Help


[permalink] [id link]
+
Page "International humanitarian law" ¶ 24
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

Protocol and I
Because growing vegetation absorbs carbon dioxide, the Kyoto Protocol allows Annex I countries with large areas of growing forests to issue Removal Units to recognise the sequestration of carbon.
I transmit herewith, for the advice and consent of the Senate to ratification, the Montreal Protocol on Substances that Deplete the Ozone Layer, done at Montreal on September 16, 1987.
I recommend that the Senate give early and favorable consideration to the Protocol and give its advice and consent to ratification.
* Protocol I, an amendment to the Geneva Conventions
One of the first tasks set by the UNFCCC was for signatory nations to establish national greenhouse gas inventories of greenhouse gas ( GHG ) emissions and removals, which were used to create the 1990 benchmark levels for accession of Annex I countries to the Kyoto Protocol and for the commitment of those countries to GHG reductions.
Annex I countries which have ratified the Protocol have committed to reduce their emission levels of greenhouse gasses to targets that are mainly set below their 1990 levels.
After intensive negotiations, it adopted the Kyoto Protocol, which outlined the greenhouse gas emissions reduction obligation for Annex I countries, along with what came to be known as Kyoto mechanisms such as emissions trading, clean development mechanism and joint implementation.
To be admitted, a state must: be a producer / exporter of arms or sensitive industrial equipment ; maintain non-proliferation policies and appropriate national policies including: adherence to non-proliferation policies, control list and, where applicable, guidelines of the Nuclear Suppliers Group, the Missile Technology Control Regime and the Australia Group ; and adherence to the Nuclear Non-Proliferation Treaty, the Biological Weapons Convention, the Chemical Weapons Convention and, where applicable, START I, including the Lisbon Protocol ; and maintain fully effective export controls.
There are two additional protocols to the Geneva Convention: Protocol I ( 1977 ), relating to the protection of victims of international armed conflicts and Protocol II ( 1977 ), relating to the protection of victims of non-international armed conflicts.
Protocol I does not mention torture but it does affect the treatment of POWs and Protected Persons.
The protocol also broadens the definition of a lawful combatant in wars against " alien occupation, colonial domination and racist regimes " to include those who carry arms openly but are not wearing uniforms, so that they are now lawful combatants and protected by the Geneva Conventions — although only if the Occupying Power has ratified Protocol I.
However, Protocol I, Article 42 of the Geneva Conventions explicitly forbids attacking parachutists who eject from damaged airplanes, and surrendering parachutists once landed.
According to Article 77. 2 of the Additional Protocol I to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts, adopted in 1977:
As the ICRC commentary on Protocol I makes clear, this is not a complete ban on the use of children in conflict.
Under the terms of Protocol I of the Geneva Conventions, children over the age of fifteen who have volunteered can be used as spotters, observers, and message-carriers ( see above International humanitarian law ).
For instance, the French Foreign Legion and the Gurkhas of the British and Indian armies are not mercenaries under the laws of war, since although they may meet many of the requirements of Article 47 of Protocol I to the Geneva Conventions, they are exempt under clauses 47 ( a )( c )( d )( e )&( f ); some journalists describe them as mercenaries nevertheless.
The Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts, ( Protocol I ), 8 June 1977 states:
Article 1. 1 is similar to Article 47 of Protocol I, however Article 1. 2 broadens the definition to include a non-national recruited to overthrow a " Government or otherwise undermining the constitutional order of a State ; or Undermin the territorial integrity of a State ;" and " Is motivated to take part therein essentially by the desire for significant private gain and is prompted by the promise or payment of material compensation ..." – under Article 1. 2 a person does not have to take a direct part in the hostilities in a planned coup d ' état to be a mercenary.
In 1977 Protocol I Additional to the Geneva Conventions, Chapter II, Article 50 " Definition of civilians and civilian population " indicates that a civilian is not a legal combatant.
Chapter III of Protocol I regulates the targeting of civilian objects.
Not all states have ratified 1977 Protocol I or the 1998 Rome Statute, but it is an accepted principle of international humanitarian law that the direct targeting of civilians is a breach of the customary laws of war and is binding on all belligerents.
For those nations that have ratified Protocol I of the Geneva Conventions, are also bound by Article 45. 3 of that protocol which curtails GCIV Article 5.
Under Article 47 of Protocol I ( Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts ) it is stated in the first sentence " A mercenary shall not have the right to be a combatant or a prisoner of war.

Protocol and 1977
Additional Protocol II of 1977 explicitly forbids collective punishment.
Article 4. 3. c of Protocol II, additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts, adopted in 1977, states " children who have not attained the age of fifteen years shall neither be recruited in the armed forces or groups nor allowed to take part in hostilities ".
The Protocol Additional GC 1977 ( APGC77 ) provides the most widely accepted international definition of a mercenary, though not endorsed by some countries, including the United States.
In 1977, Addition Protocol 1 to the Geneva Conventions designated apartheid as a grave breach of the Protocol and a war crime.
More recently the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts, referred in Article 1.
* 1977 Geneva Protocol I Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of International Armed Conflicts
* 1977 Geneva Protocol II Additional to the Geneva Conventions of 12 August 1949, and Relating to the Protection of Victims of Non-International Armed Conflicts
And weapons that go beyond non-lethal intentions and cause " superfluous injury or unnecessary suffering " could violate the Protocol I to the Geneva Conventions of 1977.
Non-combatant is a term in the law of war describing civilians who are not taking a direct part in hostilities, persons such as medical personnel and military chaplains who are member of the armed forces, but are protected because of their specific duties ( as described in Protocol I of the Geneva Conventions, adopted in June 1977 ), and combatants who are hors de combat (" outside the fight "); that is, sick, wounded, detained, or otherwise disabled.
The strategy of destroying the food supply of the civilian population in an area of conflict has been banned under Article 54 of Protocol I of the 1977 Geneva Conventions.
*** that of having a fixed distinctive sign recognizable at a distance ( there are limited exceptions to this among countries who observe the 1977 Protocol I );
The legal basis for protection of humanitarian workers in conflicts is contained in the Geneva Conventions of 1949 and the related Protocol of 1977.
More recently the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts, which applies in situations Article 1.
He has had great commercial success in memorable roles such as the executive Bobby Trippe in Deliverance ( 1972 ), Tennessee lawyer Delbert Reese in Nashville ( 1975 ), general attorney Dardis in All the President's Men ( 1976 ), Bob Sweet in Silver Streak ( 1976 ), the priest Edwards in Exorcist II: The Heretic ( 1977 ), Lex Luthor's henchman Otis in Superman ( 1978 ) and Superman II ( 1980 ), Bates ' right hand man Sydney Morehouse in The Toy ( 1982 ), Borisov and Pavel Petrovic in The Fourth Protocol ( 1987 ), TV presenter Ernest Weller in Repossessed ( 1990 ), Rudy Ruettiger's father in Rudy ( 1993 ), detective McNair in Just Cause ( 1995 ), Dexter Wilkins in Life ( 1999 ), the simple sheriff in Where the Red Fern Grows ( 2003 ), the corrupt Senator Charles F. Meachum in Shooter ( 2007 ), United States Congressman Doc Long in Charlie Wilson's War ( 2007 ) and the voice of antagonist Lots-O '- Huggin ' Bear in Toy Story 3 ( 2010 ).
She was appointed first female Chief of Protocol of the United States ( July 1, 1976 – January 21, 1977 ), and was in charge of arrangements for President Jimmy Carter's inauguration and inaugural ball.

Protocol and ):
* Joint Internet Protocol Modem ( JIPM ): DISA is developing Teleports for secure transmission of Internet Protocol over satellite communication systems.
* The Wireless Application Protocol ( WAP ): A Wiley Tech Brief ISBN 0-471-39992-2
* Signaling System No. 7 ( SS7 / C7 ): Protocol, Architecture, and Services.
* RFC 6120, Extensible Messaging and Presence Protocol ( XMPP ): Core, which describes client – server messaging using two open-ended XML streams.
* RFC 6121, Extensible Messaging and Presence Protocol ( XMPP ): Instant Messaging and Presence describes instant messaging ( IM ), the most common application of XMPP.
* RFC 6122, Extensible Messaging and Presence Protocol ( XMPP ): Address Format describes the rules for XMPP addresses, also called JabberIDs or JIDs.
* Communication Protocol ( s ): Serial Transfers: Kermit ( protocol ); Infrared Transfers: proprietary
* Communication Protocol ( s ): Serial Transfers: Kermit ( protocol ) or Xmodem ; Infrared Transfers: proprietary
* Introduction to the Common Internet File System ( CIFS ): Leverage the Power of this Popular Network File Sharing Protocol Online introduction to CIFS: Lecture / blog by Ron Fredericks
* RFC 5891 " Internationalized Domain Names in Applications ( IDNA ): Protocol "
Protocol I ( 1977 ): " Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts " has additional articles which cover military occupation but many countries including the U. S. are not signatory to this additional protocol.
; Switched Digital Broadcast-Channel Change Protocol ( SDB / CCP ): Enables a client to remotely switch from channel to channel in a broadcast environment.
* Protocol Independent Multicast-Sparse Mode ( PIM-SM ): Protocol Specification ( Revised )
* Protocol Independent Multicast-Sparse Mode ( PIM-SM ): Protocol Specification rfc2362
The WPAD standard defines two alternative methods the system administrator can use to publish the location of the proxy configuration file, using the Dynamic Host Configuration Protocol ( DHCP ) or the Domain Name System ( DNS ):
* Protocol II ( 1977 ): Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of Non-International Armed Conflicts.
* Protocol III ( 2005 ): Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Adoption of an Additional Distinctive Emblem.

0.498 seconds.