Indigenous Protected Area - Criteria

Criteria

Aboriginal Australian and Torres Strait Islander land and sea owners (including native title holders) may be encouraged, or themselves apply to the Australian Government to establish an Indigenous Protected Area on their lands/seas. However, an Indigenous Protected Area can only come into existence where:

  • land and/or seas are owned by Aboriginal Australians or Torres Strait Islanders; and
  • significant biodiversity occurs within such Aboriginal/Torres Strait Islander owned lands or seas; and
  • the Aboriginal Australians or Torres Strait Islanders concerned enter into a formal conservation agreement with the Australian Government to manage some of their lands or seas as an IUCN standard "protected area"

Read more about this topic:  Indigenous Protected Area

Famous quotes containing the word criteria:

    Every sign is subject to the criteria of ideological evaluation.... The domain of ideology coincides with the domain of signs. They equate with one another. Wherever a sign is present, ideology is present, too. Everything ideological possesses semiotic value.
    —V.N. (Valintin Nikolaevic)

    We should have learnt by now that laws and court decisions can only point the way. They can establish criteria of right and wrong. And they can provide a basis for rooting out the evils of bigotry and racism. But they cannot wipe away centuries of oppression and injustice—however much we might desire it.
    Hubert H. Humphrey (1911–1978)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)