Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.
OCR for page 71
Seeking Security: Pathogens, Open Access, and Genome Databases Appendix B Agenda AGENDA FOR OCTOBER 1, 2003, WORKSHOP OF THE NATIONAL RESEARCH COUNCIL COMMITTEE ON GENOMICS DATABASES FOR BIOTERRORISM THREAT AGENTS National Academy of Sciences Lecture Room, 2100 Constitution Avenue, NW, Washington, D.C. 8:30 am Welcome from National Academies, and committee chair Stanley Falkow Overview of charge to committee and goals for the day 9:00 am What database resources are available today and how are they used? What policies affect their content? Are the answers different in the United States vs. abroad? David Lipman, NCBI Rino Rappuoli, Chiron Italy (Industry Perspective) Rob Heckert, USDA (Agriculture Perspective) 11:00 am International Perspective on data release (with request to touch on legal issues) Sir Bob May, Royal Society Michael Morgan, Wellcome Trust
OCR for page 72
Seeking Security: Pathogens, Open Access, and Genome Databases 12:15 pm Wrap up and plans for the afternoon Stanley Falkow 12:30 pm LUNCH-at assigned tables each with its own topic and with a committee member as leader Topic 1: Security impact of free release Topic 2: Scientific impact of restricted release Topic 3: Potential mechanisms for controlling release 2:00 pm Reporting back from the lunch discussions (15 minutes per topic) 2:45 pm Can we classify genome data by threat level? Would this be based on characteristics of the organism or characteristics of the data (such as annotation)? David Relman, Stanford Discussant: Art Friedlander 3:15 pm BREAK 3:30 pm Revisit issues from the morning: What are the pros and cons of unlimited vs. restricted access to data, including threats posed to the scientific community or to national security? 4:00 pm Wrap-up talks summarizing the day’s ideas Tara O’Toole, Johns Hopkins (policy perspective)AND David Relman (biology perspective) 4:30 pm ADJOURN
Representative terms from entire chapter: