State of Conservation
275
Reports
42
Properties concerned
34
States Parties with SOC reports
Property Category:Naturalclose
Date end:2016close
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Mining |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3B,WHC-98/CONF.203/8Rev. |
Threats*: | Mining |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Mining |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7B,WHC-96/CONF.202/2B |
Threats*: | Mining |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.203/5 Add.1 |
Threats*: | Mining |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.201/11Rev,WHC-02/CONF.202/17,WHC-02/CONF.202/2 |
Threats*: | Mining |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10 |
Threats*: | Mining |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.204/10 |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Mining |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.203/5,WHC-2000/CONF.204/10 |
Threats*: | Mining |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7B |
Threats*: | Mining |
Other Threats: | State of the Guadalquivir River and dredging project |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.201/11Rev,WHC-02/CONF.202/17 |
Threats*: | Mining |
Other Threats: | Decline of the Iberian lynx and Imperial eagle populations |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Mining |
Other Threats: | Decline of the Iberian lynx and Imperial eagle populations |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Mining |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14 |
Threats*: | Mining |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3B,WHC-98/CONF.203/8Rev. |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A.Add.2 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A.Add,WHC-15/39.COM/INF.7,WHC-15/39.COM/INF.7Rev |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.203/5,WHC-2000/CONF.204/10 |
Threats*: | Mining |
Other Threats: | Need for more effective catchment management in lands adjacent to the Park |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14,WHC.99/CONF.208/5,WHC.99/CONF.208/INF.5 |
Threats*: | Mining |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3B,WHC-98/CONF.203/8Rev.,WHC.99/CONF.208/INF.5 |
Threats*: | Mining |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Mining |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC.94/CONF.003/16 |
Threats*: | Mining |
States Parties: |
|
Year: | 1986 |
Document Source: | CC-86/CONF.001/11,CC-86/CONF.003/INF.4 |
Threats*: | Mining |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Mining |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Mining |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-2001/CONF.205/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Mining |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14 |
Threats*: | Mining |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3B,WHC-98/CONF.203/8Rev. |
Threats*: | Mining |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A |
Threats*: | Mining |
Other Threats: | Villages in the ecological corridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A |
Threats*: | Mining |
Other Threats: | Villages in the ecological corridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A |
Threats*: | Mining |
Other Threats: | Villages in the ecological corridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Mining |
Other Threats: | Villages in the ecological corridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Mining |
Other Threats: | Villages in the ecologicalcorridor between the highland and lowland sectors of the park |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7B.Add,WHC-15/39.COM/INF.7,WHC-15/39.COM/INF.7Rev |
Threats*: | Mining |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Mining |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Mining |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A.Add,WHC-15/39.COM/INF.7,WHC-15/39.COM/INF.7Rev |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Mining |
Other Threats: | Transhumance |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A,WHC.03/27.COM/7A.Corr |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.003/6,WHC-94/CONF.003/6 Add. |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/4 |
Threats*: | Mining |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.003/3,CC-90/CONF.004/4 |
Threats*: | Mining |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Mining |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Mining |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Mining |
States Parties: |
|
Year: | 2001 |
Document Source: | ,WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A.Add.2 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A.Add,WHC-15/39.COM/INF.7Rev |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.207/INF.7,WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.204/10 |
Threats*: | Mining |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-2001/CONF.205/5 |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A,WHC/17/41.COM/INF.7 Rev |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A,WHC/17/41.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/18 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-01/CONF.208/INF.4,WHC-2001/CONF.205/4,WHC.01/CONF.208/INF.4 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.209/13 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.208/4B,WHC-97/CONF.208/8B |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B |
Threats*: | Mining |
Other Threats: | Animal sanitation and diseases |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Mining |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Mining |
Other Threats: | Degradation of buffer zone |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Mining |
Other Threats: | Degradation of buffer zone |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A.Add |
Threats*: | Mining |
Other Threats: | Significant decline of wildlife populations due to poaching |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A,WHC-15/39.COM/INF.7,WHC-15/39.COM/INF.7Rev |
Threats*: | Mining |
Other Threats: | Significant decline of wildlife populations due to poaching |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B.Add |
Threats*: | Mining |
Other Threats: | Reduction of elephant population |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7B |
Threats*: | Mining |
Other Threats: | Reduction of elephant population |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Mining |
Other Threats: | Reduction of elephant population |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Mining |
Other Threats: | b) Reduction of elephant populations; |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Mining |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Mining |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Mining |
States Parties
Australia Benin Bolivia (Plurinational State of) Botswana Burkina Faso Cameroon Canada Central African Republic China Congo Côte d'Ivoire Cuba Democratic Republic of the Congo France Guinea Hungary Indonesia Madagascar Mauritania Nepal Niger Peru Romania Russian Federation Senegal Slovakia Solomon Islands South Africa Spain Uganda United Republic of Tanzania United States of America Viet Nam ZimbabweThreats
Mining 275
* :
The threats indicated are listed in alphabetical order; their order does not constitute a classification according to the importance of their impact on the property.
Furthermore, they are presented irrespective of the type of threat faced by the property, i.e. with specific and proven imminent danger (“ascertained danger”) or with threats which could have deleterious effects on the property’s Outstanding Universal Value (“potential danger”).
** : All mission reports are not always available electronically.