{"id":228,"date":"2026-02-26T19:57:08","date_gmt":"2026-02-26T19:57:08","guid":{"rendered":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-security-program\/research-security-training\/"},"modified":"2026-02-26T20:01:21","modified_gmt":"2026-02-26T20:01:21","slug":"research-security-training","status":"publish","type":"page","link":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-security-program\/research-security-training\/","title":{"rendered":"Research Security Training"},"content":{"rendered":"\n<p>Over the past several years, the federal government has placed increased emphasis on protecting public investment in science, preventing the misuse of sensitive data and technologies, and ensuring the security of research personnel, including those traveling abroad.&nbsp;<\/p>\n\n\n\n<p>As part of the implementation of\u202f<a href=\"https:\/\/trumpwhitehouse.archives.gov\/presidential-actions\/presidential-memorandum-united-states-government-supported-research-development-national-security-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Security Measure Presidential Memorandum -33<\/a>\u202fand provisions under the CHIPS and Science Act,\u202fFederal regulations and guidance\u202f require that all principal investigators, co-principal investigators, and other types of key\/senior research personnel who apply for federal funding take Research Security Training\u202f<strong>before the submission of any new funding proposal request<\/strong>, including non-competitive segments of current awards.\u202f\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Who&nbsp;is required to&nbsp;take Research Security Training?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Research Security&nbsp;Training&nbsp;is strongly encouraged&nbsp;for&nbsp;all members of the CSU research community and is available to everyone.&nbsp;Anyone named as key personnel on proposals to federal funding agencies or resulting awards must take RST, including CSU faculty, staff, post-doctoral scholars, and students.&nbsp;<\/p>\n\n\n\n<p>Additional&nbsp;groups may be&nbsp;required&nbsp;to take RST based on agency policy and award terms and conditions. These individuals will be contacted directly by OVPR.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-columns has-csu-green-background-color has-background is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h2 class=\"wp-block-heading has-background-color has-text-color has-link-color wp-elements-7fcbe40e2d34db32c74a13d584d0c7d4\"><strong>Frequency of Research Security Training<\/strong>&nbsp;<\/h2>\n\n\n\n<p class=\"has-background-color has-text-color has-link-color wp-elements-392a9eb8fb8ba3b7ababa082fa8481f2\">Research Security Training must be completed annually and within 12 months prior to any new funding request.&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.citiprogram.org\/index.cfm?pageID=668\">Access Research Security Training<\/a><\/div>\n<\/div>\n\n\n\n<ol class=\"wp-block-list has-background-color has-text-color has-link-color wp-elements-3102bde59795dcc7412cdc6c36564d7a\">\n<li>Login using the \u201cLogin Through My Organization\u201d\u00a0option\u00a0<\/li>\n\n\n\n<li>Type \u201cColorado State University\u201d\u00a0<\/li>\n\n\n\n<li>Select CSU and login using your CSU ID and password\u00a0<\/li>\n\n\n\n<li>Select\u202f<strong>\u201c<\/strong>Research Security Training (Combined)<strong>\u201d<\/strong>\u00a0<\/li>\n\n\n\n<li>Scroll to the end of the Learner Course page and select \u201cAdd a Course\u201d\u00a0<\/li>\n\n\n\n<li>Select \u201cResearch Security Training (Combined)\u201d and \u201cNot at this time\u201d to all other screening questions\u00a0<\/li>\n<\/ol>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-cover alignfull is-style-brushstroke-green\" style=\"min-height:5em;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-oval-green-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33%\">\n<h3 class=\"wp-block-heading has-bodoni-font-family has-gigantic-font-size\"><em>Report a Research Security Concern<\/em><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:67%\">\n\t<div class=\"alignnone is-style-icon-list wp-block-stalwart-blocks-call-to-action\">\n\n\t<ul class=\"stalwart-ctas is-style-icon-list columns-1\" id=\"stalwart-ctas-block_36cabf40179f1cd200b27eff710cd095\">\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t<li class=\"stalwart-cta-single has-link\">\n\n\t\t\t\t\t<div class=\"stalwart-cta-content\"><h2 class=\"stalwart-cta-heading\"><a class=\"stalwart-cta-link\" href=\"mailto:mark.hubbard@colostate.edu\">Email Mark Hubbard, Assistant VP of Research Integrity &amp; Compliance, Research Security Officer<\/a><\/h2><\/div>\n\t\t\t\t<\/li><!-- .single-cta -->\n\n\t\t\t\n\t<\/ul><!-- .stalwart-ctas -->\n\n\t<\/div>\n\n\n\n<p class=\"has-text-align-center has-bodoni-font-family\"><em>OR<\/em><\/p>\n\n\n\n\t<div class=\"alignnone is-style-icon-list wp-block-stalwart-blocks-call-to-action\">\n\n\t<ul class=\"stalwart-ctas is-style-icon-list columns-1\" id=\"stalwart-ctas-block_7374cf0a6b22bf75caf7343e7d5d722c\">\n\n\t\t\t\n\t\t\t\t\n\t\t\t\t<li class=\"stalwart-cta-single has-link\">\n\n\t\t\t\t\t<div class=\"stalwart-cta-content\"><h2 class=\"stalwart-cta-heading\"><a class=\"stalwart-cta-link\" href=\"https:\/\/csusystem.edu\/compliance-reporting-hotline\/\">Complete an Online Report Through the CSU System Compliance Report Hotline<\/a><\/h2><\/div>\n\t\t\t\t<\/li><!-- .single-cta -->\n\n\t\t\t\n\t<\/ul><!-- .stalwart-ctas -->\n\n\t<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Over the past several years, the federal government has placed increased emphasis on protecting public investment in science, preventing the misuse of sensitive data and technologies, and ensuring the security of research personnel, including those traveling abroad.&nbsp; As part of the implementation of\u202fNational Security Measure Presidential Memorandum -33\u202fand provisions under the CHIPS and Science Act,\u202fFederal [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":66,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"microsite":[19],"class_list":["post-228","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":0,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/228\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/66"}],"wp:attachment":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/media?parent=228"}],"wp:term":[{"taxonomy":"microsite","embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/microsite?post=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}