🌾 For Implementers & Field Teams

Ground-Level Action Playbook

Practical protocols for NGOs, humanitarian operators, local coordinators, and field teams deploying nutrition interventions in resource-constrained environments

Quick Reference: Core Principles

Before diving into protocols, anchor in these non-negotiable principles that guide all implementation decisions:

🎯 Speed + Safety

Fast deployment does not mean reckless deployment. Build safety checks into rapid processes rather than treating them as separate phases.

🀝 Community First

Local knowledge always beats external expertise. Design with communities, not for them. Transfer agency, not just resources.

πŸ”„ Adapt or Fail

No plan survives first contact with reality. Build feedback loops into every phase. Measure, adjust, repeat.

πŸ“Š Data = Accountability

Collect data to serve communities and funders, not to perform. Privacy-first, transparent, actionable metrics only.

πŸ›‘οΈ Do No Harm

Zero tolerance for exploitation, coercion, or dependency creation. If an intervention can't be sustained locally, redesign it.

🌍 Context is King

What works in urban Kenya won't work in rural Yemen. Conflict zones require different protocols than stable regions. Always localize.

Rapid Deployment Framework (72-Hour Activation)

When speed mattersβ€”emergency contexts, acute crises, or time-sensitive opportunitiesβ€”this framework enables deployment within 72 hours while maintaining safety and community consent.

1

Hour 0-24: Assessment & Authorization

⏱️ First 24 Hours
Critical First Steps
  • Confirm immediate safety for team deployment (security, access, legal clearance)
  • Identify local partners or community leaders for initial contact
  • Assess baseline need: number of children, age distribution, acute malnutrition rates if available
  • Map existing services to avoid duplication or displacement
  • Verify supply chain access: roads, ports, warehouses, last-mile options
  • Secure initial funding authorization or emergency reserves release
⚠️ Safety Gate: Do Not Proceed If
  • Active conflict in deployment zone with no safe corridors
  • Legal barriers that could endanger team or beneficiaries
  • Community leadership explicitly opposes intervention
  • No secure communication channels for team coordination
2

Hour 24-48: Community Engagement & Setup

⏱️ Day 2
Community Integration Protocol
  • Convene community leaders, elders, women's groups, youth representatives
  • Present intervention plan in local language with visual aids
  • Solicit feedback on timing, location, cultural considerations, and potential barriers
  • Co-design distribution or delivery mechanisms with community input
  • Identify local volunteers for program support (paid or acknowledged)
  • Establish grievance mechanism and feedback channels
  • Secure physical infrastructure: distribution points, storage, clean water access
πŸ’‘ Cultural Adaptation Checkpoint

Before finalizing any plan, ask: "Could this intervention inadvertently exclude, shame, or endanger any subgroup?" Consider gender dynamics, ethnic tensions, religious practices, and local power structures.

3

Hour 48-72: Launch & Monitor

⏱️ Day 3
Go-Live Sequence
  • Pre-position supplies and verify inventory against expected beneficiary count
  • Conduct team briefing on safety, cultural protocols, and emergency procedures
  • Activate data collection systems (offline-capable forms, photo documentation)
  • Begin distribution or service delivery with community volunteers integrated
  • Monitor in real-time for bottlenecks, safety incidents, or community concerns
  • Document first-day lessons and adjust processes immediately
  • Establish daily check-in protocol with coordination hub
βœ“ Success Indicators (First 72 Hours)
  • Children receiving nutrition support without reported incidents
  • Community feedback channels active and responsive
  • Team safety protocols functioning
  • Supply chain stable for at least next 7 days
  • Data flowing back to coordination hub

Intervention Selection: Context-Based Decision Tree

Different contexts require different approaches. Use this decision framework to match interventions to ground realities.

❓ What is the primary constraint?
Food Availability: Food exists but children can't access it due to poverty, distance, or market failure β†’ Cash transfers, vouchers, or direct distribution
Infrastructure: No functioning markets, roads impassable, services collapsed β†’ Emergency feeding centers, mobile distribution, airlifts
Knowledge/Behavior: Food available but not reaching children due to feeding practices, care patterns β†’ Nutrition education, counseling, IYCF programs
Quality/Diversity: Calories sufficient but micronutrient deficiencies present β†’ Fortification, supplementation, kitchen gardens
❓ What is the security environment?
Stable: Normal operations possible, staff can move freely β†’ Full range of interventions, long-term programs
Volatile: Intermittent access, security incidents possible β†’ Community-led delivery, remote monitoring, rapid response kits
Active Conflict: Direct presence too dangerous β†’ Partner through local organizations, cross-line negotiations, humanitarian corridors
❓ What is the timeline?
Emergency (0-3 months): Prevent mortality, stabilize acute malnutrition β†’ Therapeutic feeding, RUTF, emergency food aid
Recovery (3-12 months): Restore functionality, rebuild capacity β†’ School feeding, cash-for-work, agricultural support
Development (1+ years): Sustainable systems change β†’ Fortification programs, policy advocacy, market strengthening

Stakeholder Coordination Matrix

Field operations require simultaneous engagement with multiple actors. This matrix clarifies roles and engagement strategies for each stakeholder type.

πŸ›οΈ Government Authorities
Legitimacy, permissions, policy alignment
🀝 Community Leaders
Trust, local knowledge, implementation partners
πŸ₯ Health Facilities
Screening, treatment, referrals, medical oversight
🏫 Schools & Educators
Access to children, education integration, behavior change
πŸ’Ό Other NGOs/UN
Coordination, resource sharing, expertise exchange
🚚 Supply Partners
Procurement, logistics, warehouse management

Field Data Collection: Privacy-First Protocol

Data serves accountability and learning, not surveillance. This protocol ensures ethical, useful data collection without compromising beneficiary privacy or safety.

Minimum Required Data Points

Data Type Purpose Privacy Level
Geographic Area
(district/village level only)
Service coverage mapping 🟒 Safe to share publicly
Age Brackets
(0-6mo, 6-24mo, 2-5yr, 5-12yr)
Targeting accuracy 🟒 Safe to share publicly
Number of Beneficiaries Reach and efficiency metrics 🟒 Safe to share publicly
Intervention Type
(e.g., feeding, cash, education)
Program effectiveness comparison 🟒 Safe to share publicly
Anthropometric Measurements
(MUAC, weight-for-height)
Nutrition status tracking 🟑 Aggregate only, never individual
Household Registration
(unique ID, no names)
Prevent duplication, track continuity πŸ”΄ Internal only, encrypted storage
🚫 Never Collect or Store
  • Full names (use household IDs only)
  • Precise GPS coordinates of individual homes
  • Photos showing faces without explicit consent
  • Political affiliation, ethnic identity, or religious belief
  • HIV status, disability status, or other stigmatizing health information
  • Citizenship documentation or asylum status

Data Security Checklist

  • All field devices use encrypted storage (minimum AES-256)
  • Forms function offline; sync only over secure connections
  • No cloud storage without organization-level data protection agreement
  • Team trained on consent protocols and data minimization
  • Audit trail for all data access and modifications
  • Data retention policy: delete individual records after aggregation (typically 90 days)

Team Safety & Security Protocols

No program objective justifies team endangerment. These protocols are non-negotiable for all deployment contexts.

🚨 Immediate Evacuation Triggers

Stop operations and evacuate immediately if:

  • Direct threats to team safety (violence, kidnapping risk, targeted threats)
  • Government revocation of operating permission
  • Sudden escalation of conflict in operational area
  • Outbreak of communicable disease endangering team
  • Loss of secure communication with coordination hub for >48 hours

Daily Safety Protocol

  • Morning team briefing: route plan, security updates, emergency contacts reviewed
  • Check-in with coordination hub at deployment and return (minimum twice daily)
  • Buddy system enforced: no solo field visits
  • Local staff lead in areas where international presence increases risk
  • Vehicles clearly marked, alternate routes pre-identified
  • Emergency cash and first-aid kits in all field vehicles
  • Evening debrief: incidents logged, next-day plan adjusted

Communication Continuity

In low-infrastructure or insecure environments, maintain redundant communication channels:

  • Primary: Mobile phones (local SIM cards, secure messaging apps)
  • Secondary: Satellite phones (for areas without cell coverage)
  • Tertiary: Radio network (if operating in humanitarian coordination system)
  • Emergency: Pre-arranged check-in schedule; if missed, trigger search protocol

Sustainability & Handover Planning

External support should phase out as local capacity grows. Plan for handover from day one to avoid creating dependency or sudden disruption when funding ends.

Capacity Transfer Milestones

Phase Timeline Key Transitions
Phase 1: Co-Implementation Months 1-6 External team leads, local partners observe and assist. Training begins on technical skills, data systems, supply management.
Phase 2: Shared Leadership Months 6-12 Local partners lead daily operations, external team provides oversight and troubleshooting. Financial management gradually transferred.
Phase 3: Light-Touch Support Months 12-18 Local team fully autonomous, external team provides quarterly reviews, emergency backup, fundraising support.
Phase 4: Full Handover Month 18+ Program integrated into government systems or sustained by local organization. External team exits, peer learning continues remotely.
⚠️ Red Flags: Signs of Unsustainable Design
  • Program depends on imported supplies with no local procurement plan
  • Only international staff hold technical knowledge
  • Community perceives program as foreign aid, not their own system
  • No government co-financing or policy integration after 12 months
  • Beneficiaries have no role in governance or decision-making

If you see these patterns, pause and redesign before scaling.

Ready to Deploy?

This playbook provides frameworks, but every context is unique. Use these protocols as starting points, adapt aggressively based on ground realities, and always prioritize community voice over external templates.

πŸ“š Additional Resources in Atlas