National Academies Press: OpenBook

Seeking Security: Pathogens, Open Access, and Genome Databases (2004)

Chapter: Appendix A: Statement of Task

« Previous: References
Suggested Citation:"Appendix A: Statement of Task." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

Appendix A
Statement of Task

STATEMENT OF TASK

The National Research Council will convene an ad hoc steering committee to oversee a one-day workshop that will identify issues surrounding the release to the public domain of genome data for bioterrorism threat agents. Biological agents considered at the workshop will include those on national “select agent” lists, as well as those that are not but could be considered plausible threats in the future. Questions addressed at the workshop will include but are not limited to the following:

  • What are the categories of genome data that present the greatest concern?

  • What are the pros and cons of unlimited versus restricted access to such data, including threats posed to the scientific community or to national security?

  • What are some options for making decisions about release to the public domain?

The committee will author a report based upon the workshop. The report will 1) capture input from presentations and discussions by workshop participants, 2) identify general issues surrounding the release to the public domain of genome data for bioterrorism threat agents, 3) develop a list of pros and cons associated with the release to the public domain of such data, and 4) present recommendations and/or ideas about policy

Suggested Citation:"Appendix A: Statement of Task." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×

options or decision-making frameworks for release to the public domain of pathogen- or pest-related genome information. The workshop will be designed to complement and reinforce related National Academies activities, namely the January 9, 2003 workshop on “Dual-use” Information in the Life Sciences and the ongoing study on Improving Research Standards and Practices to Prevent the Misuse of Biotechnology Research.

Suggested Citation:"Appendix A: Statement of Task." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 69
Suggested Citation:"Appendix A: Statement of Task." National Research Council. 2004. Seeking Security: Pathogens, Open Access, and Genome Databases. Washington, DC: The National Academies Press. doi: 10.17226/11087.
×
Page 70
Next: Appendix B: Agenda »
Seeking Security: Pathogens, Open Access, and Genome Databases Get This Book
×
Buy Paperback | $21.00 Buy Ebook | $16.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

Within the last 30 years, the genomes of thousands of organisms, from viruses, to bacteria, to humans, have been sequenced or partially sequenced and deposited in databases freely accessible to scientists around the world. This information is accelerating scientists' ability to fight disease and make other medical advances, but policymakers must consider the possibility that the information could also be used for destructive purposes in acts of bioterrorism or war. Based in part on views from working biological scientists, the report concludes that current policies that allow scientists and the public unrestricted access to genome data on microbial pathogens should not be changed. Because access improves our ability to fight both bioterrorism and naturally occurring infectious diseases, security against bioterrorism is better served by policies that facilitate, not limit, the free flow of this information.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    Switch between the Original Pages, where you can read the report as it appeared in print, and Text Pages for the web version, where you can highlight and search the text.

    « Back Next »
  6. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  7. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  8. ×

    View our suggested citation for this chapter.

    « Back Next »
  9. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!