Team:Freiburg Bioware/Safety
From 2010.igem.org
Line 1: | Line 1: | ||
- | {{:Team:Freiburg_Bioware/Head}} | + | {{:Team:Freiburg_Bioware/Head}} |
{{:Team:Freiburg_Bioware/jquery}} | {{:Team:Freiburg_Bioware/jquery}} | ||
{{:Team:Freiburg_Bioware/menu_home}} | {{:Team:Freiburg_Bioware/menu_home}} | ||
<html> | <html> | ||
+ | |||
<br> | <br> | ||
- | + | </div> | |
- | <h1>Biosafety</h1> | + | <h1 style="text-align: justify;">Biosafety</h1> |
- | <p>Definition: "biosafety measures aim to prevent the unintentional | + | <p style="text-align: justify;">Definition: "biosafety measures aim to |
- | exposure to pathogens and toxins, or their accidental release" | + | prevent the unintentional |
- | <a href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf"><sup>1</sup></a> | + | exposure to pathogens and toxins, or their accidental release" <a |
+ | href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf"><sup>1</sup></a> | ||
</p> | </p> | ||
- | + | <h2 style="text-align: justify;">Risk assessment for our | |
- | <h2>Risk assessment for our Adeno-associated virus based system</h2> | + | Adeno-associated virus based system</h2> |
- | <p> | + | <p style="text-align: justify;">In Germany the "Central Commission for |
- | In Germany the "Central Commission for Biological Security" (ZKBS) released three legally binding Risk | + | Biological Security" (ZKBS) released three legally binding Risk |
- | Assessment satements for the Adeno-associated Virus | + | Assessment satements for the Adeno-associated Virus <sup>26,</sup> |
- | + | <sup>27,</sup> | |
- | + | <sup>28</sup>. | |
- | + | Risk assessment in other countries may deviate from these decisions, so | |
- | Risk assessment in other countries may deviate from these decisions, so please inform yourself about the legal regulations on AAV | + | please inform yourself about the legal regulations on AAV |
in your country before using the Virus Construction Kit.<br> | in your country before using the Virus Construction Kit.<br> | ||
</p> | </p> | ||
- | + | <div style="text-align: justify;">In Germany the Biological Safety | |
- | + | Level(BSL) classifications for AAVs are: | |
- | In Germany the Biological Safety Level(BSL) classifications for AAVs are: | + | </div> |
- | <ul> | + | <ul style="text-align: justify;"> |
- | + | <li>Adeno-associated Virus 2, 3 and 5 have to be handled under BSL 1.</li> | |
- | + | <li>Adeno-associated Viurs 1, 4, 5, 7, 8, 9, 10 and 11 have to be | |
- | + | handled under BSL 2.</li> | |
- | + | ||
</ul> | </ul> | ||
- | + | <p style="text-align: justify;">This classification was developed based | |
- | <p>This classification was developed based on the fact that only | + | on the fact that only serotypes 2, 3 and 5 are isolated from humans and |
- | + | that their harmlessness has been confirmed in clinical studies. This | |
- | + | general classification has to be rechecked when the virus contains gene | |
sequences with a transforming protential. | sequences with a transforming protential. | ||
</p> | </p> | ||
- | + | <p style="text-align: justify;"><b>Viral vectors systems</b> packaging | |
- | + | a vector plasmid that only contains the | |
- | <p><b>Viral vectors systems</b> packaging a vector plasmid that only contains the | + | |
viral Inverted Terminal Repeats (ITRs) and providing the genes for | viral Inverted Terminal Repeats (ITRs) and providing the genes for | ||
- | Rep and Cap in trans (as it is the case for our system) are classified as <b>BSL 1</b> if the following conditions are fullfilled: | + | Rep and Cap in trans (as it is the case for our system) are classified |
- | <ul> | + | as <b>BSL 1</b> if the following conditions are fullfilled: </p> |
- | + | <ul style="text-align: justify;"> | |
- | + | <li>The viral particles do not contain AAV derived sequences other | |
+ | than the ITRs</li> | ||
+ | <li>The viral particles do not contain Nucleotidesequences with a | ||
+ | risk potential</li> | ||
</ul> | </ul> | ||
- | + | <p style="text-align: justify;">We also investigated the legal | |
- | + | regulations for AAV-2 Viral Vector | |
- | <p>We also investigated the legal regulations for AAV-2 Viral Vector | + | |
systems in the United States. The guidelines of the National Institutes | systems in the United States. The guidelines of the National Institutes | ||
- | of Health (NIH) classify in the | + | of Health (NIH) classify in the <a |
- | <a href="http://oba.od.nih.gov/oba/rac/guidelines_02/Appendix_B.htm">Appendix B</a><sup>32</sup> AAV-2 | + | href="http://oba.od.nih.gov/oba/rac/guidelines_02/Appendix_B.htm">Appendix |
- | Vector Systems as Risk Group 1 (RG1) agents that can be treated under BSL 1. In | + | B</a><sup>32</sup> AAV-2 Vector Systems as Risk Group 1 (RG1) agents |
- | detail the appendix states "... adeno- associated virus (AAV) types 1 | + | that can be treated under BSL 1. In detail the appendix states "... |
- | through 4; and recombinant AAV constructs, in which the transgene does not | + | adeno- associated virus (AAV) types 1 through 4; and recombinant AAV |
- | encode either a potentially tumorigenic gene product or a toxin molecule and are | + | constructs, in which the transgene does not encode either a potentially |
- | produced in the absence of a helper virus." | + | tumorigenic gene product or a toxin molecule and are produced in the |
+ | absence of a helper virus." | ||
</p> | </p> | ||
- | + | <div style="text-align: justify;">Other general observations with the | |
- | Other general observations with the Adeno-associated Virus 2 AAV-2)are: | + | Adeno-associated Virus 2 AAV-2)are: </div> |
- | <ul> | + | <ul style="text-align: justify;"> |
- | + | <li>In clinical studies the viral vectors were not dilivered to the | |
- | + | gonades. </li> | |
- | + | <li>Vector sequences were not detectable in the patients blood or | |
- | + | urine at an examination 48 h after an infection with AAV-2 <sup>29</sup>. | |
- | + | </li> | |
- | + | <li>In absence of Rep proteins, the vector DNA stays extrachromosomal | |
- | + | and is not frequently integrated.</li> | |
- | <p> | + | </ul> |
- | Concluding all these informations and regulations, the project that we have designed in this year | + | <p style="text-align: justify;"> Concluding all these informations and |
- | + | regulations, the project that we have designed in this year is clearly | |
- | + | classified as BLS 1. | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
</p> | </p> | ||
- | <div style=" | + | <div style="text-align: justify;"> </div> |
- | + | <h2 style="text-align: justify;">General biosafety regulation in Germany</h2> | |
- | + | <table | |
+ | style="text-align: left; width: 90%; margin-left: 0px; margin-right: 0px;" | ||
+ | border="0" cellpadding="2" cellspacing="2"> | ||
+ | <tbody> | ||
+ | <tr> | ||
+ | <td style="vertical-align: top;"> | ||
+ | <p><img | ||
+ | src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" | ||
+ | height="auto" width="150"></p> | ||
+ | </td> | ||
+ | <td style="vertical-align: middle;"><span | ||
+ | style="color: darkgreen;"><b>Which specific biosafety rules or | ||
+ | guidelines do you have to consider in your country?</b></span></td> | ||
+ | </tr> | ||
+ | </tbody> | ||
+ | </table> | ||
+ | <div style="text-align: justify;"> | ||
</div> | </div> | ||
- | < | + | <div |
- | + | style="margin: 0px 5px; width: 700px; float: right; height: auto; text-align: justify;"><span | |
- | < | + | style="color: darkgreen;"> </span></div> |
- | + | <div style="text-align: justify;"> | |
- | <p> | + | </div> |
- | In Germany all work that includes recombinant DNA technologies is | + | <p style="text-align: justify;">In Germany all work that includes |
+ | recombinant DNA technologies is | ||
regulated by the <a href="http://bundesrecht.juris.de/gentg/index.html">Gesetz | regulated by the <a href="http://bundesrecht.juris.de/gentg/index.html">Gesetz | ||
zur Regelung der Gentechnik</a>. This law regulates general | zur Regelung der Gentechnik</a>. This law regulates general | ||
aspects in the life sciences and refers for more precise | aspects in the life sciences and refers for more precise | ||
- | interpretations in §4 to the <a href="http://bundesrecht.juris.de/gentg/__4.html">Zentrale | + | interpretations in §4 to the <a |
+ | href="http://bundesrecht.juris.de/gentg/__4.html">Zentrale | ||
Kommission für die Biologische Sicherheit</a>. The ZKBS is a | Kommission für die Biologische Sicherheit</a>. The ZKBS is a | ||
commission composed of 20 technical experts that releases yearly | commission composed of 20 technical experts that releases yearly | ||
Line 97: | Line 112: | ||
three stratements affecting the work with Adeno-associated viral | three stratements affecting the work with Adeno-associated viral | ||
systems | systems | ||
- | <a href="https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf"><sup>26,</sup></a> | + | <a |
- | <a href="https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf"><sup>27,</sup></a> | + | href="https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf"><sup>26,</sup></a> |
- | <a href="https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf"><sup>28</sup></a>. | + | <a |
+ | href="https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf"><sup>27,</sup></a> | ||
+ | <a | ||
+ | href="https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf"><sup>28</sup></a>. | ||
These documents were used to assess the dangers that could arise from | These documents were used to assess the dangers that could arise from | ||
our project to team members and the enviroment. | our project to team members and the enviroment. | ||
</p> | </p> | ||
- | + | <table | |
- | + | style="text-align: left; width: 90%; margin-left: 0px; margin-right: 0px;" | |
- | <img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png | + | border="0" cellpadding="2" cellspacing="2"> |
- | height="auto"/> | + | <tbody> |
- | < | + | <tr> |
- | <span style="color:DarkGreen"><b>Is there a local biosafety group, committee, or review board at your institution? If yes, what does your local biosafety group think about your project?</b></span></div> | + | <td style="vertical-align: top; width: 209px;"><img |
- | < | + | src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" |
- | At the Albert-Ludwigs-University Freiburg for all concerns of security the <a href=http://www.sicherheit.uni-freiburg.de>Stabsstelle Sicherheit</a> is responsible and to contact if questions arise. Especially for questions of biological security Dr. Petra Markmeyer-Pieles is cognizant. We contacted her a first time befor the begin of our project in March when it was clear that the Adeno-associated Virus (AAV-2) was chosen as the topic of our project. At that time she proposed to do the cloning in the AAV-2 that is for sure to handle under biological security level 1 and to prepare everything for work under biological security level 2 to satisfy the precaution principle. | + | height="auto" width="150"></td> |
- | The precaution principle was realized and all viral vectors that contained a modified capsid were handled under SII conditions until proven harmless. | + | <td style="vertical-align: middle; width: 778px;"><span |
- | In August the planing of the project was completed, summarized in an <a href=https://static.igem.org/mediawiki/2010/7/76/Freiburg10_Safetyapplication.pdf>Biosafety application<sup>30</sup></a> and handed to the department for biological security who approve the application in an <a href=https://static.igem.org/mediawiki/2010/1/18/Freiburg10_Safetyconfirmation.jpg>official BSL1 confirmation<sup>31</sup></a>official BSL1 confirmation for our project.</p>< | + | style="color: DarkGreen;"><b>Is there a local biosafety group, |
- | + | committee, or review board at your institution? If yes, what does your | |
- | + | local biosafety group think about your project?</b></span></td> | |
+ | </tr> | ||
+ | </tbody> | ||
+ | </table> | ||
+ | <div | ||
+ | style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;"><span | ||
+ | style="color: DarkGreen;"></span></div> | ||
+ | <p style="text-align: justify;">At the Albert-Ludwigs-University | ||
+ | Freiburg for all concerns of security the <a | ||
+ | href="http://www.sicherheit.uni-freiburg.de">Stabsstelle Sicherheit</a> | ||
+ | is responsible and to contact if questions arise. Especially for | ||
+ | questions of biological security Dr. Petra Markmeyer-Pieles is | ||
+ | cognizant. We contacted her a first time befor the begin of our project | ||
+ | in March when it was clear that the Adeno-associated Virus (AAV-2) was | ||
+ | chosen as the topic of our project. At that time she proposed to do the | ||
+ | cloning in the AAV-2 that is for sure to handle under biological | ||
+ | security level 1 and to prepare everything for work under biological | ||
+ | security level 2 to satisfy the precaution principle. | ||
+ | The precaution principle was realized and all viral vectors that | ||
+ | contained a modified capsid were handled under SII conditions until | ||
+ | proven harmless. | ||
+ | In August the planing of the project was completed, summarized in an <a | ||
+ | href="https://static.igem.org/mediawiki/2010/7/76/Freiburg10_Safetyapplication.pdf">Biosafety | ||
+ | application<sup>30</sup></a> and handed to the department for | ||
+ | biological security who approve the application in an <a | ||
+ | href="https://static.igem.org/mediawiki/2010/1/18/Freiburg10_Safetyconfirmation.jpg">official | ||
+ | BSL1 confirmation<sup>31</sup></a>official BSL1 confirmation for our | ||
+ | project.</p> | ||
+ | <p style="text-align: justify;"><br> | ||
+ | </p> | ||
<h2>Risk management</h2> | <h2>Risk management</h2> | ||
- | <img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" width="150" | + | <table style="text-align: left; width: 90%;" border="0" cellpadding="2" |
- | + | cellspacing="2"> | |
- | <div style="float:right; width:700px; height:auto | + | <tbody> |
- | <span style="color:DarkGreen">< | + | <tr> |
+ | <td style="vertical-align: top; text-align: justify;"><img | ||
+ | src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" | ||
+ | height="auto" width="150"></td> | ||
+ | <td style="vertical-align: middle; text-align: justify;"><span | ||
+ | style="color: DarkGreen;"><b>Would any of your project ideas raise | ||
+ | safety issues in terms of: researcher safety, public safety, or | ||
+ | environmental safety?</b></span></td> | ||
+ | </tr> | ||
+ | </tbody> | ||
+ | </table> | ||
+ | <div | ||
+ | style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;"> | ||
+ | <span style="color: DarkGreen;"></span></div> | ||
+ | <p style="text-align: justify;"> | ||
+ | Our project was designed in a way that it avoids any serious safety | ||
+ | issues as far as possible. | ||
+ | When working with infectious particles a minimal risk for the | ||
+ | researcher is allways present. This risk was minimized by restricting | ||
+ | the transduced genes to fluorescent proteins and prodrug convertases | ||
+ | that are already proven not to harm human cells in the absece of the | ||
+ | corresponding prodrug. A potential danger for the public or the | ||
+ | environment was minimized as much as possible by following strictly the | ||
+ | rules of Good Laboratory Practice (GLP) and the abdication of using | ||
+ | randomized insertions in the capsid and of replication potent viruses. | ||
+ | Minimizing the risk for team members and the society was was allways | ||
+ | one of the major concerns, especially because worries about | ||
+ | undergraduate students manipulating a virus could arise. | ||
+ | The security concept will be explained by quoting and explaining the | ||
+ | six guiding principles for safe manipulation of Gene Manipulated | ||
+ | Organisms (GMOs) as summarized in Kimman et al. ; 2008<a | ||
+ | href="http://www.ncbi.nlm.nih.gov/pubmed/18625678"><sup>18</sup></a>. | ||
+ | </p> | ||
+ | <li style="text-align: justify;"><b>1) Hazard recognition and | ||
+ | identification</b> | ||
+ | Risk assessment has been done and all legal regulations were considered | ||
+ | as described in the last paragraph.</li> | ||
+ | <li style="text-align: justify;"><b>2) Biological containment</b> | ||
+ | Biological containment means the usage of organisms with "reduced | ||
+ | replicative capacity, inefectivity , transmissibility, and | ||
+ | virulence"18. | ||
+ | For our project only replicative deficient viruses were used, | ||
+ | additional all modifications aimed to have a specific targeting of the | ||
+ | resulting viral vectors for a specific cell type. This gain in | ||
+ | specificity requires it to cut off the braod natural tropism resulting | ||
+ | is an less infective virus copared to the wild type virus.</li> | ||
+ | <li style="text-align: justify;"><b>3) Concentration and enclosure</b> | ||
+ | All working steps for the preparation of viral vectors were carried out | ||
+ | in a BSL II laboratory and within this laboratory work with the AAV was | ||
+ | restricted to a separate Laminar flow cabinet type II. Cell culture and | ||
+ | storage of the virus was also done in separate Freezers and incubators. | ||
+ | All laboratories and epipment that contained viral vectors were | ||
+ | specially marked, for example with a Biohazard warning signs.</li> | ||
+ | <li style="text-align: justify;"><b>4) Exposure minimization</b> | ||
+ | This aspect of the guiding principles can be sumarized under "operator | ||
+ | protection"18. The Exposure minimization was achieved in our laboratory | ||
+ | by wearing special labcoats for the SII laboratory and gloves that were | ||
+ | desinfected and changed regualrely. During manipulation of viral | ||
+ | vectors attention was payed to avoid droplets and especially aerosoles. | ||
+ | A possible diversion of the viral vectors was avoided by cleaning all | ||
+ | equipment when inserted or removed from the Laminar flow cabinet and | ||
+ | after completion of the work task.</li> | ||
+ | <li style="text-align: justify;"><b>5) Physical containment</b> | ||
+ | The requirements for the physical containment were fullfilled by | ||
+ | performing all manipulation on the AAV in an BSL II laboratory that | ||
+ | guaranted a restriction of persons that entered the laboratory.</li> | ||
+ | <li style="text-align: justify;"><b>6) Hazard minimization</b> | ||
+ | For the AAV-2 there are no sugestive activitis because the possible | ||
+ | danger that runs out of the AAV is comparably low, vaccination is not | ||
+ | avilible and biomonitoring is not necessary.</li> | ||
+ | <br> | ||
+ | <table style="text-align: left; width: 90%;" border="0" cellpadding="2" | ||
+ | cellspacing="2"> | ||
+ | <tbody> | ||
+ | <tr> | ||
+ | <td style="vertical-align: top;"><img | ||
+ | src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" | ||
+ | height="auto" width="150"></td> | ||
+ | <td style="vertical-align: middle;"><span | ||
+ | style="color: DarkGreen;"><b>Do any of the new BioBrick parts (or | ||
+ | devices) that you made this year raise any safety issues? If yes, did | ||
+ | you document these issues in the Registry? How did you manage to handle | ||
+ | the safety issue? How could other teams learn from your experience?</b></span></td> | ||
+ | </tr> | ||
+ | </tbody> | ||
+ | </table> | ||
+ | <br> | ||
+ | <div | ||
+ | style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;"> | ||
+ | <span style="color: DarkGreen;"></span></div> | ||
<p> | <p> | ||
- | + | </p> | |
- | + | <table style="text-align: left; width: 90%;" border="0" cellpadding="2" | |
- | + | cellspacing="2"> | |
- | + | <tbody> | |
- | + | <tr> | |
- | < | + | <td style="vertical-align: top; text-align: justify;">Several |
- | + | composite parts that were assembled by our Team | |
- | + | this year are alone capable of producing infectious viral particles | |
- | + | when transduced together with a vector plasmid and a helper plasmid | |
- | + | into <a | |
- | + | href="https://static.igem.org/mediawiki/2010/e/e0/Freiburg10_AAv293_cell_line.pdf">AAV-293</a> | |
- | + | cells. These special cells provide the adenoviral gene E1 stabily | |
- | + | integrated in trans. | |
- | + | These cells are not provided in the Virus Construction Kit nor | |
- | < | + | availible in the Parts Registry and have to purchased from other |
- | + | laboratories or a commercial supplyer. | |
- | + | For this | |
- | + | <p></p> | |
- | + | reason we estimate the risk of a accidental transformation of <a | |
- | + | href="https://static.igem.org/mediawiki/2010/e/e0/Freiburg10_AAv293_cell_line.pdf">AAV-293</a> | |
- | height="auto" | + | cells with all three plasmids for negligible. |
- | + | Nevertheless we considered it useful to mark every BioBrick or | |
- | < | + | Composite Part in the Registry that contributes to the production or is |
+ | capable of producing viral vectors when transformed under the | ||
+ | previously mentioned conditions.</td> | ||
+ | <td style="vertical-align: top;"> | ||
+ | <p><img margin:="" 0px="" 5px="" | ||
+ | src="https://static.igem.org/mediawiki/2010/1/1e/Freiburg10_Warning_SignI.png" | ||
+ | alt="Warning sign for part descriptions" align="right" height="auto" | ||
+ | width="300"></p> | ||
+ | </td> | ||
+ | </tr> | ||
+ | </tbody> | ||
+ | </table> | ||
+ | <p></p> | ||
<p> | <p> | ||
- | < | + | </p> |
- | + | <br> | |
- | + | <table style="text-align: left; width: 90%;" border="0" cellpadding="2" | |
- | + | cellspacing="2"> | |
- | + | <tbody> | |
- | + | <tr> | |
- | + | <td style="vertical-align: top;"><img | |
- | + | src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" | |
- | + | height="auto" width="150"></td> | |
- | + | <td style="vertical-align: middle;"><span | |
- | height="auto"/> | + | style="color: DarkGreen;"><b>Contribute to community discussions |
- | < | + | on what needs to go into a code against the use of our science for |
- | <span style="color:DarkGreen"><b>Contribute to community discussions on what needs to go into a code against the use of our science for hostile purposes (see A Community Response)</b></span></div> | + | hostile purposes (see A Community Response)</b></span></td> |
+ | </tr> | ||
+ | </tbody> | ||
+ | </table> | ||
+ | <br> | ||
+ | <div | ||
+ | style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;"> | ||
+ | <span style="color: DarkGreen;"></span></div> | ||
<p> | <p> | ||
+ | </p> | ||
<li>Public Perception | <li>Public Perception | ||
+ | </li> | ||
<li>importance of maintaining public legitimacy and support</li> | <li>importance of maintaining public legitimacy and support</li> | ||
<li>apllications should demonstrate clear social benefits</li> | <li>apllications should demonstrate clear social benefits</li> | ||
<li>not overhyped - anxiety and unrealistic hopes</li> | <li>not overhyped - anxiety and unrealistic hopes</li> | ||
- | + | <blockquote>psychological research into the concept of "identity-driven | |
- | <blockquote>psychological research into the concept of "identity-driven decision-making" (Torpman,2004)<a href=http://www.ncbi.nlm.nih.gov/pubmed/16819452> <sup>19</sup></a></blockquote> | + | decision-making" (Torpman,2004)<a |
- | + | href="http://www.ncbi.nlm.nih.gov/pubmed/16819452"> <sup>19</sup></a></blockquote> | |
- | <blockquote>Every grout has a set of norms: a code of conduct about what is acceptable beahviour (Jaques, 2004]<a href=http://www.ncbi.nlm.nih.gov/pubmed/16819452> <sup>19</sup></a></blockquote> | + | <blockquote>Every grout has a set of norms: a code of conduct about |
- | + | what is acceptable beahviour (Jaques, 2004]<a | |
- | + | href="http://www.ncbi.nlm.nih.gov/pubmed/16819452"> <sup>19</sup></a></blockquote> | |
- | + | <br> | |
- | + | <br> | |
- | + | <center> | |
- | + | <h2>Trade-off between potential misuse and promising medical progress</h2> | |
- | + | <br> | |
- | + | <table style="text-align: left; width: 90%;" border="0" cellpadding="2" | |
- | + | cellspacing="2"> | |
- | + | <tbody> | |
- | + | <tr> | |
- | <center><h2>Trade-off between potential misuse and promising medical progress</h2>< | + | <td style="vertical-align: top; text-align: left;"><img |
- | <img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png | + | src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" |
- | height="auto"/> | + | height="auto" width="150"></td> |
- | < | + | <td style="vertical-align: middle;"><span |
- | <span style="color:DarkGreen"><b>Do you have any other ideas how to deal with safety issues that could be useful for future iGEM competitions? How could parts, devices and systems be made even safer through biosafety engineering?</b> </span></div> | + | style="color: DarkGreen;"><b>Do you have any other ideas how to |
+ | deal with safety issues that could be useful for future iGEM | ||
+ | competitions? How could parts, devices and systems be made even safer | ||
+ | through biosafety engineering?</b></span></td> | ||
+ | </tr> | ||
+ | </tbody> | ||
+ | </table> | ||
+ | <br> | ||
+ | </center> | ||
+ | <div | ||
+ | style="margin: 0px 5px; float: right; width: 700px; height: auto; text-align: justify;"> | ||
+ | <span style="color: DarkGreen;"> </span></div> | ||
<p> | <p> | ||
- | In principle each research-project that bears any risks for engaged researchers, mankind or the environment should be treated under the precautionary principle as proposed <a href=http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf><sup>11</sup></a>: "treat synthetic microorganisms as dangerous until proven harmless".<br> | + | In principle each research-project that bears any risks for engaged |
- | This would mean to work on such synthetic DNA containing Bio Bricks at least under Biological security levels two.<br> | + | researchers, mankind or the environment should be treated under the |
- | Additional to this secure working environment the system itself can be optimized according to biosafety aspects, means to reduce it's viability outside the laboratory. This aim can be approached by reducing the systems ability to evolve, proliferate and interact with it's environment. A common method to achieve this goal is to engineer microorganisms in a way that they depend on nutrients that can't be found in the environment in sufficient amount. | + | precautionary principle as proposed <a |
- | + | href="http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf"><sup>11</sup></a>: | |
- | </p><br><br> | + | "treat synthetic microorganisms as dangerous until proven harmless".<br> |
- | + | This would mean to work on such synthetic DNA containing Bio Bricks at | |
- | + | least under Biological security levels two.<br> | |
- | <center><h1>Biosecurity</h1></center> | + | Additional to this secure working environment the system itself can be |
- | Def: "measures focus on the prevention of theft, misuse , or intentional relese of pathogens and toxins" <a href=http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf><sup>1</sup></a><br> | + | optimized according to biosafety aspects, means to reduce it's |
- | + | viability outside the laboratory. This aim can be approached by | |
- | + | reducing the systems ability to evolve, proliferate and interact with | |
- | <center><h2>The malignant use of biological agents in history</h2></center> | + | it's environment. A common method to achieve this goal is to engineer |
- | <p>The misuse of biological agent as weapons in warfare is a fear spreading companion in the history of mankind, ranging from the well-poisoners in prehistoric times to bio-terrorists present days. The following brakt intends to give a short outline of the major events<a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408><sup>22</sup></a>: | + | microorganisms in a way that they depend on nutrients that can't be |
- | + | found in the environment in sufficient amount. | |
- | <li> First systhematic use of chemical weapons during the first world war</li> | + | </p> |
- | <li> The 1918 flu pandemic lasted from March 1918 to June 1920 and killed approximately 50 Million people around the world. Rumors circulated that this pandemic is caused by the other combatant nation.</li> | + | <br> |
- | <li> "Prohibion of the Use of Asphyxiating, Poisonous or other Gases and of Bacteriological Methods of Warfare" was signed on 19 June 1925<a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408><sup>22</sup></a></li> | + | <br> |
- | <li> Several combatant nations of the second world war established biological warfare programs. </li> | + | <center> |
- | <li> The range of the Japanese biological warfare program lead several nations to expand their own biological warfare program.</li> | + | <h1>Biosecurity</h1> |
- | <li> Limited military use<a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408><sup>22</sup></a> and the advances in molecular biology (e.g. the first isolatin of a gene and the discovery of the restriction enzymes in 1969) lead to the "Convention on the Prohibion of the Development, Production and Stockpilling of Bacteriological (Biological) and Toxin Weapons and on Their Destruction " (BTWC) on 10 April 1972. | + | </center> |
- | <blockquote>''"develop, produce, stockpile or otherwise acquire or retain: ... Microbial or other biological agents, or toxins whatever their origin or method of production, of types and in wantities that have no justification for prophylactic, protective or other peaceful purpose..." ''<sup>3</sup></blockquote></li> | + | Def: "measures focus on the prevention of theft, misuse , or |
- | <li> Breach of the BTWC by the Soviet Union which continued their offensive biologicla warfare programm | + | intentional relese of pathogens and toxins" <a |
- | <li> Stop of the biological warfare Program "Biopreparat" accompanies the Dissolution of the Svoviet Union in 1991</li> | + | href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf"><sup>1</sup></a><br> |
+ | <center> | ||
+ | <h2>The malignant use of biological agents in history</h2> | ||
+ | </center> | ||
+ | <p>The misuse of biological agent as weapons in warfare is a fear | ||
+ | spreading companion in the history of mankind, ranging from the | ||
+ | well-poisoners in prehistoric times to bio-terrorists present days. The | ||
+ | following brakt intends to give a short outline of the major events<a | ||
+ | href="http://www.ncbi.nlm.nih.gov/pubmed/12789408"><sup>22</sup></a>: | ||
+ | </p> | ||
+ | <li> First systhematic use of chemical weapons during the first world | ||
+ | war</li> | ||
+ | <li> The 1918 flu pandemic lasted from March 1918 to June 1920 and | ||
+ | killed approximately 50 Million people around the world. Rumors | ||
+ | circulated that this pandemic is caused by the other combatant nation.</li> | ||
+ | <li> "Prohibion of the Use of Asphyxiating, Poisonous or other Gases | ||
+ | and of Bacteriological Methods of Warfare" was signed on 19 June 1925<a | ||
+ | href="http://www.ncbi.nlm.nih.gov/pubmed/12789408"><sup>22</sup></a></li> | ||
+ | <li> Several combatant nations of the second world war established | ||
+ | biological warfare programs. </li> | ||
+ | <li> The range of the Japanese biological warfare program lead several | ||
+ | nations to expand their own biological warfare program.</li> | ||
+ | <li> Limited military use<a | ||
+ | href="http://www.ncbi.nlm.nih.gov/pubmed/12789408"><sup>22</sup></a> | ||
+ | and the advances in molecular biology (e.g. the first isolatin of a | ||
+ | gene and the discovery of the restriction enzymes in 1969) lead to the | ||
+ | "Convention on the Prohibion of the Development, Production and | ||
+ | Stockpilling of Bacteriological (Biological) and Toxin Weapons and on | ||
+ | Their Destruction " (BTWC) on 10 April 1972. | ||
+ | <blockquote>''"develop, produce, stockpile or otherwise acquire or | ||
+ | retain: ... Microbial or other biological agents, or toxins whatever | ||
+ | their origin or method of production, of types and in wantities that | ||
+ | have no justification for prophylactic, protective or other peaceful | ||
+ | purpose..." ''<sup>3</sup></blockquote> | ||
+ | </li> | ||
+ | <li> Breach of the BTWC by the Soviet Union which continued their | ||
+ | offensive biologicla warfare programm | ||
+ | </li> | ||
+ | <li> Stop of the biological warfare Program "Biopreparat" accompanies | ||
+ | the Dissolution of the Svoviet Union in 1991</li> | ||
<li> Antrax attacks in the USA in 2001</li> | <li> Antrax attacks in the USA in 2001</li> | ||
- | + | After this short description of misused biological components there is | |
- | After this short description of misused biological components there is still the question what impact biological warfare will have in the future of mankind. | + | still the question what impact biological warfare will have in the |
- | < | + | future of mankind. |
- | + | <center> | |
- | + | <h2>Broad avilibility of knowledge</h2> | |
- | n the life sciences information has allways been freely acessible for everybody who is interested in the results of a particular research project. The combination of this global availibility with the new possibilities of the internet broad for literature search and availibility of gene sequences made it easiere to collect informations for a possible misuse. <br> | + | </center> |
- | For the overwhelming majority this open availibility is absolutely desirely but on the other hand there are also examples of research results that bear a very high risk to be misused. <br> | + | n the life sciences information has allways been freely acessible for |
- | Following we present the three most controversial discussed publications that could also be read as a "How to create your own bioweapon". | + | everybody who is interested in the results of a particular research |
- | + | project. The combination of this global availibility with the new | |
- | + | possibilities of the internet broad for literature search and | |
- | <h3>Mousepox Virus in Australien</h3><br> | + | availibility of gene sequences made it easiere to collect informations |
- | The Australian research group around <a href=http://www.ncbi.nlm.nih.gov/pubmed/11152493> Jackson et al. ; 2001 <sup>16</sup></a>inserted the coding region of the IL-4 gne into the genome of mousepox. They hoped to create a virus that sterilizes mice and thus provides a means for pest control. Contrarely to their expectations they had created a superstrain that killed even naturally resistent mice and mice that had been vaccinated against normal mousepox. This discovery could potentially be used to make smallpox resistant to potential vaccines. | + | for a possible misuse. <br> |
- | + | For the overwhelming majority this open availibility is absolutely | |
- | <h3>Synthesis of a Polio Virus</h3><br> | + | desirely but on the other hand there are also examples of research |
- | At the State University of New York <a href=http://www.sciencemag.org/cgi/content/full/297/5583/1016> Cello et al. ; 2002 <sup>05</sup | + | results that bear a very high risk to be misused. <br> |
- | <blockquote>"made the virus to send a warning that terrorists might be able to make biological weapons without obtaining a natrual virus"<a href=http://www.ncbi.nlm.nih.gov/pubmed/19784453><sup>17</sup></a></blockquote> | + | Following we present the three most controversial discussed |
- | + | publications that could also be read as a "How to create your own | |
- | <h3>Reconstitution of the Spanish Flu</h3><br> | + | bioweapon". |
- | <img | + | <h3>Mousepox Virus in Australien</h3> |
- | At the Center for Disease Control and Prevention (CDC) the group around <a href=http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf>Tumpey et al. ; 2005<sup>24</sup></a> published that they had sequenced and recreated the pandemic Spanish Flu Virus of 1918 which killed 20-50 million people. The publication of the sequence provoked several very different responses that can only be partially be quoted here. | + | <br> |
- | + | The Australian research group around <a | |
- | The controversial noticed outrider of the Synthetic Biology Craig Venter seen in the new virus | + | href="http://www.ncbi.nlm.nih.gov/pubmed/11152493"> Jackson et al. ; |
- | <blockquote>"the first true Juressic Parc scenario" <a href=http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&sID=4233><sup>2</sup></a | + | 2001 <sup>16</sup></a>inserted the coding region of the IL-4 gne into |
- | + | the genome of mousepox. They hoped to create a virus that sterilizes | |
- | The Institute Professor at the MIT Philip A. Sharp supported the publication because he: | + | mice and thus provides a means for pest control. Contrarely to their |
- | <blockquote>"belive[s] that allowing the publication of this information was the correct decision in terms of both national security and public health" <a href=http://www.sciencemag.org/cgi/content/short/310/5745/17><sup>12</sup></a></blockquote> | + | expectations they had created a superstrain that killed even naturally |
- | + | resistent mice and mice that had been vaccinated against normal | |
- | Wheras <a href=http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf>v. Bubnoff; 2005<sup>25</sup></a> critisizes the CDS for it's careless regulations for the shipment of viruses and the willingness to propagate highly virulent viruses. This causes in his opinion the risk of possible accidents resulting in the release of the virus to the environment. | + | mousepox. This discovery could potentially be used to make smallpox |
- | + | resistant to potential vaccines. | |
- | + | <h3>Synthesis of a Polio Virus</h3> | |
- | <center><h2>Broad avilibility of material</h2></center> | + | <br> |
- | + | At the State University of New York <a | |
- | <center><h2>Szenarios of attack</h2></center> | + | href="http://www.sciencemag.org/cgi/content/full/297/5583/1016"> Cello |
- | + | et al. ; 2002 <sup>05</sup> synthesized a "living" polio virus from | |
- | <center><h2>Conclusion</h2>< | + | scratch. Especially the </a><a |
- | + | href="http://www.sciencemag.org/cgi/content/full/1072266/DC1">Supporting | |
- | + | Online Material</a> caused worried remarks because it precisely | |
- | <img src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png | + | describes how to assemble a virus from small oligo nucleotides. The |
- | height="auto"/> | + | authors jusifyed their project by declaring that they: |
- | < | + | <blockquote>"made the virus to send a warning that terrorists might be |
- | <span style="color:DarkGreen"><b>Include something in your project description and presentations that demonstrates that you have thought about how others could misuse your work.</b> </span></ | + | able to make biological weapons without obtaining a natrual virus"<a |
- | < | + | href="http://www.ncbi.nlm.nih.gov/pubmed/19784453"><sup>17</sup></a></blockquote> |
- | For sure there is allway the possibility that knowledge to produce transgene viral vectors could be used to produce bioweapons. Therefor it was important for us to use a system that does not bear the risk that someone could use it for evil purpose. In the case of the Adeno-associated virus the very limited packaging capacity is the major reason that excludes it from the list of agents that could realistically be used for the pruduction of bioweapons. Even a fully replication potent AAV will depend on the coninfection of a helpervirus and is therefore not suitable for a fast propagation in an population. | + | <h3>Reconstitution of the Spanish Flu</h3> |
- | Additional to this point we concentrated our project on the retargeting of the virus - means to make the broad tropismn more narrow and to decrease the transduction efficiency in the most cases. This modification is usually mainly required for medical purposes. Also we did neither investigate possibilities to shield the vector from the immune system of potential host nor ways to bypass an existing immunity. | + | <br> |
- | </p><br><br> | + | <img style="width: 300px; height: 223px;" class="right" |
- | + | src="https://static.igem.org/mediawiki/2010/9/96/Freiburg10_Spanishflu.jpg" | |
- | + | alt="Influenza hospital for american soldiers" align="left"> | |
- | + | At the Center for Disease Control and Prevention (CDC) the group around | |
- | + | <a href="http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf">Tumpey | |
- | + | et al. ; 2005<sup>24</sup></a> published that they had sequenced and | |
- | + | recreated the pandemic Spanish Flu Virus of 1918 which killed 20-50 | |
- | <li>01 <a href=http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf>Synthetic Biology & Biosecurity - Awareness in Europe | Kelle ; 2007<sup>1</sup></a></li> | + | million people. The publication of the sequence provoked several very |
- | + | different responses that can only be partially be quoted here. | |
- | <li>02 <a href=http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&sID=4233>Synthetic Biology - Social and Ethical Challenges | Balmer et Martin ; 2008<sup>2</sup></a></li> | + | The controversial noticed outrider of the Synthetic Biology Craig |
- | + | Venter seen in the new virus | |
- | <li>03) Synthetic Biology - Applying Engineering to Biology | + | <blockquote>"the first true Juressic Parc scenario" <a |
- | <br> used | + | href="http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&sID=4233"><sup>2</sup></a></blockquote> |
- | + | The Institute Professor at the MIT Philip A. Sharp supported the | |
- | <li>04 <a href=http://www.informaworld.com/smpp/content | + | publication because he: |
- | + | <blockquote>"belive[s] that allowing the publication of this | |
- | <li>05 <a href=http://www.sciencemag.org/cgi/content/full/297/5583/1016>Chemical Synthesis of Poliovirus cDNA: Generation of Infectious Virus in the Absence of Natural Template | Cello et al. ; 2002 <sup>05</sup></li> | + | information was the correct decision in terms of both national security |
- | + | and public health" <a | |
- | <li>06 <a href=http://www.nytimes.com/2003/12/03/opinion/03iht-edstein_ed3_.html>Dangerous research : When science breeds nightmares | Steinbruner et Harris ; 2003 <sup>06</sup></a></li> | + | href="http://www.sciencemag.org/cgi/content/short/310/5745/17"><sup>12</sup></a></blockquote> |
- | + | Wheras <a | |
- | <li>07 <a href=http://www.jcvi.org/cms/fileadmin/site/research/projects/synthetic-genomics-report/synthetic-genomics-report.pdf>Synthetic Genomics - Options for governance | Garfinkel et al. ; 2007 <sup>07</sup></a></li> | + | href="http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf">v. |
- | + | Bubnoff; 2005<sup>25</sup></a> critisizes the CDS for it's careless | |
- | <li>08 <a href=http://www.nature.com/nrg/journal/v6/n7/abs/nrg1637.html>Synthetic biology | Benner et Sismour , 2005 <sup>08</sup></a></li> | + | regulations for the shipment of viruses and the willingness to |
- | + | propagate highly virulent viruses. This causes in his opinion the risk | |
- | <li>09 <a href=http://www.ncbi.nlm.nih.gov/pubmed/16954140>Synthetic biology—putting engineering into biology | Heinemann et Panke ; 2006 <sup>09</sup></a></li> | + | of possible accidents resulting in the release of the virus to the |
- | + | environment. | |
- | <li>10 <a href=http://www.guardian.co.uk/world/2006/jun/14/terrorism.topstories3>Revealed: the lax laws that could allow assembly of deadly virus DNA | Randerson ; 2006 <sup>10</sup></a> </li> | + | <center> |
- | + | <h2>Broad avilibility of material</h2> | |
- | <li>11 <a href=http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf>The Promise and Perils of Synthetic Biology | Tucker & Zilinskas ; 2006 <sup>11</sup></a></li> | + | </center> |
- | + | <center> | |
- | <li>12 <a href=http://www.sciencemag.org/cgi/content/short/310/5745/17>1918 Flu and Responsible Science | Sharp ; 2005 <sup>12</sup></a></li> | + | <h2>Szenarios of attack</h2> |
- | + | </center> | |
- | <li>13 <a href=http://www.fas.org/irp/cia/product/bw1103.pdf> The Darker Bioweapons Future | CIA ; 2003 <sup>13</sup></a></li> | + | <center> |
- | + | <h2>Conclusion</h2> | |
- | <li>14) [[Media:Primer for Synthetic Biology - Mohr 2007.pdf]] | + | <br> |
- | + | <table style="text-align: left; width: 90%;" border="0" cellpadding="2" | |
- | + | cellspacing="2"> | |
- | <li>15) [[Media:Freiburg10_The bugs of war.pdf]] | + | <tbody> |
- | + | <tr> | |
- | + | <td style="vertical-align: top;"><img | |
- | <li>16 <a href=http://www.ncbi.nlm.nih.gov/pubmed/11152493>Expression of mouse interleukin-4 by a recombinant ectromelia virus suppresses cytolytic lymphocyte responses and overcomes genetic resistance to mousepox. | Jackson et al. ; 2001 <sup>16</sup></a></li> | + | src="https://static.igem.org/mediawiki/2010/1/14/Freiburg10_iGEMs_question.png" |
- | + | height="auto" width="150"></td> | |
- | <li>17 <a href=http://www.ncbi.nlm.nih.gov/pubmed/19784453>Governance of dual-use research: an ethical dilemma. | Selgelid ; 2009 <sup>17</sup></a></li> | + | <td style="vertical-align: middle;"><span |
- | + | style="color: DarkGreen;"><b>Include | |
- | <li>18 <a href=http://www.ncbi.nlm.nih.gov/pubmed/18625678>Evidence-based biosafety: a review of the principles and effectiveness of microbiological containment measures. | Kimman et al. 2008 <sup>18</sup></a> </li> | + | something in your project |
- | + | description and presentations that demonstrates that you have thought | |
- | <li>19) <a href=http://www.ncbi.nlm.nih.gov/pubmed/16819452>A Hippocratic Oath for life scientists | Revill et Dando ; 2006 <sup>19</sup></a></li> | + | about how others could misuse your work.</b></span> </td> |
- | + | </tr> | |
- | <li>20 <a href=http://www.ncbi.nlm.nih.gov/pubmed/16819443>Empowerment and restraint in scientific communication. New developments make it easier to share information, but more difficult to deal with dual-use biology. | Campbell ; 2006<sup>20</sup></a></li> | + | </tbody> |
- | + | </table> | |
- | <li>21 <a href=http://www.ncbi.nlm.nih.gov/pubmed/16819441>When risk outweighs benefit | Aken ; 2006 <sup>21</sup></a></li> | + | <br> |
- | + | </center> | |
- | <li>22 <a href=http://www.ncbi.nlm.nih.gov/pubmed/12789408>Advances in life sciences and bioterrorism. Risks, perspectives and responsibilities.| Beck ; 2003 <sup>22</sup></a></li> | + | <p>For sure there is allway the possibility that knowledge to produce |
- | + | transgene viral vectors could be used to produce bioweapons. Therefor | |
- | <li>23 <a href=http://www.ncbi.nlm.nih.gov/pubmed/12590130>PNAS policy on publication of sensitive material in the life sciences | Cozzarelli ; 2003 <sup>23</sup></a></li> | + | it was important for us to use a system that does not bear the risk |
- | + | that someone could use it for evil purpose. In the case of the | |
- | <li>24 <a href=http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf>Characterization of the | + | Adeno-associated virus the very limited packaging capacity is the major |
+ | reason that excludes it from the list of agents that could | ||
+ | realistically be used for the pruduction of bioweapons. Even a fully | ||
+ | replication potent AAV will depend on the coninfection of a helpervirus | ||
+ | and is therefore not suitable for a fast propagation in an population. | ||
+ | Additional to this point we concentrated our project on the retargeting | ||
+ | of the virus - means to make the broad tropismn more narrow and to | ||
+ | decrease the transduction efficiency in the most cases. This | ||
+ | modification is usually mainly required for medical purposes. Also we | ||
+ | did neither investigate possibilities to shield the vector from the | ||
+ | immune system of potential host nor ways to bypass an existing | ||
+ | immunity. </p> | ||
+ | <br> | ||
+ | <br> | ||
+ | <li>01 <a | ||
+ | href="http://www.idialog.eu/uploads/file/Synbiosafe-Biosecurity_awareness_in_Europe_Kelle.pdf">Synthetic | ||
+ | Biology & Biosecurity - Awareness in Europe | Kelle ; 2007<sup>1</sup></a></li> | ||
+ | <li>02 <a | ||
+ | href="http://www.bbsrc.ac.uk/nmsruntime/saveasdialog.aspx?lID=2277&sID=4233">Synthetic | ||
+ | Biology - Social and Ethical Challenges | Balmer et Martin ; 2008<sup>2</sup></a></li> | ||
+ | <li>03) Synthetic Biology - Applying Engineering to Biology <br> | ||
+ | used | ||
+ | </li> | ||
+ | <li>04 <a | ||
+ | href="http://www.informaworld.com/smpp/content%7Econtent=a713604665&db=all">The | ||
+ | Impact of the Development of Modern Biology and Medicine on the | ||
+ | Evolution of Offensive Biological Warfare Programs in the Twentieth | ||
+ | Century | Dando ; 1999 <sup>04</sup></a></li> | ||
+ | <li>05 <a | ||
+ | href="http://www.sciencemag.org/cgi/content/full/297/5583/1016">Chemical | ||
+ | Synthesis of Poliovirus cDNA: Generation of Infectious Virus in the | ||
+ | Absence of Natural Template | Cello et al. ; 2002 <sup>05</sup></a></li> | ||
+ | <li><a href="http://www.sciencemag.org/cgi/content/full/297/5583/1016">06 | ||
+ | </a><a | ||
+ | href="http://www.nytimes.com/2003/12/03/opinion/03iht-edstein_ed3_.html">Dangerous | ||
+ | research : When science breeds nightmares | Steinbruner et Harris ; | ||
+ | 2003 <sup>06</sup></a></li> | ||
+ | <li>07 <a | ||
+ | href="http://www.jcvi.org/cms/fileadmin/site/research/projects/synthetic-genomics-report/synthetic-genomics-report.pdf">Synthetic | ||
+ | Genomics - Options for governance | Garfinkel et al. ; 2007 <sup>07</sup></a></li> | ||
+ | <li>08 <a | ||
+ | href="http://www.nature.com/nrg/journal/v6/n7/abs/nrg1637.html">Synthetic | ||
+ | biology | Benner et Sismour , 2005 <sup>08</sup></a></li> | ||
+ | <li>09 <a href="http://www.ncbi.nlm.nih.gov/pubmed/16954140">Synthetic | ||
+ | biology—putting engineering into biology | Heinemann et Panke ; 2006 <sup>09</sup></a></li> | ||
+ | <li>10 <a | ||
+ | href="http://www.guardian.co.uk/world/2006/jun/14/terrorism.topstories3">Revealed: | ||
+ | the lax laws that could allow assembly of deadly virus DNA | Randerson | ||
+ | ; 2006 <sup>10</sup></a> </li> | ||
+ | <li>11 <a | ||
+ | href="http://www.thenewatlantis.com/docLib/TNA12-TuckerZilinskas.pdf">The | ||
+ | Promise and Perils of Synthetic Biology | Tucker & Zilinskas ; 2006 | ||
+ | <sup>11</sup></a></li> | ||
+ | <li>12 <a | ||
+ | href="http://www.sciencemag.org/cgi/content/short/310/5745/17">1918 | ||
+ | Flu and Responsible Science | Sharp ; 2005 <sup>12</sup></a></li> | ||
+ | <li>13 <a href="http://www.fas.org/irp/cia/product/bw1103.pdf"> The | ||
+ | Darker Bioweapons Future | CIA ; 2003 <sup>13</sup></a></li> | ||
+ | <li>14) [[Media:Primer for Synthetic Biology - Mohr 2007.pdf]] </li> | ||
+ | <li>15) [[Media:Freiburg10_The bugs of war.pdf]] </li> | ||
+ | <li>16 <a href="http://www.ncbi.nlm.nih.gov/pubmed/11152493">Expression | ||
+ | of mouse interleukin-4 by a recombinant ectromelia virus suppresses | ||
+ | cytolytic lymphocyte responses and overcomes genetic resistance to | ||
+ | mousepox. | Jackson et al. ; 2001 <sup>16</sup></a></li> | ||
+ | <li>17 <a href="http://www.ncbi.nlm.nih.gov/pubmed/19784453">Governance | ||
+ | of dual-use research: an ethical dilemma. | Selgelid ; 2009 <sup>17</sup></a></li> | ||
+ | <li>18 <a href="http://www.ncbi.nlm.nih.gov/pubmed/18625678">Evidence-based | ||
+ | biosafety: a review of the principles and effectiveness of | ||
+ | microbiological containment measures. | Kimman et al. 2008 <sup>18</sup></a> | ||
+ | </li> | ||
+ | <li>19) <a href="http://www.ncbi.nlm.nih.gov/pubmed/16819452">A | ||
+ | Hippocratic Oath for life scientists | Revill et Dando ; 2006 <sup>19</sup></a></li> | ||
+ | <li>20 <a href="http://www.ncbi.nlm.nih.gov/pubmed/16819443">Empowerment | ||
+ | and restraint in scientific communication. New developments make it | ||
+ | easier to share information, but more difficult to deal with dual-use | ||
+ | biology. | Campbell ; 2006<sup>20</sup></a></li> | ||
+ | <li>21 <a href="http://www.ncbi.nlm.nih.gov/pubmed/16819441">When risk | ||
+ | outweighs benefit | Aken ; 2006 <sup>21</sup></a></li> | ||
+ | <li>22 <a href="http://www.ncbi.nlm.nih.gov/pubmed/12789408">Advances | ||
+ | in life sciences and bioterrorism. Risks, perspectives and | ||
+ | responsibilities.| Beck ; 2003 <sup>22</sup></a></li> | ||
+ | <li>23 <a href="http://www.ncbi.nlm.nih.gov/pubmed/12590130">PNAS | ||
+ | policy on publication of sensitive material in the life sciences | | ||
+ | Cozzarelli ; 2003 <sup>23</sup></a></li> | ||
+ | <li>24 <a href="http://www.sciencemag.org/cgi/reprint/310/5745/77.pdf">Characterization | ||
+ | of the | ||
Reconstructed 1918 Spanish | Reconstructed 1918 Spanish | ||
Influenza Pandemic Virus | Tumpey et al. ; 2005<sup>24</sup></a> </li> | Influenza Pandemic Virus | Tumpey et al. ; 2005<sup>24</sup></a> </li> | ||
- | + | <li>25 <a | |
- | <li>25 <a href=http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf>Deadly flu virus can be | + | href="http://www.nature.com/nature/journal/v438/n7065/pdf/438134a.pdf">Deadly |
+ | flu virus can be | ||
sent through the mail| v. Bubnoff; 2005<sup>25</sup></a></li> | sent through the mail| v. Bubnoff; 2005<sup>25</sup></a></li> | ||
- | + | <li>26 <a | |
- | <li>26 <a href=https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf>Risk assessment of human Adeno-associated viruses| ZKBS; 2001<sup>26</sup></a></li> | + | href="https://static.igem.org/mediawiki/2010/0/09/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_2001.pdf">Risk |
- | + | assessment of human Adeno-associated viruses| ZKBS; 2001<sup>26</sup></a></li> | |
- | <li>27 <a href=https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf>Advises for AAV carrying cell cycle regulating genes| ZKBS; 2004 <sup>27</sup></a></li> | + | <li>27 <a |
- | + | href="https://static.igem.org/mediawiki/2010/a/ae/Freiburg10_Advises_for_AAV_carrying_cell_cycle_regulating_genes_2004.pdf">Advises | |
- | <li>28 <a href=https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf>Risk assessment of human Adeno-associated viruses and AAV derived vectors| ZKBS; 2005 <sup>28</sup></a> </li> | + | for AAV carrying cell cycle regulating genes| ZKBS; 2004 <sup>27</sup></a></li> |
- | + | <li>28 <a | |
- | <li>29 <a href=http://www.ncbi.nlm.nih.gov/pubmed/10700178>Evidence for gene transfer and expression of factor IX in haemophilia B patients treated with an AAV vector.| Kai et al. ; 2000 <sup>29</sup></a> | + | href="https://static.igem.org/mediawiki/2010/d/dd/Freiburg10_Risk_assessment_of_human_Adeno-associated_viruses_and_AAV_derived_vectors_2005.pdf">Risk |
+ | assessment of human Adeno-associated viruses and AAV derived vectors| | ||
+ | ZKBS; 2005 <sup>28</sup></a> </li> | ||
+ | <li>29 <a href="http://www.ncbi.nlm.nih.gov/pubmed/10700178">Evidence | ||
+ | for gene transfer and expression of factor IX in haemophilia B patients | ||
+ | treated with an AAV vector.| Kai et al. ; 2000 <sup>29</sup></a> | ||
Bioverteilung in Klinischer Studie </li> | Bioverteilung in Klinischer Studie </li> | ||
+ | <li>30 <a | ||
+ | href="https://static.igem.org/mediawiki/2010/7/76/Freiburg10_Safetyapplication.pdf">Biosafety | ||
+ | application of the iGEM team Freiburg_Bioware 2010<sup>30</sup></a> (in | ||
+ | German)</li> | ||
+ | <li>31 <a | ||
+ | href="https://static.igem.org/mediawiki/2010/1/18/Freiburg10_Safetyconfirmation.jpg">Official | ||
+ | classification as Biological Safety Level 1 by the local biosafety | ||
+ | office<sup>31</sup></a></li> | ||
+ | <li>32 <a | ||
+ | href="http://oba.od.nih.gov/oba/rac/guidelines_02/Appendix_B.htm">Appendix | ||
+ | B | National Institute of Health <sup>32</sup></a></li> | ||
+ | </html> | ||
- | |||
- | |||
- | + | {{:Team:Freiburg_Bioware/Footer}} | |
- | + | ||
- | + |
Revision as of 17:28, 26 October 2010
Biosafety
Definition: "biosafety measures aim to prevent the unintentional exposure to pathogens and toxins, or their accidental release" 1
Risk assessment for our Adeno-associated virus based system
In Germany the "Central Commission for
Biological Security" (ZKBS) released three legally binding Risk
Assessment satements for the Adeno-associated Virus 26,
27,
28.
Risk assessment in other countries may deviate from these decisions, so
please inform yourself about the legal regulations on AAV
in your country before using the Virus Construction Kit.
- Adeno-associated Virus 2, 3 and 5 have to be handled under BSL 1.
- Adeno-associated Viurs 1, 4, 5, 7, 8, 9, 10 and 11 have to be handled under BSL 2.
This classification was developed based on the fact that only serotypes 2, 3 and 5 are isolated from humans and that their harmlessness has been confirmed in clinical studies. This general classification has to be rechecked when the virus contains gene sequences with a transforming protential.
Viral vectors systems packaging a vector plasmid that only contains the viral Inverted Terminal Repeats (ITRs) and providing the genes for Rep and Cap in trans (as it is the case for our system) are classified as BSL 1 if the following conditions are fullfilled:
- The viral particles do not contain AAV derived sequences other than the ITRs
- The viral particles do not contain Nucleotidesequences with a risk potential
We also investigated the legal regulations for AAV-2 Viral Vector systems in the United States. The guidelines of the National Institutes of Health (NIH) classify in the Appendix B32 AAV-2 Vector Systems as Risk Group 1 (RG1) agents that can be treated under BSL 1. In detail the appendix states "... adeno- associated virus (AAV) types 1 through 4; and recombinant AAV constructs, in which the transgene does not encode either a potentially tumorigenic gene product or a toxin molecule and are produced in the absence of a helper virus."
- In clinical studies the viral vectors were not dilivered to the gonades.
- Vector sequences were not detectable in the patients blood or urine at an examination 48 h after an infection with AAV-2 29.
- In absence of Rep proteins, the vector DNA stays extrachromosomal and is not frequently integrated.
Concluding all these informations and regulations, the project that we have designed in this year is clearly classified as BLS 1.
General biosafety regulation in Germany
Which specific biosafety rules or guidelines do you have to consider in your country? |
In Germany all work that includes recombinant DNA technologies is regulated by the Gesetz zur Regelung der Gentechnik. This law regulates general aspects in the life sciences and refers for more precise interpretations in §4 to the Zentrale Kommission für die Biologische Sicherheit. The ZKBS is a commission composed of 20 technical experts that releases yearly statements to actual issues of biosafety. So far the ZKBS released three stratements affecting the work with Adeno-associated viral systems 26, 27, 28. These documents were used to assess the dangers that could arise from our project to team members and the enviroment.
Is there a local biosafety group, committee, or review board at your institution? If yes, what does your local biosafety group think about your project? |
At the Albert-Ludwigs-University Freiburg for all concerns of security the Stabsstelle Sicherheit is responsible and to contact if questions arise. Especially for questions of biological security Dr. Petra Markmeyer-Pieles is cognizant. We contacted her a first time befor the begin of our project in March when it was clear that the Adeno-associated Virus (AAV-2) was chosen as the topic of our project. At that time she proposed to do the cloning in the AAV-2 that is for sure to handle under biological security level 1 and to prepare everything for work under biological security level 2 to satisfy the precaution principle. The precaution principle was realized and all viral vectors that contained a modified capsid were handled under SII conditions until proven harmless. In August the planing of the project was completed, summarized in an Biosafety application30 and handed to the department for biological security who approve the application in an official BSL1 confirmation31official BSL1 confirmation for our project.
Risk management
Would any of your project ideas raise safety issues in terms of: researcher safety, public safety, or environmental safety? |
Our project was designed in a way that it avoids any serious safety issues as far as possible. When working with infectious particles a minimal risk for the researcher is allways present. This risk was minimized by restricting the transduced genes to fluorescent proteins and prodrug convertases that are already proven not to harm human cells in the absece of the corresponding prodrug. A potential danger for the public or the environment was minimized as much as possible by following strictly the rules of Good Laboratory Practice (GLP) and the abdication of using randomized insertions in the capsid and of replication potent viruses. Minimizing the risk for team members and the society was was allways one of the major concerns, especially because worries about undergraduate students manipulating a virus could arise. The security concept will be explained by quoting and explaining the six guiding principles for safe manipulation of Gene Manipulated Organisms (GMOs) as summarized in Kimman et al. ; 200818.
Do any of the new BioBrick parts (or devices) that you made this year raise any safety issues? If yes, did you document these issues in the Registry? How did you manage to handle the safety issue? How could other teams learn from your experience? |
Several composite parts that were assembled by our Team this year are alone capable of producing infectious viral particles when transduced together with a vector plasmid and a helper plasmid into AAV-293 cells. These special cells provide the adenoviral gene E1 stabily integrated in trans. These cells are not provided in the Virus Construction Kit nor availible in the Parts Registry and have to purchased from other laboratories or a commercial supplyer. For this reason we estimate the risk of a accidental transformation of AAV-293 cells with all three plasmids for negligible. Nevertheless we considered it useful to mark every BioBrick or Composite Part in the Registry that contributes to the production or is capable of producing viral vectors when transformed under the previously mentioned conditions. |
Contribute to community discussions on what needs to go into a code against the use of our science for hostile purposes (see A Community Response) |
psychological research into the concept of "identity-driven decision-making" (Torpman,2004) 19
Every grout has a set of norms: a code of conduct about what is acceptable beahviour (Jaques, 2004] 19
Trade-off between potential misuse and promising medical progress
Do you have any other ideas how to deal with safety issues that could be useful for future iGEM competitions? How could parts, devices and systems be made even safer through biosafety engineering? |
In principle each research-project that bears any risks for engaged
researchers, mankind or the environment should be treated under the
precautionary principle as proposed 11:
"treat synthetic microorganisms as dangerous until proven harmless".
This would mean to work on such synthetic DNA containing Bio Bricks at
least under Biological security levels two.
Additional to this secure working environment the system itself can be
optimized according to biosafety aspects, means to reduce it's
viability outside the laboratory. This aim can be approached by
reducing the systems ability to evolve, proliferate and interact with
it's environment. A common method to achieve this goal is to engineer
microorganisms in a way that they depend on nutrients that can't be
found in the environment in sufficient amount.
Biosecurity
The malignant use of biological agents in history
The misuse of biological agent as weapons in warfare is a fear spreading companion in the history of mankind, ranging from the well-poisoners in prehistoric times to bio-terrorists present days. The following brakt intends to give a short outline of the major events22:
''"develop, produce, stockpile or otherwise acquire or retain: ... Microbial or other biological agents, or toxins whatever their origin or method of production, of types and in wantities that have no justification for prophylactic, protective or other peaceful purpose..." ''3
Broad avilibility of knowledge
For the overwhelming majority this open availibility is absolutely desirely but on the other hand there are also examples of research results that bear a very high risk to be misused.
Following we present the three most controversial discussed publications that could also be read as a "How to create your own bioweapon".
Mousepox Virus in Australien
The Australian research group around Jackson et al. ; 2001 16inserted the coding region of the IL-4 gne into the genome of mousepox. They hoped to create a virus that sterilizes mice and thus provides a means for pest control. Contrarely to their expectations they had created a superstrain that killed even naturally resistent mice and mice that had been vaccinated against normal mousepox. This discovery could potentially be used to make smallpox resistant to potential vaccines.
Synthesis of a Polio Virus
At the State University of New York Cello et al. ; 2002 05 synthesized a "living" polio virus from scratch. Especially the Supporting Online Material caused worried remarks because it precisely describes how to assemble a virus from small oligo nucleotides. The authors jusifyed their project by declaring that they:
"made the virus to send a warning that terrorists might be able to make biological weapons without obtaining a natrual virus"17
Reconstitution of the Spanish Flu
At the Center for Disease Control and Prevention (CDC) the group around Tumpey et al. ; 200524 published that they had sequenced and recreated the pandemic Spanish Flu Virus of 1918 which killed 20-50 million people. The publication of the sequence provoked several very different responses that can only be partially be quoted here. The controversial noticed outrider of the Synthetic Biology Craig Venter seen in the new virus
"the first true Juressic Parc scenario" 2The Institute Professor at the MIT Philip A. Sharp supported the publication because he:
"belive[s] that allowing the publication of this information was the correct decision in terms of both national security and public health" 12Wheras v. Bubnoff; 200525 critisizes the CDS for it's careless regulations for the shipment of viruses and the willingness to propagate highly virulent viruses. This causes in his opinion the risk of possible accidents resulting in the release of the virus to the environment.
Broad avilibility of material
Szenarios of attack
Conclusion
Include something in your project description and presentations that demonstrates that you have thought about how others could misuse your work. |
For sure there is allway the possibility that knowledge to produce transgene viral vectors could be used to produce bioweapons. Therefor it was important for us to use a system that does not bear the risk that someone could use it for evil purpose. In the case of the Adeno-associated virus the very limited packaging capacity is the major reason that excludes it from the list of agents that could realistically be used for the pruduction of bioweapons. Even a fully replication potent AAV will depend on the coninfection of a helpervirus and is therefore not suitable for a fast propagation in an population. Additional to this point we concentrated our project on the retargeting of the virus - means to make the broad tropismn more narrow and to decrease the transduction efficiency in the most cases. This modification is usually mainly required for medical purposes. Also we did neither investigate possibilities to shield the vector from the immune system of potential host nor ways to bypass an existing immunity.
used