Biosecurity & Public Health
Detection, traceability, SOPs, and evidence preservation. Move fast, audit later; protect harmless research.
Healthy uses
- Routine testing with confirmatory procedures.
- Traceability for precursors and partners.
- Clear incident command and reporting paths.
Risks to avoid
- Unverified claims that cause panic or stigma.
- Loss of chain-of-custody evidence.
- Over-collection of personal data.
Controls & guardrails
- Standard operating procedures with drills.
- Chain-of-custody logging and tamper-evident storage.
- Privacy-preserving data collection and retention limits.
- Independent review panels for high-risk work.
Signals & metrics
- Time to detection
- Chain-of-custody integrity
- False positive/negative rates
Tech hooks
Data (lab/LIMS integration), Security (access controls), Compliance (public health regs), Observability (incident metrics).
Related playbooks
Point A → Point B, Fast
Architecture Sprint (1–2 weeks): Current → Target → 1–90-day plan. D1 maps, D2 target, D3 plan, D4 exec brief.