IASB Code of Conduct (Draft) Submitted by Germany

Size: px
Start display at page:

Download "IASB Code of Conduct (Draft) Submitted by Germany"

Transcription

1 MEETING OF THE STATES PARTIES TO THE CONVENTION ON THE PROHIBITION OF THE DEVELOPMENT, PRODUCTION AND STOCKPILING OF BACTERIOLOGICAL (BIOLOGICAL) AND TOXIN WEAPONS AND ON THEIR DESTRUCTION BWC/MSP/2008/WP.3 3 December 2008 ENGLISH ONLY 2008 Meeting Geneva, 1-5 December 2008 Item 7 of the agenda Consideration of oversight, education, awareness raising, and adoption and/or development of codes of conduct with the aim of preventing misuse in the context of advances in bio-science and bio-technology research with the potential of use for purposes prohibited by the Convention IASB Code of Conduct (Draft) Submitted by Germany 1. IASB is the Industry Association of the five leading German companies in the field of Synthetic Biology. The members of IASB share the same perspectives on biosafety and biosecurity with the aim to set the foundation for the secure and responsible development of their activities. The IASB Code of Conduct (Draft) demonstrates clearly IASB s interest and activities to play its role as a responsible actor in the field of Synthetic Biology. IASB Code of Conduct (Draft) Preamble 2. The field of Synthetic Biology is gaining momentum in the academic world. In parallel, a market for Synthetic Biology products and services has developed and grown rapidly over the past ten years. The Industry Association Synthetic Biology represents a number of companies and organizations with a stake in Synthetic Biology, for instance as providers of DNA synthesis or bioinformatics products. 3. IASB has created this Code of Conduct, which is to be implemented by each member, in order to secure the foundations of this fledgling field against abuse and to bring Synthetic Biology to its full potential. GE

2 Page 2 4. IASB's activities are exclusively focused on exploiting the highly beneficial potential of synthetic constructive biology and biologically inspired structural and productive nanotechnology, its application and dissemination. 5. The most fundamental tools for the design of Synthetic Biology applications are synthetic genes and their intrinsic features of freedom of design and artificial biological function. 6. This Code of Conduct helps companies that provide DNA synthesis services and products to conduct their business in a sensible and responsible way. Declaration: The Industry Association Synthetic Biology herewith declares that it is in full agreement with the need for a safe and responsible use of synthetic DNA. IASB strictly follows all regulations and international standards designed to safeguard against intentional or unintentional abuse of synthetic DNA. General considerations 7. Synthetic Biology provides the means to accelerate the assembly of complex biological networks and to rapidly create biological entities with new properties. These powers will undoubtedly lead to a number of beneficial developments such as sustainable biofuels, new therapeutics and and biodegradable plastics. 8. However, the efficiency and power of Synthetic Biology can also create the potential for abuse. Through rapid DNA synthesis, biorisk-associated genes such as toxin genes or virulence factors become accessible to a large number of users. 9. In order to contain the risks of Synthetic Biology and to protect the field against misuse, the members of the Industry Association Synthetic Biology have adopted this Code of Conduct which provides guidelines for safe, secure and responsible commercial DNA synthesis. 10. One important consideration of any regulation for biosafety and biosecurity is the freedom of research: A lot of beneficial developments would be impossible without the freedom to explore organisms and genes that bear a certain environmental or health risk. It is our conviction that such a risk can be managed and contained in a secure manner, while at the same time ensuring the level of freedom that is necessary for desired scientific advancements. 11. It is our declared intention to raise barriers for malign attackers through a number of measures that combinedly will protect Synthetic Biology from abuse. We aim at encouraging continued improvements and harmonization in this field. 12. IASB will participate in the definition and setup of international standards for Synthetic Biology. It will promote the field by building a positive image of its potential and benefits. To this end, IASB will promote and showcase positive examples of Synthetic Biology applications. Risk assessment and risk management

3 Page Abuse of synthetic genes in hazardous applications is possible in two ways only: Intentionally, and by failures in risk assessment and management. 14. The technology of handling synthetic genes uses complex procedures which by their nature are self-contained and tightly controlled under existing standards of good practice. 15. Therefore IASB follows existing risk assessment and management concepts based on established good practices and standard operating procedures. These procedures on a level comparable to ISO norms integrate analyses and control of internal and external risk factors of biosecurity and biosafety. 16. For biosecurity, risk assessment entails the screening of DNA sequences for genes which can be intentionally abused in biohazardous applications such as terroristic activities, whereas risk management entails the restriction of access to synthetic DNA to legitimate users. 17. For biosafety, risk assessment entails the analysis of potential hazard created by newly assembled biological pathways and components. Risk management is mainly concerned with issues of traceability on the level of labeling and containment. Record keeping 18. Records of suspicious inquiries and positive screening hits will be kept. 19. Statistics on biosecurity- and biosafety-related inquiries and orders will be kept. Cooperation with Authorities 20. Authorities will be informed about inquiries and orders that clearly indicate illegal activities, such as attempts at concealing a non-business delivery address. Customer Screening 21. Customers will be screened by determining their identity and affiliation and by ensuring that they and the organization they represent are legitimate users of synthetic DNA. 22. PO boxes and residential addresses will not be accepted as shipping addresses. 23. Addresses of businesses and institutions will be verified, and ensured that the address owner is a legitimate organization (such as a registered business or an internationally recognized academic institution).

4 Page 4 Sequence Screening 24. DNA sequences submitted as inquiries or orders for DNA synthesis by customers will be screened for homology with biorisk-associated genes. 25. Screening will be done on the DNA and protein level. 26. Screening will be against (i) (ii) All Australia Group biological dual-use organisms The Select Agent list (iii) National organism lists for export control or biological safety / security protocols. 27. For bacteria and eukaryotes, screening will be performed against all known genomic and plasmid transcripts. 28. For viruses, screening will be performed against all known genomic sequences. 29. For toxins, screening will be performed against the toxin gene sequences. Response to Identified Threats 30. When a homology against a gene in the screening database is found, the hit will be assessed by a molecular biologist or similar subject matter expert. 31. When the hit is deemed authentic, (i) (ii) the customer will be notified and made aware of the perceived risk the order will be accepted only if the customer is a legitimate user and all national and international regulations have been met. Cooperation on Biosafety and Biosecurity 32. Aspects of biosafety and biosecurity will be excluded from competitive activities. 33. IASB members will work together and with other stakeholders in improving biosafety and biosecurity measures. 34. IASB members will promote international dialogue through their activities; in particular, IASB will organize meetings and workshops to bring together international stakeholders and to discuss upcoming threats and responses.

5 Page IASB members will assemble a Technical Expert Group on Biosecurity (TEGB). This group will review current design and implementations of biosafety and biosecurity measures, and will propose and initiate improvements. Each member will nominate one representative to this group. Promotion of Science 36. The need for biosafety and biosecurity measures must be carefully balanced with the freedom of research. 37. A large number of projects relevant to public health and improved biosecurity rely on Synthetic Biology and DNA synthesis. This includes the development of vaccines and the elucidation of mechanisms of pathogenicity. Therefore, legitimate uses of biorisk-associated sequences must not be hindered, and in fact, must be promoted. 38. IASB will support education in the field of Synthetic Biology, with a particular focus on aspects of biosafety and biosecurity, and will make available educational material for this purpose.

Dual-Use Bioethics / Biosecurity Online Learning Train-the-Trainer Program

Dual-Use Bioethics / Biosecurity Online Learning Train-the-Trainer Program Dual-Use Bioethics / Biosecurity Online Learning Train-the-Trainer Program Simon Whitby 31st Workshop of the Pugwash Study Group on the Implementation of the Chemical and Biological Weapons Conventions:

More information

FACULTY OF MEDICAL SCIENCE

FACULTY OF MEDICAL SCIENCE Doctor of Philosophy Program in Microbiology FACULTY OF MEDICAL SCIENCE Naresuan University 171 Doctor of Philosophy Program in Microbiology The time is critical now for graduate education and research

More information

Centre for Research Ethics & Bioethics

Centre for Research Ethics & Bioethics Moral obligations for synthetic biology research Stefan Eriksson, Associate Professor in research ethics The worry Dual use: malicious uses such as using a pathogen for terrorism. Cf. the Swedish security

More information

United States Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern

United States Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern United States Government Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern Contents Section 1. Introduction... 2 Section 2. Purpose... 4 Section 3. Guiding Principles for

More information

FREQUENTLY ASKED QUESTIONS

FREQUENTLY ASKED QUESTIONS NATIONAL SCIENCE ADVISORY BOARD FOR BIOSECURITY FREQUENTLY ASKED QUESTIONS Establishment of the NSABB 1. What is the Administration s policy on biosecurity in life sciences research? 2. Why was the NSABB

More information

CONTROLLING THE GENIE OF EMERGING TECHNOLOGIES SIX STEPS TO MITIGATE RISKS CREATED BY INNOVATION JOHN DRZIK

CONTROLLING THE GENIE OF EMERGING TECHNOLOGIES SIX STEPS TO MITIGATE RISKS CREATED BY INNOVATION JOHN DRZIK CONTROLLING THE GENIE OF EMERGING TECHNOLOGIES SIX STEPS TO MITIGATE RISKS CREATED BY INNOVATION JOHN DRZIK Innovation is vital to progress. Advances in science, and the new technologies flowing from them,

More information

Caltech Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern

Caltech Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern Caltech Policy for Institutional Oversight of Life Sciences Dual Use Research of Concern Purpose The purpose of this Policy is to strengthen regular institutional review and oversight of certain life sciences

More information

Translated from Spanish. Permanent Mission of the Dominican Republic to the United Nations MPRDNY-1952-15. 5 November 2015. Sir,

Translated from Spanish. Permanent Mission of the Dominican Republic to the United Nations MPRDNY-1952-15. 5 November 2015. Sir, 1 Translated from Spanish Permanent Mission of the Dominican Republic to the United Nations MPRDNY-1952-15 5 November 2015 Sir, I have the honour to write to you in your capacity as Chair of the Security

More information

BIOSAFETY POLICY. Vice-President, Services PURPOSE

BIOSAFETY POLICY. Vice-President, Services PURPOSE Effective Date: March 4, 2016 Supersedes/Amends: May 2006 Originating Office: Office of the Vice-President, Services Policy Number: VPS-52 PURPOSE Biological materials have the potential, if not managed

More information

University of Nevada, Reno Environmental Health and Safety Policy

University of Nevada, Reno Environmental Health and Safety Policy University of Nevada, Reno Environmental Health and Safety Policy Title: Institutional Oversight of Dual Use Research of Concern Date: September 24, 2015 Revision: 0 Page: Page 1 of 7 POLICY: The University

More information

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program

How To Set Up A National Biological Laboratory Safety And Security Monitoring Program Biosecurity and Bioterrorism: Biodefense Strategy, Practice, and Science Volume 10, Number 4, 2012 ª Mary Ann Liebert, Inc. DOI: 10.1089/bsp.2012.0054 Establishing a National Biological Laboratory Safety

More information

Section VI Principles of Laboratory Biosecurity

Section VI Principles of Laboratory Biosecurity Section VI Principles of Laboratory Biosecurity Since the publication of the 4th edition of BMBL in 1999, significant events have brought national and international scrutiny to the area of laboratory security.

More information

Guidelines for Establishment of Contract Areas Computer Science Department

Guidelines for Establishment of Contract Areas Computer Science Department Guidelines for Establishment of Contract Areas Computer Science Department Current 07/01/07 Statement: The Contract Area is designed to allow a student, in cooperation with a member of the Computer Science

More information

Sample policy of Naturalis Biodiversity Center

Sample policy of Naturalis Biodiversity Center Sample policy of Naturalis Biodiversity Center INTRODUCTION Naturalis Biodiversity Center (hereafter Naturalis) has the mission to use its collections in as many ways as possible for the furtherance of

More information

BWC/CONF.V/COW/WP.28 STOCKPILING OF BACTERIOLOGICAL 27 November 2001 (BIOLOGICAL) AND TOXIN WEAPONS AND ON THEIR DESTRUCTION PROPOSALS

BWC/CONF.V/COW/WP.28 STOCKPILING OF BACTERIOLOGICAL 27 November 2001 (BIOLOGICAL) AND TOXIN WEAPONS AND ON THEIR DESTRUCTION PROPOSALS FIFTH REVIEW CONFERENCE OF THE STATES PARTIES TO THE CONVENTION ON THE PROHIBITION OF THE DEVELOPMENT, PRODUCTION AND BWC/CONF.V/COW/WP.28 STOCKPILING OF BACTERIOLOGICAL 27 November 2001 (BIOLOGICAL) AND

More information

Administrative Procedure Chapter 12, Research Administrative Procedure: AP 12.217, Procedure for Institutional Oversight of Life

Administrative Procedure Chapter 12, Research Administrative Procedure: AP 12.217, Procedure for Institutional Oversight of Life Administrative Procedure, AP 12.217 Procedure for Institutional Oversight of Life Sciences Dual Use Research of Concern Page 1 of 15 Administrative Procedure Chapter 12, Research Administrative Procedure:

More information

Malcolm Dando. Landau Network Centro Volta. and University of Bradford

Malcolm Dando. Landau Network Centro Volta. and University of Bradford European Biosecurity Awareness Raising Network Review Series on Policy, Ethics and Security Paper n 4 Biological Weapons and the Biological Weapons Convention: Bioethics and Dual-Use Malcolm Dando Landau

More information

New Directions: The Ethics of Synthetic Biology and Emerging Technologies. Frequently Asked Questions

New Directions: The Ethics of Synthetic Biology and Emerging Technologies. Frequently Asked Questions New Directions: The Ethics of Synthetic Biology and Emerging Technologies Q: What is synthetic biology? Frequently Asked Questions A: Synthetic biology is the name given to an emerging field of research

More information

Sec. 247d-6. Public health countermeasures to a bioterrorist attack. (a) All-hazards public health and medical response curricula and training

Sec. 247d-6. Public health countermeasures to a bioterrorist attack. (a) All-hazards public health and medical response curricula and training 42 U.S.C. 247d-6 Sec. 247d-6. Public health countermeasures to a bioterrorist attack (a) All-hazards public health and medical response curricula and training (1) In general The Secretary, in collaboration

More information

INTERNATIONAL CONFERENCE ON HARMONISATION OF TECHNICAL REQUIREMENTS FOR REGISTRATION OF PHARMACEUTICALS FOR HUMAN USE E15

INTERNATIONAL CONFERENCE ON HARMONISATION OF TECHNICAL REQUIREMENTS FOR REGISTRATION OF PHARMACEUTICALS FOR HUMAN USE E15 INTERNATIONAL CONFERENCE ON HARMONISATION OF TECHNICAL REQUIREMENTS FOR REGISTRATION OF PHARMACEUTICALS FOR HUMAN USE ICH HARMONISED TRIPARTITE GUIDELINE DEFINITIONS FOR GENOMIC BIOMARKERS, PHARMACOGENOMICS,

More information

BOSTON UNIVERSITY Dual Use Research of Concern ( DURC ) Policy

BOSTON UNIVERSITY Dual Use Research of Concern ( DURC ) Policy 1. Purpose BOSTON UNIVERSITY Dual Use Research of Concern ( DURC ) Policy The purpose of this policy is to outline Boston University s ( BU ) institutional oversight of Dual Use Research of Concern according

More information

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK

JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK JAMAL EL-HINDI DEPUTY DIRECTOR FINANCIAL CRIMES ENFORCEMENT NETWORK REMARKS AT THE PARLIAMENTARY INTELLIGENCE SECURITY FORUM JUNE 20, 2016 VIENNA, AUSTRIA Good morning. I would like to thank Congressman

More information

BBSRC TECHNOLOGY STRATEGY: TECHNOLOGIES NEEDED BY RESEARCH KNOWLEDGE PROVIDERS

BBSRC TECHNOLOGY STRATEGY: TECHNOLOGIES NEEDED BY RESEARCH KNOWLEDGE PROVIDERS BBSRC TECHNOLOGY STRATEGY: TECHNOLOGIES NEEDED BY RESEARCH KNOWLEDGE PROVIDERS 1. The Technology Strategy sets out six areas where technological developments are required to push the frontiers of knowledge

More information

G E N OM I C S S E RV I C ES

G E N OM I C S S E RV I C ES GENOMICS SERVICES THE NEW YORK GENOME CENTER NYGC is an independent non-profit implementing advanced genomic research to improve diagnosis and treatment of serious diseases. capabilities. N E X T- G E

More information

Fiskars Code of Conduct

Fiskars Code of Conduct GROUP POLICY Fiskars Code of Conduct Version history: Person responsible Päivi Timonen, General Counsel Owner Fiskars Ethics Advisory Group Framework 1.A Group Next Revision Date Code Policies Version

More information

Fundamentals of Laboratory Biosecurity and Biosafety Risk Assessments

Fundamentals of Laboratory Biosecurity and Biosafety Risk Assessments Fundamentals of Laboratory Biosecurity and Biosafety Risk Assessments Conceptual Considerations ABSA 22 October 2008, Reno Dr. Morten Bremer Mærli, Ronald Barø, Alexander Flesjø Christiansen, Dr. Stephen

More information

COMMISSION IMPLEMENTING REGULATION (EU) No /.. of XXX

COMMISSION IMPLEMENTING REGULATION (EU) No /.. of XXX Ref. Ares(2013)222755-20/02/2013 EUROPEAN COMMISSION Brussels, XXX SANCO/12462/2011 Rev. 2 (POOL/E1/2011/12462/12462R2- EN.doc) [ ](2012) XXX draft COMMISSION IMPLEMENTING REGULATION (EU) No /.. of XXX

More information

Human Research Protection Program University of California, San Diego ISSUES ON DNA AND INFORMED CONSENT

Human Research Protection Program University of California, San Diego ISSUES ON DNA AND INFORMED CONSENT Human Research Protection Program University of California, San Diego ISSUES ON DNA AND INFORMED CONSENT Regulatory changes will occur for investigators studying human DNA The recent acceleration and widening

More information

PROACTIVE AND ADAPTIVE GOVERNANCE OF EMERGING RISKS THE CASE OF DNA SYNTHESIS AND SYNTHETIC BIOLOGY

PROACTIVE AND ADAPTIVE GOVERNANCE OF EMERGING RISKS THE CASE OF DNA SYNTHESIS AND SYNTHETIC BIOLOGY PROACTIVE AND ADAPTIVE GOVERNANCE OF EMERGING RISKS THE CASE OF DNA SYNTHESIS AND SYNTHETIC BIOLOGY, Political Science and Engineering Systems Division, Massachusetts Institute of Technology June 2012

More information

A guide to the Defence Trade Controls Amendment Bill 2015

A guide to the Defence Trade Controls Amendment Bill 2015 A guide to the Defence Trade Controls Amendment Bill 2015 Introduction This guide has been produced to support public consultation on the Defence Trade Controls Amendment Bill 2015 (the Amendment Bill).

More information

MAB Solut. MABSolys Génopole Campus 1 5 rue Henri Desbruères 91030 Evry Cedex. www.mabsolut.com. is involved at each stage of your project

MAB Solut. MABSolys Génopole Campus 1 5 rue Henri Desbruères 91030 Evry Cedex. www.mabsolut.com. is involved at each stage of your project Mabsolus-2015-UK:Mise en page 1 03/07/15 14:13 Page1 Services provider Department of MABSolys from conception to validation MAB Solut is involved at each stage of your project Creation of antibodies Production

More information

Research Ethics: A comprehensive strategy on how to minimize research misconduct and the potential misuse of research in EU funded research

Research Ethics: A comprehensive strategy on how to minimize research misconduct and the potential misuse of research in EU funded research Research Ethics: A comprehensive strategy on how to minimize research misconduct and the potential misuse of research in EU funded research Table of contents A. Executive Summary B. Introduction C. Role

More information

Laboratory biosecurity guidance

Laboratory biosecurity guidance WHO/CDS/EPR/2006.6 Biorisk management Laboratory biosecurity guidance September 2006 EPIDEMIC AND PANDEMIC ALERT AND RESPONSE Biorisk management Laboratory biosecurity guidance September 2006 World Health

More information

Statement of ethical principles for biotechnology in Victoria

Statement of ethical principles for biotechnology in Victoria Statement of ethical principles for biotechnology in Victoria Statement of ethical principles for biotechnology in Victoria Acknowledgments Published by the Public Health Group, Rural & Regional Health

More information

On ne peut commander la nature qu en lui obéissant. One can order the nature while obeying to it. Pr Mamadou GUEYE

On ne peut commander la nature qu en lui obéissant. One can order the nature while obeying to it. Pr Mamadou GUEYE Pr Mamadou GUEYE National Academy of Sciences & Techniques of Sénégal (ANSTS) University of Sine Saloum Kaolack BP 45253, DAKAR, Sénégal Tel : (221) 338256336 Cell : (221) 776467762 Email : Mamadou.gueye@ansts.sn

More information

www.biochemj.org/bj/330/0581/bj3300581.htm

www.biochemj.org/bj/330/0581/bj3300581.htm Ribosomes as Antibiotic Targets www.biochemj.org/bj/330/0581/bj3300581.htm Ware, Bioscience in the 21 st Century, 2009 PERSPECTIVE Widespread use of antibiotics after WWII improved human health globally

More information

Chinese Nonproliferation Policy and Export Control Practice Taibei August 28, 2013

Chinese Nonproliferation Policy and Export Control Practice Taibei August 28, 2013 Chinese Nonproliferation Policy and Export Control Practice Taibei August 28, 2013 LI Hong Vice President & Secretary General China Arms Control & Disarmament Association (CACDA) 1 China s View on Proliferation

More information

Ethics Symposium, July 23, 2013 International Union of Physiological Sciences 37 th Congress Birmingham, UK

Ethics Symposium, July 23, 2013 International Union of Physiological Sciences 37 th Congress Birmingham, UK Ethics Symposium, July 23, 2013 International Union of Physiological Sciences 37 th Congress Birmingham, UK Synthetic Biology: Scientific Progress or Ethical Dilemma? Authors: Dr. Penny Moody-Corbett,

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04

BUDGET LETTER 05-03 PEER-TO-PEER FILE SHARING 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 BUDGET LETTER SUBJECT: PEER-TO-PEER FILE SHARING REFERENCES: STATE ADMINISTRATIVE MANUAL SECTIONS 4819.2, 4840.4, 4841.1, 4841.2, EXECUTIVE ORDER S-16-04 NUMBER: 05-03 DATE ISSUED: March 7, 2005 SUPERSEDES:

More information

Global Networking of Collections WFCC and GBRCN perspectives. EMbaRC Seminar David Smith Cantacuzino Institute, Bucharest, Romania 8-9 March 2010

Global Networking of Collections WFCC and GBRCN perspectives. EMbaRC Seminar David Smith Cantacuzino Institute, Bucharest, Romania 8-9 March 2010 Global Networking of Collections WFCC and GBRCN perspectives EMbaRC Seminar David Smith Cantacuzino Institute, Bucharest, Romania 8-9 March 2010 1 Summary Challenges need collaboration Networks The WFCC

More information

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES

REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES REQUIREMENTS RESPECTING THE SECURITY OF OFFSHORE FACILITIES Definitions 1. In these requirements: C-NLOPB means the Canada-Newfoundland and Labrador Offshore Petroleum Board; Chief Safety Officer means

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

Examining Options to Enhance Common Understanding to Strengthen End Use/r Controls. A Menu of Options

Examining Options to Enhance Common Understanding to Strengthen End Use/r Controls. A Menu of Options Examining Options to Enhance Common Understanding to Strengthen End Use/r Controls A Menu of Options What this project seeks to achieve The harmonization of end use/r control systems to prevent arms diversion

More information

KEY CONCEPT Organisms can be classified based on physical similarities. binomial nomenclature

KEY CONCEPT Organisms can be classified based on physical similarities. binomial nomenclature Section 17.1: The Linnaean System of Classification Unit 9 Study Guide KEY CONCEPT Organisms can be classified based on physical similarities. VOCABULARY taxonomy taxon binomial nomenclature genus MAIN

More information

FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING

FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING FOSTERING DIALOGUE AND MUTUAL UNDERSTANDING The crucial role of young women and men in advancing intercultural dialogue and understanding is increasingly recognized within the global development agenda.

More information

Recombinant DNA and Biotechnology

Recombinant DNA and Biotechnology Recombinant DNA and Biotechnology Chapter 18 Lecture Objectives What Is Recombinant DNA? How Are New Genes Inserted into Cells? What Sources of DNA Are Used in Cloning? What Other Tools Are Used to Study

More information

THE ROLE OF PARLIAMENTARIANS IN SUPPORT OF PEACE AND SECURITY

THE ROLE OF PARLIAMENTARIANS IN SUPPORT OF PEACE AND SECURITY PGA S 37 TH ANNUAL PARLIAMENTARY FORUM THE ROLE OF PARLIAMENTARIANS IN SUPPORT OF PEACE AND SECURITY San Salvador, El Salvador 30 th November, 2015 1 st December, 2015 DRAFT PROGRAMME Day 1: The Arms Trade

More information

Anti Money Laundering Policy Deutsche Bank Group

Anti Money Laundering Policy Deutsche Bank Group Level 2 Anti Money Laundering Policy Deutsche Bank Group Table of Contents 1. Introduction... 3 2. Scope... 3 2.1. Objectives... 3 2.2. Applicability... 3 2.3. Definition of the Term Money Laundering...

More information

AP BIOLOGY 2007 SCORING GUIDELINES

AP BIOLOGY 2007 SCORING GUIDELINES AP BIOLOGY 2007 SCORING GUIDELINES Question 4 A bacterial plasmid is 100 kb in length. The plasmid DNA was digested to completion with two restriction enzymes in three separate treatments: EcoRI, HaeIII,

More information

The Arms Trade Treaty

The Arms Trade Treaty United Nations The Arms Trade Treaty Preamble The States Parties to this Treaty, Guided by the purposes and principles of the Charter of the United Nations, Recalling Article 26 of the Charter of the United

More information

Research Data Ownership, Retention, Access, and Security

Research Data Ownership, Retention, Access, and Security , Access, and Security Policy Type: Administrative Responsible Office: VCU Office of Research and Innovation Initial Policy Approved: 05/15/09 Current Revision Approved: 11/05/2015 Policy Statement and

More information

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY

A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY APPENDIX A A COMPREHENSIVE INTER-AMERICAN CYBERSECURITY STRATEGY: A MULTIDIMENSIONAL AND MULTIDISCIPLINARY APPROACH TO CREATING A CULTURE OF CYBERSECURITY INTRODUCTION The Internet and related networks

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Bachelor of Science in Applied Bioengineering

Bachelor of Science in Applied Bioengineering Bachelor of Science in Applied Bioengineering Applied bioengineering employs scientific and engineering principles to process biological materials from biological agents for provision of goods and related

More information

Gene Synthesis & Protein Engineering News by DNA2.0 Inc. SEPTEMBER 2005

Gene Synthesis & Protein Engineering News by DNA2.0 Inc. SEPTEMBER 2005 IN THIS ISSUE My DNA2.0 Account New Tool Gene Designer Software Free and ready to use Download Meet Louise Louise Rafty, Ph.D. Technical Sales Representative DNA-2-Day Gene Synthesis Rush Order DNA-2-Day

More information

Chapter 23 Definitions of GMO/LMO and modern biotechnology. Three different definitions but the same legal interpretation?

Chapter 23 Definitions of GMO/LMO and modern biotechnology. Three different definitions but the same legal interpretation? Chapter 23 Definitions of GMO/LMO and modern biotechnology JAN HUSBY NORWEGIAN INSTITUTE OF GENE ECOLOGY (GENØK), TROMSØ, NORWAY Three different definitions but the same legal interpretation? There are

More information

. Investigators: Executive Summary

. Investigators: Executive Summary . Investigators: Using Technology to Enhance Understanding in Gateway Science Courses Center for Biotechnology Education Advanced Academic Programs Final Report February 17 th, 2014 Patrick Cummings, ScD,

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

OIE Reference Laboratory Reports Activities

OIE Reference Laboratory Reports Activities OIE Reference Laboratory Reports Activities Activities in 2013 This report has been submitted : 2014-01-23 10:22:43 Name of disease (or topic) for which you are a designated OIE Reference Laboratory: Enzootic

More information

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security

PROPOSAL 20. Resolution 130 of Marrakesh on the role of ITU in information and communication network security PROPOSAL 20 Resolution 130 of Marrakesh on the role of ITU in information and network security Submitted by the following Member States: Germany (Federal Republic of), Austria, Belarus (Republic of), Bulgaria

More information

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009

RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT. Identity Theft Prevention Program. Adopted August 3, 2009 Effective beginning August 1, 2009 RANDOLPH COUNTY EMERGENCY SERVICES & TAX DEPARTMENT Identity Theft Prevention Program Adopted August 3, 2009 Effective beginning August 1, 2009 I. PROGRAM ADOPTION The Randolph County Emergency Services

More information

CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD)

CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD) CHAPTER 1: INTRODUCTION TO RAPID APPLICATION DEVELOPMENT (RAD) 1. INTRODUCTIONS RAD refers to a development life cycle designed Compare to traditional life cycle it is Faster development with higher quality

More information

PLANT BIOSECURITY DIVISION Objectives & Goals of Training Programmes

PLANT BIOSECURITY DIVISION Objectives & Goals of Training Programmes PLANT BIOSECURITY DIVISION Objectives & Goals of Training Programmes 1. Biosecurity and Incursion Management (BIM) To create a pool of experts to identify and address the Plant biosecurity threats of concern

More information

General ethical guidelines for employees at Gjøvik University College

General ethical guidelines for employees at Gjøvik University College General ethical guidelines for employees at Gjøvik University College 1 General provisions... 1 2 Loyalty... 2 3 Transparency... 3 4 Confidence in the public service... 3 5 Ethics in the academic work...

More information

National and Transnational Security Implications of Big Data in the Life Sciences

National and Transnational Security Implications of Big Data in the Life Sciences Prepared by the American Association for the Advancement of Science in conjunction with the Federal Bureau of Investigation and the United Nations Interregional Crime and Justice Research Institute National

More information

UC Irvine Environmental Health & Safety SECTION: 2.07 INITIATOR: Campus Biosafety Officer

UC Irvine Environmental Health & Safety SECTION: 2.07 INITIATOR: Campus Biosafety Officer UC Irvine Environmental Health & Safety SECTION: 2.07 INITIATOR: Campus Biosafety Officer TITLE: Institutional Biosafety Committee REVISION DATE : 03/16/2016 1. Program Description 2. Mission, Purpose,

More information

Wellesley College Written Information Security Program

Wellesley College Written Information Security Program Wellesley College Written Information Security Program Introduction and Purpose Wellesley College developed this Written Information Security Program (the Program ) to protect Personal Information, as

More information

Towards 2017 Better Work Phase III Strategy

Towards 2017 Better Work Phase III Strategy Towards 2017 Better Work Phase III Strategy Towards 2017 Better Work Phase III Strategy Promoting Good Working Conditions Across the International Garment Industry Problem Analysis Sixty million workers

More information

Signed at London, Moscow and Washington on 10 April 1972. Entered into force on 26 March 1975. Depositaries: UK, US and Soviet governments.

Signed at London, Moscow and Washington on 10 April 1972. Entered into force on 26 March 1975. Depositaries: UK, US and Soviet governments. Convention on the Prohibition of the Development, Production and Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction Signed at London, Moscow and Washington on 10 April

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information

International Consortium for Harmonization of Clinical Laboratory Results. Operating Procedures

International Consortium for Harmonization of Clinical Laboratory Results. Operating Procedures International Consortium for Harmonization of Clinical Laboratory Results Operating Procedures Approved: February 11, 2014 Background Results from clinical laboratory measurement procedures should be comparable

More information

OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE CREATE COMPETITIVE ADVANTAGE A PLATFORM FOR INNOVATION

OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE CREATE COMPETITIVE ADVANTAGE A PLATFORM FOR INNOVATION National Standardization Strategic Framework OPEN INTERNATIONAL MARKETS INCREASE MARKET CONFIDENCE A PLATFORM FOR INNOVATION CREATE COMPETITIVE ADVANTAGE Foreword Standards influence everything we do.

More information

GENEVA STANDING COMMITTEE ON THE LAW OF PATENTS. Fourteenth Session Geneva, January 25 to 29, 2010 PROPOSAL FROM BRAZIL *

GENEVA STANDING COMMITTEE ON THE LAW OF PATENTS. Fourteenth Session Geneva, January 25 to 29, 2010 PROPOSAL FROM BRAZIL * WIPO SCP/14/7. ORIGINAL: English DATE: January 20, 2010 E WORLD INTELLECTUAL PROPERT Y O RGANI ZATION GENEVA STANDING COMMITTEE ON THE LAW OF PATENTS Fourteenth Session Geneva, January 25 to 29, 2010 PROPOSAL

More information

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11

Delphi Information 3 rd Party Security Requirements Summary. Classified: Public 5/17/2012. Page 1 of 11 Delphi Information 3 rd Party Security Requirements Summary Classified: Public 5/17/2012 Page 1 of 11 Contents Introduction... 3 Summary for All Users... 4 Vendor Assessment Considerations... 7 Page 2

More information

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE

TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE GENERAL STATEMENT TONBRIDGE & MALLING BOROUGH COUNCIL INTERNET & EMAIL POLICY AND CODE 1.1 The Council recognises the increasing importance of the Internet and email, offering opportunities for improving

More information

UF EDGE brings the classroom to you with online, worldwide course delivery!

UF EDGE brings the classroom to you with online, worldwide course delivery! What is the University of Florida EDGE Program? EDGE enables engineering professional, military members, and students worldwide to participate in courses, certificates, and degree programs from the UF

More information

FUTURE DIRECTIONS IN THE ETHICAL CONDUCT OF HEALTH RESEARCH IN CEE&NIS. Varban Ganev Medical University of Sofia, Bulgaria

FUTURE DIRECTIONS IN THE ETHICAL CONDUCT OF HEALTH RESEARCH IN CEE&NIS. Varban Ganev Medical University of Sofia, Bulgaria FUTURE DIRECTIONS IN THE ETHICAL CONDUCT OF HEALTH RESEARCH IN CEE&NIS Varban Ganev Medical University of Sofia, Bulgaria CURRENT MAJOR BIOETHICAL ISSUES: ORGAN TRANSPLANT AND BIOETHICS ABORTION AND BIOETHICS

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Standing Committee on Copyright and Related Rights

Standing Committee on Copyright and Related Rights E SCCR/24/5 ORIGINAL: ENGLISH DATE: JULY 2, 2012 Standing Committee on Copyright and Related Rights Twenty-fourth Session Geneva, July 16 to 25, 2012 DRAFT TREATY ON THE PROTECTION OF BROADCASTING ORGANIZATIONS

More information

CHAPTER 5 STAKEHOLDERS: THEIR INTERESTS, CONCERNS, AND RESPONSIBILITIES

CHAPTER 5 STAKEHOLDERS: THEIR INTERESTS, CONCERNS, AND RESPONSIBILITIES CHAPTER 5 STAKEHOLDERS: THEIR INTERESTS, CONCERNS, AND RESPONSIBILITIES Key Points: Each worker study involves multiple stakeholders in addition to the researcher and worker. Stakeholders interests in

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

Modeling DNA Replication and Protein Synthesis

Modeling DNA Replication and Protein Synthesis Skills Practice Lab Modeling DNA Replication and Protein Synthesis OBJECTIVES Construct and analyze a model of DNA. Use a model to simulate the process of replication. Use a model to simulate the process

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

WORLD MEDICAL ASSOCIATION DECLARATION OF HELSINKI Ethical Principles for Medical Research Involving Human Subjects

WORLD MEDICAL ASSOCIATION DECLARATION OF HELSINKI Ethical Principles for Medical Research Involving Human Subjects WORLD MEDICAL ASSOCIATION DECLARATION OF HELSINKI Ethical Principles for Medical Research Involving Human Subjects Adopted by the 18th WMA General Assembly, Helsinki, Finland, June 1964, and amended by

More information

II-105 Acceptable Use of Information Resources

II-105 Acceptable Use of Information Resources Children's Hospital Medical Center Online Policies II-105 Acceptable Use of Information Resources Original Date: 4/20/2005 Last Review Date: 5/12/2008 Purpose Users must not misuse corporate systems in

More information

Security Policies and Procedures

Security Policies and Procedures Security Policies and Procedures April 26, 2012 Kristen Whelan Transportation Consultant kwhelan@libertyint.com www.libertyint.com Customs-Trade Partnership Against Terrorism What is C-TPAT? CBP and Industry

More information

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D.

The 7 Foundational Principles. Implementation and Mapping of Fair Information Practices. Ann Cavoukian, Ph.D. Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices Ann Cavoukian, Ph.D. Information & Privacy Commissioner Ontario, Canada Purpose: This document provides

More information

Appendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT

Appendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT Appendix 15 CORPORATE GOVERNANCE CODE AND CORPORATE GOVERNANCE REPORT The Code This Code sets out the principles of good corporate governance, and two levels of recommendations: code provisions; and recommended

More information

13.2 Ribosomes & Protein Synthesis

13.2 Ribosomes & Protein Synthesis 13.2 Ribosomes & Protein Synthesis Introduction: *A specific sequence of bases in DNA carries the directions for forming a polypeptide, a chain of amino acids (there are 20 different types of amino acid).

More information

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central

More information

Canadian Public Health Laboratory Network. Core Functions of Canadian Public Health Laboratories

Canadian Public Health Laboratory Network. Core Functions of Canadian Public Health Laboratories Canadian Public Health Laboratory Network Core Functions of Canadian Public Health Laboratories Canadian Public Health Laboratory Network The CPHLN Core Functions of Canadian Public Health Laboratories

More information

International CEMarin Omics Workshop: Omics Techniques for the Study of Marine Organisms and Ecosystems

International CEMarin Omics Workshop: Omics Techniques for the Study of Marine Organisms and Ecosystems International CEMarin Omics Workshop: Omics Techniques for the Study of Marine Organisms and Ecosystems Genomics, proteomics and metabolomics, used alone, in combination with each other and/or with more

More information

SEOUL DECLARATION GLOBAL HEALTH SECURITY AGENDA 2015 HIGH-LEVEL MEETING IN SEOUL

SEOUL DECLARATION GLOBAL HEALTH SECURITY AGENDA 2015 HIGH-LEVEL MEETING IN SEOUL SEOUL DECLARATION GLOBAL HEALTH SECURITY AGENDA 2015 HIGH-LEVEL MEETING IN SEOUL We, the ministers gathered on September 9, 2015, at the Global Health Security Agenda (GHSA) High-Level Meeting in Seoul,

More information

ISPM No. 11 PEST RISK ANALYSIS FOR QUARANTINE PESTS INCLUDING ANALYSIS OF ENVIRONMENTAL RISKS AND LIVING MODIFIED ORGANISMS (2004)

ISPM No. 11 PEST RISK ANALYSIS FOR QUARANTINE PESTS INCLUDING ANALYSIS OF ENVIRONMENTAL RISKS AND LIVING MODIFIED ORGANISMS (2004) ISPM No. 11 INTERNATIONAL STANDARDS FOR PHYTOSANITARY MEASURES ISPM No. 11 PEST RISK ANALYSIS FOR QUARANTINE PESTS INCLUDING ANALYSIS OF ENVIRONMENTAL RISKS AND LIVING MODIFIED ORGANISMS (2004) Produced

More information

Purchase College Information Security Program Charter January 2008

Purchase College Information Security Program Charter January 2008 January 2008 Introduction When an organization implements an information security program, it raises the question of what is to be written, and how much is sufficient. SUNY Information Security Initiative

More information

DRAFT RECOMMENDATION CONCERNING THE PRESERVATION OF, AND ACCESS TO, DOCUMENTARY HERITAGE INCLUDING IN DIGITAL FORM OUTLINE

DRAFT RECOMMENDATION CONCERNING THE PRESERVATION OF, AND ACCESS TO, DOCUMENTARY HERITAGE INCLUDING IN DIGITAL FORM OUTLINE 38th Session, Paris, 2015 38 C 38 C/24 30 July 2015 Original: English Item 6.1 of the provisional agenda DRAFT RECOMMENDATION CONCERNING THE PRESERVATION OF, AND ACCESS TO, DOCUMENTARY HERITAGE INCLUDING

More information

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement.

Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement. Securing Information in an Outsourcing Environment (Guidance for Critical Infrastructure Providers) Executive Overview Supplement June 2011 DISCLAIMER: This document is intended as a general guide only.

More information

Identification of a problem, e.g., an outbreak Surveilance Intervention Effect

Identification of a problem, e.g., an outbreak Surveilance Intervention Effect EPIDEMIOLOGY EPIDEMIOLOGY Epidemiology is a cornerstone of the control of infectious diseases. Statens Serum Institut s epidemiological activities cover a wide field, from surveillance of diseases and

More information

RECOMMENDATION CONCERNING THE PROTECTION AND PROMOTION OF MUSEUMS AND COLLECTIONS, THEIR DIVERSITY AND THEIR ROLE IN SOCIETY

RECOMMENDATION CONCERNING THE PROTECTION AND PROMOTION OF MUSEUMS AND COLLECTIONS, THEIR DIVERSITY AND THEIR ROLE IN SOCIETY RECOMMENDATION CONCERNING THE PROTECTION AND PROMOTION OF MUSEUMS AND COLLECTIONS, THEIR DIVERSITY AND THEIR ROLE IN SOCIETY Paris, 20 November 2015 UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL

More information