Security
From 2009.igem.org
(23 intermediate revisions not shown) | |||
Line 1: | Line 1: | ||
+ | <span style="color:#ab0000; font-weight:bold;">** Note: For the most up-to-date information please see the [https://2010.igem.org/Security Security page] on the [https://2010.igem.org iGEM 2010 wiki]. **</span> | ||
+ | |||
<html> | <html> | ||
<head> | <head> | ||
Line 88: | Line 90: | ||
<div id="security_information"> | <div id="security_information"> | ||
- | <table width= | + | |
- | < | + | <table width=675> |
- | <b>< | + | <tr align=center> |
+ | <td width=115 align=center><img src="https://static.igem.org/mediawiki/2009/3/3f/Secuity_-_naughty_or_nice-_small.jpg"></td> | ||
+ | <td width=135 align=center><img src="https://static.igem.org/mediawiki/2009/a/a3/Video_cameras-small.jpg"></td> | ||
+ | <td width=155 align=center><img src="https://static.igem.org/mediawiki/2009/6/67/Bio_wordle.jpg"></td> | ||
+ | <td width=135 align=center><img src="https://static.igem.org/mediawiki/2009/b/bd/Zero-small.jpg"></td> | ||
+ | <td width=135 align=center><img src="https://static.igem.org/mediawiki/2009/b/b3/Security_fence_-_small.jpg"></td> | ||
+ | </tr> | ||
+ | </table> | ||
+ | |||
+ | <table width=675> | ||
+ | <tr><td style='padding-left:20px;padding-right:20px;'> | ||
+ | <b>"Biology should be more fun. It should be about exploring the world around us. We should want to get out there and do things. We should be able to do things more easily. Securing biology should be something that helps us do that. It cannot be something that gets in the way."</b> | ||
</td></tr> | </td></tr> | ||
</table> | </table> | ||
Line 233: | Line 246: | ||
<br> | <br> | ||
+ | |||
+ | <p align="right"><i>Images in top banner used under a Creative Commons license</i></p> | ||
<p align="right">Photo Credits (from left to right)</P> | <p align="right">Photo Credits (from left to right)</P> | ||
- | <div align="right" xmlns:cc="http://creativecommons.org/ns#" about="http://www.flickr.com/photos/b-tal/101471354/"><a rel="cc:attributionURL" href="http://www.flickr.com/photos/b-tal/">http://www.flickr.com/photos/b-tal/</a> / <a rel="license" href="http://creativecommons.org/licenses/by-nc/2.0/">CC BY-NC 2.0</a></div> | + | <div align="right" xmlns:cc="http://creativecommons.org/ns#" about="http://www.flickr.com/photos/eob/77927004/"><a rel="cc:attributionURL" target="_blank" href="http://www.flickr.com/photos/eob/">http://www.flickr.com/photos/eob/</a> / <a rel="license" target="_blank" href="http://creativecommons.org/licenses/by-nc-sa/2.0/">CC BY-NC-SA 2.0</a></div> |
+ | |||
+ | <div align="right" xmlns:cc="http://creativecommons.org/ns#" about="http://www.flickr.com/photos/aquilaonline/1852750301/"><a rel="cc:attributionURL" target="_blank" href="http://www.flickr.com/photos/aquilaonline/">http://www.flickr.com/photos/aquilaonline/</a> / <a rel="license" target="_blank" href="http://creativecommons.org/licenses/by-nc/2.0/">CC BY-NC 2.0</a></div> | ||
+ | |||
+ | <div align="right" xmlns:cc="http://creativecommons.org/ns#" about="http://www.wordle.net/thumb/wrdl/1210204/Untitled"><a rel="cc:attributionURL" target="_blank" href="http://www.wordle.net/thumb/wrdl/1210204/Untitled">http://www.wordle.net/thumb/wrdl/1210204/Untitled</a> / <a rel="license" target="_blank" href="http://creativecommons.org/licenses/by/3.0/us/">CC BY 3.0</a></div> | ||
+ | |||
+ | <div align="right" xmlns:cc="http://creativecommons.org/ns#" about="http://www.flickr.com/photos/wonderferret/2439258771/"><a rel="cc:attributionURL" href="http://www.flickr.com/photos/wonderferret/">http://www.flickr.com/photos/wonderferret/</a> / <a rel="license" target="_blank" href="http://creativecommons.org/licenses/by/2.0/">CC BY 2.0</a></div> | ||
+ | |||
+ | <div align="right" xmlns:cc="http://creativecommons.org/ns#" about="http://www.flickr.com/photos/b-tal/101471354/"><a rel="cc:attributionURL" target="_blank" href="http://www.flickr.com/photos/b-tal/">http://www.flickr.com/photos/b-tal/</a> / <a rel="license" target="_blank" href="http://creativecommons.org/licenses/by-nc/2.0/">CC BY-NC 2.0</a></div> | ||
+ | |||
<div class="main_item"> | <div class="main_item"> | ||
<html> | <html> |
Latest revision as of 19:14, 11 January 2010
** Note: For the most up-to-date information please see the Security page on the iGEM 2010 wiki. **
Resources
People
- Piers Millet
- BWC ISU
- bwc@unog.ch
- www.unog.ch/bwc
The BWC ISU is the closest thing to an international organisation to ensure biology is used solely for beneficial purposes. It is housed in the UN Office for Disarmament Affairs in Geneva and, as Deputy Head, Piers helps States Parties to the Biological Weapons Convention ban the hostile use of biology. As a microbiologist and chartered biologist, Piers supports the technical aspects of the ISU's work.
Reports
Synthetic Genomics: Options for Governance by the J Craig Venter Institute, CSIS and MIT, October 2007Synthetic Biology and Biosecurity Awareness in Europe by SynBioSafe, November 2007
Synthetic Biology: Social and Ethical Challanges by the Institute for Science and Society, May 2008
Trends in American and European Coverage of Synthetic Biology by the Woodrow Wilson International Center for Scolars, 1 November 2008
Technical solutions for biosecurity in synthetic biology by the Industry Association Synthetic Biology, 2008
Synthetic Biology: Scope Applications and Implications by the UK Royal Academy of Engineering, May 2009
Other Resources
Why Secure Modern Biology?This is a 30 minute video arguing why we need to secure synthetic biology. It was filmed at SB4.0 in Hong Kong in 2008. It includes a short quiz that demonstrates how hard it is to spot the use of biology for hostile purposes. It looks at some of the problems with trying to secure biology through top-down governmental approaches and the need to find a community-based response to this shared problem.
"Biology should be more fun. It should be about exploring the world around us. We should want to get out there and do things. We should be able to do things more easily. Securing biology should be something that helps us do that. It cannot be something that gets in the way." |
Scientific research continues to bring us new and unexpected knowledge, technologies and approaches. Synthetic biology, being on the very cutting edge of what is possible, promises unprecedented opportunities for health, wealth and better living. But science and technology can be used for destructive purposes as well as for constructive ones. Refining our control of biology opens up chances to intentionally cause harm to humans, animals, plants and the environment that just did not exist before. That’s why it is important now, more than ever, for us to think about how others might use what we are doing in ways we would not be happy with.
Preventing Malign Use
Securing biology is not a simple task. It is not something those outside biology could, or should, do alone. Equally, this is not something that biologists can do by themselves (our focus, as the name implies is on the biology). This is a truly interdisciplinary problem - one that means we will need to work together, in new ways, with new partners, to find an approach that provides benefits for all. Given the interdisciplinary nature of synthetic biology, and the experience the community has in drawing in people from different backgrounds, we are well placed to position ourselves in the vanguard of those thinking about how science interacts with society and to help write the rules which will govern this ‘century of biology’. |
As a participant in iGEM, there are three things you can do right now to help us secure our science:
|
Ensuring that biology is used safely, securely and constructively should be of concern to us all. This is a challenge we will have to face together. To do this we will need to figure out what we want biological engineering to look like, what we are prepared for others to do with it, and just how we want to tackle security issues. This page provides a space to focus on these issues and for you to help shape what should be done to stop those with a malign intent. There is a real opportunity here for iGEM and those participating in iGEM, not only to shape how they will deal with security issues but to drive their national and even international processes. You can make a real difference in securing biology – in your lab, in your country and across the world.
There is a strong feeling amongst those involved with iGEM, as well as the broader synthetic biology community, that the work we do should be used only for the benefit of humankind. It should not be used to do harm or to make weapons. This understanding has prompted some to think about what the community can do to ensure that this never happens. One important step would be a code or personal declaration that everyone involved (from the organisers, through supervisors and advisors, to team members and even the mascots!) would commit themselves to. This helps to ensure that we think about security as something that does directly involve us, is part of our project and can be dealt with in a way that helps us to get on and have some fun engineering biology.
Areas a code might address:
|
Any code that would commit community members to do no harm would be first and foremost the property of this community. There is a solid body of work dedicated to the sorts of things that might be included in such an effort (see the Resources section). But nothing should be taken for granted – the content of our code would be up to us to decide. Here are some of the areas that a code might cover. Are these accurate? Can you think of anything else that should be on this list? Is there too much and we should get rid of some (if so, what)? Is there any point to working on a code? Here is where you can get involved – we are hoping that you will have something to say. You can answer these questions or add anything else you want to say (you know the drill) in the comments section below. |
There is an international treaty that prohibits the use of biology for hostile or malign purposes. If you use biology to do harm you will be breaking international law.
Many countries also have their own laws about using biology in this way. They are increasingly backed up with regulations and guidelines that are relevant to the day to day functioning of a laboratory. It is important that we are all familiar with the rules that cover our work. Whilst we are commonly taught how we should work safely, we are less often taught how to work securely.
This section provides a gateway to details of some of these national regulatory frameworks. We hoping that you will use this to make sure you know all you need to know about staying out of trouble. But we are hoping that you will also be able to help us improve this resource. We have provided some information on some of the measures in some of the countries with the largest participation in iGEM. We know this is not a list of all relevant measures in all countries that participate. Here is where you come in. Is there something missing you know applies in your country? If so why not add some information? If you don't know what is in place, why not find out and let us know? That would really help future teams, your professional conduct and the community as a whole.
China
Switzerland
- Laws in Switzerland relevant to work with biological agents
- Swiss arrangements for biosafety and biosecurity
- Swiss arrangements for the oversight of science
United Kingdom
- Laws in the UK relevant to work with biological agents
- UK arrangements for biosafety and biosecurity
United States
- Laws in the US relevant to work with biological agents
- US arrangements for biosafety and biosecurity
- US arrangements for the oversight of science
If there is anything here that has caught your interest, infuriated you and sparked any other reason you would like to get in touch, then please do. You can leave comments, thoughts and suggestions below but also feel free to contact us directly if you want something a little more interactive.
Images in top banner used under a Creative Commons license
Photo Credits (from left to right)