised in the field of asylum, borders and immigration law and that may be confronted with legal qüstions relating to these subjects.
For versions in other European languages check also http://fra.europa.eu/de/publication/2013/handbuch-zu-den-europarechtlichen-grundlagen-im-bereich-asyl-grenzen-und-migration
more
These Guidelines comprise a General Guidelines document that provides the basic parameters of DG ECHO humanitarian health assistance, complemented by specific Technical Guidance in annex.
International Journal of Infectious Diseases 32 (2015) 170–178
http://dx.doi.org/10.1016/j.ijid.2014.11.023
1201-9712/ß 2014 The Authors. Published by Elsevier Ltd on behalf of International Society for Infectious Diseases. This is an open access article under the CC BY-NC-ND license (http:...//creativecommons.org/licenses/by-nc-nd/3.0/).
more
Security Risk Management and Religion: Faith and secularism in humanitarian assistance examines the impact that religion has on security risk management for humanitarian agencies, and considers whether a better understanding of religion can improve the security of organisations and individuals in th...e field.
more
Mid-term review of The National AIDS Programme 2011-15
October 2013
Supplement to the Healthcare Waste Management Toolkit for Global Fund
Practitioners and Policy Makers
Conceived as part of the CWS-A/P project on regional security and risk management, this book presents a
collection of testimonies from aid workers in some of the most insecure and volatile environments in the world.
The participants recount a broad array of security incidents, such as kidnappings,... suicide bombings, mob
violence, road ambushes, and point-blank range shootings. Their narrative provides valuable information on
how organizations can manage security risks and streamline safety policies.
more