Navigation path

Call for proposals "Action Grants" 2007

Deadline: 16/07/2007

I) Latest developments

  • 01/09/2010: Reporting documents are available.

II) Documents

  • Call for proposals "Action Grants" 2007 pdf - 58 KB [58 KB] Deutsch (de) español (es) français (fr) italiano (it) polski (pl) [200 KB]
  • Guide for applicants 2007 pdf - 105 KB [105 KB] [104.74 KB]
  • Application form msw8 - 2 MB [2 MB] Deutsch (de) español (es) français (fr) italiano (it) polski (pl) [1560 KB]
  • Model Grant Agreement for an Action pdf - 92 KB [92 KB] Deutsch (de) français (fr) [105 KB]
  • Partnership declaration msw8 - 27 KB [27 KB] [27 KB]
  • Timetable excel8book - 21 KB [21 KB] Deutsch (de) español (es) français (fr) italiano (it) [22 KB]
  • Explanatory note excel8book - 29 KB [29 KB] [29 KB]
  • Budget form how-to pdf - 23 KB [23 KB] Deutsch (de) español (es) français (fr) italiano (it) [26 KB]
  • Budget estimate excel8book - 109 KB [109 KB] Deutsch (de) español (es) français (fr) italiano (it) polski (pl) [116 KB]
  • Privacy statement pdf - 16 KB [16 KB] [16 KB]

III) Reporting documents

IV) Reports

Additional tools




Glossary

Trafficking in human beings

The recruitment, transportation, transfer, harbouring or reception of persons, including the exchange or transfer ...

+

Specific Programme "Prevention of and Fight against Crime" (ISEC)

This programme contributes to citizens' security by preventing and combating crime, in particular terrorism...

+

Sexual exploitation

Any actual or attempted abuse of a position of vulnerability, power differential or trust for sexual purposes, including, but not limited to, profiting monetarily, socially or politically from the sexual exploitation of another.

+

Organised crime

Activities of large-scale criminal and terrorist networks, including terrorism, international drugs trafficking, trafficking ...

+

Money laundering

The attempt to conceal or disguise the ownership or source of the proceeds of criminal activity and to integrate ...

+

Cybercrime

Offences against the confidentiality, integrity and availability of computer data and systems (illegal access and ...

+

Counterfeiting

Unauthorized representation of a registered trademark carried on goods identical or similar to goods for which the ...

+

Corruption

The abuse of power for private gain (in both the public and the private sector).

+