Protecting Research Integrity Through Security and Compliance
Research security at the 91直播视频 helps protect our people, data, and research partnerships while ensuring that the benefits of our research remain open, trusted, and responsibly shared. Security is not about limiting research; it is about managing risk, meeting federal requirements, and maintaining trust with sponsors and the public in an increasingly global research environment. Faculty, professional staff, students, and collaborators should use this page as a guide on UNE鈥檚 research security approach, with answers to frequently asked questions to help researchers understand their responsibilities and where to find support.
Research Security and Its Role
Research security refers to the steps we take to safeguard our research from risks such as:
- Unauthorized access to research data or materials
- Undisclosed outside affiliations or commitments
- Cybersecurity threats to research systems and equipment
- Improper sharing of sensitive or export-controlled information
Maintaining research security doesn鈥檛 mean limiting collaboration 鈥 it means ensuring that partnerships are transparent, responsible, and built on trust.
91直播视频is committed to protecting the integrity, security, and openness of our research enterprise. Because we partner with federal sponsors such as the National Institutes of Health (NIH), the National Science Foundation (NSF), and the U.S. Department of Agriculture (USDA), we have aligned our practices with federal research security requirements under and the .
Through clear procedures and ongoing awareness training, 91直播视频helps protect:
- The integrity of our research findings
- The University鈥檚 eligibility for federal funding
- The trust of our partners and the public
UNE鈥檚 Approach
UNE鈥檚 research security program has been developed around four national priority areas identified by the :
Disclosure and Transparency
Researchers are required to disclose all external professional appointments, collaborations, and financial interests when applying for or managing federally sponsored awards. The Office of Sponsored Programs can provide guidance on disclosure requirements.
Disclosure and Transparency FAQ
You must disclose all sources of research support, appointments, affiliations, and in-kind contributions, both domestic and foreign.
Yes. If the collaboration involves research activity, data sharing, or access to project resources, it must be disclosed.
Yes, collaborations with international colleagues are allowed, but they must be transparent and disclosed through the appropriate channels.
Please contact the Office of Research and Innovation before sharing data, materials, or results with foreign institutions.
Undue influence occurs when an external entity 鈥 often a foreign organization 鈥 improperly seeks to direct, compromise, or benefit from federally funded research.
Cybersecurity for Research Data
91直播视频maintains secure systems for research data storage and transmission, and we promote best practices for password protection and phishing awareness.
Cybersecurity for Research Data FAQ
Cybersecurity protects research data, intellectual property, and sensitive information from unauthorized access or loss.
All researchers are responsible for safeguarding the data they collect, store, and share. This includes following 91直播视频cybersecurity policies and using approved tools and systems.
Always use UNE-approved storage systems for research data. These systems are designed to meet security and compliance standards.
No, not all research data is considered sensitive, but any data tied to federally funded or controlled projects must follow 91直播视频and your sponsor鈥檚 cybersecurity rules.
No. Never store sensitive or confidential data on personal devices or unapproved cloud storage accounts. Doing so puts the data 鈥 and your research 鈥 at risk.
- Protect your login credentials.
- Use multi-factor authentication (MFA) whenever possible.
- Log out when you鈥檙e finished using shared or public computers.
Use only UNE-approved file-sharing and collaboration tools. These platforms ensure data protection and compliance with institutional and sponsor requirements.
Report any suspected data breaches immediately to ITS or the Office of Research and Innovation. Prompt reporting helps contain potential damage and protect other systems.
Always contact ITS before transferring research data outside of UNE. They can help ensure that the transfer complies with security and privacy requirements.
Foreign Travel and Collaboration Security
Faculty, professional staff, and students engaging in international research collaborations or travel are encouraged to contact the Office of Research and Innovation for pre-trip guidance on data protection, export controls, and collaboration agreements.
Foreign Travel and Collaboration Security FAQ
Pre-trip guidance helps ensure that you understand data protection, export control regulations, and collaboration requirements before you travel. This minimizes security risks and compliance issues.
The Office of Research and Innovation provides information on:
- Protecting research data and electronic devices while abroad
- Export control laws and restrictions on sharing certain technologies or data
- Requirements for international research or collaboration agreements
All faculty, professional staff, and students involved in international research travel or collaborations are encouraged to contact the Office of Research and Innovation 鈥 especially those carrying research data, equipment, or proprietary information.
Export controls are federal regulations that restrict the sharing of certain technologies, data, or materials with foreign nationals or entities. Violations can result in severe penalties for both individuals and the University.
- Obtain a loaner laptop or mobile device from ITS before international travel whenever possible. Loaner devices are pre-configured with appropriate security settings and contain no sensitive data.
- Use UNE-provided or approved devices only.
- Avoid connecting to public Wi-Fi networks.
- Use a virtual private network (VPN) when accessing University systems.
- Limit the amount of sensitive data you take abroad.
Report any lost, stolen, or compromised devices immediately to the ITS department and the Office of Research and Innovation. Early reporting helps protect your data and the University鈥檚 assets.
Yes. Some collaborations may require formal agreements or export control review. Always consult with the Office of Research Integrity and Compliance before sharing research materials, data, or results internationally.
Research Training and Awareness
All senior/key personnel involved in NIH, NSF, and USDA-supported research are required to complete online research security training through the CITI Program. This online training introduces the key elements of research security 鈥 including disclosure expectations, cybersecurity awareness, and managing international engagements 鈥 and helps ensure institutional compliance with federal requirements under and the .
Research Training and Awareness FAQ
NIH: Please review the definition provided in the .
NSF: Please review the definition provided in .
USDA: All individuals who contribute in a substantive, measurable way to the scientific development or execution of the project are considered senior/key personnel, whether salaries are requested or not. Consultants are also included if they meet this definition.
The Principal Investigator is responsible for identifying all senior/key personnel associated with the award 鈥 including those named in the proposal and any individual added after the award is issued 鈥 and for ensuring everyone completes the appropriate CITI research security course.
for instructions on how to create a new CITI account, add courses to your profile, and navigate through the CITI website.
CITI offers two research security courses:
- Research Security Training (Combined Course): Select this course if you鈥檙e completing research security training for the first time.
- Research Security Advanced Refresher: Select this course if you鈥檝e previously completed the combined course.
Completion of the research security course in CITI is valid for one (1) year. You must complete the CITI training annually for as long as your award remains active.
Effective October 2025, NSF and USDA will require all senior/key personnel listed on a proposal to have completed research security training within the 12 months before proposal submission.
Although NIH does not currently impose a pre-award training requirement, 91直播视频policy requires all senior/key personnel named on an NIH grant 鈥 or added to it after the award is issued 鈥 to complete the appropriate online CITI research security training course.
Resources
91直播视频Resources
- 91直播视频Policy on NIH Other Support Disclosure and Annual Training
- Responsible Conduct of Research Training Website
Federal Resources
- (July 17, 2025)
- (November 24, 2025)
- (July 8, 2025)
Contact
Information Technology Services
(207) 602-2487
helpdesk@une.edu
Office of Research and Innovation
For general inquiries, please contact the Office of Research and Innovation at ori@une.edu.