Professional Documents
Culture Documents
Cell-Line Authentication Demystified
Cell-Line Authentication Demystified
Some researchers run and hide from the task of authenticating cell lines. A few simple steps save time and
money.
Scientists are not easily fooled, but they many journals require authentication
can unwittingly fool themselves. The of cell lines, and grant-funding agencies
identity of a cell line might not be what recommend them, all of which makes
they assume it is. It is “very risky” for an many researchers optimistic that cell-
© 2014 Nature America, Inc. All rights reserved.
investigator to begin a project and spend line misidentification will one day be
several years working with a cell line and vanquished—or at least diminished.
yet be unsure of its identity, says Karina That day is not quite nigh. The pollution
Eterovic, who directs the characterized of labs and scientific literature with
cell-line core at MD Anderson Cancer misidentified cell lines may well be due to
Thinkstock
Center’s institute of personalized cancer a continued lack of awareness about the
therapy. extent of the problem, says Douglas Storts,
Skipping cell-line authentication can Researchers should know the true identities of who directs research and development
lead to lost time, money and publications their cell lines. for nucleic acid research technologies at
owing to cross-cont aminat ion and Promega. He is a co-author with Reid of
misidentification. Last year, a team had Reid, a cell biologist at American Type guidelines on cell-line authentication5 and
to retract work published in Nature Culture Collection (ATCC), a nonprofit was interviewed jointly with her.
Methods because the cells they studied biological resource center and repository Among the important resources is
were contaminated with other cells 1 . It that offers cell-line authentication services the Database of Cross-contaminated or
was not the first case2,3, nor is it likely to and is active in the area of standards in the Misidentified Cell Lines6, maintained by
be the last. life sciences. Reid has co-authored reports the International Cell Line Authentication
Eterovic helped colleagues clarify that on best practices in cell-line authentication Committee (ICLAC), a group founded
npg
the widely used KU7 line, derived from and the recommended standards5. in 2012 and run by volunteer scientists
bladder cancer cells, is in fact the HeLa cell The standards have brought about more to e st abl ish b e st pr a c t i c e s for t he
line4. The contamination occurred before change than the numerous warnings authentication and testing of human cell
1984 at the source institution, which has and pleas in past decades, Reid says. The lines. According to ICLAC, approximately
an effect on all KU7-based experimental standards are used in many labs and core 400 cell lines are misidentified6.
results and underscores the impact of facilities around the world. Workshops The oldest cell line, HeLa, which is one
misidentification. abound on best practices in tissue culture; of the most frequent contaminants of other
Cell-line authentication can seem too
time-consuming or daunting. Avoidance
and denial behaviors are widespread, BOX 1 ADVICE FOR THE PASSAGE
say researchers interviewed by Nature
• Cells must be transferred from flask to flask so they keep growing. But too much
Methods. They understand why their
passaging can lead to genetic drift from the parental cell line.
colleagues skip essentials to pursue
• There is no global right or wrong number of passages. The number varies across cell
biological questions without delay, but
and tissue types and culture conditions.
they say it is time to put a few common
• Begin with high-quality, authenticated and characterized cells.
misconceptions to rest.
• Watch the cells carefully. Media and environmental conditions such as temperature
and humidity need to be optimized for cells’ well-being.
Standards • Growth-curve analysis should be routine to keep track of cell-doubling times.
S ome sweet songs of praise for the • Freeze batches of cells at early passages.
scientific community can be heard on the • Use the lowest-passage aliquot to start fresh cultures.
subject of cell-line authentication. There
Sources: ATCC; Promega
has been “a lot of progress,” says Yvonne
including gene-edited ones. Short tandem repeats have less experience with the molecular
The main test for authenticating cell lines biology methods, she says. “Maybe they are
cell lines, was derived without consent is short tandem repeat (STR) profiling, the not comfortable with having to perform a
in 1951 from Henrietta Lacks, who had analysis of microsatellite regions of DNA test themselves.”
cervical cancer. The cells and the way they that have variable numbers of repeats and Scientists at core facilities might help
were acquired have been the subject of are located throughout the genome. The in various ways; for example, they might
controversy over the years. Last year, the approach originated with Alec Jeffreys’s be able to do the protocol more quickly,
HeLa genome was sequenced, rekindling discovery of variable genomic regions in Saldanha says. But they may also leave the
ethics issues because the family had not 1984, and development has continued since interpretation of results up to the scientists,
consented to the sequencing. Meetings then. which could pose a challenge for those
between members of the Lacks family and STR profiling is the test that most unfamiliar with the territory (Box 2).
leadership at the US National Institutes of journals require, says Eterovic, and the One misconception in some labs is that
Health (NIH) led to the establishment of assay is relatively simple. PCR amplicons cell-line authentication calls for an identical
a rule that all publications based on work are generated using primers for regions STR profile match. But STR profiling looks
with HeLa cells acknowledge the Lacks that flank these polymorphic sites. After for an 80% match or higher in profiled
family, who also help to oversee requests to amplification, PCR products are resolved loci, says Donald Finley, Sigma-Aldrich’s
use the genome data. using capillary electrophoresis, and a profile marketing manager for products relating
npg
It is still too early to tell how the for these repetitive regions is created. to Mycoplasma. Sigma-Aldrich also sells
discussions about these famous cells are Investigators can do the analysis on their kits for STR profiling.
influencing cell-line authentication trends. own, using kits from vendors with primers “With 80% you can be reasonably
Having the NIH director address issues and reagents for well-known STRs. Buying confident that you’re working with the cell
relating to cell-line identity is bound to be a kit avoids the need to design primers line that you think you’re working with,”
helpful, says Reid.
The published characterizations of the
HeLa cell line show a large number of BOX 2 TROUBLESHOOTING STR ANALYSIS
mutations and rearrangements and help
explain why HeLa cells are able to displace • With cancer cell lines it can be difficult to distinguish low-level STR peaks from
other cell lines, says Storts. noise. Using the recommended amount of DNA can help minimize noise.
• Using positive and negative controls helps troubleshoot STR profiles.
Passaging • Artifacts may require a repeat of the STR protocol.
Researchers must ‘passage’ their cells—by • ‘Stutter peaks’ are usually lower than true allele peaks, but using too much DNA
changing the growth medium so the cells can lead to extremely high stutter peaks, making them harder to distinguish from
have fresh nutrients and moving cells to true allele peaks.
other flasks to maintain their exponential • Dye blobs can appear as wide peaks, which the software might assign as regular
growth. The longer a cell line is kept in peaks. The blobs are formed when fluorescent dye tags detach from their primers.
culture, the higher the chances it will Sometimes this can happen if kits are not stored as vendors recommend.
• STR profiling software can identify atypically sized allele microvariants. Vendor
acquire genetic changes 7 . With more
kits might not cover all microvariants.
passages, genetic drift is more likely,
Source: ATCC
says Reid, which can lead to dropouts of
to perform further authentication steps around 4–5 hours to deliver a result, she
before beginning an experiment with such says.
cells. Non-PCR approaches involve the use of
Eterovic confirms that many types of indicator cells, which gives results within
stresses can result in loss of heterozygosity 16–24 hours, or Hoechst staining, which
or lead to genomic rearrangements, which takes about two hours and requires exper-
alter an STR profile. The stresses include tise to interpret the results. Sigma-Aldrich’s
extensive passaging, contamination with Finley agrees that using the Hoechst stain,
microorganisms, passage through mice and which his company also sells, is “a little
exposure to drugs. tricky.”
MD Anderson has its own STR database Many contaminants can kill cell lines, but
and an algorithm to match STR profiles from Mycoplasma is not one of them. Mycoplas-
unstable cell lines8. Many users can match ma can affect cell performance and render
their cells’ profiles with the help of a public
database. But STR results from unstable cell
lines or potential mixes of cell lines may also
require special algorithms and interpretation
npg
Mycoplasma
Most researchers are aware of potential
contamination by Mycoplasma bacteria,
but t hey probably underestimate its
frequency and the degree to which it
can inf luence their experiments, says
Andrea Toell, product manager at Lonza
Pharma&Biotech Bioscience Solutions.
An estimated 15–35% of cell cultures are
Coriell Institute for Medical Research
cate of analysis to show that the cell lines To establish that a cell line is of human cell lines that, upon authentication,
have been authenticated and are free of origin, the scientists perform a long- turned out to be misidentified. The genet-
contamination, says Finley. interspersed nuclear element (LINE) ic change that the sender said had been
A repository can be an in-house facility assay, which is sensitive enough to edited into the cell line was not present.
at a research institute or a separate entity. differentiate human DNA from closely The originating lab may have passaged
It can also be organized as a collection of related chimpanzee DNA, Berlin says. the cells too often, leading to genetic drift.
many repositories under one roof. In the Sigma-Aldrich partners with European “That’s how you end up with a mess across
cases of grouped repositories, each dis- Collection of Cell Cultures (ECACC) the whole sector,” he says.
tinct collection of biological specimens and sells cell lines that the ECACC has Starting a research project with a mis-
or cell lines belongs to a different uni- authenticated. ECACC is a cell and tissue identified human cell line and then lay-
versity group, hospital or company. The repository run by Public Health England, ering on gene-editing techniques exac-
Coriell Institute for Medical Research has which is part of the UK Department of erbates the problem of misidentification,
repositories for government, academic Health. because a lab might launch directly into
and nonprofit organizations and com- “Moving cell lines across borders is studying gene function with these cells.
pany labs. For example, they hold the cell difficult,” Finley says. If a US researcher “You need a characterized cell line from
lines and DNA of the US Human Genetic wants a European cell line, Sigma- the beginning,” says Disley, to analyze fol-
Cell Repository of the National Institute Aldrich’s distribution agreement will low-on experiments that look at deletions,
of General Medical Sciences. help with cross-border travel. For the cell insertions, substitutions, rearrangements
At Coriell, Dorit Berlin oversees cell- lines developed at Sigma-Aldrich, such as or to be able to credibly perform gain-of-
line repositories for several different those edited with zinc-finger nucleases, function experiments.
institutions. She and her team practice the company handles authentication, Horizon was originally established
cell-line authentication on a large scale. he says. to focus on a gene-editing technology