Research security training

Research security training is critical to protecting federally funded research activities from misappropriation of research to the detriment of national or economic security, violations of research integrity, and undue foreign influence in research.  

Requirements by federal agencies

As of May 1, 2025, the US Department of Energy (DOE) began requiring certification of completed Research Security Training for “covered individuals” on DOE funding applications.   As of October 2025, the US Department of Agriculture (USDA) and the National Science Foundation (NSF) require “covered individuals” (NSF “Senior/Key Personnel”) to certify completed Research Security training in proposal applications.  Research security training is currently required for Department of Defense awards with Risk Mitigation Plans, as well as for other federal awards with award specific Research Security Plans.  It is expected that other federal sponsors will follow suit and soon require certification of completed research security training on proposal applications as a standard practice, as well as annual recertifications of completed training on awards.  ASU Research Compliance highly encourages all researchers to take annual research security training now to ensure compliance with federal sponsor requirements which could show up in federal Notice of Funding Opportunity (NOFO)/Funding Opportunity Announcements (FOAs) and awards at any time.

Annual Research Security trainingis highly recommended for ALL persons currently conducting ASU research  involving U.S. Critical and Emerging Technology.  This recommendation applies even if current activities may be fundamental research.

Awareness of the current research security risks and how to mitigate those risks is critical to maintaining a secure, compliant environment. Critical and Emerging Technologies (CETs) are a subset of advanced technologies that are potentially significant to U.S. national security” (National Science and Technology Council, 2024). The following critical and emerging technology areas are of particular importance to the national security of the United Sates – and please see key subfields for each identified CET starting on page three of the Critical and Emerging Technologies List Update:

  • Advanced Computing
  • Advanced Engineering Materials
  • Advanced Gas Turbine Engine Technologies
  • Advanced and Networked Sensing and Signature Management
  • Advanced Manufacturing
  • Artificial Intelligence
  • Biotechnologies
  • Clean Energy Generation and Storage
  • Data Privacy, Data Security, and Cybersecurity Technologies
  • Directed Energy
  • Highly Automated, Autonomous, and Uncrewed Systems (UxS), and Robotics
  • Human-Machine Interfaces
  • Hypersonics
  • Integrated Communication and Networking Technologies
  • Positioning, Navigation, and Timing (PNT) Technologies
  • Quantum Information and Enabling Technologies
  • Semiconductors and Microelectronics
  • Space Technologies and Systems

Note: Although we encourage ALL researchers to complete the annual Research Security training, this advisory is specifically for researchers working on CET. Please note the difference between working on CET and working with CET. For example, this advisory is applicable to a researcher working to advance AI technology (instead of a researcher only using AI as a tool for a separate research objective). 

Where to access

The Research Security training certification is primarily made in the Current and Pending and Other Support forms.  All “covered individuals” will be required to certify that they have completed the training within 12 months prior to the proposal submission date and then annually in awards (if required by the sponsor).  

Covered Individuals include ASU PIs, Co-PIs, project managers, or anyone contributing substantially to the research scope, as designated by the sponsor or outlined in the Notice of Funding Opportunity (NOFO). NSF and NIH use the terminology of “Senior/Key Personnel” which aligns with the definition of “covered individual”.   

Note: graduate students and postdocs may be included depending on their role/function. External collaborators must complete federally required research security training through their home institutions if they are designated as “covered individuals.”

ASU offerings for research security training

ASU offers three (3) research security training courses through CITIProgram.org.    Completing one (1) of the three (3) research security courses will meet the federal training requirement.   

We recommend the annual “Research Security Training (Combined)” course as it only takes about an hour to complete.

 How to access the training:

  1. Log in to your CITI Program account using your ASURITE. See CITI Login Instructions.
  2. Scroll down and select “Add a Course.”
  3. Choose the Research Security category.
  4. Select one of the following approved courses:
    • Research Security Training (combined): ~1 hour (recommended)
    • Research Security Training (full): ~4 hours, interactive
    • Research Security Advanced Refresher: 8 modules, ~4 hours

Need help or more information? 

  • Training verification: Contact Research Compliance at [email protected] to confirm completion.
  • Proposal preparation support: Work with your Research Advancement (RA) team.
  • Background: these requirements support the CHIPS and Science Act of 2022 and aim to safeguard federally funded research.

Resources