National Academies Press: OpenBook

Biotechnology Research in an Age of Terrorism (2004)

Chapter: Appendix C: Committee Meetings

« Previous: Appendix B: Biographical Sketches of Committee Members
Suggested Citation:"Appendix C: Committee Meetings." National Research Council. 2004. Biotechnology Research in an Age of Terrorism. Washington, DC: The National Academies Press. doi: 10.17226/10827.
×
Page 143
Suggested Citation:"Appendix C: Committee Meetings." National Research Council. 2004. Biotechnology Research in an Age of Terrorism. Washington, DC: The National Academies Press. doi: 10.17226/10827.
×
Page 144
Suggested Citation:"Appendix C: Committee Meetings." National Research Council. 2004. Biotechnology Research in an Age of Terrorism. Washington, DC: The National Academies Press. doi: 10.17226/10827.
×
Page 145
Suggested Citation:"Appendix C: Committee Meetings." National Research Council. 2004. Biotechnology Research in an Age of Terrorism. Washington, DC: The National Academies Press. doi: 10.17226/10827.
×
Page 146
Suggested Citation:"Appendix C: Committee Meetings." National Research Council. 2004. Biotechnology Research in an Age of Terrorism. Washington, DC: The National Academies Press. doi: 10.17226/10827.
×
Page 147
Suggested Citation:"Appendix C: Committee Meetings." National Research Council. 2004. Biotechnology Research in an Age of Terrorism. Washington, DC: The National Academies Press. doi: 10.17226/10827.
×
Page 148

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Appendix C Committee Meetings First Meeting April 1-2, 2002 Washington, D.C. Meeting Objectives: Introduce National Research Council procedures; committee introductions and composition/balance/bias discussions; committee and report procedures; discuss genesis of the study and Statement of Task; discuss draft report outline; discuss project plan and report realization; receive overview briefing on the current U.S. regulatory environment; determine objectives and date of next com- mittee meeting. Presenters Analysis of the current (U.S.) regulatory environment: "Select Agent Rule," RAC/IRB Rules and Practices, Effectiveness/Enforcement of Current (U.S.) Biotechnology Rules and Practices Joseph G. Perpich Perpich and Associates, Inc. Ronald Atlas American Society for Microbiology 143

44 APPENDIX C The view from "The Hill" - Congressional perspectives on poten- tially dangerous biotechnology research and pathogens Stephen Redhead Congressional Research Service View from the Executive Branch: "Safeguarding Information Re- garding Weapons of Mass Destruction" - Office of Homeland Se- curity, Executive Office of the President Penrose (Parney) C. Albright Office of Homeland Security Office of Science and Technology Policy Rachel Levinson Office of Science and Technology Policy "Protective Oversight of Biotechnology: A Discussion Paper" John Steinbruner University of Maryland Second Meeting June 24-25, 2002 Washington, D.C. Meeting Objectives: Introduce new members and complete composi- tion/balance/bias discussion; discuss draft report outline; receive briefings on defining the problem, safeguarding information and governmen- tal challenges; make writing assignments; determine objectives and date of next committee meeting. Presenters Defining the Universe of Potentially Dangerous Biotechnology Re- search Gerald Epstein Defense Threat Reduction Agency Clarence J. Peters, Professor University of Texas at Galveston

APPENDIX C Mark Wheelis, Professor University of California at Davis Safeguarding Information in the Life Sciences Steven M. Block, Professor Stanford University Eugene B. Skoluikoff, Professor Massachusetts Institute of Technology 145 The Life Sciences Community and the Safeguarding of Scientific Knowledge: Challenges for Government Guy Roberts Department of the Navy R. Timothy Mulcahy, Associate Dean and Professor University of Wisconsin, Madison Steven Aftergood, Senior Research Analyst Federation of American Scientists Third Meeting September 9-10, 2002 Washington, D.C. Meeting Objectives: Receive briefings on "science and security issues" and the current thinking on "information security"; discuss chapter drafts; make writing assignments; determine objectives and date of next committee meeting. Presenters Defining Potentially Dangerous Research in the Life Sciences Malcolm Dando University of Bradford, U.K.

146 Defining "Sensitive" Information in the Life Sciences Parney Albright Office of Science and Technology Policy Rachel Levinson Office of Science and Technology Policy APPENDIX C Defining "Sensitive" Information in the Life Sciences The NIH Perspective Anthony Fauci, Director National Institute of Allergy and Infectious Disease National Institutes of Health "Life Sciences Research in International Security: Policy Developments for Responsible Use of 'Dual-Use' Knowledge" George Poste Health Technology Networks Biological Weapons Working Group U.K. Consultation Overview fohn Steinbruner University of Maryland Fourth Meeting October 8, 2002 Washington, D.C. Meeting Objectives: Review of contents, structure and substance of draft chapters; discuss report plan and status; make writing assign- ments; determine objectives and date of next committee meeting. No Presenters

APPENDIX C Fifth Meeting November 11, 2002 Washington, D.C. 147 Meeting Objectives: Review of contents, structure and substance of draft chapters; discuss report plan and status; make writing assign- ments; determine objectives and date of next committee meeting. No Presenters Sixth Meeting January 29, 2003 Washington, D.C. Meeting Objectives: Review of contents, structure and substance of draft chapters; discuss report plan and status; make writing assign- ments. No Presenters

Biotechnology Research in an Age of Terrorism Get This Book
×
Buy Paperback | $48.00 Buy Ebook | $38.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

In recent years much has happened to justify an examination of biological research in light of national security concerns. The destructive application of biotechnology research includes activities such as spreading common pathogens or transforming them into even more lethal forms. Policymakers and the scientific community at large must put forth a vigorous and immediate response to this challenge. This new book by the National Research Council recommends that the government expand existing regulations and rely on self-governance by scientists rather than adopt intrusive new policies. One key recommendation of the report is that the government should not attempt to regulate scientific publishing but should trust scientists and journals to screen their papers for security risks, a task some journals have already taken up. With biological information and tools widely distributed, regulating only U.S. researchers would have little effect. A new International Forum on Biosecurity should encourage the adoption of similar measures around the world. Seven types of risky studies would require approval by the Institutional Biosafety Committees that already oversee recombinant DNA research at some 400 U.S. institutions. These “experiments of concern” include making an infectious agent more lethal and rendering vaccines powerless.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!