Questions? Call 800-624-6242
add to cart
Rights & Permissions
. "Appendix B: Agenda." Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press, 2004.
Please select a format:
The following HTML text is provided to enhance online
readability. Many aspects of typography translate only awkwardly to HTML.
Please use the page image
as the authoritative form to ensure accuracy.
Wrap up and plans for the afternoon
LUNCH-at assigned tables each with its own topic and with a committee member as leader
Topic 1: Security impact of free release
Topic 2: Scientific impact of restricted release
Topic 3: Potential mechanisms for controlling release
Reporting back from the lunch discussions (15 minutes per topic)
Can we classify genome data by threat level? Would this be based on characteristics of the organism or characteristics of the data (such as annotation)?
David Relman, Stanford
Discussant: Art Friedlander
Revisit issues from the morning: What are the pros and cons of unlimited vs. restricted access to data, including threats posed to the scientific community or to national security?
Wrap-up talks summarizing the day’s ideas
Tara O’Toole, Johns Hopkins (policy perspective)AND
David Relman (biology perspective)