{"id":226,"date":"2026-02-26T19:52:13","date_gmt":"2026-02-26T19:52:13","guid":{"rendered":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-security-program\/federal-laws-regulations-directives\/"},"modified":"2026-03-11T19:31:51","modified_gmt":"2026-03-11T19:31:51","slug":"federal-laws-regulations-directives","status":"publish","type":"page","link":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-security-program\/federal-laws-regulations-directives\/","title":{"rendered":"Federal Laws, Regulations and Directives"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Federal Laws, Regulations,<strong> <\/strong>and Directives Pertaining to Research Security<\/h2>\n\n\n\n<p>The U.S. Government has enacted the following federal directives and legislation&nbsp;regarding&nbsp;disclosures,\u202fresearch security program requirements, and research security training:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Biden White House Office of Science and Technology Policy (OSTP):\u202f<\/strong><a href=\"https:\/\/bidenwhitehouse.archives.gov\/wp-content\/uploads\/2024\/07\/OSTP-RSP-Guidelines-Memo.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Guidelines for Research Security Programs at Covered Institutions<\/strong><\/a><strong>.<\/strong>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/trumpwhitehouse.archives.gov\/presidential-actions\/presidential-memorandum-united-states-government-supported-research-development-national-security-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>National Security Presidential Memorandum 33<\/strong><\/a><strong>\u202f(NSPM 33) and\u202f<\/strong><a href=\"https:\/\/bidenwhitehouse.archives.gov\/wp-content\/uploads\/2022\/01\/010422-NSPM-33-Implementation-Guidance.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Implementation Guidance<\/strong><\/a>&nbsp;\n<ul class=\"wp-block-list\">\n<li><strong>Released in January 2021 and January 2022<\/strong>&nbsp;<\/li>\n\n\n\n<li><strong>Requires all federal research funding agencies to standardize disclosure requirements for federally funded awards<\/strong>&nbsp;<\/li>\n\n\n\n<li><strong>Requires research institutions receiving over $50 million per year in federal research funding to certify that they have implemented a research security program<\/strong>&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.aau.edu\/sites\/default\/files\/AAU-Files\/Key-Issues\/Science-Security\/CHIPSandScienceFinalResearchSecurityProvisions.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>CHIPS &amp; Science Act<\/strong><\/a>&nbsp;\n<ul class=\"wp-block-list\">\n<li><strong>Enacted in 2022<\/strong>&nbsp;<\/li>\n\n\n\n<li><strong>Mandates research security provisions including:<\/strong>&nbsp;\n<ul class=\"wp-block-list\">\n<li><strong>Annual Research Security Training requirements for Federal research award personnel: page 792, section 10634<\/strong>&nbsp;<\/li>\n\n\n\n<li><strong>Certification of no involvement in Maligned Foreign Talent Recruitment Programs (MFTRP):\u202fpage 787, section 10632<\/strong>&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-116publ283\/html\/PLAW-116publ283.htm\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>National Defense Authorization Act for Fiscal Year 2021<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/trumpwhitehouse.archives.gov\/wp-content\/uploads\/2021\/01\/NSTC-Research-Security-Best-Practices-Jan2021.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>JCORE Recommendations<\/strong><\/a><strong>:<\/strong>&nbsp;\n<ul class=\"wp-block-list\">\n<li><strong>Developed in 2021 by The National Science and Technology Council Joint Committee on the Research Environment, Subcommittee on Research Security in coordination with the National Security Council<\/strong>&nbsp;<\/li>\n\n\n\n<li><strong>Outlines recommended practices and guidance for research institutions to meet the requirements of NSPM-33.<\/strong>&nbsp;<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><a href=\"https:\/\/www.nsf.gov\/bfa\/dias\/policy\/nstc_disclosure.jsp\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>National Science and Technology Council Disclosure Requirements &amp; Standardization<\/strong><\/a>&nbsp;<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>National Science Foundation<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/new.nsf.gov\/research-security\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Research Security<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.nsf.gov\/policies\/pappg\/24-1\/ch-9-recipient-standards\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Proposal &amp; Award Policies &amp; Procedures Guide\u202f<\/strong><\/a><strong>(PAPPG)<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>National Institutes of Health<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/grants.nih.gov\/policy\/foreign-interference.htm\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Foreign Interference<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/grants.nih.gov\/grants\/forms\/NIH-Disclosures-Table.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Harmonized Other Support table<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/grants.nih.gov\/grants\/glossary.htm#ForeignComponent\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Foreign Component definition<\/strong><\/a>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/grants.nih.gov\/grants\/policy\/nihgps\/HTML5\/section_8\/8.1.2_prior_approval_requirements.htm#Foreign\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Foreign Component Prior Approval Requirement\u202f<\/strong><\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Department of Energy<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.energy.gov\/sites\/default\/files\/2021-12\/Interim%20COI%20Policy%20FAL2022-02%20to%20SPEs.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Interim COI policy<\/strong><\/a><strong>\u202f<\/strong>&nbsp;<\/li>\n\n\n\n<li><a href=\"https:\/\/www.energy.gov\/sites\/default\/files\/2024-10\/FAL25-02%20Research%20Security%20Training%20Requirements%20%28CHIPS%29_0.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Financial Assistance Letter<\/strong><\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Department of Defense<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/dodcio.defense.gov\/CMMC\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Cybersecurity Maturity Model Certification (CMMC)\u202fregulations<\/strong><\/a><strong>\u202ffor handling Controlled Unclassified Information (CUI)<\/strong>&nbsp;<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-cover alignfull is-style-brushstroke-green\" style=\"min-height:5em;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-oval-green-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33%\">\n<h3 class=\"wp-block-heading has-bodoni-font-family has-gigantic-font-size\"><em>Report a Research Security Concern<\/em><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:67%\">\n\t<div class=\"alignnone is-style-icon-list wp-block-stalwart-blocks-call-to-action\">\n\n\t<ul class=\"stalwart-ctas is-style-icon-list columns-1\" id=\"stalwart-ctas-block_1278aab26f3523f5af034bbc0501ff3c\">\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t<li class=\"stalwart-cta-single has-link\">\n\n\t\t\t\t\t<div class=\"stalwart-cta-content\"><h2 class=\"stalwart-cta-heading\"><a class=\"stalwart-cta-link\" href=\"mailto:mark.hubbard@colostate.edu\">Email Mark Hubbard, Assistant VP of Research Integrity &amp; Compliance, Research Security Officer<\/a><\/h2><\/div>\n\t\t\t\t<\/li><!-- .single-cta -->\n\n\t\t\t\n\t<\/ul><!-- .stalwart-ctas -->\n\n\t<\/div>\n\n\n\n<p class=\"has-text-align-center has-bodoni-font-family\"><em>OR<\/em><\/p>\n\n\n\n\t<div class=\"alignnone is-style-icon-list wp-block-stalwart-blocks-call-to-action\">\n\n\t<ul class=\"stalwart-ctas is-style-icon-list columns-1\" id=\"stalwart-ctas-block_b6731f394fff879dac88656ae0f24432\">\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t<li class=\"stalwart-cta-single has-link\">\n\n\t\t\t\t\t<div class=\"stalwart-cta-content\"><h2 class=\"stalwart-cta-heading\"><a class=\"stalwart-cta-link\" href=\"https:\/\/csusystem.edu\/compliance-reporting-hotline\/\">Complete an Online Report Through the CSU System Compliance Report Hotline<\/a><\/h2><\/div>\n\t\t\t\t<\/li><!-- .single-cta -->\n\n\t\t\t\n\t<\/ul><!-- .stalwart-ctas -->\n\n\t<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Federal Laws, Regulations, and Directives Pertaining to Research Security The U.S. Government has enacted the following federal directives and legislation&nbsp;regarding&nbsp;disclosures,\u202fresearch security program requirements, and research security training:&nbsp; National Science Foundation&nbsp; National Institutes of Health&nbsp; Department of Energy&nbsp; Department of Defense&nbsp;<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":66,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"microsite":[19],"class_list":["post-226","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/comments?post=226"}],"version-history":[{"count":0,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/226\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/66"}],"wp:attachment":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/media?parent=226"}],"wp:term":[{"taxonomy":"microsite","embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/microsite?post=226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}