The use of third party monitoring in insecure contexts: Lessons from Afghanistan, Somalia and Syria
This report is based on interviews with commissioning agencies, TPM providers and donors, and a review of literature.
Abstract
Third-Party Monitoring (TPM) describes the practice of contracting third parties to collect and verify monitoring data. In insecure contexts, aid actors primarily use TPM to monitor the activities of partner organisations in places where their own staff faces access restrictions.
This report is based on interviews with commissioning agencies, TPM providers and donors, and a review of literature. It concludes that TPM can provide a meaningful contribution to the broader monitoring and evaluation toolbox by strengthening compliance in places where access is limited. For donors, TPM offers an option to verify monitoring information from partners. For aid agencies, TPM can provide a source of primary field data to inform programming and help verify partner reporting. However, agencies should do as much of their own monitoring as possible.
This report is part of the Secure Access in Volatile Environments (SAVE) research programme
Citation
-
Sagmeister, E. and Steets, J. with Derzsi-Horváth, A. and Hennion, C. (2016) ‘The use of third party monitoring in insecure contexts: Lessons from Afghanistan, Somalia and Syria’. Resource Paper from the Secure Access in Volatile Environments (SAVE) research programme, Humanitarian Outcomes. October.
-
Sagmeister, E. and Steets, J. with Derzsi-Horváth, A. and Hennion, C. (2016) ‘The use of third party monitoring in insecure contexts: Lessons from Afghanistan, Somalia and Syria’. Briefing Note from the Secure Access in Volatile Environments (SAVE) research programme, Humanitarian Outcomes. October.