33
community and with outsiders. These should be respected at all times. Discussions should be held with
community leaders and the appropriate knowledge holders about types of sensitive information and how
it should be handled (see Box 20). If the community decides to document or include sensitive information
in the protocol, there should be a system such as authorized individuals with keys or passwords to ensure
security of written and digital records until the information is consolidated for external use.
Before starting the protocol process, what mechanisms should be put in place to ensure sensitive
information is retained by the appropriate knowledge holders?
Do the locations, names, or any other information and traditional knowledge about natural and
cultural resources need to be kept confidential or have restricted access?
Who should and should not know this information within the community?
Who should and should not know this information outside of the community?
If the community would like to include certain elements of sensitive information in their protocol,
how can they be presented in a way that respects customary forms of safeguarding and responds
to contemporary challenges? For example, maps could have ‘fuzzy’ boundaries and exclude certain
names or exact locations, visitors could be restricted to public areas, and shared information could
be on a ‘need to know’ basis only.
Box 20: Key questions to consider about sensitive information
The divulgence of sensitive or restricted information can easily lead to external damage or destruction to
natural sites or resources and to the cultural norms and expectations that otherwise protect them. On the
other hand, if all information is kept within the community, external decisions about natural resource
extraction can be made in ignorance and unintentionally harm sensitive sites or resources. Careful
consideration of the community’s terms and conditions for sharing sensitive information can play a major
role in the community protocol. Clarity of how those terms and conditions can be communicated to and
respected by external actors can also lead to positive outcomes.
Key Resources on Safeguarding Sensitive Information
Sacred Natural Sites: Guidelines for Protected Area Managers (IUCN and UNESCO, 2008)
Maintain & Strengthen Your Culture: Handbook for Working with Indigenous Ecological Knowledge &
Intellectual Property (Northern Territories Natural Resources Management Board, 2009)
Guidelines and Protocols for Ethical Research (North Australian Indigenous Land and Sea Management
Alliance, 2007)
Sacred Natural Sites website: www.sacrednaturalsites.org
C.
SEEKING AGREEMENT ABOUT THE PROTOCOL PROCESS
Drawing on the guidance above, ensure that your role and the protocol process are clear to the
community at the outset. First, the process should be driven by and for the community, with you as the
facilitator. Even if there is a considerable amount of organization and resources being invested, it is still
the community’s protocol and they need to have ownership over the process. Second, ensure clarity on
roles and responsibilities for various tasks, including documenting and consolidating the protocol. If
certain community members or catalysts commit to key roles, it will become an initiative of the broader
community, distinct from and larger than your role as facilitator. Further considerations are provided in
Box 21 below.