33 community and with outsiders. These should be respected at all times. Discussions should be held with community leaders and the appropriate knowledge holders about types of sensitive information and how it should be handled (see Box 20). If the community decides to document or include sensitive information in the protocol, there should be a system such as authorized individuals with keys or passwords to ensure security of written and digital records until the information is consolidated for external use.  Before starting the protocol process, what mechanisms should be put in place to ensure sensitive information is retained by the appropriate knowledge holders?  Do the locations, names, or any other information and traditional knowledge about natural and cultural resources need to be kept confidential or have restricted access?  Who should and should not know this information within the community?  Who should and should not know this information outside of the community?  If the community would like to include certain elements of sensitive information in their protocol, how can they be presented in a way that respects customary forms of safeguarding and responds to contemporary challenges? For example, maps could have ‘fuzzy’ boundaries and exclude certain names or exact locations, visitors could be restricted to public areas, and shared information could be on a ‘need to know’ basis only. Box 20: Key questions to consider about sensitive information The divulgence of sensitive or restricted information can easily lead to external damage or destruction to natural sites or resources and to the cultural norms and expectations that otherwise protect them. On the other hand, if all information is kept within the community, external decisions about natural resource extraction can be made in ignorance and unintentionally harm sensitive sites or resources. Careful consideration of the community’s terms and conditions for sharing sensitive information can play a major role in the community protocol. Clarity of how those terms and conditions can be communicated to and respected by external actors can also lead to positive outcomes. Key Resources on Safeguarding Sensitive Information Sacred Natural Sites: Guidelines for Protected Area Managers (IUCN and UNESCO, 2008) Maintain & Strengthen Your Culture: Handbook for Working with Indigenous Ecological Knowledge & Intellectual Property (Northern Territories Natural Resources Management Board, 2009) Guidelines and Protocols for Ethical Research (North Australian Indigenous Land and Sea Management Alliance, 2007) Sacred Natural Sites website: www.sacrednaturalsites.org C. SEEKING AGREEMENT ABOUT THE PROTOCOL PROCESS Drawing on the guidance above, ensure that your role and the protocol process are clear to the community at the outset. First, the process should be driven by and for the community, with you as the facilitator. Even if there is a considerable amount of organization and resources being invested, it is still the community’s protocol and they need to have ownership over the process. Second, ensure clarity on roles and responsibilities for various tasks, including documenting and consolidating the protocol. If certain community members or catalysts commit to key roles, it will become an initiative of the broader community, distinct from and larger than your role as facilitator. Further considerations are provided in Box 21 below.

Select target paragraph3