Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
From: DAS
To: "Sto||orz, Volker"; "Dominique Brtfiard"; "Jason Delborne_"; Elizabeth l-leitman;
Cc: "Dietram A. figheufele"; "Keegan Sawyer"Subject: Genome Editing & Security WorkshopDate: Monday, October 02, 2017 7:21:02 PMAttachments: Fi I - Pr r mm In rna i n I W rk h
.
Plenagy Session Instgugtigns for Speakers and §;hai[§,Qgfg;gmmgnicatign and figgial Media Quigelinespdf
Importance: High
Hi everyone,
Thank you so much again for participating in our session on “Public communication and engagementon potential security risks of genome editing applications” at the Hannover, Germany meeting next
week. Most of the logistics are outlined in the documents I am attaching. As session chair, I wantedto share a few additional logistics with you.
Most importantly, this session is meant as a broader discussion about communication and
engagement. Toward thatend, I would ideally like to avoid any slide presentations during the briefintroductory remarks (5-7 minutes each). The point of these introductory comments is for each of
you to share what you see as the most important take-aways for different stakeholder communities.Not having prepared slides will also allow you to respond in your introductory comments to some ofthe things thatmay have been said or omitted during the previous two days of our meeting.
After the intro comments from everyone, I will have a couple of opening questions before going to
the audience. When we get questions from the floor, I might direct them to some of you for a
response in order to avoid awkward pauses as the panel decides who wants to go first. Of course,
everyone should feel free to chime in on all questions, but we also want to get to as many of them as
possible. We'll just play it by ear.
Finll w I -. f - _--. - “r I - II’’ n hi mil -- im hi w kwi h '
w r
' ' ' ' and also to let us know if not
using slides will work for you? I fully understand thateveryone has different preferences even forshort presentations, and we'd like to honor those. That way everyone has at least a rough idea what
everyone else will be saying beyond just the areas listed on the program.
Thanks so much again for doing this. I look forward to hearing from all of you thisweek, and meet in
person in Hannover! Please do not hesitate to be in touch with any other questions you might have.
BestDietram
john e. ross professor I vilas dislinguished achievementprofessoruniversity of wisconsin- ---madison | morgridge institute for research
dielramscheufelecom | §_cimep lab | office hours
Enterriational Vtforl<sl'iopAssessirig the Szecurity implicationsof
Genome Editing Technology
11-13 October, 2017
Herrenhausen Palace 0 Hanover, Germany
Communicationand Social Media Guidelines
Please read the following guideline before you tweet (or blog, or lnstagram, or Pinterest, or
Google+, or Linkedln, or share information through any other communication platform). In
order to find a balance between the needs and expectations of workshop speakers and
attendees and to make the meeting a safe and comfortable space for everyone, we ask you to
use the following guidelines:
During the plenary sessions encourage open, respectful discussion of workshop contenton social media (e.g. Twitter, Facebook,Goog|e+, etc.) and blogging platforms duringthe workshop. Please use the following workshop hashtag: #GeneEdit_Security
While the default policy during the plenary sessions is to allow open discussion ofworkshop presentations on social media and blogging platforms, please respect anyrequest from speakers to not share the contents of their presentation online. Speakerswho do not wish to have their research chare by Twitter, Facebook,or other socialnetworksshould make an announcement before and during her/his presentation. We
encourage speakers to also use an opt-out Twitter image on every slide of her/hispresentation to ensure their preference is known. An example of an opt-out Twitterimage can be found here: http:[[egu2016.eu[egu2016 twitter nopng
During the breakout sessions we respectfully ask all participants to adhere tothe Chatham House Rule: workshop participants are welcome to use the informationreceived, but neitherthe identity nor the affiliationof the speaker(s), nor thatof anyother participant, should be revealed.
We expect all meeting participants to engage to behavewith the highest of decorum intheircommunicationsonline and in person. Harassment, intimidation, or discriminationin any form will not be tolerated. Individuals who behave in a disrespectful or
discriminatory manner will be asked to leave the workshop.
Q The National8 C I E N C E AcademiesofRESEARCHHEALTH SCIENCES
the interocodemy partnership
- 0 - O Volkswagenstiftung
Eropean Academies
q_ ,R_ ‘7‘ :‘i;"J.€‘L<'§ 9
*2 L Id‘.. ; eopo Ina
3 ~,._.-:7 S Nationale Akademie4‘ §:..‘I_i-"I it der Wissenschaften
1’ .. ‘I ’\
Science Advisory Council "mg-‘;,.->“‘°
GORDON AND BETTY
MOOREFOUNDATION
InternationalWorkshopAssessing the Security Implications of
Genome Editing Technology11-13 October, 2017
Herrenhausen Palace o Hanover, Germany
WORKSHOP PROGRAM
WEDNESDAY,11th OCTOBER
09.00 A.M.- 1:00 P.M. REGISTRATION
Satellite Event:
09_o0 AM, - 1:00 P_M_ POLICY MINI-HACKATHON SATELLITEEVENT, GLOBAL
12.30 P.M.
01.30 P.M.
02.00 P.M.
03.30 P.M.
YOUNG ACADEMY(Invitation Only)
LUNCH
WELCOME
Chair: Volker ter Meulen, InterAcademy Partnership
Wilhelm Krull, Volkswagen FoundationVolker ter Meulen, |nterAcademy PartnershipThierry Courvoisier, European Academies Science Advisory CouncilDiane Griffin, U.S. National Academies of Sciences, Engineering, and MedicineJorg Hacker, German National Academy of Sciences Leopoldina
KEYNOTE LECTURES: A NEW AGE OF BIOLOGY
Chair & Introduction: Indira Nath, All India Institute of Medical Sciences, New Delhi
Presentations (20 min each):
A New Age of BiologySir Venki Ramakrishnan, Royal Society
The Latest Advances in Genome Editing: Between Promise and AlarmRobin Lovell-Badge, The Francis Crick Institute
The Importance of Public Engagement for Discussions about EmergingTechnologiesDominique Brossard, University of Wisconsin—Madison
Questions & Answers
COFFEE BREAK
04.00 P.M SESSION 1ADVANCES IN GENOME EDITING: PROMISE AND READINESS
Chair and Introduction: Barbel Friedrich, Alfried Krupp Institute of Advanced Studies,Greifswald
Presentations (20 min each):
Genome Editing in MedicineDuanqing Pei, Chinese Academy of Sciences
Genome Editing in AgricultureDan Voytas, University of Minnesota, St. Paul
Gene Drives: From Species Eradication to Species PreservationFred Gould, North Carolina State University
Genome Editing in MicrobesLennart Randau, Max Planck Institute for Terrestrial Microbiology,Marburg
Questions & Answers
05.45 P.NI. SESSION 2ASSESSING THE SECURITY DIMENSIONS ASSOCIATED WITH SPECIFICAPPLICATIONS OF GENONIE EDITING TECHNOLOGIES
Chair & Introduction: David Relman, Stanford University
Assessing the Security Implicationsof Emerging Technologies:What Do WeNeed to Know‘?Piers Millett, Oxford University
Questions & Answers
Introduction to the Breakout GroupsDavid Relman, Stanford University
06:30 P.M. APERITIF
07:00 P.IVI. DINNER
THURSDAY,12th OCTOBER
09:00 AM.
10.30 A.IV‘n.
11.00 All/I.
12.30 PM.
01.30 PM.
01.35 P.IVi.
SESSION 2BREAKOUT DISCUSSIONS: ASSESSING THE SECURITY DINIENSIONSASSOCIATEDWITH SPECIFIC APPLICATIONS OF GENOME EDITING
Breakout Group 1: Potential Security Concerns Arising from Human CellEditing Applications (Auditorium)Chair: Anthony Perry, University of BathSpeaker: Jonathan Moreno, University of PennsylvaniaRapporteur: Johannes Fritsch, German Academy of Sciences Leopoldina
Breakout Group 2: Potential Security Concerns Arising from Applications inAgriculture (Seminar2)Chair: Diane Griffin, US National Academies of Sciences, Engineering, and MedicineSpeakers: Joachim Schiemann, German Federal Research Centre for Cultivated Plants
Angelika Schnieke, Technical University of MunichRapporteur: Nina Hobbhahn, European Academies Science Advisory Council
Breakout Group 3: Potential Security Concerns Arising from GeneDrive Applications(Seminar5)Chair: Zachary Adelman, TexasA&M UniversitySpeaker: Todd Kuiken, North Carolina State UniversityRapporteur: Sarah Carter, Science Policy Consulting LLC
Breakout Group 4: Potential Security Concerns Arising fromMicrobialApplications (Seminar6)Chair: Iqbal Parker, University of Cape Town, Cape TownSpeaker: Bert Rima, Queen‘s University BelfastRapporteur: James Revill, University of Sussex
COFFEE BREAK
SUMMARY OF SESSION 2BREAKOUT GROUPS AND PLENARY DISCUSSION
Chair: Ernst-Ludwig Winnacker, Human Frontier Science Program
Report Out from Human Cell Editing GroupReport Out from Agriculture GroupReport Out from Gene Drive GroupReport Out from Microbe Group
Discussion of Breakout Group Reports
LUNCH (Ceremony Hall)
SESSION 3, Part ISTRATEGIESFOR ADDRESSING POTENTIAL SECURITY RISKS OF GEI\IOI’\flEEDITING
Chair and Introduction: PilarOssorio, University of Wisconsin-Madison
Panels
Legal, Regulatory, and Policy Strategies for Genome Editing: GeneralMichele Garfinkel, EMBOS.R.Rao, Ministry of Science & Technology. Government of India
02.00 RM.
02.25 P.IVI.
03.00 RM.
03.30 P.M.
03.55 P.M..
04.45 PM.
05.15 RM.
06.45 P.IVI.
07.30 P.M.
Legal, Regulatory, and Policy Strategies: Security-SpecificDaniel Feakes, Implementation Support Unit, Biological Weapons ConventionCatherineRhodes, University of Cambridge
Norms of Responsible Behavior and Voluntary GuidelinesIndira Nath, All India Institute of Medical Sciences, New DelhiUlrich Sieber, Max Planck Institutes for Foreign and International Criminal Law
BREAK
SESSION 3, Part IISTRATEGIESFOR ADDRESSING POTENTIAL SECURITY RISKS OF GENONIEEDITING
Scientificand Technical StrategiesUrsula Jenal, Jenal & PartnersOwain Edwards, Commonwealth Scientific& Industrial Research Organisation
Discussion with Session 3 Speakers Followed by Questions & Answers
Introduction to the Breakout GroupsPilarOssorio, University of Wisconsin-Madison
COFFEE BREAK
SESSION 4BREAKOUT DISCUSSIONS: ADDRESSING AND MITIGATING POTENTIALSECURITY RISKS ASSOCIATED WITH SPECIFIC APPLICATIONS OF GENOIVIEEDITING
Breakout Group 1: Human Cell Editing Applications(Auditorium)Chair: Duanqing Pei, Chinese Academy of SciencesSpeaker: AbhimanyuVeerakumarasivam,Sunway UniversityRapporteur: Johannes Fritsch, German Academy of Sciences Leopoldina
Breakout Group 2: Applications in Agriculture (Seminar2)Chair: Sarah Hartley, University of ExeterSpeaker: Rene Custers, Vlaams Institute for BiotechnologyRapporteur: Nina Hobbhahn, European Academies Science Advisory Council
Breakout Group 3: Gene Drive Applications (Seminar5)Chair: ElizabethHeitman, University of TexasSouthwestern Medical CenterSpeaker: Ary Hoffman, University of Melbourne
Rapporteur: Sarah Carter, Science Policy Consulting LLC
Breakout Group 4: MicrobialApplications(Seminar6)Chair: Herawati Sudoyo, Eijkman Institute for Molecular BiologySpeaker: Filippa Lentzos, Kings College London -
Rapporteur: James Revill, University of Sussex
APERTIF AND POSTER SESSION
DINNER
FRIDAY, 13thOCTOBER
09.00 A.Iv'I. SUMMARY OF SESSION 4BREAKOUT GROUPS AND PLENARY DISCUSSION
Chair: Peter Mills, Nuffield Council
Report Out from Human Cell Editing GroupReport Out from Agriculture GroupReport Out from Gene Drive GroupReport Out from Microbe Group
Report-Out from Policy Mini-HackathonSatellite Event: Alexander Kagansky, University ofEdinburgh
Discussion of Breakout Group Reports
10.30 A.M. COFFEE BREAK
11.00 A.M. SESSION 5PUBLIC COIVIMUNICATION AND ENGAGEMENT ON POTENTIAL SECURITYRISKS OF GENOIVIE EDITING APPLICATIONS
Chair & Introduction: Dietram Scheufele, University of Wisconsin-Madison
Commentaries (7 min each):
Science Journalism in a Changing WorldVolker Stollorz, Science Media Center Germany
The Science of Communicating Risks and Benefits: When, Why, and How?Dominique Brossard, University of Wisconsin-Madison
Public Engagement: Rationales, Methods and Intended OutcomesJason Delborne, North Carolina State University
Lessons from Engaging Global Communities of ScienceElizabethHeitman, University of TexasSouthwestern Medical Center
Connecting with Publics in a World of Twitter, Blogs, and Online NewsEnvironmentsReiner Korbmann, Wissenschaft Kommuniziert
Panel Discussion Followed by Questions & Answers
12.30 P.M. SESSION 6THE WAY AHEAD
Chair: Robin Lovell-Badge, The Francis Crick Institute
Barbe! Friedrich, Alfried Krupp Institute of Advanced Studies, GreifswaldErnst-Ludwig Winnacker, Human FrontierScience ProgramPiers Millett, Oxford UniversityPeter Mills, Nuffield CouncilIndira Nath, All India Institute of Medical Sciences, New DelhiDietram Scheufele, University of Wisconsin-Madison
Panel Discussion Followed by Questions & Answers
01.15 PM. CLOSING REMARKS
Volker ter Meulen, lnterAcademy Partnership
01.30 P.IVl. END OF WORKSHOP / REFRESHIVIENTS
llcltematlcmall.l‘llorl<slnopfi.eses3is1g= the S»ecurity' Empliwtions; of
G€+liOlT’iG Editing 'l”ec;l'molog‘_,!11-13 October, 2017
Herrenhausen Palace 0 Hanover, Germany
Instructions for Plenary Session Participants
General Information
Overarching goals of theworkshop are:
1. Launch a proactive, internationaldiscussion about what constitutes an evidence—based securityconcern, outlining the potential near- middle- and long-term security concerns — relating tointentional misuse — that may arise from genome editing applications.
2. Describe potential technical, operational, regulatory and governance strategies that may aid thescientificand security communities in preventing or mitigating security concerns
3. Develop a networkof genome engineering,security studies, and public policy experts to buildawareness and facilitateinformation exchange about common areas of study and concern, andpotential communication mechanisms.
The Audience: Workshop attendees are a mix of scientists, security experts, and policy makers fromdifferent sectors (academia,government, industry, and NGOS). We anticipate 150 attendees, representingmany different countries.
Website: The workshop program and background materials are accessible here:htt : nas—sites.or dels events e-securit
Social Media: In order to make the meeting a safe and comfortable space for everyone to contribute, we ask
you to adhere to the communicationguidelines (separate document). The communicationguidelines are
also posted on the website. Hashtag for the event: #GeneEdit_Security
Report Summary: The IAP will publish a peer-reviewed workshopsummary thatwill be provided to
workshop participants and broadlyavailableto the public.
Plenary Chair Guidance
Your role as chair is 3-fold:o Introduce the session topic and speakers (name and affiliation).
The session chairs each have 5 minutes to introduce theirsession.o Manage the discussion periods.o Keep agenda on time.
Thankyou very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
Please carefully review the agenda to be certain of how much time is availableto speakers and to the'Questions 8: Answer” periods. Time allotted varies by session.
Please carefully parse the question & answer time. At the later end of each plenary session thereis a modest period of time for membersof the audienceto ask clarifying questions. We very muchencourage the audienceto ask questions. Please ask questioners to state their names andaffiliationand to keep theirquestions or comments succinct (1-2 minutes maximum) so thatthereis sufficient time for other audiencemembersto ask questions.
Plenary Speaker Guidance
Speaker Abstracts. We kindly ask you to prepare no more than 1-paragraph abstract on the key points thatyou will make in your presentation or commentary. The abstract will be used as a guide in preparing theworkshop summary. Your abstract will NOT be made public. Please email your abstract to Robin Fears
— by 10 October, 2017.
Please carefully review theagenda to be certain of the time and order of presentations in your session.Additionaldetails are provided below on the scope of each session, and the amount of time speakers havefor their presentation. Time allotted to speakers varies by session.
Guidance by Session
WELCON E
Chair: Volker ter MeulenSpeakers: Krull, Courvoisier, Griffin, HackerEach speaker has 5 minutes to give welcoming remark.Scope: Describe purpose of science academies’ involvement in thisworkshop.
KEYNOTE LECTURES: /~\.l\lE\/1/ AGE OF BIOLOGY (90 minutes)
Chair: Indira Nath.The chair will take 3-5 minutes to make opening comments and introduce the speakers.Speakers: Ramakrishnan, Lovell-Badge, BrossardEach speaker has 20 minutes for theirpresentations.Please be prepared for a short (25 minute) Q&A period thatwill take place immediatelyafter the keynotetalks.
Scope: Provide high-level overviews of genome editing technologies within the broader context ofbiotechnology (Ramakrishnan),the promise and perils of genome editing technologies (Lovell-Badge), and the importance of and practical considerations for communicatingabout new
technologies with membersof the public (Brossard).
Thank you very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
SESSION 1 £\D\/ANCES IN GEI’\'OI'\/IE EDITIIRIG: PRQIVIISE AIXID RE/—\DINES.‘E.i (105 minutes)
0 Chair: Béirbel Friedrich.The chair will take 3-5 minutes to make opening comments and introduce the speakers.
0 Speakers: Pei, Voytas, Gould, RandauEach speaker has 20 minutes for theirpresentations. Please be prepared for a 15 minute Q&A periodthatwill take place immediatelyafter thesession presentations are all complete.
0 Scope: Outline the latest developments in genome editing technologies, their potentialapplicationsand theirstate of readiness for use for public health, human medicine, agriculture, andconservation. Specific questions and issues include:
o What are the methodsand what can theydo in gene function research?0 What are the research and societal value?o What are timelines for development and application of genome editing technologies (within
a wide range of organisms and levels of biological organization - cellular to ecosystem)o What are the implicationsof differences between alternative genome editing approaches
and their technical requirements (where relevant)?
SESSIOIKI 2 ASSESSING THE SECURITY Dill./IENSIGNS ASSOCIATED UVITI-I SPECIFIC APPLICATIONS OFGENOIVIE EDITING TECl—li\.!OLOGlES (Plenary — 4'5 min)
0 Chair: David RelmanThe chair will have 5 minutes to make opening comments and introduce the speakers. The chairwill have 10 minutes at the end of the session to describe the purpose and logistics for the Session2 Breakout Groups.
0 Speaker: Piers MillettThe speaker will have 20 minutes for his presentation. Please be prepared for at 10 minute Q&Aperiod thatwill take place immediatelyafter the presentation.
0 Scope: Describe the range of and evidence for potential security concerns in the near- middle- andlong-term. Specific questions and issues include:
o What are the presumed major security risks for each key application of genome editing?0 How achievableare these presumed security concerns? Are there biological, technical,
expertise, or infrastructure related constraints on the security concerns?
SESSION 3 S'l'Rl-WEGIES FOR /JIDDRESSIIXIG POTEIXITIAL SECUP'.IT‘a’ RISKS UF GENOIVIE(Part 1 — 90 minutes; Part 2 —= 45 minutes)
0 Chair: PilarOssorioThe chair will have 5 minutes to make opening comments and introduce the speakers. The chairwill have 10 minutes at the end of the session to describe the purpose and logistics for the Session4 Breakout Groups.
Thank you very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
SESSION 5
Speakers: Garfinkle, Rao, Feakes, Rhodes, Nath, Sieber,Jenal, EdwardsEach speaker has 10 minutes to give their presentation. 5 minutes are allocated to each themeforclarifying questions from the audience.Session 3 is organized into themes.Two speakers willaddress key considerations for each theme.Scope: Highlight key strategies to identify, manage, and communicate about security issues forgenome editing applications. The following general ‘strategies’ will be discussed:
0 National/Regional Legal, Regulatory, and Policy Strategies (General)0 International Legal, Regulatory, and Policy Strategies (Security Specific)O Norms of Responsible Behavior and Voluntary Guidelines0 Scientific and Technical Strategies
PUBLIC COMl't"iUNlCIfi.TlOl\l .£.l\lD El2!G;’-‘*.G.=.'El\fEl‘~.'T ON POTEl\lT!£3.L SECURITY RISKS OF GEl'\'Of\fiEEDITING APPLlC2ATlOl‘~.'.S (E30 iTllTiLll€;S)
Chair: Dietram Scheufele.The chair will have 5 minutes to make opening comments and introduce the panelists.Panelists: Stollorz, Brossard, Delborne, Heitman, KorbmannEach panelist has 7 minutes to provide opening comments. We kindlyask the session 5 panelists tolimit presentations to no more than 5 slides, or to not use slides.A 55 minute panel discussion will begin immediatelythe panelists have given theiropening comments.Members of the audiencewill be encouraged to ask questions during the panel discussion.
Scope: Discuss evidence-based, culturally relevant considerations and practices for communicatingabout risks and benefitsof genome editing technologies, and explore roles for the media andscientificcommunity in the dialogue about security implicationswith society.
SESSION 6 THE VW1‘-.Y AHEAD (-45: minutes)Chair: Robin Lovell-Badge.The chair will have 5 minutes to make opening comments and introduce the panelists.Panelists: Friederich, Winnacker, Millet, Mills, Nath, ScheufelePanelists be prepared to provide your brief reflections (1-2 minutes) on workshop themes,common areas of agreement (and disagreement),and ideas for next steps. Reflections will befollowed by facilitateddiscussion with membersof the audience.Scope: Reflect on themesand lessons from the workshop, drawn from plenary and breakoutsessions. Outline needs and ‘next steps’ (conceptual and concrete) to continue to build a
community thatexamines security implications of genome editing and to further the conversation.
Thank you very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
From: Royden Saah
T03 .\’LQQ|_'Z3Ln.._&§D£§Cc: Eligabgth HgitmgnSubject: Gennany MeetingDate: Monday, October 09, 2017 4:56:10 PM
HiRenee,
Coordinating a meeting between you and Elizabethhas been on my task list. In speaking with hertoday, I thinkyou will both be in a meeting in Germany (VW as I recall) in the near future.
If so, could you see about connecting to meet each other?
Also, you will both be in the DC GBIRd meeting on Nov 5”‘.
Fair Winds,Royden
J. Royden Saah
Program CoordinatorGenetic Biocontrol of Invasive RodgntsIsland Conservation+1 919 520 5954 (mobilein USA)Roydensaah (skype)
fle:dLi1lF;ar_eLv_r)e<>_klLvLi_i_I.eL|F'l“l<"|l%_l(2£?.
From: Monica GonzalezTo: Adam Brenne_r; E|izab_eth Heitman; Th§r<§a_De Frgitas NicholsonSubject: GuyanaDate: Thursday, October 05, 2017 9:53:12 PM
Rev was asking about nursing interest to try to collaborate. Would you all even know where tostart with that?
Monica
Get Outloglg for jg )3CONFIDENTIALITYNOTICE This message (including any attachments) is intended onlyfor the use of the addressee(s) and may contain information that is privileged and confidential.If you are the intended recipient, further disclosures are prohibitedwithoutproperauthorization.If you are not the intended recipient or an authorizedrepresentative of theintended recipient, the use, dissemination or reproduction of this communication is prohibitedand may be a violationof federal or state law and regulations. If you have received thiscommunication in error, please destroy all copies of the message and its attachmentsandnotify the sender immediately.The Dallas County Hospital District and its affiliatedentitieshereby claim all applicable privileges related to this information.CONFIDENTIALITYNOTICE This message (including any attachments) is intended only for the use of theaddressee(s) and may contain information that is privilegedand confidential. If you are theintended recipient, fiirther disclosures are prohibitedwithoutproper authorization.If you are
not the intended recipient or an authorizedrepresentative of the intended recipient, the use,dissemination or reproduction of this communication is prohibited and may be a violation offederal or state law and regulations. If you have received this communication in error, pleasedestroy all copies of the message and its attachmentsand notify the sender immediately. TheDallas County Hospital District and its affiliatedentities hereby claim all applicable privilegesrelated to this information.
From: ElizabethHeitmanTo: ElizabethHeitman
Subject: Hotel accommodation for Biosecurity workshopDate: Tuesday, September 19, 2017 5:30:00 PM
Dear Ms Riilsmann,
After re-reading your email below I have realized that I do not yet have information on myhotel accommodations. I completed the registration form in July, indicatingthat I would need
a hotel room from October 10”‘ through the 14”‘.
Is there a group reservation for the
speakers or do I need to make my own reservation ? If the latter, I would be grateful forrecommendationson the appropriate hotel or hotels to contact at this time.
Sincerely,
Liz Heitman
ElizabethHeitman, PhD
Program in Ethics in Science and Medicine
University of Texas Southwestern Medical Center
5323 Harry Hines Boulevard, NC5.832
Dallas, TX 75390-9070
(214)-648-5379(214)-648-4967 faxEmail: _E_|lA3belh.Heit_man@LJTSQu1;hwestern.eduwww. hw rn.e hi
From: ElizabethHeitmanSent: Tuesday,September 19, 2017 5:13 PM
To: 'Vo|kswagenStiftung'<events@vo|kswagenstiftung.de>Subject: RE: Registration for break out groups / Biosecurity workshop
Thank you for the updated agenda. I have attached my response form here. Since I will be
moderating the second session of Breakout Group #3, I would like to be part of thatgroup for the
first session, too.
With best wishes,
Liz Heitman
ElizabethHeitman, PhD
Program in Ethics in Science and Medicine
University of Texas Southwestern Medical Center
5323 Harry Hines Boulevard, NC5.832
Dallas, TX 75390-9070
(214)-648-5379(214)—648—4967 faxEmail: E|i;abetb,Hei];mar]@llT§Qu1;hwe§j_ern.@lw w.r r hw rn.
.
hi
From: Vo|kswagenStiftung [mailtp:event§_@vQlk§wagenstiftung.de]Sent: Tuesday,September 19, 2017 8:42 AMTo: ElizabethHeitman< >Subject: Registration for break out groups / Biosecurity workshop
Dear Dr. Heitman,
We very much look forward to welcoming you to our international workshop "Assessing the SecurityImplicationsof Genome Editing Technology"on October 11”‘ - 13”‘, 2017
.
The workshop will take place at Herrenhausen Palace, Herrenhauser Stralse 5. 30419 Hanover,Germany.
Please find a detailed information about our conference venue l'_i9_r_e.
If you are not a speaker, chair, steering or organization committee memberor travel grantee,please make sure that hotel accommodationhas been booked. You can find hotelrecommendationsat our website, too.
In order to organize the break out groups we would like to ask you to send back the attachedf 2 2 17. Please use the following e-mail address to register for
one of the four break out groups:
If circumstances should have changed and you could no longer participate please cancel yourregistration via our event portal. We still have a waiting list and you can offer your place to anotherinterested person if you cannot attend. Simply use the :_egj_s_tr_a_tj_o_n_p_o_:La1 to cancel or write an
email to .Thank you!
Kind regards.
Mareike Rtilsmannand Pavel Dutow
VolkswagenFoundation
From: Eliz h H im n
To: Eliz th H i m n
Subject: Hotel accommodation for Biosecurity workshopDate: Tuesday, September 19, 2017 5:30:40 PM
Dear Ms Rulsmann,
After re-reading your email below I have realized that I do not yet have information on myhotel accommodations. I completed the registration form in July, indicatingthat I would need
a hotel room from October 10”‘ through the 14”‘.
Is there a group reservation for the
speakers or do I need to make my own reservation ? If the latter, I would be grateful forrecommendationson the appropriate hotel or hotels to contact at this time.
Sincerely,
Liz Heitman
ElizabethHeitman, PhD
Program In Ethics in Science and Medicine
University of Texas Southwestern Medical Center
5323 Harry Hines Boulevard, NC5.832
Dallas, TX 75390-9070
(214)-648-5379(214)-648-4967 faxEmail: Elizabe_t_h.Heitman@UTSout_hwestern.eduvvww.u;smiI;hwes_I;ernegjiizgthics
From: ElizabethHeitmanSent: Tuesday,September 19, 2017 5:13 PM
To: 'Vo|kswagenStiftung'<events@vo|kswagenstiftung.de>Subject: RE: Registration for break out groups / Biosecurity workshop
Thank you for the updated agenda. I have attached my response form here. Since I will be
moderating the second session of Breakout Group #3, I would like to be part of thatgroup for thefirst session, too.
With best wishes,
Liz Heitman
ElizabethHeitman, PhD
Program in Ethics in Science and Medicine
University of Texas Southwestern Medical Center
5323 Harry Hines Boulevard, NC5.832
Dallas, TX 75390-9070
(214)-648-5379(214)-648-4967 faxEmail: Elizabethfleitman@lJT§Q;;1hwe5:eru.eduwww. o thw rn. hi
From: Volkswagenstiftung[mai|:Q:evem;s@vQ|k§wagen§:if:ung.de]Sent: Tuesday,September 19, 2017 8:42 AMTo: ElizabethHeitman <
' i m T h >
Subject: Registration for break out groups / Biosecurity workshop
Dear Dr. Heitman,
We very much look fowvard to welcoming you to our internationalworkshop "Assessing the SecurityImplicationsof Genome Editing Technology"on October 11”‘ - 13"‘, 2017
.
The workshop will take place at Herrenhausen Palace. Herrenhauser Stral3e 5, 30419 Hanover,Germany.
Please find a detailed information about our conference venue _l3g_r_e.
If you are not a speaker, chair, steering or organization committee memberor travel grantee,please make sure that hotel accommodationhas been booked. You can find hotelrecommendationsat our website, too.
In order to organize the break out groups we would like to ask you to send back the attachedr r 2 2 17. Please use the following e-mail address to register for
one of the four break out groups:fle;t
lf circumstances should have changed and you could no longer participate please cancel yourregistration via our event portal. We still have a waiting list and you can offer your place to anotherinterested person if you cannot attend. Simply use the Le_gj_s_t;;a1j_o_n_p_Qi;ta_[to cancel or write anemail to .Thank you!
Kind regards,
Mareike RiJl3mann and Pavel Dutow
Volkswagen Foundation
—:— —-.u—- 1 r t—:—-
UT SouthwesternMedical Center
The future of medicine, today.
From: Royden Saah
To: gQirgj@|i§;§.ng§;;.§QgCc: Elizabeth_He_ij;man; Chad HansonSubject: Hotel Contract Signed for Safe Genes/GBIRd MeetingDate: Thursday, September 14, 2017 5:06:41 PM
Hello Team
Island Conservation signed the connect with a Washington DC hotel. I will send out details as
I get them (meeting codes and such).
Warm RegardsRoyden
From: gggh VincigggrrgTo: Eliz th H im n
Subject: IZT - Baltimore & Washington, DCDate: Monday, October 30, 2017 10:01:44 AMAttachments: tjgigmgg 11Q32Q12 Washington Ix 12T §igngg1.pgf
Hgigmgn 11Q32Q17 Ealtlmgrg I2! §ig[]§§j,Qd
Signed forms for this week's travel. . .
UT SouthwesternMedical Center
The future of medicine, today.
-,-U1 50U1~HwEgH3RN Intent to Travel Form IZTM E D I C A L C E N T E R
Department of Psychiatry F°" UTSW°"‘P'°‘/"'-‘es°“'V
Traveler'sName (Mustmatch the ID you willuse) Date SubmittedlizabethHeitman Facultv I? Yes l" N0 10,13,2017
Dates of TravelL M
Start Date
End Date
-
T°ta|H°urs/Davs I
VacationDays Taken
l starmme E:-:——::I T0ta|H°urs/Davs[IE-_'::l|::-T.-'-:1 [ii
Destination Of- (use separate sheet for each additional destination)City: State/Count :"
Di=m°*C°'umbia
Business Travel PurposeConference: Name of conference: 3rd Annual Mtg Genetic Biocontrol of Invasive Rodents partnership (GBIRE
PresemiingiI: Title Of Presentation! Overviewof GBlRd's pending External EthicsAdvisoryCommittee
Start Date
Host Paid: Host Name: Island Conservation/NorthCarolina State University/GBlRd
Expenses h°5t is paVi"3‘ airfare, hotel, ground transportation, some meals
E] ScientificCommittee/ReviewBoard: Name:
Re5e3'Ch/TFBWDBRelated? Chairs external ethicsadvisory committee; mtg to discuss its role & potential fundi s
C] Other: Explain:
Benefit to UTSW or Grant Funding:
0 share UT Southwestern research and scholarship in theadvancementof education and bestpractices in practicaland professionalethicswithotherscholars and established researchers
ApproximateCost:
Lodging Registration lncidentals Total Host Paid Self Paid
Rental
$500 sTraveler'sSignature
I certify thatthe information provid by me in thisdocument is, to the best of my knowledge, true an - correct.FX‘ otédfi A
¢____*_ Date /0 /g" /7.4 __..__
U’ Reports To Signature
Signature SignaturePrint NameChair Approval for Non-Facultyand/or InternationalTravel
O:\PSYCH\PSYCHSharing\l2T\|2TForm
;_;|- SOUFHWESTERN Intent to Travel Form l2TM E D I C A L C E N T E R
Department of Psychiatry F°' “T9”°'“P'°V°°5°“'V
Traveler'sName (MustmauhtheID you will use) Date Submitted
ElizabethHeitman I Faculty if V95 F No 10/13/2017
Dates of TravelSta” We 11 so__
aaaa <4
Total Hours I Davs
VacationDays Takenstart We Total Hours/DaysE“d°ate I:-—Z.":ll""‘__-III_ZII"_'.__l l‘:_‘::l
Destination 1 Ofi (use separate sheet for each additional destination)C’t : State C t :" :°'e ::j ' °""”
Business TravelPurposeConference: Name of conference: Gates FoundationConference- TalkingAboutGene Drives
Host Pald: Host Name: Island Conservation/NorthCarolina State University GB|Rd project
E"pe"5e5 h°5t '5 pa‘/mg‘ airfare, lodging, some meals
E] ScientificCommittee/Review Board: Name:
R€5€3l'Ch/TwiningRelated: how to talkto thepublic about geneticallymodified mosquitoes 8: gene drives
[:| Other: Explain: Directly related to planned project on grant withTexasA & M and GBlRd EthicsCommittee
Benefit to UTSW or Grant Funding:
0 share UT Southwestern research and scholarship in theadvancementof education and best practices in practicaland professional ethicswithotherscholars and established researchers
ApproximateCost:
Lodging Registration lncidentals Total Host Paid Self Paid
Rental
"E121Traveler'sSignature
I certify thatthe information dby me in thisdocument is, to the best of my knowledge, true and correct.
Signature9- @6575 gé/LP.-‘"—
Date/g [g /
Reports To Signature
I
Signature Date
Print NameChair Approval for Non-Facultyand/or InternationalTravel Date
——————————-—-—-—
O:\PSYCH\PSYCHSharing\|2T\l2TFonn
From: RutnxmsjguecraTo: flzahetnfimmlanSubject: I2T - NashvilleDate: Tuesday, October 24, 2017 4:13:31 PMAttachments: ' vii I i n
Just picked it up from the Chair's office. . .
UT SouthwesternMedical Center
The future of medicine, today.
3 SOUI-HWESTERN Intent to Travel Form l2TM E D I C A L C E N T E R
Department of Psychiatry F9’ UTSW°'“P'°V‘-'95 °"'V
Traveler'sName (MustmatchthelDy_ouw_il_luse)_ _
Date SubmittedllzabethHeitrrian F3CU|tV ‘Y YES I— No 1011312017
P P
Dates of Travel
Start Date
End Date Total Hours/ Days
T_IVacationDays Taken
starwate |::——:|“'_--—-_:--:1 malnours/DaysEnme l_I-.I_II""‘.;__I—I"_'ll__%_-_II-_‘| 1:3
Destination 1 Of | (use separate sheet for each additionaldestination)C’: StatC t:"" e'°"""'
Business Travel Purpose
E] Invited Speaker/VisitingProfessor: Name of company/university: D HonorariumAmount: S|
Host Paid: Host Name: VanderbiltUniversity Medical Center (Fogarty Grant—MozambiqueResearch)
Expenses host is paying: ravel and lodging
[:| ScientificCommittee/Review Board: Name:
R9593"Ch/T"3i""‘8Related: Meet w/ Co-Pl & Trainee- workon manuscripts, NIH progress reports, frame project
D Other: Explain:
Benefit to UTSWor Grant Funding:
0 share UT Southwestern research and scholarship in theadvancementof education and bestpractices in practicaland professional ethicswithotherscholars and established researchers.
ApproximateCost:Air Fare,
Taxi, Lodging Registration lncidentals Total Host Paid Self PaidShuttle,Rental
Traveler'sSignatureI certify thatthe informationprovided by me in thisdocument is, to the best of my knowledge, true and correct.
Sisnature Date /0 /7 I 7
Reports To Signature
Signature
Print NameChair Approval for Non-Facultyand/or internationalTravel
f\.\ l'IC'\If'I I\ l'|f'\Il“'lJ¢'L4...3.....\l"\"I'\ l'\1" l‘-.._.
From: Birth yingiggiggraTo: Ii i
Subject: I2T- Washington, DC; Kansas City; TempeDate: Thursday, September28, 2017 7:28:25 AMAttachments: Heitman 1011525117 Washington og; I2T.pdf
Heltmgn 1Q192Q1Z Kansasggity [2[,QdfHgitman 11292917 Tempe 12].Qdf
Hi Liz,
Please find attached the signed Intent to Travel forms for your trips to Washington, DC; Kansas City;and Tempe. Please let me know if you need me to take care of any of your travel arrangements.Thanks.—Ruth
UT SouthwesternMedical Center
The future of medicine, today.
;_;|-SQ Intent to Travel Form IZTM E D I C A L C E N T E R
Department of Psychiatry F°' UTSW e'“P'°V°°5 °"'V
_ D_ate SubmittedF3C“"‘V [>7 Yes '— N0 |o9/19/2017
Traveler's N'ame (Must match the no you will use)[ElizabethHeitman
Dates of Travel
Start Date' _
[10/1__9__,2Q17_
Start Time Tota| H‘ou?5_/fipays _
E"d Date lm/99/7n17 A _J 5'“ Time
VacationDays Taken
End Date | f | End Time_
j I I I
Destination 1 Of :1 (use separate sheet for each additional destination)City:
_
State/Country: c 1Kansas City Missouri
Business Travel Purpose
[2 Conference: Name of conference: lAS_BH AnnfllMtg: J_o-urney to theCenter of Bioethics& the Humanities 1Jurjjjj —-7; -—-—4—j
PTESEWPS3 |Yes | Title Of Pre5e“t3tl0n1[Panek Loss of PublicTrust in Research & Its Consequences for Resii3 Invited Speaker/VisitingProfessor: Name of company/university:
:| Honorarium Amount: S LOT-
j j. 1 r . :1 —:. |El Host Paid: Host Name: LExpenses host is paying: None |
E] ScientificCommittee/Review Board: Name: | T I IE] Research/TrainingRelated: |
1 r\- L 2 - Z:
—- -7 mmC] Other: Explain:-T - - u :11 T:- —_1 -—:
Benefit to UTSW or Grant Funding: |
To share UT Southwestern biomedicalethics research and scholarship |ApproximateCost:
Air Fare,Taxi, Meals Total Host Paid Self Paid
Shuttle,Rental
.
_
_ T T__ _ _
. I— . _ A
$I3_75 I $I4oo I $I1825 I slo%
||$ 1825
Traveler'sSignatureI certify that the information provided by me in this document is, to the best of my knowledge, true and correct.
SignatureL _
Date_ _
Reports To Signature
Signaturej j L _
Date
Print Name‘I _ _ i f
Chair Approval for Non-Facultyand/or InternationalTravel
_ r _ _
Date
O:\PSYCH\PSYCHSharing\l2l\|2TForm
;_;|-S0 Intent to Travel Form IZTM E D I C A L C E N T E R
Department of Psychiatry F°' UTSW °'“P'°V°°5 °"'V
4-—4- —
TT3Velel"5Name (Must match the ID you_will use)r
Date SubmitaElizabethHeitman | [F35-UltY D? Yes l_ N0 log/19/2017 l
_ Dates of Travel_
Start Date I10/02;/2017 ' | Start TfieEnd Date lm,,m,,In117“ ’ ' | End Time
VacationDays TakenStart Date i| '
_ _ ‘| Start Time J '_ T
-rota] Hours / Days_
End Date End Time |_
| l m — I - - - j
Total Hours / Days[2 1/2 davs
L
4:
-_ L
Dest_ination 1 Of l:l(use separate sheet for each additional destination)City: ' - State/Country:
Washington J District of Columbia
Business Travel Purpose Conference: Name of Conference: [AdvancingDiseaseModeling in Animal-Based Research in Support o-fPrefi
P|'95€‘”tl“83 Yes .Title Of Presentation? Ethical8: welfare considerations regarding precision animal mode&
‘I Invited Speaker/VisitingProfessor: Name of company/university:mu
—-2. - 4:——
Honorarium Amount: S 0 l4:j: L «j_— ———j
Host Paid: Host Name: Office of Research Infrastructure Programs, National Institutes of Health
Expenses host is paying: All travel-related expenses, lodging, meals
E] ScientificCommittee/Review Board: Name:I I
:| Research/TrainingRelated: I J i ' _ j _ |[3 Other: Explain: E_— — 4
g-— jj —- r n -j
Benefit to UTSW or Grant Funding:
To share UT Southwestern biomedicalethics research and scholarship as participants explore the potential of .
ongoing and future research in animal models with implicationsfor precision medicine. ‘
—_ .1 4- - —
Self Paid
Traveler'sSignature
I certify thatthe information provided by me in this document is, to the best of my knowledge, true and correct.
Signaturen _ k _
Date_ _ _ _
Reports To Signature
Signature_ ___ _ L _
Date_ _ _
Print NameChair Approval for Non-Facultyand/or InternationalTravel
a _
Date
O:\PSYCH\PSYCHSharing\l2T\l2TForm
-U1’SO .
Intent to Travel Form IZTM E D I C A L C E N T E R Department of Psychiatry F0’ UTSW e"‘P'°Ve°5°"'V
_1T|'3VeIeI"5 Name (Must match the ID you will use)ElizabethHeitman
Date SubmittedF3°U'tY '7 Yes I. N0 09/19/2017
—_
Dates of Travel
_—. muStart Date '11/E9?/2017 I Start Time I3-QQ EM Tota| Hours / DaysEnd Date 39/n1/9n17
t
_J End Time 11:30 PM I 21/2 davs- I
VacationDays Taken I
i End Date ' ‘
L
End Time |_ j _
I I
_
Destination 1 Of (use separate sheet for each additional destination)City: —"— State/Country: ‘
Tempe Arizona I Business Travel Purpose
:1 Conference: Name of conference:
| Presenting: I Title of Presentation:
Invited Speaker/VisitingProfessor: Name of company/university:
Honorarium Amount: Sr
' x Host Paid; Host Name: INationa| Academies of SciencesI
IExpenses host is paying:
I:I ScientificCommittee/ReviewBoard:Name:fl f r a I
D Research/TrainingRelated:_ ' L | I
Other: E"pIaI"3 NAS Board on Life Sciences fall meeting. Dr. Heitman is; board member. I
Benefit to UTSW or Grant Funding:1 L r ~_ -1|:I_O share UT Southwestern biomedicalethics research and scholarship
-T: j —_-
ApproximateCost:
Air Fare,Taxi, Registration lncidentals I
Shuttle,Rental
slo $I§J Traveler'sSignature
I certify that the information provided by me in this document is, to the best of my knowledge, true and correct.
Signature_ _ _i i _
Datej _
, Reports To Signature
I Signature1
DateL _
I
I Print Name_
fl _ _
Chair Approval for Non-Facultyand/or InternationalTravel Date
O:\PSYCH\PSYCHSharing\|2T\|2TForm
From: Qhriggphgr PerkinsTo: Eliz h H i n
Subject: INC1106816 : Heitrnan : Commons affiliationDate: Friday, September 15, 2017 4:34:43 PM
Greetings, Dr. Heitman.
Per your request (R2772),or request by someone in your behalf,your existing NIH eRA Commons
user profile_is now affiliatedwith UTSW.
Kind regards,
Chris Perkins, M.A.Sr. Business AnalystOperations,Academic & Administr Information Resources,UT Southwestem Medical Center214.645.6117Onlipe PACT Form
UT SouthwesternMedical Center
The future of medicine. today.
From: ' h '
m n
To: yigki DennigSubject: info for retreatDate: Friday, September29, 2017 2:11:00 PM
Dear Vicki,
I have been remiss in my delay providing anyone with my information on honors and awards thatwarrant mention at next week's departmental retreat. Ruth says thatyou are the most appropriateperson to receive them at this point.
I would include the following three items as honors, to be worded as you thinkbest:
1) I was named and served as the Chair of the National Academies of Sciences, Engineering andMedicine's Committee on the Elaboration of a National Curriculum in BioethicsandResponsible Conduct ofSciencefor Algeria.
2) I was named and served as the U.S. Co-Chair of the National Academies of Sciences,Engineering and Medicine's Committee on Responsible Science in Egypt, Phase 3: FosteringAcademic Curricula.
3) I was re-elected to the Executive Board of the Association of Practicaland ProfessionalEthics, and will serve a 4 year term (UntilJune 30, 2021).
Thanks
Liz
ElizabethHeitman, PhD
Program in Ethics in Science and Medicine
University of TexasSouthwestern Medical Center5323 Harry Hines Boulevard, NC5.832
Dallas, TX 75390-9070
(214)-648-5379(214)-648-4967 faxEmail: Elizabeth. eitman@U"&Lith
w ' utw "m. _J h'cs
From: Thevenon, Audrey
To: Abhi Veerakumarasivam;; ElizabethHeitman;
Peter MillsCc: ; ;Volker ter Meulen; robinfears; Eater Mcgrath; Adrian, Qelina;
— 52.4%A Hike
Subject: Instructions - Security and Genome Editing - Breakout Session 4Date: Tuesday, October 03, 2017 10:37:51 AMAttachments: Breakggt Sessign 4 - Instriigtignsgdf
mmun'ca ion and cial edia Guid "n f
Importance: High
Dear Colleagues,
Thank you again for accepting the invitation to participate in the international workshop, AssessingtheSecurity implicationsof Genome Editing Technology,10-13, October, 2017 in Hanover, Germany.We are emailingyou as a group, becauseeach of you is serving as a chair, speaker, or rapporteur in
the Breakout Session 4 on Addressing and Mitigating Potential Security Risks Associated with
SpecificApplicationof Genome Editing. Also copied is the chair of the plenary sessions during whichbreakout out groups will share the results of their discussion.
To help you prepare for the workshop, we developed instructions about your role, the scope ofthe session, communication guidelines, among otherdetails. We are also emailingyou as one groupto provide you with the opportunity to introduce yourselves to one another and coordinate
presentations or key points of discussion in advance of the workshop. Please refer to the email sent
last week if you would like to engage participants of the breakout session 2 as well.
Please carefully read through the following attached documents in advance of the meeting:0 Breakout Session Instructions for Chairs, Speakers, and Rapporteurs- Communication and Social Media Guidelines- We are still accommodating last minute changes in the agenda but at any time, the most
updated version of the agenda can be found here: bttp;[Zma5-sites,Qrg[dels[events[ge-securhyz
In the attached breakout session instructions, please take note in particular of the breakout session
questions, the amount of time allotted to the speakers, and the expected report-out format.
An important request and deadline, is for each speaker to provide a short abstract (2 — 3
sentences) of the key points or questions they plan to make during the breakout session. The
abstract will be used as a guide in preparing the workshop summary. The abstracts will not be made
public. We kindly ask the speakers to submit their abstract to Robin Fears(_ by10 October, 2017.
in addition to this email, we invite you to join us for dinner on Wednesday,October 11 to get to
know one another and exchange ideas. Further information about the dinner arrangements will be
provided later this week.
Additionaldetails about the workshop can be found at: http://nas-sil;e_s.Qrg[dels[eventszge-securityi
If you have any questions about the upcoming workshop, please do not hesitate to contact us.
Best Wishes,Keegan, Jo, and Audrey
Audrey D. Thévenon, PhD
Program OfficerThe NationalAcademies of Sciences, Engineering and MedicineBoard on Life Sciences500 FifthStreet, NW; Washington, DC 20001
Ph: 202334-2814nj
international WorkshopAssessing the Security lmplicatiorrs of
Genome Editing Technology
11-13 October,2017Herrenhausen Palace 0 Hanover, Germany
Instructions for Breakout Session 4 Participants
General Information
Overarching goals of theworkshop are:
o Launch a proactive, international discussion about what constitutes an evidence-based security concern, outlining the potential near— middle- and long-termsecurity concerns — relating to intentional misuse — thatmay arise from genomeediting applications.
o Describe potential technical, operational, regulatory and governance strategiesthatmay aid the scientific and security communities in preventing or mitigatingsecurity concerns
o Develop a networkof genome engineering, security studies, and public policyexperts to build awareness and facilitateinformation exchange about common
areas of study and concern, and potential communication mechanisms.
The Audience: Workshop attendees are a mix of scientists, security experts, and policymakers from different sectors (academia,government, industry, and NGOs). We
anticipate 150 attendees.
Website: The workshop program and background materials are accessible here:htt : nas—sites.or dels events e—securit
Social Media: In order to make the meeting a safe and comfortable space for everyoneto contribute, we ask you to adhere to the communication guidelines at the end of thisdocument. These guidelines are also posted on the website. Hashtag for the event:
#GeneEdit_Security
Report Summary: The IAP will publish a peer-reviewed workshop summary thatwill be
provided to workshop participants and broadlyavailableto the public.
Thank you very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
Breakout Chair Guidance
Your role as chair is to:
0 Introduce the session goals, the speaker, and the rapporteur.o Facilitatethe breakout discussion in a thoughtful and respectful manner,
creating opportunities for everyone to engage in the discussion.o Manage the time to make sure each of the breakout questions are adequately
discussed (see questions below).0 Ask session participants to adhere to the communicationguidelines (separate
document). Please take note thatwe are asking workshop participants to adhereto the Chatham House Rule during breakout session discussions.
o Develop and present the breakout session report with assistance from thesession speaker(s) and rapporteur.
Please carefully review the breakout session questions to be certain of issues that needto be addressed in order to develop the breakout session report. Carefully divide thetime during the breakout sessions to ensure thateach question is addressed.
Session report. Each breakout group is asked to give a brief (7 minutes) presentationduring the following plenary session. The report-out should consist of concise answers
to each of the discussion questions. It should not be a summary of everythingdiscussedduring the breakout discussion. A slide template for the session report-out will beprovided at the meeting.
Speaker Guidance
Speaker Abstracts. We kindlyask you to prepare a brief abstract (“'1-paragraph)on thekey points thatyou will make in your presentation or commentary. The abstract will beused as a guide in preparing the workshop summary. Your abstractwill NOT be madepublic. Please email your abstract to Robin Fears— by 10 October,2017.
Time. Each speaker will have 7 minutes to provide framing comments and questions forthe breakout discussion.
Please carefully review the breakout session questions to be certain of issues that needto be addressed in order to develop the breakout session report (brief power pointpresentation).
Thank you very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
Rapporteur Guidance
Your role as rapporteur is to:
o Take and organize notes for the breakout session, particularlyas they pertain tothe breakout session questions, adding additional relevant material as necessary.Your notes will serve as a resource to the chair in developing the breakoutsession report-out.
o Assist the chair with developing and/or presenting the breakout session report.Each breakout group will give a brief (7 minutes) presentation during thefollowing plenary session. The report—out should consist of concise answers toeach of the discussion questions. It should not be a summary of everythingdiscussed during the breakout discussion. A slide template for the session
report—out will be provided at the meeting.
Please carefully reviewthe breakout session questions to be certain of issues that needto be addressed in order to develop the breakout session report (brief power pointpresentation). A slide template for the session report will be provided at the meeting.
Session Instructions & Discussion Questions
Breakout sessions are a critical dimension of thisworkshop.
Chatham House Rule. In order to encourage open discussion and brainstorming, we
kindly ask participants to adhere to the Chatham House Rule during the breakoutsessions. That is, individuals are free to use the information received in outsideactivities, but neitherthe identity nor the affiliationof the speaker(s), nor thatof anyother participant, may be revealed. Please carefully review the communicationguidance (separate document) for additional details.
Breakout group assignments. Each person registered for the workshop is assigned to a
breakout group. In most cases, workshop participants will be assigned to their firstpreference of breakout topic. However, please understand that, in order to balancenumbers and expertise across the four groups, some participants may be allocated to a
group otherthan their first preference. Participants will be notified of their breakoutsession at theworkshop.
A list of individuals assigned to each breakout group will be sent to the breakout sessionchairs, speakers, and rapporteurs in advance of the workshop.
Thank you very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
SESSION 4- ADDRESSING AND IVIITIG/-"tTll\lG POTENTIAI- SECURlT'\" RISKS AS-SOCIATEDWITH
SPECIFIC APPLICATIONS OF GEI\IOl\flE EDITING (90 I\/IIl\lUTES)
Goal: Explore the range of technical, legal, regulatory, and policy mitigation strategies thatcould be applied to address potential security risks of genome editing applications. Eachbreakout groups will discuss potential strategies pertaining to 1 of 4 general applications of
genome editing (medicine, agriculture, gene drives, microbial applications), including the role ofscientists in promoting awareness and developing norms and practices for responsible conductof science.
1. Given the potential security implications associated with this application, what are the
primary legal, regulatory, and policy approaches thatcould be applied to address and
mitigate them? In addition, are there technical approaches for specific applications that
are being or could be developed to address these risks?
2. Are there approaches thatseem particularlyappropriate for thisapplication?Particularly inappropriate?
3. If safety or other key considerations emerged in the previous breakout session as a
major source of concern, how would addressing those considerations affect the
potential security implicationsassociated with this application?
Breakout Group 1: Mitigation to the risk of human cell editing applications (Auditorium)Chair: Duanqing Pei, Chinese Academy of SciencesSpeaker: AbhimanyuVeerakumarasivam,Sunway UniversityRapporteur: Johannes Fritsch, German Academy of Sciences Leopoldina
Breakout Group 2: Mitigation to the risk of applications in agriculture (Seminar 2)Chair: Sarah Hartley, University of ExeterSpeaker: Rene Custers, Vlaams Institute for BiotechnologyRapporteur: Nina Hobbhahn, European Academies Science Advisory Council
Breakout Group 3: Mitigation to the risk of gene drive applications (Seminar 5)Chair: ElizabethHeitman, University of TexasSouthwestern Medical CenterSpeaker: Ary Hoffman, University of MelbourneRapporteur: Sarah Carter, Science Policy Consulting LLC
Breakout Group 4: Mitigation to the risk of microbialapplications (Seminar6)Chair: Herawati Sudoyo, Eijkman Institute for Molecular BiologySpeaker: Filippa Lentzos, Kings College LondonRapporteur: James Revill, University of Sussex
Thank you very much for your willingnessto share yourexpertise, ideas, and time with us on this important activity.
internationalWorkshopAssessing the Security implicationsof
Genome Editing Technology
11-13 October, 2017
Herrenhausen Palace 0 Hanover, Germany
Communicationand Social Media Guidelines
Please read the following guideline before you tweet (or blog, or lnstagram, or Pinterest, or
Google+, or Linkedln, or share information through any other communication platform). In
order to find a balance between the needs and expectations of workshop speakers andattendees and to make the meeting a safe and comfortable space for everyone, we ask you to
use the following guidelines:
During the plenary sessions encourage open, respectful discussion of workshop content
on social media (e.g. Twitter, Facebook,Goog|e+, etc.) and blogging platforms duringthe workshop. Please use the following workshop hashtag: #GeneEdit_Security
While the default policy during the plenary sessions is to allow open discussion ofworkshop presentations on social media and blogging platforms, please respect anyrequest from speakers to not share the contents of their presentation online. Speakerswho do not wish to have their research chare by Twitter, Facebook,or othersocialnetworksshould make an announcement before and during her/his presentation. We
encourage speakers to also use an opt—out Twitter image on every slide of her/hispresentation to ensure their preference is known. An example of an opt-out Twitterimage can be found here: httpzz[egu2016.eu[egu2016 twitter no.png
During the breakout sessions we respectfully ask all participants to adhere tothe Chatham House Rule: workshop participants are welcome to use the informationreceived, but neitherthe identity nor the affiliationof the speaker(s), nor thatof anyother participant, should be revealed.
We expect all meeting participants to engage to behave with the highest of decorum intheircommunicationsonline and in person. Harassment, intimidation, or discriminationin any form will not be tolerated. Individuals who behave in a disrespectful or
discriminatory manner will be asked to leave the workshop.
From: Eliz h im n
To: Francesca LeeCc: Ruth VingiggggrrgSubject: Invitation to meet with Ethics Grand Rounds speaker Scott H. Podolsky, MD on Tuesday, November14thDate: Monday, November06, 2017 4:28:00 PMAttachments: _E_thic§ Grand Ro_ungs_Anrpyncerrent _1_11417.Qd_f
Dear Dr. Lee,
On Tuesday, November14”‘, the Program in Ethics in Science and Medicine will welcomeScott H. Podolsky, MD, Professor of Global Health and Social Medicine at Harvard MedicalSchool as November'sspeaker for Ethics Grand Rounds. Dr. Podolksy (no relation to
President Daniel Podolksy) is the authorof a numberof books on the history of treatment ofinfectious disease, the most recent of which is ThecllntibiotigEra: RebrmkR Pyrguit Qfa Rational Thegqpeutigs from Johns Hopkins University Press.
As head of the University Hospital's antibioticstewardship program, we would like to invite
you to attend Dr. Podolsky’s talk, ”The AntibioticEra: Historical and Ethical Reflections on
Seven Decades of Reform Efforts,” scheduled for 12 noon — 1 PM in D 1.602,
We would also like to invite you to meet with Dr. Podolksy before his talk on Tuesday forpersonal conversation of to join him and a small numberof other faculty and students at lunchafter his talk or a dinner the night before his presentation. Lunch will be in the facultycluband dinner will be at Javier's Gourmet Mexicano on Cole Avenue. Please let me know if youare interested and availableto join us by replying to fli;a;b_eth.Heitrnan@,l_JfLSou_thM/esteLr1_.ed1;or to Ruth.Vinciguerra@UT$mhw
I have attached the announcement for Dr. Podolsky’s Ethics Grand Rounds presentation, and
you can read more about himhere:D.O_d_Ql$lS¥
Sincerely,
ElizabethHeitman, PhDProfessor
Program in Ethics in Science and Medicine
University of TexasSouthwestern Medical Center
5323 Harry Hines Boulevard, NC5.832
Dallas, TX 75390-9070
(214)-648-5379(214)-648-4967 faxEmail: [email protected]
hiWWW.