Difference between revisions of "Team:Bielefeld-CeBiTec/Practices/DualUse"

 
(11 intermediate revisions by 2 users not shown)
Line 34: Line 34:
 
   <div id="Overview">
 
   <div id="Overview">
 
     <h2>Overview</h2>
 
     <h2>Overview</h2>
<p> We decided to do an analysis of <b>biosecurity</b>, specifically the <b>dual use issue</b> of our project. While we were scanning the literature for information about our biosensor for detection of date rape drugs, we encountered many sensitive information about the accessibility and (chemical) synthesis of date rape drugs. Those information are publicly availably. Especially the publication of a freely available ingredient raised our concern. In our opinion, this knowledge can create a threat to the health of people, if it is misused.</p>
+
<p> We decided to do an analysis of <b>biosecurity</b>, specifically the <b>dual use issue</b> of our project. While we were scanning the literature for information about our biosensor for detection of date rape drugs, we encountered many sensitive information about the accessibility and (chemical) synthesis of date rape drugs. Those information are publicly available. Especially the publication of a freely available ingredient raised our concern. This knowledge can create a threat to the health of people, if it is misused.</p>
 
<p>Because iGEM is an open source competition, we might ourselves provide knowledge that could be of dual use. Since iGEM asks us to be striving to be conscientious members of the synthetic biology community, we informed ourselves about existing biosafety, biosecurity and dual use regulations.</p>
 
<p>Because iGEM is an open source competition, we might ourselves provide knowledge that could be of dual use. Since iGEM asks us to be striving to be conscientious members of the synthetic biology community, we informed ourselves about existing biosafety, biosecurity and dual use regulations.</p>
<p>We found the legal situation in Germany, the European Union and the USA to be inconsistent. In addition to these <b>laws</b>, many proposals from various advisory boards and <b>non governmental organizations</b> exist. We provide an overview about the proposals of these organizations and summarize various aspects of the ongoing <b>ethical discussion</b> about the opposing needs freedom of science and regulation of research with possible biosecurity issues. Therefore we contacted several experts from ethics committees, members of the German ethics council, a constitutional lawyer and a law student from the USA, as well as the iGEM safety committee itself. In fruitful discussions we obtained various opinions from different fields of expertise/from different academically point of views/from different perspectives.</p>
+
<p>We found the legal situation in Germany, the European Union and the USA to be inconsistent. In addition to these <b>laws</b>, many proposals from various advisory boards and <b>non governmental organizations</b> exist. We provide an overview about the proposals of these organizations and summarize various aspects of the ongoing <b>ethical discussion</b> about the opposing needs freedom of science and regulation of research with possible biosecurity issues. Therefore we contacted several experts from ethics committees, members of the German ethics council, a constitutional lawyer and a law student from the USA, as well as the iGEM safety committee itself. In fruitful discussions we obtained various opinions from different academical perspectives.</p>
<p>We wondered, why we did not find any biosafety, biosecurity and dual use definitions within the <b>iGEM</b> safety page. iGEM offers many regulations and risk assessments concerning biosafety and provides a great infrastructure with its interdisciplinary expert team, the biosafety commission. We want to <b>complete this biosafety and security aspects</b> by finding guidelines for the safe distribution of information and the dual use in research. We propose the implementation of definitions in the safety page and questions aiming for biosecurity and dual use risk assessment in the obligatory safety forms. iGEM has a unique potential in reaching out in education of young researchers to contribute to a responsible research community.</p>
+
<p>In the year 2011, the iGEM main page had a security section, which stated</p>
<p>We performed the risk assessment for our project, which, in addition to our public outreach and several expert contacts, <b>influenced our project significantly</b>. It broadened our horizon in the context of interdisciplinary collaboration and communication with the public - to build up to the trust put into us.</p>
+
 
 +
<p>"As a participant in iGEM, there are three things you can do right now to help us secure our science:</p>
 +
<p>
 +
<ol>
 +
<li>Fully answer the safety questions that demonstrates that you have thought about how others could misuse your work</li>
 +
<li>Contribute to community discussions on what needs to go into a code against the use of our science for hostile purposes (see A Community Response)</li>
 +
<li>Look into what security provisions, such as laws and regulations, are already in place in your country (see Working within the Law)"</li>
 +
</ol>
 +
<br>
 +
<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#iGEMSecurity">(iGEM Security Page 2011)</a>
 +
</p>
 +
 
 +
<p>While the answering of the safety questions is already obligatory, we addressed the laws and regulations as well as the contribution to a community discussion with our analysis and report. </p>
 +
<p>We wondered, why we did not find any biosafety, biosecurity and dual use definitions within the <b>iGEM</b> safety page 2015. A specific security page was not established in the manner of 2011. iGEM offers many regulations and risk assessments concerning biosafety and provides a great infrastructure with its interdisciplinary expert team, the biosafety commission. We want to <b>complete this biosafety and security aspects</b> by finding guidelines for the safe distribution of information and the dual use in research. We propose the implementation of definitions in the safety page and questions aiming for biosecurity and dual use risk assessment in the obligatory safety forms. iGEM has a unique potential in reaching out in education of young researchers to contribute to a responsible research community.</p>
 +
<p>We performed the risk assessment for our project. In addition to our public outreach and several expert contacts, this analysis results <b>influenced our project significantly</b>. The findings broadened our horizon in the context of interdisciplinary collaboration and communication with the public - to build up to the trust put into us.</p>
  
 
<p><b>We believe, that iGEM can be a role model in raising awareness of biosecurity and dual use risks - for a better international collaboration to create beneficial knowledge.</b></p>
 
<p><b>We believe, that iGEM can be a role model in raising awareness of biosecurity and dual use risks - for a better international collaboration to create beneficial knowledge.</b></p>
<p>We briefly summarize our findings on these pages. The detailed report is available as <b>PDF</b>.</p>
+
<p>We briefly summarize our findings on these pages. The detailed report is available as a <b>PDF</b>.</p>
  
 
</div>
 
</div>
 
<div class="row footer" style="float: left">
 
<div class="row footer" style="float: left">
 
<div class="col-md-2 col-md-offset-5 text-center">
 
<div class="col-md-2 col-md-offset-5 text-center">
<a type="button" class="btn btn-default btn-next" href="<!-- HIER DIE PDF-->"><img src="https://static.igem.org/mediawiki/2015/b/b2/Bielefeld-Cebitec_Dual-use-logo-schmal.png"><p>Complete report as PDF</p></a>
+
<a type="button" class="btn btn-default btn-next" href="https://static.igem.org/mediawiki/2015/b/be/Bielefeld-CeBiTec_Dual-Use_Report.pdf"><img src="https://static.igem.org/mediawiki/2015/b/b2/Bielefeld-Cebitec_Dual-use-logo-schmal.png"><p>Complete report as PDF</p></a>
 
</div>
 
</div>
 
   <div id="Definition" style="float: left">
 
   <div id="Definition" style="float: left">
Line 60: Line 74:
 
<p>"Laboratory biosecurity describes the protection, control and accountability for valuable biological materials (…) within laboratories, in order to prevent their unauthorized access, loss, theft, misuse, diversion or intentional release."(<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#who04">World Health Organization, 2004</a>)</p>
 
<p>"Laboratory biosecurity describes the protection, control and accountability for valuable biological materials (…) within laboratories, in order to prevent their unauthorized access, loss, theft, misuse, diversion or intentional release."(<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#who04">World Health Organization, 2004</a>)</p>
 
<p><b>Dual Use</b></p>
 
<p><b>Dual Use</b></p>
<p>Initially the term dual use used to be refered to the aspects of certain materials, information and technologies that are useful in both military and civilian spheres. The expression is increasingly being used to refer not only to military and civilian purposes, but also to harmful misuse and peaceful activities.(<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#who">World Health Organization, 2006</a>)</p>
+
<p>The potential of knowledge to be used in both benevolent and malevolent ways is defined as dual use risk. In addition, the potential of items to be used for military purposes is reffered to as dual use potential. Research providing knowledge containing dual use risk is called Dual Use Research of Concern (DURC). </p>
 
<p><b>Dual Use Research of Concern (DURC)</b></p>
 
<p><b>Dual Use Research of Concern (DURC)</b></p>
 
<p>The National Science advisory board refers the “generation and communication of information and new technologies from life sciences research that have the potential for both benevolent and malevolent application (…) along with the subset of dual use research with significant potential for generating information that could be misused (…) to as “dual use research of concern.” (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#NSABB2007">NSABB, 2007</a>)</p>
 
<p>The National Science advisory board refers the “generation and communication of information and new technologies from life sciences research that have the potential for both benevolent and malevolent application (…) along with the subset of dual use research with significant potential for generating information that could be misused (…) to as “dual use research of concern.” (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#NSABB2007">NSABB, 2007</a>)</p>
Line 80: Line 94:
 
   <div id="Ethics" style="float: left">
 
   <div id="Ethics" style="float: left">
 
     <h2>Ethical questions</h2>
 
     <h2>Ethical questions</h2>
<p>The discussion about moral and ethical questions of the dual use matter is of very broad range. The complete understanding of the ethical basis is far beyond the size of this record and requires a deep understanding of ethics. To display various points of view beyond the laboratory work and to complete our findings we contacted various <a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#Interviews">experts</a> and display a summary of different points of view. </p>
+
<p>The discussion about moral and ethical questions of the dual use matter is of very broad range. The complete understanding of the ethical basis is far beyond the size of this record and requires a deep understanding of ethics. To display various points of view beyond the laboratory work and to complete our findings we contacted several <a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#Interviews">experts</a> and display a summary of different points of view. </p>
 
<h3>Freedom and responsibility in science</h3>
 
<h3>Freedom and responsibility in science</h3>
 
<p>The advances of communication technology create free access and communication. This is promoting the progress of science. Simultaneously, this freedom creates the possibility of access of this information for potential misuse (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#DFG10">DFG/Leopoldina, 2010</a>). Freedom of science and the possible need for restriction of information for security purposes are hence controversial and need to be weighed carefully.</p>
 
<p>The advances of communication technology create free access and communication. This is promoting the progress of science. Simultaneously, this freedom creates the possibility of access of this information for potential misuse (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#DFG10">DFG/Leopoldina, 2010</a>). Freedom of science and the possible need for restriction of information for security purposes are hence controversial and need to be weighed carefully.</p>
Line 93: Line 107:
  
 
<h3>Conclusions</h3>
 
<h3>Conclusions</h3>
<p>In our opinion, the ethical dilemma points out the necessity for the implementation of the dual use issue in research at the very beginning: The education and advisory of young researchers is a key step towards this goal. To ensure these progresses, advisory institutions, such as ethical commissions, need to be established. While the optimal solution would be international applicable guidelines, which advisory boards are reaching out for, we believe iGEM to have the unique chance to be a role model in international collaboration and education of young researchers.</p>
+
<p>While we were unable to include a deep ethical analysis in a report of this size, the summary of ethical questions points out the necessity for the implementation of the dual use issue in research at the very beginning. The education and advisory of young researchers is a key step towards this goal. Only if the awareness of the dual use issue is implemented in education, researachers can participate in an ethical discussion. To ensure these progresses, advisory institutions, such as ethical commissions, need to be established. While the optimal solution would be international applicable guidelines, which advisory boards are reaching out for, we believe iGEM to have the unique chance to be a role model in international collaboration and education of young researchers.</p>
  
 
</div>
 
</div>
Line 104: Line 118:
 
<p>Every team is dealing with genetically modified organisms, methods of synthetic biology to analyze, combine and build those organisms and DNA parts, respectively. Therefore, the question of regulation is given in context of biosecurity and biosafety. It needs to be dealt with within each team and the competition itself as well.</p>
 
<p>Every team is dealing with genetically modified organisms, methods of synthetic biology to analyze, combine and build those organisms and DNA parts, respectively. Therefore, the question of regulation is given in context of biosecurity and biosafety. It needs to be dealt with within each team and the competition itself as well.</p>
 
<h3>Biosafety and Biosecurity in iGEM</h3>
 
<h3>Biosafety and Biosecurity in iGEM</h3>
<p>However, we could not find definitions of biosafety, biosecurity, dual use and dual use research of concern (DURC) within the iGEM safety page. In terms of biosafety, obligational forms need to be filled and check-ins for certain organisms and proteins are required. A list of organizations publishing instructions and legal regulations for different countries is provided, since iGEM faces the challenge of teams from a broad range of countries. Regarding biosecurity on the other hand, we found questions to be asked in context of safe project design, such as “To whom will it be benefitial or harmful?” on the safety page. It is noticeable, that the questions asked try to cover a mixture of biosafety and biosecurity issues. The answers differ among the iGEM teams in a very broad spectrum. Interestingly, the questions aim to the designed product or the used methods/chassi, but not the information that are distributed among our society by the team´s homepages, wiki and other published materials, so does the question concerning security in the safety form: “What risks might your project pose, if it were fully developed into a real product that real people could use? What future work might you do to reduce those risks?” We think that biosecurity risks need to be defined and the question to be asked more precisely.</p>
+
<p>However, we could not find definitions of biosafety, biosecurity, dual use and dual use research of concern (DURC) within the iGEM safety page. In terms of biosafety, obligational forms need to be filled and check-ins for certain organisms and proteins are required. A list of organizations publishing instructions and legal regulations for different countries is provided, since iGEM faces the challenge of teams from a broad range of countries. Regarding biosecurity on the other hand, we found questions to be asked in context of safe project design, such as “To whom will it be benefitial or harmful?” on the safety page. It is noticeable, that the questions asked try to cover a mixture of biosafety and biosecurity issues. The answers differ among the iGEM teams in a very broad spectrum. Interestingly, the questions aim to the designed product or the used methods/chassi. The information that are distributed among our society by the team´s homepages, wiki and other published materials is not addressed. In our view, the question concerning security in the safety form aim for the product rather than the knowledge too: “What risks might your project pose, if it were fully developed into a real product that real people could use? What future work might you do to reduce those risks?” We think that biosecurity risks need to be defined and the question to be asked more precisely.</p>
 
<h3>Dual Use Dilemma in iGEM</h3>
 
<h3>Dual Use Dilemma in iGEM</h3>
<p>Nevertheless, iGEM members are supposed to live up to the trust that is put into them by society and “design, build and share biological devices safely” (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#iGEM15">iGEM Safety Page</a>). Aspects of dual use have found focus in Terry Johnson´s call for awareness: iGEM participants, but also participants anywhere in the biotechnological environment, “should be aware of: the organization or organizations overseeing (ones) work, the appropriate Risk Group for the organisms that (one is) working with, and any select agents that might be involved. Further consider: any potentials for dual use, and especially if there are any biosafety or biosecurity concerns that are not addressed by current administrative controls”. (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#Terry">Terry Johnson, 2013</a>). Interestingly, the security page of 2011 contains details about biosecurity risk assessment. The possible misuse of information is pointed out. At the time of this years project design and conduction neither on the main igem page nor on the 2015 page a security page was existent. Nevertheless, the iGEM competition established a safety committee that has members with very deep knowledge about the dual use concern. </p>
+
<p>Nevertheless, iGEM members are supposed to live up to the trust that is put into them by society and “design, build and share biological devices safely” (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#iGEM15">iGEM Safety Page</a>). Aspects of dual use have found focus in Terry Johnson´s call for awareness: iGEM participants, but also participants anywhere in the biotechnological environment, “should be aware of: the organization or organizations overseeing (ones) work, the appropriate Risk Group for the organisms that (one is) working with, and any select agents that might be involved. Further consider: any potentials for dual use, and especially if there are any biosafety or biosecurity concerns that are not addressed by current administrative controls”. (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#Terry">Terry Johnson, 2013</a>). Interestingly, the security page of 2011 contains details about biosecurity risk assessment. The possible misuse of information is pointed out. At the time of this year's project design and conduction neither on the main iGEM page nor on the 2015 page a security page was existent. Nevertheless, the iGEM competition established a safety committee that has members with very deep knowledge about the dual use concern. </p>
 
<h3>Conclusions</h3>
 
<h3>Conclusions</h3>
<p>Facing this dilemma in our own project, we have not found proper guidelines within the competitions to apply to our concerns. While iGEM provides expert council through its safety committee, we find this not to be sufficient to call for awareness of dual use in states of research. As proposed in our description of the ethical debate, this is critical for the planning of research. Therefore, we propose the implementation of biosecurity risk assessment in obligational forms. Since the iGEM competition asks us to be “striving to be conscientious members of the synthetic biology community” (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#iGEM15">iGEM Safety Page</a>), we want to complete this safety and security aspects by finding guidelines for the safe distribution of knowledge and the question of dual use research of concern. As it is an international competition aiming to promote the communication between researchers as well as between them and the public, iGEM could be a role model in considering the dual use dilemma.</p>
+
<p>Facing this dilemma in our own project, we have not found proper guidelines within the competitions to apply to our concerns. While iGEM provides expert council through its safety committee, we find this not to be sufficient to call for awareness of dual use in all states of research. As proposed in our description of the ethical debate, this is critical for the planning of research. Therefore, we propose the implementation of biosecurity risk assessment in obligational forms. Since the iGEM competition asks us to be “striving to be conscientious members of the synthetic biology community” (<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#iGEM15">iGEM Safety Page</a>), we want to complete this safety and security aspects by finding guidelines for the safe distribution of knowledge and the question of dual use research of concern. As it is an international competition aiming to promote the communication between researchers as well as between them and the public, iGEM could be a role model in considering the dual use dilemma.</p>
  
 
</div>
 
</div>
Line 116: Line 130:
  
 
<p>We propose the implementation of the definitions of biosafety, biosecurity and dual use in the iGEM safety page. This is suggested to increase awareness of biosecurity risks and especially the dual use issue from the very beginning of research progress in iGEM projects.</p>
 
<p>We propose the implementation of the definitions of biosafety, biosecurity and dual use in the iGEM safety page. This is suggested to increase awareness of biosecurity risks and especially the dual use issue from the very beginning of research progress in iGEM projects.</p>
<p>Further, on advice of Prof. Nixdorff and in hindsight of the proposals of several advisory boards, we propose a general biosecurity risk assessment by implementation of questions into obligatory safety forms:</p>
+
<p>Further, on advice of Prof. Nixdorff and in hindsight of the proposals of several advisory boards, we propose a general biosecurity risk assessment by implementation of additional questions into obligatory safety forms. This assessment cannot be strictly seperated from biosafety questions, as the security measures need to be adapted to the biosafety risks:</p>
 
<h3>General biosecurity risk assessment</h3>
 
<h3>General biosecurity risk assessment</h3>
 
<p>
 
<p>
 
<ul>
 
<ul>
<li>Do you work with any S3/4 organism’s sequences or toxins or does your work contain any sequences or proteins specifically produced/contained in these organisms? </li>
+
<li>Do you work with any sequences or toxins of plant/animal origin, that might be a threat to health of humanity or environment?</li>
 +
<li>Do you work with any sequences of S3 organisms or does your work contain any sequences or proteins specifically produced/contained in these organisms? </li>
 
<li>Do you provide any knowledge of constructing, manipulating or influencing these agents or toxins?</li>
 
<li>Do you provide any knowledge of constructing, manipulating or influencing these agents or toxins?</li>
 
<li>Do your experiments meet any of these criteria or provide knowledge about the conduction of these experiments?
 
<li>Do your experiments meet any of these criteria or provide knowledge about the conduction of these experiments?
Line 131: Line 146:
 
<li>Enhances the susceptibility of a host population to the agent or toxin</li>
 
<li>Enhances the susceptibility of a host population to the agent or toxin</li>
 
<li>Generates or reconstitutes an eradicated or extinct agent or toxin listed above”</li>
 
<li>Generates or reconstitutes an eradicated or extinct agent or toxin listed above”</li>
</Ol>
+
</ol>
</li>
+
 
<p>(<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#USGP">United States Government, 2015</a>)</p>
 
<p>(<a href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/DualUse#USGP">United States Government, 2015</a>)</p>
 +
<li>Who has access to your laboratory?</li>
 +
<li>Do the persons with access to the laboratory receive prior training?</li>
 +
<li>Did you apply additional biosecurity measures to any used substances? Describe the measures.</li>
 
</ul>
 
</ul>
 
</p>
 
</p>
 
<h3>Dual use risk assessment</h3>
 
<h3>Dual use risk assessment</h3>
 
<p><ul>
 
<p><ul>
<li>Can you imagine any malevolent use of the knowledge and sequences published on your team’s wiki? Could the knowledge you provide in direct consequence be used for the creation of products or organisms that pose a danger to humans or the environment?</li>
+
<li>Can you imagine any malevolent use of the knowledge and sequences published on your team’s wiki? Could the knowledge you provide be in direct consequence used for the creation of products or organisms that pose a danger to humans or the environment?</li>
 
<li>In case of collaboration, does the sharing of devices or information create the potential of misuse?</li>
 
<li>In case of collaboration, does the sharing of devices or information create the potential of misuse?</li>
<li>In case of potential risk, did you initiate oversight or seek ethical/legal council or advice?</li></ul></p>
+
<li>In case of potential risk, did you initiate oversight or seek ethical/legal council or advice?</li>
 +
<li>How where your concerns addressed in your project?</li>
 +
</ul></p>
 
<h3>Prospect</h3>
 
<h3>Prospect</h3>
 
<p>We favor the implementation of international applicable guidelines for biosecurity and dual use risk assessment. We found the importance of the establishment of oversight and assessment in every state of research progress, beginning at raising awareness of the risk up to the establishment of the risk assessment in hindsight of research: publication and collaboration. The detailed implementation and process is displayed in our report.</p>
 
<p>We favor the implementation of international applicable guidelines for biosecurity and dual use risk assessment. We found the importance of the establishment of oversight and assessment in every state of research progress, beginning at raising awareness of the risk up to the establishment of the risk assessment in hindsight of research: publication and collaboration. The detailed implementation and process is displayed in our report.</p>
Line 151: Line 170:
 
<p>The dual use dilemma was first discussed, when our team was looking for information about a date rape drugs, since we aimed to develop a biosensor detecting ingredients in these drugs. We were astonished, how many, in our eyes, sensitive information we found free for access on the internet. These information contained detailed instructions of availability of chemicals on the free market that could be used as date rape drugs, as well as instructions of synthesis of these drugs. We were wondering, why these information are freely available and if there are any laws applying publication of sensitive information.</p>
 
<p>The dual use dilemma was first discussed, when our team was looking for information about a date rape drugs, since we aimed to develop a biosensor detecting ingredients in these drugs. We were astonished, how many, in our eyes, sensitive information we found free for access on the internet. These information contained detailed instructions of availability of chemicals on the free market that could be used as date rape drugs, as well as instructions of synthesis of these drugs. We were wondering, why these information are freely available and if there are any laws applying publication of sensitive information.</p>
 
<h3>Laws</h3>
 
<h3>Laws</h3>
<p>Our project is aiming to build a biosensor for detecting ingredients of date rape drugs with the prospect of enabling people to protect themselves. Nevertheless, we focus attention on these ingredients and their availability and hence provide knowledge that might be misused to harm people. We therefore analyzed the legal restriction of the providence of this knowledge not only in our country (Germany), but also in the European Union as confederal institution and in the USA, where iGEM takes place. We did not find laws applying to the publication of this knowledge, which is therefore legally justifiable.</p>
+
<p>Our project is aiming to build a biosensor for detecting ingredients of date rape drugs with the prospect of enabling people to protect themselves. Nevertheless, we focus attention on these ingredients and their availability and hence provide knowledge that might be misused to harm people. Therefore we analyzed the legal restriction of the providence of this knowledge not only in our country (Germany), but also in the European Union as confederal institution and in the USA, where iGEM takes place. We did not find laws applying to the publication of this knowledge, which is therefore legally justifiable.</p>
 
<h3>Ethics</h3>
 
<h3>Ethics</h3>
<p>While providing this knowledge might lead to misuse, it has benevolent content. By publishing our obtained knowledge, we might inspire others to improve that sensor for the protection against date rape drugs, but also to build other biosensors detecting harmful substances in beverages in hindsight to our aim to provide a modular, extensible tool for the further creation of biosensors. In addition, our knowledge might raise the awareness of availability of the used chemicals in date rape drugs. This could ultimately lead to a more careful handling of beverages or even the overthought of legal obtainability and restriction of these chemicals, as we caused a broad discussion in the media. These findings lead to our ethical analysis in collaboration with experts from microbiology, law, sociology and ethics. Do the potential benefits of the publication of our results outweigh the potential risk? Since we are not providing knowledge how to synthesize or obtain these drugs, we still focus attention on these substances. Therefore, we decided to apply security risk assessment to our project.</p>
+
<p>While providing this knowledge might lead to misuse, it has benevolent content. By publishing our obtained knowledge, we might inspire others to improve a sensor for the protection against date rape drugs, but also to build other biosensors detecting harmful substances in beverages in hindsight to our aim to provide a modular, extensible tool for the further creation of biosensors. In addition, our knowledge might raise the awareness of availability of the used chemicals in date rape drugs. This could ultimately lead to a more careful handling of beverages or even the overthought of legal obtainability and restriction of these chemicals, as we caused a broad discussion in the media. These findings lead to our ethical analysis in collaboration with experts from microbiology, law, sociology and ethics. Do the potential benefits of the publication of our results outweigh the potential risk? Since we are not providing knowledge how to synthesize or obtain these drugs, we still focus attention on these substances. Therefore, we decided to apply security risk assessment to our project.</p>
 +
 
 +
 
 
<figure style="float: right; margin-left: 20px">
 
<figure style="float: right; margin-left: 20px">
<img src="https://static.igem.org/mediawiki/2015/e/e0/Bielefeld-CeBiTec_Dual-Use_Proposal-RiskAssessment.png"  width="500px">
+
<a href="https://static.igem.org/mediawiki/2015/e/e0/Bielefeld-CeBiTec_Dual-Use_Proposal-RiskAssessment.png" data-lightbox="Proposedriskassessment" data-title="Proposed Risk Assessment in every stage of the research progress">
 +
<img src="https://static.igem.org/mediawiki/2015/e/e0/Bielefeld-CeBiTec_Dual-Use_Proposal-RiskAssessment.png"  width="500px"></a>
 
<figcaption>Proposed Risk Assessment in every stage of the research progress</figcaption>
 
<figcaption>Proposed Risk Assessment in every stage of the research progress</figcaption>
 
</figure>
 
</figure>
 +
 
<h3>Risk assessment</h3>
 
<h3>Risk assessment</h3>
 
<p>The process of risk assessment as proposed by our team is conducted at every stage of our research. We do not aim for restriction or prohibition of research or progress, but for raising awareness and thereby minimizing the risk of misuse in a process of free and responsible science.</p>
 
<p>The process of risk assessment as proposed by our team is conducted at every stage of our research. We do not aim for restriction or prohibition of research or progress, but for raising awareness and thereby minimizing the risk of misuse in a process of free and responsible science.</p>
Line 170: Line 193:
 
<p>In our weekly team meeting the upcoming publication of the substance and details about our sensor were discussed in hindsight to potential dual use risk. Experts were contacted, such as the ethics committee at our university, the iGEM safety committee itself and of course our supervisor. Regular oversight by an institution is not yet established.</p>
 
<p>In our weekly team meeting the upcoming publication of the substance and details about our sensor were discussed in hindsight to potential dual use risk. Experts were contacted, such as the ethics committee at our university, the iGEM safety committee itself and of course our supervisor. Regular oversight by an institution is not yet established.</p>
 
<li>Minimizing potential risk</li>
 
<li>Minimizing potential risk</li>
<p>We found restriction of publication in this case to not be effective to minimize the risk, since we do not provide the knowledge of how to obtain or synthesize the ingredients of the date rape drugs. Said information are obtainable astonishingly easily, therefore our call for awareness and providence of knowledge to create a biosensor contains more benevolent content than potential risk.</p>
+
<p>We found restriction of publication in this case not to be effective to minimize the risk, since we do not provide the knowledge of how to obtain or synthesize the ingredients of the date rape drugs. Said information are obtainable astonishingly easily, therefore our call for awareness and providence of knowledge to create a biosensor contains more benevolent content than potential risk.</p>
 
<li>Documentation and communication</li<
 
<li>Documentation and communication</li<
 
<p>We documented not only the use of the chemical, but also our concerns about biosecurity issues. We contacted the ethics council of our university that unfortunately is not yet established for biotechnological research. The interview is available in our report. We further contacted the iGEM safety committee for advice on publication. Mrs. Kelly Drinkwater, member of the iGEM safety committee, agreed on our proposed publication.</p>
 
<p>We documented not only the use of the chemical, but also our concerns about biosecurity issues. We contacted the ethics council of our university that unfortunately is not yet established for biotechnological research. The interview is available in our report. We further contacted the iGEM safety committee for advice on publication. Mrs. Kelly Drinkwater, member of the iGEM safety committee, agreed on our proposed publication.</p>
Line 181: Line 204:
 
<h4>General biosecurity risk assessment:</h4>
 
<h4>General biosecurity risk assessment:</h4>
 
<ul>
 
<ul>
 +
<li>Do you work with any sequences or toxins of plant/animal origin, that might be a threat to health of humanity or environment?</li>
 +
<p>&rarr; No. </p>
 
<li>Do you work with any S3/4 organism’s sequences or toxins or does your work contain any sequences or proteins specifically produced/contained in these organisms?</li>
 
<li>Do you work with any S3/4 organism’s sequences or toxins or does your work contain any sequences or proteins specifically produced/contained in these organisms?</li>
 
<p>&rarr; No. </p>
 
<p>&rarr; No. </p>
Line 197: Line 222:
 
</li>
 
</li>
 
<p>&rarr; No.</p>
 
<p>&rarr; No.</p>
 +
<li>Who has access to your laboratory?</li>
 +
<p>&rarr; We work in a biosecurity level 1 laboratory. The building and each laboratory section is secured by electonical devices limiting the access. Public access is not possible. Members of the working group have access. </li>
 +
<li>Do the persons with access to the laboratory receive prior training?</li>
 +
<p>&rarr; Yes. Every person with access receives prior training following the rules for S1 laboratory safety instructions.</p>
 +
<li>Did you apply additional biosecurity measures to any used substances? Describe the measures.</li>
 +
<p>&rarr; Yes. We stored GBL, the substance of possible biosecurity concern, in a locked poison storage with limited access and, as described before, documented the usage of the substance. </p>
 
</ul>
 
</ul>
  
Line 204: Line 235:
 
<p>&rarr; Yes. We focus on the availability of an ingredient of date rape drugs. This potential misused has been evaluated carefully. The benefit of the published knowledge outweighs the potential risk, because we found the critical information already published and easily assessable. Therefore, our knowledge provides protection by creation of a biosensor and raise of the awareness of the potential danger of date rape drugs.</p>
 
<p>&rarr; Yes. We focus on the availability of an ingredient of date rape drugs. This potential misused has been evaluated carefully. The benefit of the published knowledge outweighs the potential risk, because we found the critical information already published and easily assessable. Therefore, our knowledge provides protection by creation of a biosensor and raise of the awareness of the potential danger of date rape drugs.</p>
 
<li>In case of collaboration, does the sharing of devices or information create the potential of misuse?</li>
 
<li>In case of collaboration, does the sharing of devices or information create the potential of misuse?</li>
<li>Sharing the device does not contain the risk of misuse. Sharing the information contains the same risk as publication of said knowledge.</li>
+
<p>&rarr; Sharing the device does not contain the risk of misuse. Sharing the information contains the same risk as publication of said knowledge.</p>
 
<li>In case of potential risk, did you initiate oversight or seek ethical/legal council or advice?</li>
 
<li>In case of potential risk, did you initiate oversight or seek ethical/legal council or advice?</li>
 
<p>&rarr; Yes. We contacted the ethics commission of our university and the iGEM safety committee. Unfortunately, no advice could be given by our ethics commission. The iGEM safety committee agreed with us, that the information we provide is already published and easily accessible and therefore does not contain a risk that would justify the restriction of publication on our wiki. </li>
 
<p>&rarr; Yes. We contacted the ethics commission of our university and the iGEM safety committee. Unfortunately, no advice could be given by our ethics commission. The iGEM safety committee agreed with us, that the information we provide is already published and easily accessible and therefore does not contain a risk that would justify the restriction of publication on our wiki. </li>
 +
<li>How were your concerns addressed in your project?</li>
 +
<p>&rarr;We addressed the dual use issue and biosecurity concerns in a detailed analysis as proposed here. We propose the integration of biosecurity measures for further teams. We educated ourselves about the laws and regulations. We discussed the concern with our advisors and instructor. We decided to conctact the ethics council at our university and the iGEM ethics committee. We applied additional biosecurity measures to the substance of possible biosecurity concern.</p>
 
</ul>
 
</ul>
  
Line 287: Line 320:
 
Federal Republic of Germany (2012): Basic Law.
 
Federal Republic of Germany (2012): Basic Law.
 
</p>
 
</p>
<p id="iGEM15>
+
<p id="iGEM15">
iGEM Safety Page, checked on 8/22/2015.
+
iGEM Safety Page 2015, checked on 8/22/2015.
 +
</p>
 +
<p id="iGEMSecurity">
 +
iGEM Security Page 2011, checked on 8/18/2015
 
</p>
 
</p>
 
<p id="Terry">
 
<p id="Terry">
Line 312: Line 348:
 
</div>
 
</div>
  
<div class="row footer" style="float: left">
+
<div class="row footer">
 
<div class="col-md-2 col-md-offset-5 text-center">
 
<div class="col-md-2 col-md-offset-5 text-center">
<a type="button" class="btn btn-default btn-next" href="<!-- HIER DIE PDF-->"><img src="https://static.igem.org/mediawiki/2015/b/b2/Bielefeld-Cebitec_Dual-use-logo-schmal.png"><p>Complete report as PDF</p></a>
+
<a type="button" class="btn btn-default btn-next" href="https://static.igem.org/mediawiki/2015/b/be/Bielefeld-CeBiTec_Dual-Use_Report.pdf"><img src="https://static.igem.org/mediawiki/2015/b/b2/Bielefeld-Cebitec_Dual-use-logo-schmal.png"><p>Complete report as PDF</p></a>
 
</div>
 
</div>
  
Line 320: Line 356:
  
  
<div class="col-md-2 col-md-offset-3 text-center" style="float: left">
+
<div class="col-md-2 col-md-offset-3 text-center">
 
<a type="button" class="btn btn-default btn-next" href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/Scenarios"><img src="https://static.igem.org/mediawiki/2015/5/54/Bielefeld-CeBiTec_hp_logo.png"><p>Scenarios</p></a>
 
<a type="button" class="btn btn-default btn-next" href="https://2015.igem.org/Team:Bielefeld-CeBiTec/Practices/Scenarios"><img src="https://static.igem.org/mediawiki/2015/5/54/Bielefeld-CeBiTec_hp_logo.png"><p>Scenarios</p></a>
 
</div>
 
</div>

Latest revision as of 15:52, 29 October 2015

iGEM Bielefeld 2015


Dual Use

More than biosafety and biosecurity: Ethics, Laws and Guidelines

Overview

We decided to do an analysis of biosecurity, specifically the dual use issue of our project. While we were scanning the literature for information about our biosensor for detection of date rape drugs, we encountered many sensitive information about the accessibility and (chemical) synthesis of date rape drugs. Those information are publicly available. Especially the publication of a freely available ingredient raised our concern. This knowledge can create a threat to the health of people, if it is misused.

Because iGEM is an open source competition, we might ourselves provide knowledge that could be of dual use. Since iGEM asks us to be striving to be conscientious members of the synthetic biology community, we informed ourselves about existing biosafety, biosecurity and dual use regulations.

We found the legal situation in Germany, the European Union and the USA to be inconsistent. In addition to these laws, many proposals from various advisory boards and non governmental organizations exist. We provide an overview about the proposals of these organizations and summarize various aspects of the ongoing ethical discussion about the opposing needs freedom of science and regulation of research with possible biosecurity issues. Therefore we contacted several experts from ethics committees, members of the German ethics council, a constitutional lawyer and a law student from the USA, as well as the iGEM safety committee itself. In fruitful discussions we obtained various opinions from different academical perspectives.

In the year 2011, the iGEM main page had a security section, which stated

"As a participant in iGEM, there are three things you can do right now to help us secure our science:

  1. Fully answer the safety questions that demonstrates that you have thought about how others could misuse your work
  2. Contribute to community discussions on what needs to go into a code against the use of our science for hostile purposes (see A Community Response)
  3. Look into what security provisions, such as laws and regulations, are already in place in your country (see Working within the Law)"

(iGEM Security Page 2011)

While the answering of the safety questions is already obligatory, we addressed the laws and regulations as well as the contribution to a community discussion with our analysis and report.

We wondered, why we did not find any biosafety, biosecurity and dual use definitions within the iGEM safety page 2015. A specific security page was not established in the manner of 2011. iGEM offers many regulations and risk assessments concerning biosafety and provides a great infrastructure with its interdisciplinary expert team, the biosafety commission. We want to complete this biosafety and security aspects by finding guidelines for the safe distribution of information and the dual use in research. We propose the implementation of definitions in the safety page and questions aiming for biosecurity and dual use risk assessment in the obligatory safety forms. iGEM has a unique potential in reaching out in education of young researchers to contribute to a responsible research community.

We performed the risk assessment for our project. In addition to our public outreach and several expert contacts, this analysis results influenced our project significantly. The findings broadened our horizon in the context of interdisciplinary collaboration and communication with the public - to build up to the trust put into us.

We believe, that iGEM can be a role model in raising awareness of biosecurity and dual use risks - for a better international collaboration to create beneficial knowledge.

We briefly summarize our findings on these pages. The detailed report is available as a PDF.