Mainstreaming Protection in the food security Mainstreaming Protection in the food security Mainstreaming Protection in the food security
activities implemented by the members of activities implemented by the members of activities implemented by the members of
The Somalia Food Security ClusterThe Somalia Food Security ClusterThe Somalia Food Security Cluster
Protection Mainstreaming ChecklistProtection Mainstreaming Checklist
SOMALIA
Page 1 of 15
All rights reserved by Somalia Food Security Cluster/ WFP. No part of this document may be
reprinted, reproduced or utilized without the written permission of the publisher.
For additional inquires on this document, contact:
Somalia Food Security Protection Advisor, Mr. Dher Abbas Ali, [email protected]
DEVELOPED BY THE SOMALIA FOOD SECURITY CLUSTER
Page 2 of 15
SOMALIA FOOD SECURITY CLUSTER
Protection Mainstreaming Checklist
MAINSTREAMING PROTECTION IN THE FOOD SECURITY ACTIVITIES IMPLEMENTED
BY THE SOMALIA FOOD SECURITY CLUSTER MEMBERS
I. PREFACE:
The Protection Mainstreaming Checklist is a technical guidance, developed to support Somalia
Food Security Cluster (FSC) members to mainstream protection in their food security
interventions in Somalia. This tool is exclusively designed to assist the members during the
Consolidated Appeal Process (CAP) 2013-2015 and its flowing activities. The tool has been
drafted after a series of intensive consultations with Somalia FSC members.
While acknowledging the essentiality of all global protection mainstreaming guidelines, this
Checklist strives to tailor protection mainstreaming principle to the food security activities in
the context of Somalia. Therefore, the contents do not necessarily cover all protection
mainstreaming principles but rather focuses on aspects related to the specific context of
Somalia.
SOMALIA
Page 3 of 15
II. WHAT IS PROTECTION MAINSTREAMING IN FOOD SECURITY CLUSTER?
For Food Security Cluster (FSC) members, Protection Mainstreaming means implementing food
assistance, agricultural, nutritional and livelihood activities in non-discriminatory and impartial
ways that promote the of the people receiving assistance. A safety, dignity and integrity
protection approach to food assistance and livelihood activities is consistent with humanitarian
principles and encompasses a variety of internationally and human rights-based programming
recognized human-rights, and not only the right to food, the right to be free from hunger and
those rights directly related to them. FSC members aim to avoid, minimize or reduce any
unintended negative consequences or impact of their assistance or interventions and are
committed to a approach to programming. ‘do no harm’ Equality, accountability to affected
, and are principles incorporated into populations participation empowerment of beneficiaries
all stages of implementing any food security activity, program, project or intervention.
Page 4 of 15
III. WHY PROTECTION MAINSTREAMING IS IMPORTANT FOR FOOD SECURITY IN
SOMALIA?
1. Mainstreaming protection of food security enhances the relevance and quality
programs and of interventions. Furthermore, it contributes to the maximizes the impact
of beneficiaries and enables us potentially appropriate targeting to avoid the harm
generated by food security assistance and to of the staff, the increase the safety
intervention and beneficiaries. Identifying protection threats enables us to harmonize
and fine-tune our food security activities in order to address, mitigate or reduce these
. threats
2. The food security activities by their nature are diverse and they require high-level
technical knowledge on the food security related fields. Therefore, it is essential to
remind ourselves that:
The technically demanding nature of food security activities should not
compromise, or overshadow the overall humanitarian goal of our
actions. Strengthening the protective environment of vulnerable
population remains the core objective of our food security activities in
Somali.
Page 5 of 15
In order to meet the standards of this Handbook, all humanitarian agencies should
be guided by the Protection Principles, even if they do not have a distinct protection
mandate or specialist capacity in protection. (The Sphere Project – Humanitarian
Charter and Minimum Standards in Humanitarian Response – Putting the Protection
Principles into practice - Page 31)
3. Inter-Agency Standing Committee (IASC) cites protection mainstreaming as compulsory
for all clusters and illustrates this in a self-explanatory diagram that shows the different
between standalone protection activities and protection mainstreaming.
4. Sphere Handbook emphasizes the essentiality of protection mainstreaming:
Page 6 of 15
IV. WHEN SHOULD WE MAINSTREAM PROTECTION?
Protection mainstreaming should be considered an ongoing process and consistent with all
. stages of any food security activity
The following sections of this document will provide guidance how to mainstream protection
within food security activities in Somalia.
Box No: 1
Box No: 1
Page 7 of 15
IV.1.1 ASSESSMENT TOOL (TEMPLATE):
Designing the assessment tools should go and guarantee that the beyond technicality
tool allocates satisfactory space to allow assessing the protection situation as a
fundamental base.
The Focus Group Discussion (FGD) section of the tools must precisely indicate the
and it should mention the range of participants’ background and profile age and sex
participants.
The individual interview section should file the of the interviewed person. age and sex
The assessment tools must pay special attention to (such as older people, minorities
people with specific needs, ethnic or religious minorities etc.)
The potential that might be generated by provision assistance must be harms
foreseen.
Allocate a space to mention the available local remedies that could be used as project
inputs. The activities must build on the available resources within the area and
community before bringing in external resources.
“THE NEEDS ASSESSMENT STAGE IS
THE CORNERSTONE OF A SUCCESSFUL
RESPONSE. A WELL-PLANNED
ASSESSMENT KEEPS STEERING AND
GUIDING THE OTHER COMPONENTS
OF THE PROJECT CYCLE AND ENSURES
THAT THE TARGETS ARE CLEAR AND
MEASURABLE AT ALL STAGES.”
I. MAINSTREAMING PROTECTION DURING ASSESSMENT
Box No: 2 Box No: 3
Page 8 of 15
IV.1.2 TEAM COMPOSITION:
Ensure that your team is able to . reach all individuals and communities equally
Compose your team on the basis of in the lights of different needs equal opportunities
vulnerabilities and deviations within the targeted community. The common issues to
consider are language, culture, gender, older people, people with disabilities and
tribal/ethnical diversities.
Ensure to include team. female members in the assessment
Brief the assessment team on the importance of identifying the most vulnerable
people, groups and communities.
Remind the team that their assessment report is expected to, at a minimum level,
underline the most . significant protection concerns
Page 9 of 15
IV.1.3 PARTICIPATORY APPROACH:
: Active involvement of the targeted community will allow the Participatory approach
beneficiaries, not only to raise their needs but also contribute to the response planning
phase.
One of the key data gathering methodologies in Somalia is the Focus Group Discussions
(FGDs). Remember to involve as much as you can representatives from minority clans
in these FGDs.
It often happens that few community members (i.e. women, children, minority clans/
families, aged people and people with specific needs) are unable to attend the FDGs,
therefore, you need to carry out and sub-focus group discussions individual meetings/
with those who are unable to attend the general FGDs. interviews
Talk to those (i.e. children, people with disabilities, older who cannot talk to you
persons, people with specific needs, minorities)
The principle must be applied at the assessment stage by involving the Do No Harm
“indirect beneficiaries” i.e. the hosting community. This will contribute mitigating the
potential harm or any negative implication the project might cause.
Try to enlarge the discussion on the needs and response by asking “WHAT COULD BE
THE NEGATIVE IMPLICATIONS OF THE RESPONSE?”
The active contribution of the community in response planning would enhance the
impact, maintain the relevance, raise the sense of ownership and increase the safety of
beneficiaries and staff during intervention.
Box No: 4
Page 10 of 15
A common feedback of on ; make the needs might vary from one group to another
sure that the most vulnerable and marginalized people have a say.
Ensure that the de facto are aware of your assessment in order to have authorities
them on your side and minimize the risk.
Remind the authorities that they are the safety and security of accountable to
and to aid workers in areas under their authority – to the extent feasible beneficiaries
– encourage and persuade the formal authorities to assume their obligations more
fully*professional standards for protection ICRC
Page 11 of 15
In this phase you establish best practices, and you perform risk analysis to identify
threats and vulnerabilities and you maintain the logic between the needs identification
and response stages.
Map and , their interrelationships, roles, influence and their analyze the stakeholders
potential impact on the intervention. Set communications and participatory
mechanisms to engage or not to engage these actors in the program stages.
the potential of violence, danger, coercion and take Map external and internal sources
preventative and responsive measures to address, mitigate or reduce these threats.
Ensure that the protection risks and concerns underlined in the are assessment
considered in your . planning
Ensure that the design cites the affected population, not only as beneficiaries but also as
. active contributors to the intervention
Map the risks the project might expose the beneficiaries and to hosting communities
and take measures to mitigate these threats during implementation and reporting
phases.
Ensure that the plan addresses the of the most groups and specific needs vulnerable
individuals, are critical needs that must be given a special consideration at gender issues
the planning stage, remember that older people and people with disabilities are
considered and included in your planning. If needed, design and include a vulnerability
targeting methodology in your response plan.
Ensure that the project implementation staff has signed the and, if code of conduct
needed, organize refreshing sessions on humanitarian principles of humanity,
independence and impartiality.
II. MAINSTREAMING PROTECTION AT PLANNING PHASE
Box No: 5
Page 12 of 15
Ensure that of the most vulnerable groups to services is tangible and the equal access
implemented.
Each single implementation staff member must be aware of the and of specific needs
the , and sensitivities within the targeted community. sex clan age
The beneficiaries and surrounding community must be aware of the DATE/S AND
of the intervention. LOCATION/S
The must be in place and all beneficiaries must be feedback (complaint) mechanisms
aware of them. The mechanism must be easy to use and impartially accessible by all
including the marginalized and illiterate people.
The where the projects is implemented is safe and location OF, TO and FROM accessible
to everybody. The end of project does not mean end of responsibility, the provision of
assistance must not put the beneficiaries at any kind of risk.
Reduce the threats and ensure that the most vulnerable and those who Do No Harm:
are given . CANNOT GO THROUGH USUAL BENEFITING PROCEDURES equal chances
Ensure that vulnerable groups and individuals are able to access services equally and
without any discrimination – ensure that the service prevision process does not
generate any against girls, boys, women or men. Apply Sexual Exploitation and Abuse
the principle of “different needs equal opportunities.”
All protection concerns that have been identified, recommended, designed and
planned must be PUT INTO PRACTICE at implementation phase. List all underlined
protection concerns in the design and response plan and ensure that all these concerns
will be taken into consideration and will be incorporated to the implementation
phase.
III. MAINSTREAMING PROTECTION AT IMPLEMENTATION PHASE
Box No: 6
Page 13 of 15
Remember to report the specific that occurred or were witnessed protection incidents
during the implementation and how the team addressed with these cases. Beware that
protection incident are sensitive and must be handled with extreme confidentiality.
Reporting and M&E phases must review the and must collect the feedback reports
stakeholders’ (including local authorities, hosting community and vulnerable and
marginalized communities) feedback on the implementation.
Logical framework and of protection issues: verify if the issues raised during cohesion
the assessment stage were included in the planning stage and were actually
implemented in the field.
Collect a few examples illustrating the way the project addressed and Do No Harm
document any security-related concerns that might have affected beneficiaries during
the implementation phase.
Ensure that your reports include lessons learned and recommendations.
THE OVERALL EVALUATION MUST DETERMINE IF:
THE PROJECT CONTRIBUTED TO MAKE THE POPULATION STRONGER AGAINST PROTECTION RISKS THEY ARE
EXPOSED TO.
THE PROJECT MAINTAINED HUMAN RIGHTS AND ENSURED THE EQUAL ACCESS OF THE BENEFICIARIES TO
SERVICES.
THE MOST VULNERABLE GROUPS AND INDIVIDUALS AND PEOPLE WITH SPECIFIC NEEDS WERE INCLUDED,
THE DIFFERENT NEEDS OF WOMEN, MEN, GIRLS AND BOYS WERE CONSIDERED EQUALLY AND THEIR RIGHTS
WERE NOT VIOLATED BY ANY MEANS.
THE PROJECT DID NOT DO HARM AND WHAT ARE THE LESSONS LEARNED FOR THE FUTURE. Box No: 8
Mainstreaming Protection in any food security activity is a dynamic and complex
process. Some reporting and monitoring and evaluation tools might not alloctae
enough space to report, monitor or evaluate protection issues. Therefore these tools
need to be developed in away it takes into acount the proteciton issues as explained
below. Box No: 7
IV. MAINSTREAMING PROTECTION AT REPORTING AND M&E PHASES
Page 14 of 15
We talked to, and considered the needs of all people of concern and of those
who cannot talk to us. We were reachable and accessible by everybody.
We planned and designed our program ensuring that nobody will be left out or
harmed as a result of our activities. We mapped and analyzed the roles and
responsibilities of those who might impact the project and involved them accordingly
in our activities. We reduced the likelihoods of facing unexpected challenges during
the implementation phase.
The implementation was carried out safely; no one was neglected, abused,
discriminated or exploited. Older people, women, men, girls, boys, minority groups,
clans and individuals and all other people of most concern identified in the needs
assessment were included and assisted. We actively involved the community and
maintained the sense of ownership and responsibility. We ensured that our response
is Needs Based Response
Our reports and Monitoring and Evaluation verified whether the most
vulnerable individuals and communities were assisted and no one was harmed or de-
benefitted from the intervention. We did not feed any disagreement or conflict. Our
staff adhered to their humanitarian principles. We learned lessons for our next
activities.
THANKS TO OUR FOOD SECURITY INTERVENTIONS,
THE COMMUNITY HAS BECOME STRONGER AND
MORE ABLE TO PROTECT ITSELF.
Page 15 of 15
SOMALIA FOOD SECURITY CLUSTER
Protection Mainstreaming
Checklist
SOMALIA
Mainstreaming Protection in the food security Mainstreaming Protection in the food security Mainstreaming Protection in the food security
activities implemented by the members of activities implemented by the members of activities implemented by the members of
The Somalia Food Security ClusterThe Somalia Food Security ClusterThe Somalia Food Security Cluster
Protection Mainstreaming ChecklistProtection Mainstreaming Checklist
SOMALIA