National Academies Press: OpenBook
« Previous: Appendix A: Statement of Task
Suggested Citation:"Appendix B: Agenda." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

Appendix B
Agenda

AGENDA FOR OCTOBER 1, 2003, WORKSHOP OF THE NATIONAL RESEARCH COUNCIL

COMMITTEE ON GENOMICS DATABASES FOR BIOTERRORISM THREAT AGENTS

National Academy of Sciences Lecture Room, 2100 Constitution Avenue, NW, Washington, D.C.

8:30 am

Welcome from National Academies, and committee chair Stanley Falkow

Overview of charge to committee and goals for the day

9:00 am

What database resources are available today and how are they used?

What policies affect their content? Are the answers different in the United States vs. abroad?

David Lipman, NCBI

Rino Rappuoli, Chiron Italy (Industry Perspective)

Rob Heckert, USDA (Agriculture Perspective)

11:00 am

International Perspective on data release (with request to touch on legal issues)

Sir Bob May, Royal Society

Michael Morgan, Wellcome Trust

Suggested Citation:"Appendix B: Agenda." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

12:15 pm

Wrap up and plans for the afternoon

Stanley Falkow

12:30 pm

LUNCH-at assigned tables each with its own topic and with a committee member as leader

Topic 1: Security impact of free release

Topic 2: Scientific impact of restricted release

Topic 3: Potential mechanisms for controlling release

2:00 pm

Reporting back from the lunch discussions (15 minutes per topic)

2:45 pm

Can we classify genome data by threat level? Would this be based on characteristics of the organism or characteristics of the data (such as annotation)?

David Relman, Stanford

Discussant: Art Friedlander

3:15 pm

BREAK

3:30 pm

Revisit issues from the morning: What are the pros and cons of unlimited vs. restricted access to data, including threats posed to the scientific community or to national security?

4:00 pm

Wrap-up talks summarizing the day’s ideas

Tara O’Toole, Johns Hopkins (policy perspective)AND

David Relman (biology perspective)

4:30 pm

ADJOURN

Suggested Citation:"Appendix B: Agenda." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 71
Suggested Citation:"Appendix B: Agenda." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 72
Next: Appendix C: Participants »
Seeking Security: Pathogens, Open Access, and Genome Databases Get This Book
×
Buy Paperback | $21.00 Buy Ebook | $16.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Within the last 30 years, the genomes of thousands of organisms, from viruses, to bacteria, to humans, have been sequenced or partially sequenced and deposited in databases freely accessible to scientists around the world. This information is accelerating scientists' ability to fight disease and make other medical advances, but policymakers must consider the possibility that the information could also be used for destructive purposes in acts of bioterrorism or war. Based in part on views from working biological scientists, the report concludes that current policies that allow scientists and the public unrestricted access to genome data on microbial pathogens should not be changed. Because access improves our ability to fight both bioterrorism and naturally occurring infectious diseases, security against bioterrorism is better served by policies that facilitate, not limit, the free flow of this information.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!