Most users: Use this 5-minute tool to assess if your activity (e.g. a project, plan, policy) is climate-influenced and a priority for further assessment using CCORAL. No climate-related knowledge or expertise is required to do the screening.
Technical users: If your activity is specifically designed to build resilience to climate variability and/or climate change, and you have a technical involvement in this activity, it is recommended you click here to find a comprehensive climate risk management process that best suits your needs.
Timing The screening exercise can be done at any time, but is most relevant:
Begin the screening exercise
Answer all questions below by ticking the relevant box
Y N
1 Effects or outcomes of an activity refer to physical artefacts, functional processes, systems and other results, intended or otherwise .The intent of this question is to differentiate between activities with short and long term effects, as those with longer term effects are likely to see a greater range of climate impacts and experience more extreme events over the course of their lifetime. 2 Involvement’ of one of these sectors refers to the sector being the core sector for your activity, and/or being significantly involved in consultation for your activity. 3 Examples of critical infrastructure include transportation, energy, water, ICT, hospitals, schools, etc. 4 This question is intended to capture the core objectives that are seen as fundamental for the success of a national development program. Consequently this box should only be ticked for issues that significantly contribute to high priority national development plan objectives. 5 Vulnerable Groups: Children, pregnant women, elderly people, malnourished people, and people who are ill or immunocompromised, are particularly vulnerable when a disaster strikes, and take a relatively high share of the disease burden associated with emergencies. Poverty � and its common consequences such as malnutrition, homelessness, poor housing and destitution � is a major contributor to vulnerability.