State of Conservation
88
Reports
11
Properties concerned
8
States Parties with SOC reports
Property Category:Naturalclose
Date end:2016close
Region:
Latin America and the Caribbeanclose
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.201/11Rev,WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Educational reform not implemented. |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Other Threats: | Educational reform not implemented. |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7A |
Threats*: | Illegal activities |
Other Threats: | h) Educational reform not implemented |
Danger List: | Yes |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7A |
Threats*: | Illegal activities |
Other Threats: | Educational reform not implemented. |
Danger List: | Yes |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
Other Threats: | Educational reform not implemented |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Add,WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
Other Threats: | Implementation of quarantine measures |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2002 |
Document Source: | WHC-02/CONF.202/17 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/10,WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-2001/CONF.205/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/5,WHC-2000/CONF.204/10 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1987 |
Document Source: | SC-87/CONF.005/INF.1 |
Threats*: | Illegal activities |
Other Threats: | Fires |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7B.Rev |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/5,WHC-99/CONF.209/14,WHC.99/CONF.208/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Serious concerns over the conservation status of two species, vaquita (porpoise species) and totoaba (marine fish) |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A,WHC-15/39.COM/INF.7,WHC-15/39.COM/INF.7Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7B.Add |
Threats*: | Illegal activities |
Other Threats: | Reported decline in the overwintering population of Monarch butterfly |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2016 |
Document Source: | WHC/16/40.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2015 |
Document Source: | WHC-15/39.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2014 |
Document Source: | WHC-14/38.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2013 |
Document Source: | WHC-13/37.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2012 |
Document Source: | WHC-12/36.COM/7A.Add |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2011 |
Document Source: | WHC-11/35.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2010 |
Document Source: | WHC-10/34.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2009 |
Document Source: | WHC-09/33.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Other Threats: | Lack of infrastructure and services for small producers and potential tourism initiatives hinder sustainable economic development and are underlying causes for poverty, leading to over-exploitation of natural resources |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A,WHC.03/27.COM/7A.Corr |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.204/5,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7,WHC-98/CONF.203/8Rev. |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7B,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1991 |
Document Source: | SC-91/CONF.002/4 Add. |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1990 |
Document Source: | CC-90/CONF.004/13 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 1989 |
Document Source: | SC-89/CONF.003/12,SC-89/CONF.003/2,SC-89/CONF.004/12,SC-89/CONF.004/5 |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2008 |
Document Source: | WHC-08/32.COM/7B.Add |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2007 |
Document Source: | WHC-07/31.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2006 |
Document Source: | WHC-06/30.COM/7B |
Threats*: | Illegal activities |
States Parties: |
|
Year: | 2005 |
Document Source: | WHC-05/29.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2004 |
Document Source: | WHC-04/28.COM/15A.Rev |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2003 |
Document Source: | WHC.03/27.COM/7A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2001 |
Document Source: | WHC-01/CONF.208/09,WHC-01/CONF.208/9,WHC-2001/CONF.205/4 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 2000 |
Document Source: | WHC-2000/CONF.202/4,WHC-2000/CONF.204/9 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1999 |
Document Source: | WHC-99/CONF.204/4,WHC-99/CONF.204/INF.17,WHC-99/CONF.209/13 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1998 |
Document Source: | WHC-98/CONF.201/3A,WHC-98/CONF.203/7 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1997 |
Document Source: | WHC-97/CONF.204/2A,WHC-97/CONF.208/8A |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1996 |
Document Source: | WHC-96/CONF.201/7A,WHC-96/CONF.202/2B |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1995 |
Document Source: | WHC-95/CONF.201/4,WHC-95/CONF.203/5,WHC-95/CONF.203/5 Add.1 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1994 |
Document Source: | WHC-94/CONF.001/3B Add.1,WHC-94/CONF.003/6,WHC-94/CONF.003/6 Add. |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1993 |
Document Source: | WHC-93/CONF.001/3,WHC-93/CONF.002/5 |
Threats*: | Illegal activities |
Danger List: | Yes |
States Parties: |
|
Year: | 1992 |
Document Source: | CLT-92/CONF.003/3,WHC-92/CONF.002/5 |
Threats*: | Illegal activities |
Threats
Illegal activities 88
* :
The threats indicated are listed in alphabetical order; their order does not constitute a classification according to the importance of their impact on the property.
Furthermore, they are presented irrespective of the type of threat faced by the property, i.e. with specific and proven imminent danger (“ascertained danger”) or with threats which could have deleterious effects on the property’s Outstanding Universal Value (“potential danger”).
** : All mission reports are not always available electronically.