{"id":15980,"date":"2025-06-13T09:37:55","date_gmt":"2025-06-13T13:37:55","guid":{"rendered":"https:\/\/research.ncsu.edu\/administration\/?page_id=15980"},"modified":"2026-05-01T14:44:55","modified_gmt":"2026-05-01T18:44:55","slug":"research-security-training","status":"publish","type":"page","link":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/","title":{"rendered":"Research Security: Training"},"content":{"rendered":"\n\n\n\n\n<h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>As required by the CHIPS Act of 2022, all federal agencies are implementing a Research Security training&nbsp;requirement for&nbsp;<a href=\"https:\/\/research.ncsu.edu\/administration\/policies-and-guidance\/covered-individuals-and-senior-personnel\/\" target=\"_blank\" rel=\"noreferrer noopener\">Senior Personnel<\/a>.&nbsp;On May 1, 2025, the U.S. Department of Energy became the first agency to implement this requirement for its proposals, with the USDA, NSF and others quickly following.&nbsp;To ensure NC State researchers are familiar with Research&nbsp;Security requirements \u2014 and to keep the university well-positioned to deal with evolving requirements \u2014 effective for proposals submitted on or after Oct. 15, 2025, all principal investigators and other named senior personnel listed on proposals are required to have completed Research Security training prior to the submission of the proposal.<\/p>\n\n\n<div class=\"is-text wp-block-ncst-buttons\">\n    \n<div class=\"is-style-secondary wp-block-ncst-button\">\n      <a\n        class=\"ncst-block__button-link btn\"\n        href=\"https:\/\/docs.google.com\/document\/d\/1QU-EM6Meyg7z52P8NVaIEGhklBzFIUQpDF851LBYL84\/edit?tab=t.0\"\n        data-ncst-lightbox=\"false\"\n         target=\"_blank\"          rel=\"noreferrer noopener\"       >\n                  <span class=\"text\">Process Guide for Assigning Research Security Training in REPORTER<\/span><span class=\"arrow-indicator\"><svg class=\"wolficon wolficon-arrow-right-bold\" role=\"img\"  aria-hidden=\"true\">\n\t\t\t\n\t\t\t<use xlink:href=\"#wolficon-arrow-right-bold\">\n\t\t<\/svg><\/span>\n              <\/a>\n    <\/div>\n  \n\n<div class=\"is-style-secondary wp-block-ncst-button\">\n      <a\n        class=\"ncst-block__button-link btn\"\n        href=\"https:\/\/reporter.ncsu.edu\/link\/courseview?courseID=RES-COMPLI-RE-SECUR&amp;deptName=RES\"\n        data-ncst-lightbox=\"false\"\n         target=\"_blank\"          rel=\"noreferrer noopener\"       >\n                  <span class=\"text\">Research Security Course in REPORTER<\/span><span class=\"arrow-indicator\"><svg class=\"wolficon wolficon-arrow-right-bold\" role=\"img\"  aria-hidden=\"true\">\n\t\t\t\n\t\t\t<use xlink:href=\"#wolficon-arrow-right-bold\">\n\t\t<\/svg><\/span>\n              <\/a>\n    <\/div>\n  \n\n  <\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Regulatory Context<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The&nbsp;<a href=\"https:\/\/www.law.cornell.edu\/uscode\/text\/42\/19234\" target=\"_blank\" rel=\"noreferrer noopener\">CHIPS and Science Act<\/a>&nbsp;(42 U.S.C. \u00a7 19234) codifies a RS training requirement introduced in&nbsp;<a href=\"https:\/\/trumpwhitehouse.archives.gov\/presidential-actions\/presidential-memorandum-united-states-government-supported-research-development-national-security-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Security Presidential Memorandum-33.<\/a>&nbsp;<\/li>\n\n\n\n<li>NC State&#8217;s Research Security course has been designed to meet the requirements of federal agencies, including but not limited to:\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.nsf.gov\/notices\/important\/important-notice-no-149-updates-nsf-research-security\/in149\" target=\"_blank\" rel=\"noreferrer noopener\">NSF<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.energy.gov\/ia\/research-security-training-requirement\" target=\"_blank\" rel=\"noreferrer noopener\">Department of Energy<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/grants.nih.gov\/grants\/guide\/notice-files\/NOT-OD-25-154.html\" target=\"_blank\" rel=\"noreferrer noopener\">National Institutes of Health<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Who is Required to Complete the Training?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As of Oct. 15, 2025, all <a href=\"https:\/\/research.ncsu.edu\/administration\/policies-and-guidance\/covered-individuals-and-senior-personnel\/\">Senior Personnel<\/a> listed on any NC State proposal must have completed Research Security training within the last 12 months prior to the submission of the proposal.<\/li>\n\n\n\n<li>Individuals on federally funded projects that include this requirement in the terms and conditions of the award.&nbsp;<\/li>\n\n\n\n<li>As of Oct. 25, 2025 NSF requires that the required Responsible Conduct if Research (RCR) course include Research Security.&nbsp;NC State&#8217;s CITI RCR course will be modified before that date to include a Research Security Module. Please visit&nbsp;<a href=\"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-integrity\/rcr-training\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Conduct of Research (RCR) Training<\/a>&nbsp;for more information.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How can the course be accessed? <\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Completion of the National Science Foundation Research Security modules will also satisfy this requirement.&nbsp;Those modules are available on at <a href=\"https:\/\/www.nsf.gov\/research-security\/training\">Research Security Training | NSF<\/a>.&nbsp;To receive credit for the NSF course, submit the competition certificate to <a href=\"mailto:researchsecurity@ncsu.edu\">researchsecurity@ncsu.edu<\/a><\/li>\n\n\n\n<li>The NC State Research Security course can be <a href=\"https:\/\/go.ncsu.edu\/research_security\">accessed in REPORTER<\/a>.&nbsp;The course is scenario-based and can be completed in 30 minutes.<\/li>\n\n\n\n<li>Information on how to access the CITI RCR course can be found at&nbsp;<a href=\"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-integrity\/rcr-training\/rcr-courses\/\" target=\"_blank\" rel=\"noreferrer noopener\">RCR Courses<\/a>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Other Security Training<\/h2>\n\n\n\n<p>For NC State Personnel engaging in <a href=\"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-compliance-definitions\/#controlled-research\">controlled research<\/a>, visit <a href=\"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/export-controls-training\/\">Export Controls: Training<\/a> for training requirements.<\/p>\n\n\n<div class=\"is-text wp-block-ncst-buttons\">\n    \n<div class=\"is-style-secondary wp-block-ncst-button\">\n      <a\n        class=\"ncst-block__button-link btn\"\n        href=\"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-compliance-definitions\/#controlled-research\"\n        data-ncst-lightbox=\"false\"\n                      >\n                  <span class=\"text\">More about training for controlled research<\/span><span class=\"arrow-indicator\"><svg class=\"wolficon wolficon-arrow-right-bold\" role=\"img\"  aria-hidden=\"true\">\n\t\t\t\n\t\t\t<use xlink:href=\"#wolficon-arrow-right-bold\">\n\t\t<\/svg><\/span>\n              <\/a>\n    <\/div>\n  \n\n  <\/div>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Overview As required by the CHIPS Act of 2022, all federal agencies are implementing a Research Security training&nbsp;requirement for&nbsp;Senior Personnel.&nbsp;On May 1, 2025, the U.S. Department of Energy became the&hellip;<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":14610,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"source":"","ncst_custom_author":"","ncst_show_custom_author":false,"ncst_dynamicHeaderBlockName":"ncst\/default-header","ncst_dynamicHeaderData":"{\"pageIntro\":\"Research security training is mandated for individuals involved in federally funded research by U.S. federal regulations such as the <a href=\\\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/4346\/text\\\">CHIPS Act of 2022<\/a> and <a href=\\\"https:\/\/trumpwhitehouse.archives.gov\/presidential-actions\/presidential-memorandum-united-states-government-supported-research-development-national-security-policy\/\\\">National Security Presidential Memorandum 33<\/a> (NSPM-33).\u00a0\"}","ncst_content_audit_freq":"","ncst_content_audit_date":"","ncst_content_audit_display":false,"ncst_backToTopFlag":"","footnotes":""},"tags":[],"class_list":["post-15980","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Research Security: Training - Research Administration and Compliance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research Security: Training - Research Administration and Compliance\" \/>\n<meta property=\"og:description\" content=\"Overview As required by the CHIPS Act of 2022, all federal agencies are implementing a Research Security training&nbsp;requirement for&nbsp;Senior Personnel.&nbsp;On May 1, 2025, the U.S. Department of Energy became the&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Research Administration and Compliance\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-01T18:44:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/research-compliance\\\/research-security\\\/research-security-training\\\/\",\"url\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/research-compliance\\\/research-security\\\/research-security-training\\\/\",\"name\":\"Research Security: Training - Research Administration and Compliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/#website\"},\"datePublished\":\"2025-06-13T13:37:55+00:00\",\"dateModified\":\"2026-05-01T18:44:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/research-compliance\\\/research-security\\\/research-security-training\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/research-compliance\\\/research-security\\\/research-security-training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/research-compliance\\\/research-security\\\/research-security-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compliance\",\"item\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Compliance\",\"item\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/research-compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Research Security\u00a0\",\"item\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/compliance\\\/research-compliance\\\/research-security\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Research Security: Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/#website\",\"url\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/\",\"name\":\"Research Administration and Compliance\",\"description\":\"Just another Research and Innovation site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/research.ncsu.edu\\\/administration\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research Security: Training - Research Administration and Compliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/","og_locale":"en_US","og_type":"article","og_title":"Research Security: Training - Research Administration and Compliance","og_description":"Overview As required by the CHIPS Act of 2022, all federal agencies are implementing a Research Security training&nbsp;requirement for&nbsp;Senior Personnel.&nbsp;On May 1, 2025, the U.S. Department of Energy became the&hellip;","og_url":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/","og_site_name":"Research Administration and Compliance","article_modified_time":"2026-05-01T18:44:55+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/","url":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/","name":"Research Security: Training - Research Administration and Compliance","isPartOf":{"@id":"https:\/\/research.ncsu.edu\/administration\/#website"},"datePublished":"2025-06-13T13:37:55+00:00","dateModified":"2026-05-01T18:44:55+00:00","breadcrumb":{"@id":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/research-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/research.ncsu.edu\/administration\/"},{"@type":"ListItem","position":2,"name":"Compliance","item":"https:\/\/research.ncsu.edu\/administration\/compliance\/"},{"@type":"ListItem","position":3,"name":"Research Compliance","item":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/"},{"@type":"ListItem","position":4,"name":"Research Security\u00a0","item":"https:\/\/research.ncsu.edu\/administration\/compliance\/research-compliance\/research-security\/"},{"@type":"ListItem","position":5,"name":"Research Security: Training"}]},{"@type":"WebSite","@id":"https:\/\/research.ncsu.edu\/administration\/#website","url":"https:\/\/research.ncsu.edu\/administration\/","name":"Research Administration and Compliance","description":"Just another Research and Innovation site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/research.ncsu.edu\/administration\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/pages\/15980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/comments?post=15980"}],"version-history":[{"count":40,"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/pages\/15980\/revisions"}],"predecessor-version":[{"id":18074,"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/pages\/15980\/revisions\/18074"}],"up":[{"embeddable":true,"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/pages\/14610"}],"wp:attachment":[{"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/media?parent=15980"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/research.ncsu.edu\/administration\/wp-json\/wp\/v2\/tags?post=15980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}