  {"id":57554,"date":"2025-06-05T15:28:03","date_gmt":"2025-06-05T22:28:03","guid":{"rendered":"https:\/\/www.washington.edu\/research\/?page_id=57554"},"modified":"2026-04-03T08:09:30","modified_gmt":"2026-04-03T15:09:30","slug":"research-security-at-uw","status":"publish","type":"page","link":"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/","title":{"rendered":"Research Security at UW"},"content":{"rendered":"<p>UW is required by the <a href=\"https:\/\/www.nsf.gov\/chips\">CHIPS and Science Act<\/a> to have an integrated program for research security.\u00a0 The UW Research Security program comprises various components which, together, fulfill federal legal and regulatory requirements.\u00a0 While the program centers on research, it applies to all university activities.<\/p>\n<h2>Content<\/h2>\n<ul>\n<li><a href=\"#export-control-regulations\">Export Control Regulations<\/a><\/li>\n<li><a href=\"#international-travel\">International Travel<\/a><\/li>\n<li><a href=\"#international-activities\">International Activities Assessment Process<\/a><\/li>\n<li><a href=\"#compliance\">Compliance, Disclosures, and Reporting<\/a><\/li>\n<li><a href=\"#restricted-parties\">Restricted Parties<\/a><\/li>\n<li><a href=\"#information-security\">Information Security and Privacy<\/a><\/li>\n<li><a href=\"#research-security-training\">Research Security Training<\/a><\/li>\n<li><a href=\"#research-security-role\">Research Security by Role<\/a><\/li>\n<li><a href=\"#research-security-design\">Research Security by Design<\/a><\/li>\n<li><a href=\"#contact\">Contact<\/a><\/li>\n<\/ul>\n<hr \/>\n<p><a name=\"export-control-regulations\"><\/a><\/p>\n<h2>Export Control Regulations<\/h2>\n<p>Sharing controlled items and information with a foreign national as well as shipping-controlled items to a foreign destination may require export licensing. There are some <a href=\"https:\/\/www.washington.edu\/research\/myresearch-lifecycle\/manage\/compliance-requirements-non-financial\/export-control\/#exceptions\" target=\"_blank\" rel=\"noopener\">export license exceptions<\/a>.<\/p>\n<p>Primary responsibility for compliance with export regulations falls on the Principal Investigator. The following activities may be subject to export control regulations, and can occur at any time during your research:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.washington.edu\/research\/myresearch-lifecycle\/manage\/compliance-requirements-non-financial\/export-control\/#tech-sharing\" target=\"_blank\" rel=\"noopener\">Sharing<\/a>\u00a0proprietary or otherwise restricted information, technology or software with a foreign national<\/li>\n<li>Engaging in a sponsored project where the research results must be approved by the sponsor prior to publication<\/li>\n<li>Projects performed abroad by UW personnel<\/li>\n<li>Export of tangible items outside the United States<\/li>\n<li>Furnishing defense services to a foreign person or entity within the United States or abroad<\/li>\n<li>Transacting with embargoed or sanctioned countries or parties<\/li>\n<\/ul>\n<p>More information about these activities can be found on the <a href=\"https:\/\/www.washington.edu\/research\/myresearch-lifecycle\/manage\/compliance-requirements-non-financial\/export-control\/\">Export Controls webpage<\/a>.<\/p>\n<hr \/>\n<p><a name=\"international-travel\"><\/a><\/p>\n<h2>International Travel<\/h2>\n<p>Federal regulations require the University, as a \u201ccovered institution\u201d receiving federal science and engineering support in excess of $50 million per year to <a href=\"https:\/\/www.washington.edu\/globalaffairs\/global-travelers\/travelregistry\/\"><b>register international travel<\/b><\/a> of <a href=\"https:\/\/www.washington.edu\/research\/glossary\/covered-individual\/\">covered individuals<\/a> and ensure covered individuals receive <b>foreign travel security training<\/b>. The University must establish and operate a research security program that includes an organizational record of international travel as a component of a travel reporting program.<\/p>\n<h3>Registering Official International Travel<\/h3>\n<p>All personnel, including staff, faculty and other academic personnel, and students, involved in UW research are required to register all international travel for <a href=\"https:\/\/policy.uw.edu\/directory\/aps\/section-70-travel\/aps-75-1-official-international-travel\/?mkt_tok=NTI3LUFIUi0yNjUAAAGcycprwtvCbfPnHwqnjk9gzUmR0NkfHbpyF5Z8mPWc5e8RRJpqJAJRA8PGWOhbEpZcQN7v5A2y78nzO1ZwJxw\" target=\"_blank\" rel=\"noopener\">official business <\/a>in the <a href=\"https:\/\/www.washington.edu\/globalaffairs\/global-travelers\/travelregistry\/\">UW International Travel Registry<\/a><a href=\"https:\/\/policy.uw.edu\/directory\/aps\/section-70-travel\/aps-75-1-official-international-travel\/?mkt_tok=NTI3LUFIUi0yNjUAAAGcycprwtvCbfPnHwqnjk9gzUmR0NkfHbpyF5Z8mPWc5e8RRJpqJAJRA8PGWOhbEpZcQN7v5A2y78nzO1ZwJxw\" target=\"_blank\" rel=\"noopener\">.<\/a><\/p>\n<h3>Registering Personal International Travel<\/h3>\n<p>All <a href=\"https:\/\/www.washington.edu\/research\/glossary\/covered-individual\/\">Covered Individuals<\/a> are required to register all personal international travel for teaching, research, or conferences (attending or presenting) in the <a href=\"https:\/\/www.washington.edu\/globalaffairs\/global-travelers\/travelregistry\/\">UW International Travel Registry<\/a>.<\/p>\n<h3>Foreign Travel Security Training<\/h3>\n<p>The University must implement periodic training on foreign travel security to <a href=\"https:\/\/www.washington.edu\/research\/glossary\/covered-individual\/\">Covered Individuals<\/a> initially and at least every six years. All personnel, including staff, faculty and other academic personnel, and students, involved in UW research are required to complete this training. <em>Please note: This training is currently in development<\/em>.<\/p>\n<hr \/>\n<h2 id=\"international-activities\">International Activities Assessment Process<\/h2>\n<p>The ÁñÁ«ÊÓÆµ is committed to international collaborative research and academic activities. The caliber of our researchers and students make the UW a leader in quality and impact. However, some international activities\u202fexpose the UW community to substantial risks and\u202fmay\u202finterfere with\u202fthe University\u2019s mission\u202for\u202finfringe upon our culture of academic freedom. Activities associated with increased legal, reputational, or financial risk require an additional review.<\/p>\n<h3>International <span data-olk-copy-source=\"MessageBody\">Activities Assessment Process <\/span>Criteria<\/h3>\n<p>The International Activity Assessment Process is required when UW activity, such as an agreement or transaction, includes involvement by a party or entity:<\/p>\n<ol>\n<li>Associated with one or more of the following countries of concern:\n<ul>\n<li>China, including Hong Kong and Macau<\/li>\n<li>Iran<\/li>\n<li>North Korea<\/li>\n<li>Russia<\/li>\n<li class=\"x_MsoListParagraph\" data-olk-copy-source=\"MessageBody\">Crimea and the \u201cCovered Regions\u201d of Russian-occupied Ukraine (Donetsk and Luhansk)<\/li>\n<li>Belarus<\/li>\n<li>Cuba<\/li>\n<li>Venezuela<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p>or<\/p>\n<ol start=\"2\">\n<li>is a foreign military, intelligence, security, or police organization; or a research organization affiliated with a foreign military, intelligence, security, or police organization (even if not associated with a country of concern).<\/li>\n<\/ol>\n<p>Involvement means that a party to the activity is any of the following (not exhaustive list):<\/p>\n<ul>\n<li>Is a funder (e.g. sponsor, donor)<\/li>\n<li>Will participate on a sponsored project or other research with UW<\/li>\n<li>Is considered a foreign component<\/li>\n<li>Will receive or share information, data, technology, material or other tangibles or non-tangibles<\/li>\n<li>Will be a customer, vendor, or otherwise enter an agreement with the University<\/li>\n<\/ul>\n<p>Involvement by an international ÁñÁ«ÊÓÆµ enrolled student, undergraduate or graduate level, does not qualify for this assessment process while at UW. However, UW students and postdocs who independently collaborate with or sign an agreement with international parties that meet the above criteria must inform their mentor and follow the assessment process.<\/p>\n<h3 id=\"international-activities-escalation-process\">International Activities Assessment Process<\/h3>\n<ul>\n<li>Business or Academic Unit runs <a href=\"#restricted-parties\">Restricted Party Screening<\/a> on the international entit(ies).<\/li>\n<li>Business or Academic Unit completes the <a href=\"https:\/\/forms.cloud.microsoft\/Pages\/ResponsePage.aspx?id=W9229i_wGkSZoBYqxQYL0llV009GsllCm8etPXku4mNUMDNVVjVFRExLVDZLR1JWMVdLTkY0V1pYVi4u\" target=\"_blank\" rel=\"noopener\">International Activities Assessment Intake Form<\/a>.\n<ul>\n<li>The form is reviewed initially by the Research Security Office (RSO) and Export Controls Office (ECO) in the Office of Research.<\/li>\n<li>Initial Review consists of reviewing restricted party screening results, export control review, as applicable, and potential follow-up with the Business or Academic Unit about mitigations.\n<ul>\n<li>If this review indicates that this is not a high-risk research activity or that risk can be managed with specific mitigations, the RSO will notify the Business or Academic unit that they can proceed.<\/li>\n<li>If this review indicates the University may not proceed, as it will be in violation of federal law, regulation or sponsor policies, and not eligible for an exception or license, the RSO will contact the Business or Academic Unit.<\/li>\n<li>If the initial review indicates that further assessment is needed, it will be escalated to the Chair of the International Activities Committee (Assistant Vice Provost, Research Compliance and Administration).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<li>The Chair will determine whether the requested activity needs full Committee review and communicate with the Business or Academic Unit.<\/li>\n<li>All assessment records are maintained by the Office of Research.<\/li>\n<\/ul>\n<p>The International Activities Committee includes leadership from the Office of Research, Office of Global Affairs, UW Innovation, Corporate &amp; Foundation Relations, Finance, and the Chief Information Security Officer.<\/p>\n<p>Recommendations of the International Activities Committee are advisory to the President and Provost.<\/p>\n<hr \/>\n<p><a name=\"compliance\"><\/a><\/p>\n<h2>Compliance, Disclosures, and Reporting<\/h2>\n<p>The University as well as individual UW researchers are required to make certain certifications regarding compliance with federal research security regulations.\u00a0 Non-compliance or falsely certifying compliance presents individual and institutional risks.<\/p>\n<h3>Disclosures and Reporting<\/h3>\n<p>The University as well as individual UW researchers are required to report certain financial and other support from, and collaborations with, international entities.<\/p>\n<h3>Institutional Reporting<\/h3>\n<ul>\n<li>Section 117 of the Higher Education Act of 1965 requires the University to report all gifts and contracts received from a foreign source that amount to $250,000 or more in a calendar year.<\/li>\n<li>Section 10339B of the CHIPS &amp; Science Act requires the University to report all financial support received from a source associated with a Foreign Country of Concern that amounts to $50,000 or more.<\/li>\n<\/ul>\n<h3>Individual Researcher Disclosures and Reporting<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.washington.edu\/research\/compliance\/outside-professional-work-for-compensation-form-1460\/\">Outside Work<\/a><\/li>\n<li><a href=\"https:\/\/www.washington.edu\/research\/financial-conflicts-of-interest-fcoi\/\">Significant Financial Interests Disclosures<\/a><\/li>\n<li><a href=\"https:\/\/www.washington.edu\/research\/myresearch-lifecycle\/plan-and-propose\/sponsor-requirements\/federal\/cpos\/\">Current, Pending or Other Support<\/a><\/li>\n<\/ul>\n<h3>Malign Foreign Talent Recruitment Programs (MFTRPs)<\/h3>\n<p>In accordance with the CHIPS and Science Act of 2022, all faculty, staff and other University personnel are prohibited from participating in malign foreign talent recruitment programs (MFTRPs), detailed in the <a href=\"https:\/\/www.washington.edu\/research\/wp-content\/uploads\/UW-Presidential-Memo-on-MFTRP.pdf\">July 2024 Presidential Memorandum<\/a>. Further information about MFTRPs can be found on the <a href=\"https:\/\/www.washington.edu\/research\/compliance\/foreign-interests-in-sponsored-programs\/#mftrp\">Foreign Interests in Sponsored Programs<\/a>.<\/p>\n<h3>Critical and Emerging Technologies List<\/h3>\n<p>Critical and Emerging Technologies are a subset of advanced technologies that are potentially significant to U S national security. Though not a strategy document, <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2024\/02\/Critical-and-Emerging-Technologies-List-2024-Update.pdf\">this list<\/a> may inform government-wide and agency-specific efforts concerning U S technological competitiveness and national security. <i>Research in these and related areas may be subject to existing and developing federal regulation and monitoring.<\/i><\/p>\n<hr \/>\n<h2 id=\"restricted-parties\">Restricted Parties<\/h2>\n<p>The University engages and transacts with many parties, including consultants, customers, and others who carry out work, research, or provide goods and services to UW.<\/p>\n<p>Restricted Party Screening (RPS) is a step the University carries out to prevent the unauthorized transfer of sensitive technologies and materials, play a part in economic &amp; national security efforts, and minimize other risks to the institution.<\/p>\n<p>RPS is the review of institutions and individuals against restricted party lists maintained by government agencies, international organizations, and regulatory bodies to identify threats to national security, export regulations, and trade sanctions.<\/p>\n<p>By performing RPS, the University can continue to responsibly lead in innovations and scientific advancement.<\/p>\n<h3 id=\"prs\">Restricted Party Screening Process<\/h3>\n<p>The ÁñÁ«ÊÓÆµ maintains a subscription to Descartes&#x2122; Visual Compliance software that searches federal restricted party lists, automatically updates as changes to the lists occur, and notifies UW of potential matches.<\/p>\n<p>UW personnel who will conduct RPS in their area of responsibility must <a href=\"https:\/\/accounts.visualcompliance.com\/register.aspx\" target=\"_blank\" rel=\"noopener\">request a Visual Compliance account<\/a>.<\/p>\n<ul>\n<li>Review the <a href=\"\/research\/restricted-party-screening-how-to-guide\/\">Restricted Party Screening \u201cHow-To\u201d guidance<\/a><\/li>\n<li>Any alerts generated by RPS should be evaluated by the responsible business unit for a false positive result.<\/li>\n<li>Once a match is confirmed, the unit must then assess the risk.\n<ul>\n<li>If the activity may not proceed, based on screening results, document your search, and why the activity may not proceed and communicate the decision with the business or academic unit head and impacted individual(s).<\/li>\n<li>If you think the activity could proceed but it is associated with a country of concern or an entity considered a foreign military, intelligence, security, or police organization affiliated with such an organization please use the <a href=\"#international-activities\">International Activities Assessment Process<\/a>, which requires attaching your RPS results.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>If there are any questions on screening, or your unit needs training on how to screen, contact <a href=\"mailto:researchsecurity@uw.edu\">researchsecurity@uw.edu<\/a> for further guidance. This applies to all UW units and activities.<\/p>\n<h4>When to Screen<\/h4>\n<p>Restricted Party Screening should occur across the University, and prior to these activities involving an <a href=\"https:\/\/www.washington.edu\/research\/glossary\/international-nexus\/\">international nexus<\/a> and\/or a foreign party:<\/p>\n<ul>\n<li>Research collaborations (including unfunded collaborations)<\/li>\n<li>Sharing UW information, materials or data, including licensing IP<\/li>\n<li>Affiliate appointment<\/li>\n<li>Providing editing or informal peer-review of an unpublished publication<\/li>\n<li>Providing goods or services under <a href=\"https:\/\/policy.uw.edu\/directory\/aps\/section-30-fiscal-management\/aps-38-14-sales-of-goods-and-services\/\" target=\"_blank\" rel=\"noopener\">APS 38.14<\/a><\/li>\n<li>Procurement of goods or services<\/li>\n<li>Official travel<\/li>\n<li>Licensing of UW intellectual property<\/li>\n<li><span style=\"color: #000000;\">Educational exchange programs<\/span><\/li>\n<li>Hosting visitors<\/li>\n<li>Exports: deemed and\/or physical<\/li>\n<li>Accepting funding (gifts, donations, research support, etc.)<\/li>\n<li>Invited presentations, awards associated with presentation requirements<\/li>\n<\/ul>\n<hr \/>\n<p><a name=\"information-security\"><\/a><\/p>\n<h2>Information Security and Privacy<\/h2>\n<p>Privacy protections for individuals whose personal information is collected or otherwise used in research apply to all UW research and are considered integral to overall research security.<\/p>\n<ul>\n<li>The <a href=\"https:\/\/itconnect.uw.edu\/guides-by-topic\/privacy\/\">UW Privacy Office<\/a>, within UWIT, provides information about UW data and information privacy.<\/li>\n<li>The <a href=\"https:\/\/itconnect.uw.edu\/it-at-the-uw\/about-uwit\/divisions\/office-of-information-security\/?_gl=1*3qivxw*_ga*MTE2Njg5MTEyMy4xNzM0NDY5MDcw*_ga_3T65WK0BM8*MTczNjQ1NTg3NC40NS4xLjE3MzY0NTg2NDEuMC4wLjA.*_gcl_au*Njc2MzM4OTQwLjE3MzQ0NjkwNzA.*_ga_JLHM9WH4JV*MTczNjQ1NTg3NC40Ny4xLjE3MzY0NTg2NDEuMC4wLjA.\">UWIT Office of Information Security<\/a> provides comprehensive information on the University\u2019s institutional approach to information security.<\/li>\n<li>General guidance on information\/data security and privacy in research, covering topics including CUI (Controlled Unclassified Information), requirements for human subjects research, EU GDPR (European Union General Data Protection Regulation), and classified information may be found <a href=\"https:\/\/www.washington.edu\/research\/myresearch-lifecycle\/setup\/compliance-requirements-non-financial\/information-privacy-and-security\/\">here<\/a>.<\/li>\n<\/ul>\n<hr \/>\n<p><a name=\"research-security-training\"><\/a><\/p>\n<h2>Research Security Training<\/h2>\n<p>Federal research sponsors, such as NSF and DOE, require completion of <a href=\"https:\/\/www.washington.edu\/research\/required-training\/research-security-training\/\">Research Security Training<\/a> by all \u201c<a href=\"https:\/\/www.washington.edu\/research\/glossary\/covered-individual\/\">covered individuals<\/a>\u201d participating on a project before an application for funding is submitted as of May 25 2025.\u00a0The definition of covered individual varies by federal agency. Generally, however, it refers to \u201can individual who (A) contributes in a substantive, meaningful way to the scientific development or execution of an R&amp;D project proposed to be carried out with an\u2026 award from a Federal research agency; and (B) is designated as a covered individual by the Federal research agency concerned.\u201d See the <i><a href=\"https:\/\/bidenwhitehouse.archives.gov\/wp-content\/uploads\/2024\/02\/OSTP-Foreign-Talent-Recruitment-Program-Guidelines.pdf\">Office of Science and Technology Policy (OSTP) Memo.<\/a><\/i><\/p>\n<p>The USDA requires all individuals employed to work on a USDA award to complete Research Security Training (see <a href=\"https:\/\/www.usda.gov\/sites\/default\/files\/documents\/usda-general-terms-conditions-2025.pdf\" target=\"_blank\" rel=\"noopener\">USDA&#8217;s General Terms and Conditions for Federal Awards)<\/a>.<\/p>\n<p>Currently, research project-specific training in Export Controls, a component of Research Security, is required for certain activities. The <a href=\"mailto:exports@uw.edu\">UW Office of Export Controls<\/a> is available to provide guidance as well as training, where it is required.<\/p>\n<h3><span class=\"TextRun SCXW146872046 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146872046 BCX0\">FAQs<\/span><\/span><\/h3>\n<p><span class=\"TextRun SCXW146872046 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW146872046 BCX0\">More information about Research Security training can be found in these <a href=\"https:\/\/www.washington.edu\/research\/faq\/research-security-training\/\">FAQs<\/a>.<\/span><\/span><\/p>\n<h3><strong>Enrollment<\/strong><\/h3>\n<p><strong>If you are the PI of an impacted proposal, ensure all <a href=\"https:\/\/www.washington.edu\/research\/glossary\/covered-individual\/\" target=\"_blank\" rel=\"noopener\">covered individuals<\/a> have completed training ahead of the anticipated submission date. <\/strong>This research security training requirement can be met by completing the <a href=\"https:\/\/www.washington.edu\/research\/required-training\/research-security-training\/\">CITI-hosted training<\/a>.<\/p>\n<h3>Research Security Training Verification<\/h3>\n<p>Completion of Research Security Training will be reflected in MyResearch Training Transcript (MRTT). Completion records in MRTT will be linked for each individual listed on the PI, Personnel and Organizations page of the eGC1.\u00a0 Campus units can use these links to verify <a href=\"https:\/\/www.washington.edu\/research\/glossary\/covered-individual\/\">covered individuals<\/a> have completed training.<\/p>\n<p>The Office of Sponsored Programs will verify that individuals named in federal proposals have completed training in alignment with sponsor policies.<\/p>\n<hr \/>\n<p><a name=\"research-security-role\"><\/a><\/p>\n<h2>Research Security by Role<\/h2>\n<div class=\"accordion \" id=\"accordion\">\n<div class=\"screen-reader-text\"><\/div>\n<div class=\"card\">\n<div class=\"card-header\" id=\"accordion-header\">\n<h3 class=\"mb-0\"><button class=\"btn btn-link\" type=\"button\" data-toggle=\"collapse\" data-target=\"#collapse\" aria-expanded=\"false\" aria-controls=\"collapse\"><span class=\"btn-text\"><span style=\"font-weight: 400;\">Researcher<\/span><\/span><span class=\"arrow-box\"><span class=\"arrow\"><\/span><\/span><\/button><\/h3>\n<\/div>\n<div id=\"collapse\" class=\"collapse \" aria-labelledby=\"collapse\" data-parent=\"#accordion\" role=\"region\">\n<p>As a Researcher, your role carries with it responsibilities for research security.\u00a0 If you are the Principal Investigator (PI), you are also responsible for overall compliance of the project (and its associated personnel) with research security regulations.<\/p>\n<p><strong>Checklist<\/strong><\/p>\n<p>If your project\/lab\/research group involves any of the following, research security regulations apply<\/p>\n<ul>\n<li>A Critical or Emerging Technology<\/li>\n<li>Employment or hosting of non-U S persons, including students, postdoctoral scholars, visiting scientists, or other visitors<\/li>\n<li>Work done in an international location<\/li>\n<li>Funding from an international source<\/li>\n<li>An international collaborator<\/li>\n<li>Data or materials shared with, or obtained from, an international source<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"card\">\n<div class=\"card-header\" id=\"accordion-header\">\n<h3 class=\"mb-0\"><button class=\"btn btn-link\" type=\"button\" data-toggle=\"collapse\" data-target=\"#collapse\" aria-expanded=\"false\" aria-controls=\"collapse\"><span class=\"btn-text\"><span style=\"font-weight: 400;\">Administrator<\/span><\/span><span class=\"arrow-box\"><span class=\"arrow\"><\/span><\/span><\/button><\/h3>\n<\/div>\n<div id=\"collapse\" class=\"collapse \" aria-labelledby=\"collapse\" data-parent=\"#accordion\" role=\"region\">\n<p>As a Research Administrator, your role carries with it responsibilities for research security.\u00a0 Depending upon the duties of your position, you may be responsible for ensuring compliance by identifying, tracking, and\/or reporting specific research security components applicable to a research project or lab.\u00a0 Working with the PI and project or lab personnel, you can facilitate compliance by understanding research security policies, regulations and best practices and assisting in their application.<\/p>\n<p><strong>Checklist<\/strong><\/p>\n<p>If your project\/lab\/research group involves any of the following, research security regulations apply:<\/p>\n<ul>\n<li>A Critical or Emerging Technology<\/li>\n<li>Employment or hosting of non-U S persons, including students, postdoctoral scholars, visiting scientists, or other visitors<\/li>\n<li>Work done in an international location<\/li>\n<li>Funding from an international source<\/li>\n<li>An international collaborator<\/li>\n<li>Data or materials shared with, or obtained from, an international source<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"card\">\n<div class=\"card-header\" id=\"accordion-header\">\n<h3 class=\"mb-0\"><button class=\"btn btn-link\" type=\"button\" data-toggle=\"collapse\" data-target=\"#collapse\" aria-expanded=\"false\" aria-controls=\"collapse\"><span class=\"btn-text\"><span style=\"font-weight: 400;\">Project Staff<\/span><\/span><span class=\"arrow-box\"><span class=\"arrow\"><\/span><\/span><\/button><\/h3>\n<\/div>\n<div id=\"collapse\" class=\"collapse \" aria-labelledby=\"collapse\" data-parent=\"#accordion\" role=\"region\">\n<p>As staff to a research project or lab, your role carries with it responsibilities for research security.\u00a0 You are responsible for understanding research security policies, regulations and best practices as they apply to your work and to the work of those you supervise.<\/p>\n<p>Depending upon the duties of your position, you may also have an administrative role in ensuring compliance by identifying, tracking, and\/or reporting specific research security components applicable to a research project or lab.\u00a0 If so, working with the PI and project or lab personnel, you can facilitate compliance by understanding and assisting in their application.<\/p>\n<p><strong>Checklist<\/strong><\/p>\n<p>If your PI\u2019s project\/lab\/research group involves any of the following, research security regulations apply:<\/p>\n<ul>\n<li>A Critical or Emerging Technology<\/li>\n<li>Employment or hosting of non-U S persons, including students, postdoctoral scholars, visiting scientists, or other visitors<\/li>\n<li>Work done in an international location<\/li>\n<li>Funding from an international source<\/li>\n<li>An international collaborator<\/li>\n<li>Data or materials shared with, or obtained from, an international source<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"card\">\n<div class=\"card-header\" id=\"accordion-header\">\n<h3 class=\"mb-0\"><button class=\"btn btn-link\" type=\"button\" data-toggle=\"collapse\" data-target=\"#collapse\" aria-expanded=\"false\" aria-controls=\"collapse\"><span class=\"btn-text\"><span style=\"font-weight: 400;\">Trainee<\/span><\/span><span class=\"arrow-box\"><span class=\"arrow\"><\/span><\/span><\/button><\/h3>\n<\/div>\n<div id=\"collapse\" class=\"collapse \" aria-labelledby=\"collapse\" data-parent=\"#accordion\" role=\"region\">\n<p>As an undergraduate student, graduate student or postdoctoral scholar working on a research project, your role carries with it responsibilities for research security.\u00a0 You are responsible for understanding research security policies, regulations and best practices as they apply to your work and to the work of those you supervise.<\/p>\n<p><strong>Checklist<\/strong><\/p>\n<p>If the project you are working on or the lab\/research group in which you are working involves any of the following, research security regulations may apply:<\/p>\n<ul>\n<li>A Critical or Emerging Technology<\/li>\n<li>Employment or hosting of non-U S persons, including students, postdoctoral scholars, visiting scientists, or other visitors<\/li>\n<li>Work done in an international location<\/li>\n<li>Funding from an international source<\/li>\n<li>An international collaborator<\/li>\n<li>Data or materials shared with, or obtained from, an international source<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<hr \/>\n<p><a name=\"research-security-design\"><\/a><\/p>\n<h2>Research Security by Design<\/h2>\n<p>The ÁñÁ«ÊÓÆµ aims to provide a research security focused culture while maintaining an open-research environment. <a href=\"https:\/\/www.washington.edu\/research\/compliance\/foreign-interests-in-sponsored-programs\/federal-research-security-by-design\/\">Research Security by Design<\/a> is a resource developed by <a href=\"https:\/\/www.washington.edu\/research\/osp\/\">The UW Office of Sponsored Programs<\/a> to help build research security into a UW research program.<\/p>\n<hr \/>\n<p><a name=\"contact\"><\/a><\/p>\n<h2>Contact<\/h2>\n<p>Email <a href=\"mailto:researchsecurity@uw.edu\">researchsecurity@uw.edu<\/a> to:<\/p>\n<ul>\n<li>Request a consultation<\/li>\n<li>Request research security information<\/li>\n<li>Report non-compliance<\/li>\n<li>Check the status of a program activity<\/li>\n<li>View employment opportunities<\/li>\n<\/ul>\n<p><span class=\"TextRun SCXW157601784 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW157601784 BCX0\">The <\/span><\/span><a class=\"Hyperlink SCXW157601784 BCX0\" href=\"mailto:avprso@uw.edu\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW157601784 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW157601784 BCX0\" data-ccp-charstyle=\"Hyperlink\">Chief Research Security Officer <\/span><\/span><\/a><span class=\"TextRun SCXW157601784 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW157601784 BCX0\">is UW\u2019s <\/span><span class=\"NormalTextRun SCXW157601784 BCX0\">designated<\/span><span class=\"NormalTextRun SCXW157601784 BCX0\"> single point of contact for communications with the federal government on matters involving Research Security<\/span><span class=\"NormalTextRun SCXW157601784 BCX0\">.<\/span><span class=\"NormalTextRun SCXW157601784 BCX0\"> Contact the Chief Research Security Officer, Jasmine Campbell, at <a href=\"mailto:jlnc@uw.edu\">jlnc@uw.edu<\/a>.<\/span><\/span><\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>UW is required by the CHIPS and Science Act to have an integrated program for research security.\u00a0 The UW Research Security program comprises various components which,&#8230;<\/p>\n","protected":false},"author":144,"featured_media":0,"parent":230,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-57554","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Research Security at UW - UW Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research Security at UW - UW Research\" \/>\n<meta property=\"og:description\" content=\"UW is required by the CHIPS and Science Act to have an integrated program for research security.\u00a0 The UW Research Security program comprises various components which,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/\" \/>\n<meta property=\"og:site_name\" content=\"UW Research\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T15:09:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/\",\"url\":\"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/\",\"name\":\"Research Security at UW - UW Research\",\"isPartOf\":{\"@id\":\"https:\/\/www.washington.edu\/research\/#website\"},\"datePublished\":\"2025-06-05T22:28:03+00:00\",\"dateModified\":\"2026-04-03T15:09:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.washington.edu\/research\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance\",\"item\":\"https:\/\/www.washington.edu\/research\/compliance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Security at UW\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.washington.edu\/research\/#website\",\"url\":\"https:\/\/www.washington.edu\/research\/\",\"name\":\"UW Research\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.washington.edu\/research\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research Security at UW - UW Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/","og_locale":"en_US","og_type":"article","og_title":"Research Security at UW - UW Research","og_description":"UW is required by the CHIPS and Science Act to have an integrated program for research security.\u00a0 The UW Research Security program comprises various components which,...","og_url":"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/","og_site_name":"UW Research","article_modified_time":"2026-04-03T15:09:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/","url":"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/","name":"Research Security at UW - UW Research","isPartOf":{"@id":"https:\/\/www.washington.edu\/research\/#website"},"datePublished":"2025-06-05T22:28:03+00:00","dateModified":"2026-04-03T15:09:30+00:00","breadcrumb":{"@id":"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.washington.edu\/research\/compliance\/research-security-at-uw\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.washington.edu\/research\/"},{"@type":"ListItem","position":2,"name":"Compliance","item":"https:\/\/www.washington.edu\/research\/compliance\/"},{"@type":"ListItem","position":3,"name":"Research Security at UW"}]},{"@type":"WebSite","@id":"https:\/\/www.washington.edu\/research\/#website","url":"https:\/\/www.washington.edu\/research\/","name":"UW Research","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.washington.edu\/research\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/pages\/57554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/comments?post=57554"}],"version-history":[{"count":49,"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/pages\/57554\/revisions"}],"predecessor-version":[{"id":63328,"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/pages\/57554\/revisions\/63328"}],"up":[{"embeddable":true,"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/pages\/230"}],"wp:attachment":[{"href":"https:\/\/www.washington.edu\/research\/wp-json\/wp\/v2\/media?parent=57554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}