{"id":249,"date":"2026-03-25T17:15:49","date_gmt":"2026-03-25T17:15:49","guid":{"rendered":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-security-program\/export-control-training\/"},"modified":"2026-03-25T17:17:32","modified_gmt":"2026-03-25T17:17:32","slug":"export-control-training","status":"publish","type":"page","link":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/research-security-program\/export-control-training\/","title":{"rendered":"Export Control Training"},"content":{"rendered":"\n<p>Colorado State University provides export control training to ensure that faculty, staff, and researchers understand their responsibilities when conducting research involving international collaborations, foreign sponsors, or controlled technologies.<\/p>\n\n\n\n<p>This training supports CSU\u2019s compliance with U.S. export control regulations and federal research security requirements established under National Security Presidential Memorandum-33 (NSPM-33).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Is Required to Take Export Control Training?<\/h2>\n\n\n\n<p>Export control training is required for CSU personnel whose work may involve export-controlled technologies, international collaborations, or foreign sponsors. This may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Researchers working on federally sponsored projects<\/li>\n\n\n\n<li>Personnel handling controlled equipment, software, or technical data<\/li>\n\n\n\n<li>Individuals involved in international research collaborations<\/li>\n\n\n\n<li>Faculty and staff traveling internationally for research activities<\/li>\n<\/ul>\n\n\n\n<p>Training is through CITI PROGRAM (PROVIDE LINK TO TRAINING).<\/p>\n\n\n\n<p>Export control training covers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>U.S. export control regulations and compliance responsibilities<\/li>\n\n\n\n<li>Review of foreign sponsors, collaborators, and partnerships<\/li>\n\n\n\n<li>Screening against restricted and sanctioned entities<\/li>\n\n\n\n<li>International travel considerations for research and equipment<\/li>\n\n\n\n<li>Responsibilities for protecting controlled technologies and data<\/li>\n<\/ul>\n\n\n\n<p>EMAIL <a href=\"mailto:Rich.Wright@colostate.edu\">Rich Wright -Export Control Director<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-100\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/export-controls-foreign-engagement-program\/export-control\/\">Export Control Office<\/a><\/div>\n<\/div>\n\n\n\n<p>The Export Controls and Foreign Engagement Office provide guidance on export control requirements, restricted party screening, international collaborations, and compliance questions. Personnel are encouraged to contact the office with any questions related to export control training or requirements.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Colorado State University provides export control training to ensure that faculty, staff, and researchers understand their responsibilities when conducting research involving international collaborations, foreign sponsors, or controlled technologies. This training supports CSU\u2019s compliance with U.S. export control regulations and federal research security requirements established under National Security Presidential Memorandum-33 (NSPM-33). Who Is Required to Take [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":66,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"microsite":[19],"class_list":["post-249","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":0,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/249\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/pages\/66"}],"wp:attachment":[{"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"microsite","embeddable":true,"href":"https:\/\/www.research.colostate.edu\/integrity-security-compliance\/wp-json\/wp\/v2\/microsite?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}