Biosecurity Plans

A biosecurity plan is implemented to prevent theft, misuse or intentional release of pathogens. The type of biosecurity plan implemented will depend on the nature of the facility, type of research and diagnostics conducted and the local environment. Key features of a biosecurity plan should include:

  • Facility security
  • Inventory of biological materials
  • Emergency protocols for security incidents

For more information on Biosecurity, please contact Risk Management Services at or (250)807-8656.

Biosecurity Requirements for CL1 and CL2 Work

For CL1 and CL2 work, inform the UBC Biosafety Committee with what biological material is handled in your lab and the room numbers in which they are being handled.

Please Note: An exhaustive list accounting for each tube is not currently needed for any Risk group 1 or 2 agents, although we do recommend it for pathogens.

CL1 and CL2 Pathogens

When working with pathogens (an agent that can cause disease in humans or animals), labs should have:

  • inventory of all vials, plates and tubes that are being stored. Working solutions of the agents that are currently being used for on-going experiments do not need to be inventoried.
  • access to the pathogens must be restricted to specific laboratory personnel.
  • tracking system must be established to determine if vials are unaccounted for.
  • personnel who do have access to the pathogens must be documented and kept on file.

Facility Security

In this part of the plan, strategies used to prevent the entry of unauthorized personnel and the theft of pathogens must be examined. For instance, outline how access to pathogens is restricted (i.e. kept under lock and key) and the facility’s specific security protocols to minimize the entry of unauthorized personnel (i.e. Key card access, identity badges, protocols for locking doors).

Protocols for Security Incidents

An emergency protocol must be in place to deal with cases in which unauthorized personnel have entered the building or pathogen samples were stolen, misused or intentionally released. This protocol must clearly state who needs to be contacted about the theft or unauthorized entry (i.e. supervisor, security, law enforcement agencies, RMS, etc.) and provide their contact details.