Skip to Main Content View Text-Only

Planning and Sustainability

Innovation. Collaboration. Practical Solutions.

Phone: 503-823-7700

Fax: 503-823-7800

1900 SW 4th Ave, Suite 7100, Portland, OR 97201

More Contact Info

Agenda: May 29, 2013 Networks PEG meeting

May 29, 2013 from 2:30 p.m. to 4:30 p.m.
1900 SW 4th Avenue,Portland, Conference Room 7A 

Note:  The meeting is officially scheduled to adjourn at 4:30.  Given the number of agenda items, please plan to extend your participation to 5:00 pm if warranted. 

Introductions (2:30 p.m.)
Presenter: Jim Owens, Facilitator 

Review of May 1 Meeting Summary, Schedule/Topics for Remaining Meetings, and Desired Meeting Outcomes (2:35 p.m.)
Presenters: Jim Owens, Courtney Duke and Eric Engstrom
Description: Review of May 1 meeting summary, discussion of program for remaining meetings, and identification of desired outcomes from this meeting.
Related Materials:

  • PEG Meeting Schedule and Agenda Topics
  • May 1 Meeting Summary

Trails (3:00 p.m.)
Presenter: Shannon Buono, BPS
Description: Presentation on proposed program for trails and relation to greenways.
Related Materials:  TBD 

Public Comment (3:30 p.m.) 

PEG Recommendations on Working Draft Part 1 (3:35 pm)
Facilitator:  Jim Owens
Description:  Discussion of draft memorandum from PEG detailing its recommendations on Comprehensive Plan goals and policies; approval of recommendations to forward to BPS.
Related Materials:

  • Draft Memorandum of PEG Comments on Working Draft Part 1

Next Steps and Wrap Up (4:25 p.m.)
Presenter: Jim Owens, Facilitator
Description: Summary of actions, schedule and assignments 

Adjourn (4:30 p.m.)

For more information, please contact either Courtney Duke, PBOT at 503-823-7265 or or Jim Owens, Facilitator at 503-278-3452 or 

Heartbleed Security Notice

A serious security vulnerability known as "Heartbleed" was recently discovered in OpenSSL, a popular software library commonly used by many websites on the internet to encrypt communication between a user's computer and a web server. is NOT affected by this vulnerability as it does not use the OpenSSL software library. Please rest assured we are dedicated to protecting your security on this website.