
Contents
-
-
-
-
-
-
-
-
-
-
Select Bibliography Select Bibliography
-
A. Introduction A. Introduction
-
B. Meaning and Application B. Meaning and Application
-
I. The scope of the protective regime I. The scope of the protective regime
-
II. The obligation to respect and protect II. The obligation to respect and protect
-
a. The notion a. The notion
-
b. In all circumstances b. In all circumstances
-
-
III. The obligation to search for, collect, and evacuate III. The obligation to search for, collect, and evacuate
-
a. The notion a. The notion
-
b. Nature of the obligation b. Nature of the obligation
-
c. Recording and forwarding of information c. Recording and forwarding of information
-
-
IV. The obligation to care for IV. The obligation to care for
-
a. The notion a. The notion
-
b. Nature of the obligation b. Nature of the obligation
-
c. Obligation when compelled to abandon the wounded and sick c. Obligation when compelled to abandon the wounded and sick
-
-
V. The distinction between combatants and civilians in international armed conflict V. The distinction between combatants and civilians in international armed conflict
-
VI. Involvement of local inhabitants and relief societies: assistance in collecting and caring for the wounded, sick, and shipwrecked VI. Involvement of local inhabitants and relief societies: assistance in collecting and caring for the wounded, sick, and shipwrecked
-
a. Duties a. Duties
-
b. Confidentiality and prohibition of penalties b. Confidentiality and prohibition of penalties
-
-
-
C. Relevance in Non-International Armed Conflicts C. Relevance in Non-International Armed Conflicts
-
I. The protective regime I. The protective regime
-
a. Humane treatment and medical care a. Humane treatment and medical care
-
b. An obligation to search for and evacuate? b. An obligation to search for and evacuate?
-
-
II. Security measures and counter-terrorism legislation II. Security measures and counter-terrorism legislation
-
III. Application to non-state armed groups III. Application to non-state armed groups
-
-
D. Legal Consequences of a Violation D. Legal Consequences of a Violation
-
E. Critical Assessment E. Critical Assessment
-
-
-
-
-
-
-
-
-
-
-
-
-
39. The Obligations to Respect, Protect, Collect, and Care for the Wounded, Sick, and Shipwrecked
Get access-
Published:October 2015
Cite
Abstract
This chapter analyses the provisions under the Geneva Conventions to understand the obligations owed to wounded, sick, and shipwrecked combatants and civilians. The main legal issues discussed are: whether wounded, sick, and shipwrecked civilians are entitled to the same protection as combatants in international armed conflict (IAC); whether the required treatment of the shipwrecked differs from that afforded to the wounded and sick; whether the civilian population has any rights and obligations towards combatant or civilian wounded, sick, and shipwrecked; whether Common Article 3 provides comparable standards of protection to those detailed in IAC; whether civilians and relief societies in non-international armed conflicts (NIACs) are protected against penalties for offering assistance, similar to the way in which they are protected in IAC; and whether/how these obligations to respect, protect, collect, and care for apply to armed groups in NIAC.
Sign in
Personal account
- Sign in with email/username & password
- Get email alerts
- Save searches
- Purchase content
- Activate your purchase/trial code
- Add your ORCID iD
Purchase
Our books are available by subscription or purchase to libraries and institutions.
Purchasing informationMonth: | Total Views: |
---|---|
August 2024 | 4 |
September 2024 | 4 |
October 2024 | 11 |
November 2024 | 18 |
December 2024 | 2 |
January 2025 | 20 |
February 2025 | 14 |
March 2025 | 2 |
April 2025 | 1 |
Get help with access
Institutional access
Access to content on Oxford Academic is often provided through institutional subscriptions and purchases. If you are a member of an institution with an active account, you may be able to access content in one of the following ways:
IP based access
Typically, access is provided across an institutional network to a range of IP addresses. This authentication occurs automatically, and it is not possible to sign out of an IP authenticated account.
Sign in through your institution
Choose this option to get remote access when outside your institution. Shibboleth/Open Athens technology is used to provide single sign-on between your institution’s website and Oxford Academic.
If your institution is not listed or you cannot sign in to your institution’s website, please contact your librarian or administrator.
Sign in with a library card
Enter your library card number to sign in. If you cannot sign in, please contact your librarian.
Society Members
Society member access to a journal is achieved in one of the following ways:
Sign in through society site
Many societies offer single sign-on between the society website and Oxford Academic. If you see ‘Sign in through society site’ in the sign in pane within a journal:
If you do not have a society account or have forgotten your username or password, please contact your society.
Sign in using a personal account
Some societies use Oxford Academic personal accounts to provide access to their members. See below.
Personal account
A personal account can be used to get email alerts, save searches, purchase content, and activate subscriptions.
Some societies use Oxford Academic personal accounts to provide access to their members.
Viewing your signed in accounts
Click the account icon in the top right to:
Signed in but can't access content
Oxford Academic is home to a wide variety of products. The institutional subscription may not cover the content that you are trying to access. If you believe you should have access to that content, please contact your librarian.
Institutional account management
For librarians and administrators, your personal account also provides access to institutional account management. Here you will find options to view and activate subscriptions, manage institutional settings and access options, access usage statistics, and more.