Skip to main content

Research Security Training

Background

The federal government is moving toward requiring research security training for researchers applying for or receiving federal funding. The Department of Energy (DOE) will begin requiring this training effective May 1, 2025, and covered individuals applying for DOE awards will need to certify the completion of this training. Other federal agencies (NSF, DOD, NIH, etc.) have not yet released their timelines for research security training; however, all agencies are required to do so in 2025. 

A covered individual is defined as someone who significantly contributes to a federally funded research project's development or execution and is designated as such by the federal research agency, requiring them to complete research security training. 

Roles & Responsibilities

  • Principal Investigators are responsible for determining which personnel meet the criteria of a covered individual.
  • Research Administrators are responsible for verifying compliance prior to submission of federal application or award materials to sponsored research for review.
  • Sponsored Research is responsible for verifying compliance prior to submission of federal applications and acceptance of awards. 

Training Verification & SR Actions 

Training for covered individuals is required to be completed and must be verified by both the RA and SR prior to: 

  • Proposal submission 
  • JIT  
  • Award receipt
  • RPPR / Continuation submissions 
  • Personnel change requests 
  • Addition of new subawards 

If training has not been completed as per sponsor requirements, Sponsored Research will not take further action. For example,

  • SR will not submit applications if training for covered individuals is not complete; certification of compliance is done when the proposal is submitted. 
  • SR will hold award setup until training for covered individuals is complete; certification is likely to be required by execution of the award or spending/draw-down occurs. 

Verification of compliance will occur across the lifecycle of the project. Refer to Research Security Training Verification Guidance for additional information. 

Resources