Protecting Research Integrity Through Security and Compliance

Research security at the 91直播视频 helps protect our people, data, and research partnerships while ensuring that the benefits of our research remain open, trusted, and responsibly shared. Security is not about limiting research; it is about managing risk, meeting federal requirements, and maintaining trust with sponsors and the public in an increasingly global research environment. Faculty, professional staff, students, and collaborators should use this page as a guide on UNE鈥檚 research security approach, with answers to frequently asked questions to help researchers understand their responsibilities and where to find support.

Research Security and Its Role

Research security refers to the steps we take to safeguard our research from risks such as:

  • Unauthorized access to research data or materials
  • Undisclosed outside affiliations or commitments
  • Cybersecurity threats to research systems and equipment
  • Improper sharing of sensitive or export-controlled information

Maintaining research security doesn鈥檛 mean limiting collaboration 鈥 it means ensuring that partnerships are transparent, responsible, and built on trust.

91直播视频is committed to protecting the integrity, security, and openness of our research enterprise. Because we partner with federal sponsors such as the National Institutes of Health (NIH), the National Science Foundation (NSF), and the U.S. Department of Agriculture (USDA), we have aligned our practices with federal research security requirements under and the .

Through clear procedures and ongoing awareness training, 91直播视频helps protect:

  • The integrity of our research findings
  • The University鈥檚 eligibility for federal funding
  • The trust of our partners and the public

UNE鈥檚 Approach

UNE鈥檚 research security program has been developed around four national priority areas identified by the :

Disclosure and Transparency

Researchers are required to disclose all external professional appointments, collaborations, and financial interests when applying for or managing federally sponsored awards. The Office of Sponsored Programs can provide guidance on disclosure requirements.

Disclosure and Transparency FAQ

What must I disclose when applying for federal funding?

You must disclose all sources of research support, appointments, affiliations, and in-kind contributions, both domestic and foreign.

Do I have to disclose unpaid collaborations?

Yes. If the collaboration involves research activity, data sharing, or access to project resources, it must be disclosed.

I collaborate with an international colleague. Is that allowed?

Yes, collaborations with international colleagues are allowed, but they must be transparent and disclosed through the appropriate channels.

What if I receive an invitation to collaborate from a foreign institution?

Please contact the Office of Research and Innovation before sharing data, materials, or results with foreign institutions.

What is 鈥渇oreign influence鈥?

Undue influence occurs when an external entity 鈥 often a foreign organization 鈥 improperly seeks to direct, compromise, or benefit from federally funded research.

Cybersecurity for Research Data

91直播视频maintains secure systems for research data storage and transmission, and we promote best practices for password protection and phishing awareness.

Cybersecurity for Research Data FAQ

Why is cybersecurity important for research?

Cybersecurity protects research data, intellectual property, and sensitive information from unauthorized access or loss.

Who is responsible for protecting research data?

All researchers are responsible for safeguarding the data they collect, store, and share. This includes following 91直播视频cybersecurity policies and using approved tools and systems.

Where should I store my research data?

Always use UNE-approved storage systems for research data. These systems are designed to meet security and compliance standards.

Is all research data considered sensitive?

No, not all research data is considered sensitive, but any data tied to federally funded or controlled projects must follow 91直播视频and your sponsor鈥檚 cybersecurity rules.

Can I store research data on my personal device or cloud account?

No. Never store sensitive or confidential data on personal devices or unapproved cloud storage accounts. Doing so puts the data 鈥 and your research 鈥 at risk.

What security measures should I take when accessing research systems?
  • Protect your login credentials.
  • Use multi-factor authentication (MFA) whenever possible.
  • Log out when you鈥檙e finished using shared or public computers.
How should I share or collaborate on research data?

Use only UNE-approved file-sharing and collaboration tools. These platforms ensure data protection and compliance with institutional and sponsor requirements.

What should I do if I suspect a data breach?

Report any suspected data breaches immediately to ITS or the Office of Research and Innovation. Prompt reporting helps contain potential damage and protect other systems.

Can I transfer research data outside of UNE?

Always contact ITS before transferring research data outside of UNE. They can help ensure that the transfer complies with security and privacy requirements.

Foreign Travel and Collaboration Security

Faculty, professional staff, and students engaging in international research collaborations or travel are encouraged to contact the Office of Research and Innovation for pre-trip guidance on data protection, export controls, and collaboration agreements.

Foreign Travel and Collaboration Security FAQ

Why should I contact the Office of Research and Innovation before traveling internationally for research?

Pre-trip guidance helps ensure that you understand data protection, export control regulations, and collaboration requirements before you travel. This minimizes security risks and compliance issues.

Who topics are covered in pre-trip guidance?

The Office of Research and Innovation provides information on:

  • Protecting research data and electronic devices while abroad
  • Export control laws and restrictions on sharing certain technologies or data
  • Requirements for international research or collaboration agreements
Who should seek this guidance?

All faculty, professional staff, and students involved in international research travel or collaborations are encouraged to contact the Office of Research and Innovation 鈥 especially those carrying research data, equipment, or proprietary information.

What are export controls, and why do they matter?

Export controls are federal regulations that restrict the sharing of certain technologies, data, or materials with foreign nationals or entities. Violations can result in severe penalties for both individuals and the University.

How can I protect my research data while traveling?
  • Obtain a loaner laptop or mobile device from ITS before international travel whenever possible. Loaner devices are pre-configured with appropriate security settings and contain no sensitive data.
  • Use UNE-provided or approved devices only.
  • Avoid connecting to public Wi-Fi networks.
  • Use a virtual private network (VPN) when accessing University systems.
  • Limit the amount of sensitive data you take abroad.
What should I do if I encounter a security issue or lose a device while abroad?

Report any lost, stolen, or compromised devices immediately to the ITS department and the Office of Research and Innovation. Early reporting helps protect your data and the University鈥檚 assets.

Are there any special rules for collaborating with foreign researchers or institutions?

Yes. Some collaborations may require formal agreements or export control review. Always consult with the Office of Research Integrity and Compliance before sharing research materials, data, or results internationally.

Research Training and Awareness

All senior/key personnel involved in NIH, NSF, and USDA-supported research are required to complete online research security training through the CITI Program. This online training introduces the key elements of research security 鈥 including disclosure expectations, cybersecurity awareness, and managing international engagements 鈥 and helps ensure institutional compliance with federal requirements under and the . 

Research Training and Awareness FAQ

How does NIH, NSF, and USDA define 鈥渟enior/key personnel鈥?

NIH: Please review the definition provided in the .

NSF: Please review the definition provided in .

USDA: All individuals who contribute in a substantive, measurable way to the scientific development or execution of the project are considered senior/key personnel, whether salaries are requested or not. Consultants are also included if they meet this definition.

Who is responsible for determining who is senior/key personnel on an award?

The Principal Investigator is responsible for identifying all senior/key personnel associated with the award 鈥 including those named in the proposal and any individual added after the award is issued 鈥 and for ensuring everyone completes the appropriate CITI research security course. 

How do I create a CITI account, and which CITI research security course should I complete?

for instructions on how to create a new CITI account, add courses to your profile, and navigate through the CITI website.

CITI offers two research security courses:

  • Research Security Training (Combined Course): Select this course if you鈥檙e completing research security training for the first time.
  • Research Security Advanced Refresher: Select this course if you鈥檝e previously completed the combined course. 
How often do I need to complete the research security course in CITI?

Completion of the research security course in CITI is valid for one (1) year. You must complete the CITI training annually for as long as your award remains active.  

Which federal agencies require pre-award research security training?

Effective October 2025, NSF and USDA will require all senior/key personnel listed on a proposal to have completed research security training within the 12 months before proposal submission.

Although NIH does not currently impose a pre-award training requirement, 91直播视频policy requires all senior/key personnel named on an NIH grant 鈥 or added to it after the award is issued 鈥 to complete the appropriate online CITI research security training course.

Resources

91直播视频Resources

Federal Resources

  • (July 17, 2025)
  • (November 24, 2025)
  • (July 8, 2025)

Contact

Information Technology Services

(207) 602-2487
helpdesk@une.edu

Office of Research and Innovation

For general inquiries, please contact the Office of Research and Innovation at ori@une.edu.