Presentation Reinoud Bouwer


Published on

Presentation held during the workshop 'Biosecurity at the Science-Policy Nexus: Developing a Vision for the Future'

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • -
  • 31/01/11 © 2006 Capgemini - All rights reserved
  • Thanks for your attention
  • Presentation Reinoud Bouwer

    1. 1. Applied biosecurity Reinoud Bouwer, Biological & Environmental Safety Officer Plant Sciences Group Rathenau Biosecurity Workshop 06-10-2010
    2. 2. Biosecurity - Biosafety <ul><li>Definitions </li></ul><ul><li>Synergy and conflicts </li></ul><ul><li>Analyze and approach </li></ul><ul><li>Challenges </li></ul><ul><li>Organize biosecurity </li></ul><ul><li>Practical rules </li></ul><ul><li>Conclusions </li></ul>
    3. 4. Definitions <ul><li>Biosafety: </li></ul><ul><ul><li>Principles, technologies and practices implemented to prevent the accidental or unintentional exposure or release of pathogens and toxins </li></ul></ul><ul><li>Biosecurity: </li></ul><ul><ul><li>Principles, technologies and practices implemented to secure pathogens, toxins and sensitive technology from unauthorized access, loss, theft, misuse, diversion or unintentional release. </li></ul></ul><ul><li>Bioterrorism: </li></ul><ul><ul><li>Act of violence or the threat of using biological agents or toxins to further a political agenda or challenge democratic values. </li></ul></ul><ul><ul><li>Reference: </li></ul></ul><ul><ul><li>WHO/CDS/EPR/2006.6 </li></ul></ul><ul><ul><li>Laboratory Biorisk Management Standard </li></ul></ul>
    4. 5. Definitions (short) <ul><li>Biosafety: Keep bad bugs from people </li></ul><ul><li>Biosecurity: Keep bad people from bugs </li></ul><ul><li>(Murray L. Cohen, NSABB) </li></ul>
    5. 6. Dutch Biosafety Association (1) <ul><li>Contribution to the Biosecurity Code of Conduct (2008) </li></ul><ul><li>Contribution to the Biosecurity logo </li></ul>
    6. 7. Dutch Biosafety Association (2) <ul><li>Points of interests </li></ul><ul><li>To increase awareness </li></ul><ul><ul><li>Developing toolkits (RIVM project) </li></ul></ul><ul><ul><li>Pay attention to the codes of conduct </li></ul></ul><ul><li>Similar approach to: </li></ul><ul><ul><li>radioactive substances, </li></ul></ul><ul><ul><li>biological agents class 2,3,4, </li></ul></ul><ul><ul><li>quarantine organism </li></ul></ul><ul><ul><li>IT data protection / security </li></ul></ul>
    7. 8. Synergy Biosafety and Biosecurity Increasing risk awareness Inventory control Access restriction Redundancy of installations Compliance and accountability Incident reporting and response Evaluation and revision Education and training Transfer and transport Biosafety Biosecurity
    8. 9. Conflicts Biosafety - Biosecurity <ul><li>BIOSAFETY </li></ul><ul><li>open information </li></ul><ul><li>open communication </li></ul><ul><li>recognisable samples </li></ul><ul><li>rescuing lab workers in case of emergency </li></ul><ul><li>transport by protocol </li></ul><ul><li>contingency plan </li></ul><ul><li>BIOSECURITY </li></ul><ul><li>restricted information </li></ul><ul><li>restricted communication </li></ul><ul><li>coding of samples in storage </li></ul><ul><li>close barrier in case of emergency </li></ul><ul><li>tackle the gap between sender and receiver </li></ul><ul><li>restricted information to contingency (first aid) teams </li></ul>
    9. 10. Conflict to share knowledge <ul><li>Scientific </li></ul><ul><li>To communicate in a free academic world </li></ul><ul><li>To publish the results from life science research </li></ul><ul><li>Political </li></ul><ul><li>In accordance with the Biosecurity code of conduct </li></ul>
    10. 11. Range in organization level <ul><li>University </li></ul><ul><li>Public place </li></ul><ul><li>Life Sciences diagnostics and industry </li></ul><ul><li>Private domain </li></ul>
    11. 12. FIT–GAP (threat) analyze Wageningen UR Risks Inside theft Burglary Illegal transfers Delivering by ordering Sabotage Theft of production facilities Misuse of information Main issues Security policy Access control Purchase & stock control Personnel Information security
    12. 13. Success triangle Technical Procedures Attitude
    13. 14. SeMS structure at the organization level <ul><li>Security </li></ul><ul><li>Management: </li></ul><ul><li>Policy </li></ul><ul><li>Management of handbook </li></ul><ul><li>Advice </li></ul>QESH Buiding access management Security standards SeMS owner Personnel aspects Security as Part of HRM Implementation attitude & behaviour Security aspects as normal aspects of daily activities Management HR manager ?? ?? Line manager / head Security manager
    14. 15. Proportional approach by authorities? <ul><li>NO ! </li></ul><ul><li>Bad tuning, not very good project management </li></ul><ul><ul><li>In case of CBRN (anti-terrorism) project / Security Education and Life Science Facilities (SOK) </li></ul></ul><ul><li>Why? </li></ul><ul><li>Ministry for Health, Welfare and Sport </li></ul><ul><li>Ministry for Housing Regional Development and Environment </li></ul><ul><li>Ministry of Agriculture, Nature and Fisheries </li></ul><ul><li>Ministry of Social Affairs en Employment </li></ul>
    15. 16. Challenges for the BSO / Security Coordinator <ul><li>Hardware </li></ul><ul><li>To set up physical security </li></ul><ul><li>“ Software” </li></ul><ul><li>Key word is Awareness ! </li></ul><ul><li>Tune the process of awareness / corporate culture at BSL (2) 3,4. </li></ul><ul><ul><li>Monitor attitude & behavior </li></ul></ul><ul><ul><li>Only continue attention results in improved awareness </li></ul></ul>
    16. 17. Zoning of the site (1) Green: WUR employees and students, visitors Blue: PSG employees and PhD students Rood: authorized employees + first aid and (bio)safety officers
    17. 18. Monitoring and zoning level 1
    18. 19. Monitoring behavior
    19. 20. Zoning level 2 and 3
    20. 21. Practical house rules / advice <ul><li>Consistent policy, don’t accept exceptions </li></ul><ul><li>Don’t admit unregistered guests </li></ul><ul><li>Always guide visitors and technicans </li></ul><ul><li>Be aware of sensitive objects, information </li></ul><ul><li>Clean desk policy </li></ul><ul><li>PC’s logged off </li></ul><ul><li>Lock /close the doors </li></ul>
    21. 22. Conclusions and advice <ul><li>‘Mystery guest’ increases the urgency of awareness </li></ul><ul><li>Awareness has to be improved by board of directors, line managers, scientists and facility department </li></ul><ul><li>No Biosecurity without Biosafety </li></ul><ul><li>BSO & Security coordinator operate on the same organization level </li></ul><ul><li>Biological Safety Officer is not a security manager </li></ul>
    22. 23. Remarks for workgroup discussion © Wageningen UR