# Improved Cookstove

**Introduction**

Currently, there are many different types of cookstoves and several Standards Bodies, each with their own Standard that must be followed in order to prove the quality of a given GHG emission reduction claim. This process is time and labor-intensive, creating barriers to those willing to enter the market. Digitization of this manual, paper-driven process is a necessary step to scaling at the speed required for climate change.

The Value of Digitizing the Methodology:

Creates trust via

● Traceability and transparency of data

● Digital quality assurance

● Immutability of data

● Transparency of Verifier credentials and approval data

Reduces barriers to entry

● Accessible and standardized policies and processes inform and encourage suppliers to bring their projects to market

● Decentralized project management reduces dependency on Standards Bodies and reduces time to market.

Contributes to Climate Goals

● Achieves higher confidence in carbon project outcomes, and scales the finance and rollout of carbon projects at the speed required by the climate emergency

This first-of-its-kind Improved Cookstove Guardian Policy was designed per the Anthropogenic Impact Accounting Ontology found here An ontology for anthropogenic impact accounting. To this end, the Guardian Policy does not adhere to a specific Standard or approved methodology for carbon offset quantification, rather it abstracts concepts from all known standards and methodologies, categorizes them, models their relationships, and then instantiates them in the form of this digitally native Guardian Policy and its associated Guardian Schema. This policy issues a non-fungible Improved Cookstove Carbon Credit (ICCC) Token.

## **Scope and Applicability**

Guardian implementation of a digitally native methodology for quantifying greenhouse gas (GHG) emission reductions from improved biomass cookstoves developed by the Nova Institute and Tolam Earth, Inc.

Applicable to activities reducing GHG emissions from cookstoves:

1. Switching to more efficient stove technology

Token: Non-Fungible Type: Carbon Offset Standard: Multiple Methodology: Multiple

Required Documents: Project Design Document (PDD), PDD Validation Report, Monitoring Report, Monitoring Report Verification, Double Counting Certification,

VVB Certification and Conflict of Interest Statement

NFT Owner:

## **Preconditions**

1. Standard Registry accounts on a Guardian instance to import the policy. See Guardian documentation at (<https://docs.hedera.com/guardian/policy-creation-using-the-guardian-apis/prerequesite-> steps) for steps to create an account and import a policy.
2. User accounts within the Guardian to fill the roles defined in this policy.
3. Required Project Documentation is posted to the traceable, immutable source which can be accessed by the Tolam Earth Marketplace.

## **Policy User Roles**

1. Project Developer: The person responsible for executing the Project Design and Collecting Data as per the Project Application. The Project Developer submits Monitoring Reports and is the beneficiary of the Credit Claims.
2. Verifier: Approved, independent person or organization that Verifies the Project Application and Claims Data in the form of Monitoring Reports.
3. Standard Body: Administrative role that approves Verifiers, approves Project Applications, and manages the issuance of claims.

## Policy Guide

We have 3 ways to import the Policy

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FnTz24VOjMk67ATykahhs%2Fimage.png?alt=media&#x26;token=7f0bb894-db0c-4a09-9944-9eba73ddd60b" alt=""><figcaption></figcaption></figure>

Once imported, there will be 2 additional users with different roles (aside from the Standard Registry) that need to be created. Create a user account for the Project Developer. Once created and entered into the Policy, select the Project Developer role from the drop-down.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FzGb8uNJRtBwJ8qHIoCbY%2Fimage.png?alt=media&#x26;token=bb30c4cf-51c3-464e-9acf-833b17ae4403" alt=""><figcaption></figcaption></figure>

Fill out the Agent Application and wait for the approval.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2F7Hvfq4Vlumpb5JsgENcR%2Fimage.png?alt=media&#x26;token=e6d3e196-c7c9-4783-81e9-bccdff1b5c0c" alt=""><figcaption></figcaption></figure>

The next step is to create a user account for the verifier. Once created and entered into the Policy, select the Verifier role from the drop-down.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2F6Wiuhb5Kyq8zypu9LUHJ%2Fimage.png?alt=media&#x26;token=fb3bc15f-75b7-4c6b-9ea2-dc86b58ce1d6" alt=""><figcaption></figcaption></figure>

Fill out the Agent Application to become a verifier and wait for approval.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FJgNzw6ud4tVcuhjqLDLS%2Fimage.png?alt=media&#x26;token=9186b7a2-acc6-4272-9ca6-d6b0b4337dca" alt=""><figcaption></figcaption></figure>

Now log back into the Standard Registry account and go into the policy. You will notice now two approvals waiting for action.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2F2D0uov24nK4DhIGT6oUh%2Fimage.png?alt=media&#x26;token=65a22784-4fe0-44f8-adb2-370bd15ecde8" alt=""><figcaption></figcaption></figure>

The next step is for the Project Developer to create a new project. Do this by logging into the Project Developer policy screen, clicking on the "Create new project" button, and filling out the "Project Listing Application" form.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2Fr2mnMcNQsAg3qTasAKgr%2Fimage.png?alt=media&#x26;token=58f3cb6a-f451-4f3f-9f27-84a53db5f11f" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FmL5IfJUky3wOvJ38onh7%2Fimage.png?alt=media&#x26;token=531aec53-efdb-41ff-ba09-2acecdeadc0b" alt=""><figcaption></figcaption></figure>

Logging back into the Standard Registry role, you can see that the Project Listings now has a new review request.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2F7dcd9w0fpwbkmrdPwmiH%2Fimage.png?alt=media&#x26;token=d03cfaf6-4719-4a12-a293-126ba847c629" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FbLX9m2Q9lh5QjuqtIGFQ%2Fimage.png?alt=media&#x26;token=480797b9-0095-450f-b4a0-7792bc0b8f1d" alt=""><figcaption></figcaption></figure>

The Standard Registry can now assign a review ID and "Finalise review"

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FnS9IZ4dI0vmWOdhUBGrJ%2Fimage.png?alt=media&#x26;token=f457c032-8c0c-4e52-a85e-a8480f612a78" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2Fu7K0bfPhsp8ddxukRCYw%2Fimage.png?alt=media&#x26;token=c348a879-159a-49c6-8bea-5110416ac7f8" alt=""><figcaption></figcaption></figure>

Now, the Project Developer must go into their screen and "Submit a PDD" and fill out the Project Design Document form.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2Fy5QC9OXEbU9tKmOtk8N5%2Fimage.png?alt=media&#x26;token=68a8c086-46d0-48a0-a3a7-e85fb51c725a" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FNYvGVGYRElMdCQq0b8pA%2Fimage.png?alt=media&#x26;token=5b19e453-1b40-4b03-aa80-3fdd33dd7432" alt=""><figcaption></figcaption></figure>

The Verifier must now go into their Policy screen and view the PDD by click on the "Review button" and filling out the review form.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FdduVygG6sKZPs091gz1Y%2Fimage.png?alt=media&#x26;token=44342be6-fff7-4578-85e3-e233584e25e0" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FR6SFO8vryjUmTbED3htU%2Fimage.png?alt=media&#x26;token=0c97e5a8-205b-4171-8b92-cb3eec534ec6" alt=""><figcaption></figcaption></figure>

After that, the Verifer can select a Review ID and "Finalise review."

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FnWFbng8woZB6nqQfHvhl%2Fimage.png?alt=media&#x26;token=0fb5c9ff-9830-4d6a-a152-6c280315e937" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FXjOoMlgHCBwPovwndY6v%2Fimage.png?alt=media&#x26;token=40a1b943-5887-4b7a-a76e-ed0639e1ed66" alt=""><figcaption></figcaption></figure>

Once the PDD has been verified, the Project Developer can "Request registration."

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FxntowrJe1KQJaEZNCRVt%2Fimage.png?alt=media&#x26;token=6dd9dcbf-606c-4442-b65b-eaddb0596280" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FbPPaUo1yU2AQ59fD49CZ%2Fimage.png?alt=media&#x26;token=b82a18c7-46fd-4227-8710-ce1df48427de" alt=""><figcaption></figcaption></figure>

The Standard Registry can log into their Policy screen, view the incoming Project Registration, and approve it.&#x20;

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FusIhYLOyuUzI4OWEKQT1%2Fimage.png?alt=media&#x26;token=e94d4c92-ac96-4478-adca-4ad74a91a389" alt=""><figcaption></figcaption></figure>

Once the Standard Registry approved the Project Developer's Project Registration, the Project Developer can submit the report by clicking on the "Submit MR" button and filling out the form.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2F7QPcAbJg6dfUcxFjSgrp%2Fimage.png?alt=media&#x26;token=b8e29624-aa6b-41e4-a6c3-7cbe05819f6b" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FBT5J9vO5fuuYUJMgF3ue%2Fimage.png?alt=media&#x26;token=d6950b09-3612-4952-8f24-cc5c7d44e9fc" alt=""><figcaption></figcaption></figure>

Once the Monitoring Report has been submitted to the Verifier, the Verifier can log into their Policy screen, review it, and fill out the review form.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FDHyY6LRnLjMSkOVOYDu8%2Fimage.png?alt=media&#x26;token=7e3b9e4a-bfb1-4744-a6ad-7bc0be6d7e6f" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FKJozRdOAdmNA3cuxfb0f%2Fimage.png?alt=media&#x26;token=dd7c6c29-4964-4356-a8fa-d3cf498b1cc3" alt=""><figcaption></figcaption></figure>

The Verifier can submit the Review ID and "Finalise review"

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FIwLnqsGvBDxMzpQDi3sr%2Fimage.png?alt=media&#x26;token=49221b39-0a76-4850-bc4a-0d46c430da01" alt=""><figcaption></figcaption></figure>

At this point in the methodology workflow, the Project Developer can "request credit issuance" by clicking on the "Request credit issuance button" and filling out the Request ICCC issuance form.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FqKpchjEx3cSJkreCrAx9%2Fimage.png?alt=media&#x26;token=45aceee4-d296-4a9c-b881-9369c50a4df3" alt=""><figcaption></figcaption></figure>

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FdBgjWYvyAKlaateJWRf7%2Fimage.png?alt=media&#x26;token=c485dae3-6c9c-466a-ab7a-672edda21ee0" alt=""><figcaption></figcaption></figure>

The Standard Registry can now see the Credit Issuance request and approve it.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2F4Gcdk26l6Jbr5KSS5ihi%2Fimage.png?alt=media&#x26;token=67343f7e-4f7d-42e9-9603-323e2f8a465c" alt=""><figcaption></figcaption></figure>

Once approved, you can see the Trustchain in the Token History tab of the Standard Registry's policy account.

<figure><img src="https://3006114282-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FXVOaWpJKxLZf1Tee9eCO%2Fuploads%2FcEiKgxGcGkdQoJ0EOAwc%2Fimage.png?alt=media&#x26;token=d9460a8a-61bf-45b2-8210-35fab03e17eb" alt=""><figcaption></figcaption></figure>
