uconn

IRB InfoEd Updates and Training Sessions

IRB InfoEd Updates 

The UConn IRB Office is EXCITED to announce that the updates to the IRB module of InfoEd will go-live later this Fall. The updated system will help streamline IRB submission and review processes, making it easier to keep track of your protocols and communications with the IRB staff, and streamline the review process. 

WHAT WILL BE DIFFERENT? 

  • Consolidated Smart Forms: the application forms have been consolidated into a single Main Application form that uses logic to drive your experience.  
  • Updated Protocol Templates:  Comprehensive protocol templates will be introduced with the goal of reducing back and forth during the review process. 
  • Responding to IRB Feedback: System enhancements will make it easier for study teams to respond to IRB feedback.   
  • Routing: Routing will be automated; submitters will not have to add the PI and Department Head to the route for review and sign-off.  
  • Personnel Roles: Personnel roles will drive who on a study team is able to edit, manage, and submit submissions to the IRB and who receives messages. 
  • Amendments: There will be two types of amendments: Personnel Changes and Amendments (for changes to the study itself or study materials). Only one amendment can be in process at any given time. 
  • Ancillary Reviews: Questions are built into the application form that will determine the need for ancillary reviews and automatically inform the responsible office. 
  • Reportable Information/Events: All reports of issues or information that is required to be reported to the IRB will be reported using a single smart form.   
  • Administrative Check-Ins:  Studies that do not require continuing review will receive periodic notices to complete an administrative check-in or a study closure.  

WHAT DOES THIS MEAN FOR EXISTING STUDIES? 

Most existing studies will need to be migrated to the updated application form for the system to work as intended. Migration will be required before continuing review (starting on February 25th 2025) or with the next submission to the IRB (for studies without continuing review). 

A study migration guide is forthcoming. 

Investigators are encouraged to close studies that are eligible for closure as soon as possible.  Studies are eligible for closure when: 

  1. Enrollment is closed, 
  1. Interactions and Interventions with participants are complete, 
  1. Data collection is complete, and 
  1. Analysis of identifiable information and/or identifiable biospecimens for the purposes of the current research is complete. 
  1. When the UConn IRB is serving as the IRB of record for other sites, the study may be closed when all sites meet the above criteria. 

Simply maintaining identifiable data/biospecimens without using, studying, or analyzing the data/biospecimens does not require an open protocol with the IRB.  

IS TRAINING AVAILABLE? 

Research Integrity & Compliance will offer weekly training opportunities both in-person and online via WebEx or Teams. They are open to all UConn faculty, staff, and students. A recorded session will be made available for those unable to attend in person. 

Sign up for an online or in-person training session on our InfoEd Training webpage.

WHERE CAN I LEARN MORE? 

The IRB Office (irb@uconn.edu) is always available to answer any questions you may have.  

How-To Guides with step-by-step instructions will also be made available including: 

  • InfoEd Guide for Researchers 
  • InfoEd Guide for Ancillary Reviewers 
  • InfoEd Guide for Department Reviewers 
  • InfoEd Guide for IRB Members 

 

IRB Virtual and In-Person Hours in September

The Research Integrity & Compliance (RIC) team will be holding office hours via Microsoft Teams to assist students and faculty with IRB submissions and human subjects regulations.  To accommodate varying schedules, late afternoon and early evening appointments will be available.

RIC staff will be on hand to answer any questions regarding IRB submissions, human subjects regulations, post-approval support, and general IRB guidance.

Office hours will be held on the following dates and times:

Wednesday, September 25, 2024: 3:00pm – 6:30pm

Location: Whetten Graduate Center, Giolas Conference Room, 2nd floor.

Thursday, September 26, 2024: 10:00am – 1:00pm

Follow the link below to schedule an in person or virtual meeting.

https://nexus.uconn.edu/secure_per/schedule1.php?stser=4475

 

Education & Training Sessions Offered by RIC 

The RIC office provides educational and training sessions to researchers, research teams, and classes.  These sessions cover a range of topics, including best practices for obtaining informed consent, successful IRB submissions, managing research post-approval, and other aspects of human subjects research.

For questions about the office hours or educational sessions, please contact Joan Levine at joan.levine@uconn.edu.

 

External Funding Resources Overview

The Research Development Services team offers several resources to assist faculty in finding external funding opportunities for their research and scholarship.

 

Listservs

Sign up for our Funding Opportunity Listservs to receive periodic emails with funding opportunities in topic areas of interest to you.

 

Databases

UConn subscribes to two grant funding search engines:

Pivot-RP, encompassing state, federal, corporate, non-profit, and foundation sponsors. Create an account to identify potential funding opportunities, receive weekly funding alerts based on your research profile, and identify potential collaborators within UConn using Pivot Profiles.

Foundation Directory Online, specializing in private and corporate foundation funding.

 

Specific Topic Areas

UConn is a key member of the QuantumCT initiative. Our team has curated funding opportunities specific to research, workforce development, and education related to the quantum sciences.

ARPA-H – a new research funding agency focused on transformative biomedical and health breakthroughs. See our ARPA-H funding resources page for more information.

 

Contact our team!

For assistance with any of these tools or questions regarding external funding opportunities, please contact the RDS team at ovpr-rds@uconn.edu.

ARPA-H Current Funding Opportunities

The RDS team suggests contacting us for support on ARPA-H submissions well before submitting a solution summary or proposal, as their programs and requirements frequently change. We are keeping up to date with these changes and can help your submission meet current requirements.

Background

Mission: The Advanced Research Projects Agency for Health (ARPA-H) accelerates better health outcomes for everyone by supporting the development of high-impact solutions to society’s most challenging health problems.

Who They Are: ARPA-H advances high-potential, high-impact biomedical and health research that cannot be readily accomplished through traditional research or commercial activity. ARPA-H awardees are developing entirely new ways to tackle the hardest challenges in health.

Contact

This contact form can be used to connect with ARPA-H directly.


Mission Office ISOs

The four current ARPA-H focus areas translate to four mission offices. Each mission office has its own Innovative Solutions Opening (ISO) to replace the previous Open BAA. Interested applicants should submit their proposal to the Mission Office ISO that best fits their subject matter.

All Mission Office ISOs require solution summaries prior to a full proposal and have a closing date of March 3, 2025.

Health Science Futures (HSF)

Expanding what’s technically possible. Accelerating advances across research areas and removing limitations that stymie progress towards solutions. The tools and platforms developed apply to a broad range of diseases.

Proactive Health (PHO)

Keeping people from being patients. Reducing the likelihood that people become patients. Preventative programs will create new capabilities to detect and characterize disease risk and promote treatments and behaviors to anticipate threats to Americans’ health, whether those are viral, bacterial, chemical, physical, or psychological.

Resilient Systems (RSO)

Building integrated health care systems. Developing capabilities, business models, and integrations to endure crises such as pandemics, social disruption, and economic instability. Resilient systems need to sustain themselves between crises, from the molecular to the societal, to better achieve outcomes that advance American health and wellbeing.

Scalable Solutions (SSO)

Reaching everyone quickly. Addressing challenges that include geography, distribution, manufacturing, data and information, and economies of scale to create programs that result in impactful, timely, and equitable solutions.


Current Programs and Exploration Topics

Note: Solution summaries and full proposals are due at varying times of day on due dates depending on the program. Be sure to confirm these times on each program’s program page, linked in the table below.

Funding Opportunity Listservs

With the growing number of demands on faculty time, we understand that keeping up with external funding opportunities for research and scholarship can be a challenge. A new initiative from our OVPR Research Development Services team aims to highlight funding opportunities, particularly those that are new, fast-moving, and interdisciplinary, across wide-ranging topic areas. To view brief descriptions of each of these lists and to sign up, click on the link below.

Current topics areas:

  • Agriculture and Food Sciences
  • Arts, Humanities, and Law
  • Business, Management, and Commerce
  • Climate, Environment, Energy, and Sustainability
  • Data Science, Cybersecurity, and AI
  • Education
  • Entrepreneurship and Commercialization
  • Global Human Rights

 

  • Health and Wellness
  • Innovative Medicine
  • Life Sciences
  • Limited Submissions
  • Materials and Advanced Manufacturing
  • Physical Sciences and Mathematics
  • Quantum Sciences
  • Social Sciences and Social Work

If you have questions or suggestions for improvement, please email the team at ovpr-rds@uconn.edu.

Foreign Travel Security

Researchers who travel domestically or overseas should be aware of security considerations that apply to themselves. Our office has provided a list of some useful travel tips for those of you who work on any sponsored research.  These tips are useful for any traveler and are often overlooked in the rush to acquire tickets, hotel reservations, visas, etc.

Please remember that secure research cannot be conducted outside the United States – this includes traveling with devices that may contain research.  Please contact us or the Export Control office with any questions as they may pertain to your situation: researchsecurity@uconn.edu or exportcontrol@uconn.edu

Depending on your travel situation, we are available to provide country-specific travel briefings.  Please contact our office researchsecurity@uconn.edu to arrange an agency briefing.

All university-sponsored international travel requests are routed through the Concur system, of which the Export Control office is part of the approval workflow for specific destination countries, to included sanctioned and high-risk countries.

Travelers to sanctioned countries are prohibited from taking regular use laptops, tablets, and/or university-provided equipment.

Loaner equipment is provided to travel to high risk countries to ensure sensitive or export-controlled information, data or materials with them.

If you are planning to travel to a country which is comprehensively sanctioned by the United States Government, you are required to submit a Pre-Travel Application for Embargoed Country Travel.

Contact exportcontrol@uconn.edu with any questions, to access the Pre-Travel Application for Embargoed Country Travel form, or to request a pre-travel informational meeting.

 

Travel Security ‘101’

Every time you move away from your residence, place of work, or some other safe static location you need to focus on what is going on ‘around you’; to be always situationally aware.  Notice what is ‘normal’ to include people, objects, and environment and pay attention when that ‘normal’ adjusts or changes.  Never disregard your gut feeling as the human body amazingly is able to detect stimulus long before our brains consciously pull it all together.  Prepare for the unexpected.  Noticing small things consistently can better assist with preparing yourself and those you might be traveling with anything threat-wise that may come later.

 

Plan Ahead

Always be prepared before you travel, research where and how you are traveling, staying, or living – – what does the on-the-ground situation look like?  Are there beyond normal security and safety considerations to focus on?  Areas to avoid?  Ongoing demonstrations and/or political strife that could affect movements and onward travel?  Your pre-travel preparations should be deliberate and fulsome.

 

Keeping A Low Profile

Do your best to minimize unwanted attention.  Review what you are packing or wearing, clothing, jewelry, and even overtly displayed religious items if you typically display them on your person.  Avoid items that might necessarily identify you as an American by alternately wearing non-descript attire that enables you to blend in as best as possible especially moving through public venues.  Do not accept letters, personal messages, photographs, packages, or other material to be carried in or out of the country.

 

Airports and Airplanes

Arrive early for your flights and proceed as quickly as possible through check-in and security to your gate as this offers the best level of in-depth security against a possible terrorist or criminal threat(s).  Keep close control of all carry-on items and stay alert to those other passengers and airport personnel moving around you until you board the aircraft.  Once onboard, pay attention to the location of the closest exits by counting rows of seats, both in front and behind if that is your closest exit.  Remember if and when smoke fills the cabin, you will be unable to see the lighted strips on the floor so counting seats and placing that fact in your muscle memory can be critical in evacuating safely.  When placing carry-on bags in overhead compartments, place them with their zippers and openers towards the back making it more difficult for potential thieves to get inside.  If placing bags underneath seats, turn your bag upside down to cover the zipper or even wrap the bags strap around your foot for an additional security measure.

 

Hotel Safety

Request a room between the second and fifth floors as those are rooms too high typically for thieves but would allow fire equipment to reach in the event of a potential fire emergency.  Locate your closest emergency exit(s) and develop a plan when/if there is a fire or other emergency where quicker egress is necessary minus using elevators.  When in your room, always use all the provided door locking hardware, and check to ensure if there are any opening windows or sliding glass doors, that they too are secured properly.  Keep your room neat so you can quickly notice anything that might be out of place or conversely messy which might do the same trick.  When leaving the room typically use the ‘do not disturb’ sign on the door and keep a light on and the television also at a low volume to give the impression that someone is in the room.

 

Vehicle Safety

Always keep your doors locked and windows rolled up, especially if transiting busy thoroughfares with multiple stoplights or anything that reduces your vehicle speed.  Leave distance between you and the vehicle in front of you, typically if you cannot see the rear wheels of the vehicle in front, then you are too close and would be unable to move in the event you needed to. When parked, find well illuminated areas and keep any valuables you might have locked in your trunk and out of sight to passersby.

 

​​​​​​​Other Travel Related Resources

The U.S. Department of State, Bureau of Consular Affairs maintains a comprehensive library of information that can help you prepare for a unexpected crisis overseas. Their site includes links to additional information about other aspects of security for persons living overseas, including children.

The U.S. Department of State Smart Traveler Enrollment Program (STEP) is a free service to allow U.S. citizens and nationals traveling and living abroad to enroll their trip with the nearest U.S. Embassy or Consulate, receive information from the Embassy about safety conditions in the destination country, and help the U.S. Embassy contact you in an emergency, whether natural disaster, civil unrest, or family emergency.

Traveling overseas with mobile phones, laptops, PDAs, and other electronic devices from The National Counterintelligence and Security Center.  Additionally, the Air Force Office of Special Investigations has created a similar brochure with additional information

U.S. Department of State Current Travel Warnings are issued to describe long-term, protracted conditions that make a country dangerous or unstable. A Travel Warning is also issued when the U.S. government’s ability to assist American citizens is constrained due to the closure of an embassy or consulate or because of a drawdown of its staff.

Also see the CIA World Factbook, which contains a plethora of excellent travel data in one-page synopses.

The State Department’s annual Country Reports on Terrorism details key developments in 2020 in the global fight against international terrorist groups.​​​​​​​

 

Academic Solicitation

What Is Academic Solicitation?

Academic Solicitation is the use of students, professors, scientists, or researchers as collectors improperly attempting to obtain sensitive information. Placing academics at, and requesting to collaborate with, U.S. research institutions under the guise of legitimate research in order to access developing technologies and cutting-edge research. These attempts can include requests for, or arrangement of, peer or scientific board reviews of academic papers or presentations; requests to study or consult with faculty members; and requests for and access to software and dual-use technology. Academic solicitation can also occur when a faculty member, student, employee, or visiting scholar seeks access to this same information. The number of foreign academics requesting to work with classified programs continues to rise, and the academic community will likely remain a top target for the foreseeable future. Although most academic contacts are likely legitimate, some foreign academics may ultimately take advantage of their placement and access to further their country’s research and development goals. 

 

Who Is Being Targeting? 

  • Researchers, scientists, and subject matter experts conducting research/ projects on behalf of a U.S. Government customer 
  • Researchers, scientists, and subject matter experts employed at academic institutions or with published in scientific or technical journals or presented at conferences
  • Students, professors, and researchers with access to research and technical information (especially graduate and post-doctorate students) 
  • Researchers, scientists, and subject matter experts working on cutting-edge technology 
  • Subject matter experts teaching technical courses

 

What To Report  

Any contact (i.e., emails, telephone, personal contact) that is suspicious because of the manner or subject matter of the request. This may include requests from U.S. persons or from foreign nationals located in the United States or abroad, and may consist of:  

  • Unsolicited applications or requests for undergraduate, graduate, postgraduate, or other research positions 
  • Unsolicited requests for access to research papers or other research-related publications or documents 
  • Unsolicited requests for assistance with or review of thesis papers, draft publications, or other research related documents 
  • Unsolicited invitations to attend and/or present at international conferences
  • Unsolicited grants or gifting of funds/equipment to conduct joint research projects from foreign academic institutions or foreign governments

 Contact the UConn Research Security Office at researchsecurity@uconn.edu with any concerns or questions.  If you suspect academic solicitation is taking place you can also file an anonymous report at compliance.uconn.edu. 

 

Economic Espionage

Economic espionage is foreign power-sponsored or coordinated intelligence activity directed at the U.S. government or U.S. corporations, establishments, or persons, designed to unlawfully or clandestinely influence sensitive economic policy decisions or to unlawfully obtain sensitive financial, trade, or economic policy information; proprietary economic information; or critical technologies. This theft, through open and clandestine methods, can provide foreign entities with vital proprietary economic information at a fraction of the true cost of its research and development, causing significant economic losses. 

 Our Nation’s secrets are in jeopardy, the same secrets that make your company profitable. The FBI estimates billions of US dollars are lost to foreign competitors every year. These foreign competitors deliberately target economic intelligence in advanced technologies and flourishing US industries.  

Foreign competitors operate under three categories to create an elaborate network of spies: 

  • Aggressively target present and former foreign nationals working for US companies and research institutions;
  • Recruit and perform technical operations to include bribery, discreet theft, dumpster diving (in search of discarded trade secrets) and wiretapping; and,
  • Establish seemingly innocent business relationships between foreign companies and US industries to gather economic intelligence including proprietary information.

 What Are Trade Secrets? 

Trade secrets are all forms and types of financial, business, scientific, technical, economic or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, complied, or memorialized physically, electronically, graphically, photographically or in writing, (1) which the owner has taken reasonable measures to protect; and (2) which have an independent economic value from not being generally known to the public.  

Commonly referred to as proprietary information, economic policy information, trade information, proprietary technology, or critical technology. 

 What Are Some Methods Of Targeting Or Acquiring Trade Secrets? 

  • Steal, conceal, or carry away by fraud, artifice, or deception;
  • Copy, duplicate, sketch, draw, photograph, download, upload, alter, destroy, photocopy, replicate, transmit, deliver, send, mail, communicate, or convey; and,
  • Receive, buy, or possess a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization.

 Know The Signs 

  • Working odd hours without authorization 
  • Taking proprietary information home without authorization
  • Unnecessarily copying material 
  • Disregarding company policies on personal software and hardware 
  • Accessing restricted websites
  • Downloading confidential material 
  • Conducting unauthorized research

Personal Behaviors 

  • Unexplained short trips to foreign countries 
  • Engaging in suspicious personal contacts with competitors, business partners or unauthorized individuals 
  • Buying items they normally cannot afford
  • Overwhelmed by life crises or career disappointments 
  • Showing concern about being investigated

Common Factors  

  • Financial need 
  • Greed 
  • Unhappiness in the workplace 
  • Different allegiances to another company or country 
  • Drug/Alcohol abuse 
  • Vulnerability to blackmail 
  • Job offers from other organizations

Targeted Industries Or Sectors 

  • Information and communication technology 
  • Business information that pertains to supplies of scarce natural resources or that provides global actors an edge in negotiations with U.S. businesses or the U.S. government 
  • Military technologies (marine systems, unmanned aerial vehicles, and aerospace/aeronautic technologies) 
  • Civilian and dual-use technologies in fast-growing sectors (clean energy, health care and pharmaceuticals, and agricultural technology)
  • Academia

 https://www.fbi.gov/video-repository/newss-the-company-man-protecting-americas-secrets/view 

As part of a nationwide campaign to raise awareness of the growing economic espionage threat, the FBI has released a short video, “The Company Man: Protecting America’s Secrets.” Based on an actual case, the video illustrates how one company was targeted by foreign actors and what the FBI did to help. 

 Contact the UConn Research Security Office at researchsecurity@uconn.edu with any concerns or questions.  If you suspect economic espionage is taking place you can also file an anonymous report at compliance.uconn.edu.

Controlled Unclassified Information

 Controlled Unclassified Information (CUI) is information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies but is not classified under Executive Order 13556 “Classified National Security Information” or the Atomic Energy Act, as amended. 

  CUI Regulations

The CUI security controls must be compliant with the federal regulations specified in 32 CFR Part 2002(link is external) and by the National Archives and Records Administration (NARA), who acts as the CUI Executive Agent (EA) to oversee the federal agency CUI compliance. The most commonly encountered Federal CUI requirements and guidelines include:

NATIONAL INSTITUTES OF STANDARDS AND TECHNOLOGY (NIST) SPECIAL PUBLICATION (SP)

FEDERAL ACQUISITION REGULATION (FAR) SECURITY REQUIREMENTS

DEPARTMENT OF DEFENSE FEDERAL ACQUISITION REGULATION (DFARS)

Other requirements and guidance as directed in agency-specific regulations and certain legal documents may also apply.

“Information” as defined by the Federal CUI Program may include research data and other project information, including non-public Federal Contract Information (FCI).  FCI is normally protected in accordance with FAR 52.204-21 when a research team receives, possesses, or creates FCI in the performance of a sponsored contract.

“Information system” means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Information systems may include electronic media, non-electronic media, and physical environments.

 

CUI Onboarding

UConn research contracts, projects, and/or meetings that have Controlled Unclassified Information (CUI) as indicated in the research contract, we will need to meet with the University Research Security Office to display the documents listed below in order to complete their USPERS/citizenship verification.

 The United States Government has instituted a requirement that United States Persons (USPERS) be granted access to CUI. The Government defines a USPERS for the purpose of CUI access as those naturalized citizens, Lawful Permanent Resident Aliens, and those born in the United States.  The following acceptable forms of documentation will be utilized to establish USPER status for UConn CUI project participants: 

 List A: Valid US Passport, I-551 Permanent Resident Card 

List B: US Military Photo ID, State Issued Driver’s License, or Government issued photo ID 

List C: Original or Certified Copy of State Issued Birth Certificate, US Consular Report of Birth FS-240, DoS Certificate of Birth Abroad DS-1350, Certificate of US Citizenship, or Certificate of US Naturalization 

 A determination of USPER status will require one item from List A; or one item from List B and one item from List C. All documents produced to verify birth in the US must be either the originals or certified copies. 

 Training Requirements 

 

DoD CUI Training (as mandated by DoD and provided by DCSA) 

All Personnel handling (CUI) must receive initial and annual refresher CUI education and training, and maintain documentation of this training for audit purposes. The University of Connecticut provides a mandatory training course for all DOD personnel with access to CUI. This course also fulfills CUI training requirements for industry when it is required by Government Contracting Activities for contracts with CUI requirements. 

University of Connecticut Technology Control Plan Briefing Acknowledgement and Non-Disclosure Statement 

 

OVPR Export Control trainings required (2 modules, offered by CITI) 

  • Authorized USPER project participants will be required to successfully complete the following CITI online export training prior to working on the project and shall provide proof of completion to the Director of Export Compliance. CITI training can be accessed at https://www.citiprogram.org/?pageID=668 
  • Then, type in “UConn” to find the university. 
  • Then, sign in with your UConn SSO login.
  • Under the “Learner Tools” section of the website after you log in (you’ll have to scroll down in the webpage to see this section), click “Add a Course”
  • Then, check the box for the Export Compliance course, and follow the remaining steps to enroll and take the courses.
  • Contact the Export Control Officer, exportcontrol@uconn.edu if you have any difficulty accessing these required trainings.

NIST 800-171 compliance training (2023 version) 

NIUVT User Agreement (NIUVT projects only) 

OVPR Export Control User Agreement (for all non-NIUVT projects)           

 

 Background Screening for CUI 

 All university researchers and staff who handle or have access to Controlled Unclassified Information (CUI) are required to undergo background investigations as a condition of their access as required by NIST 800-171. Background investigations are necessary to verify the trustworthiness, reliability, and suitability of individuals with access to sensitive information.

Employee Background Checks:

Employees of the university will have their background checks conducted by the Human Resources department as part of the standard hiring process as required by the Pre-Employment Background Check Policy. Any employee hired prior to the implementation of background checks by the university will be required to undergo a background investigation prior to accessing CUI.  The University Research Security Office will provide you with additional information during your onboarding.

Undergraduate and Graduate Student Background Checks:

Undergraduate student and graduate students who are state employees are also required to undergo a background check in order to handle or have access to CUI as part of their research activities. The background investigation process for these students must be initiated through the Research Security Office prior to beginning any CUI research.

Background Investigation Process:

Background investigations may include, but are not limited to, criminal history checks, employment verification, education verification, and reference checks. The results of background investigations will be used to assess the suitability of individuals for access to CUI.

 

FAQ:

https://research-compliance.umich.edu/research-information-security/controlled-unclassified-information-cui

 

Additional Resources:

National Policy 

DOD Policy 

 Useful Links 

CUI Resources: https://www.dcsa.mil/Portals/91/Documents/CTP/CUI/DOD-CUI_Resources_One-Pager_for_DOD.pdf 

Research Security

Research security at universities is crucial for safeguarding sensitive information, intellectual property, and national security interests. NSPM-33, or National Security Presidential Memorandum 33 https://www.whitehouse.gov/wp-content/uploads/2022/01/010422-NSPM-33-Implementation-Guidance.pdf , outlines the guidelines and policies for securing research activities, particularly those involving sensitive or classified information. This memorandum emphasizes the need for universities to implement robust security measures to prevent unauthorized access, disclosure, or exploitation of research findings that could potentially harm national security or economic interests. By adhering to NSPM-33 and implementing research security measures, universities can ensure the protection of valuable research assets while also fostering a collaborative and transparent research environment. 

 

EXPORT CONTROLS

Export control laws are federal regulations that govern how certain information, technologies, and commodities can be transmitted overseas or to a foreign national on U.S. soil. The scope of the regulations is broad: they cover exports in virtually all fields of science, engineering, and technology and apply to research activities regardless of the source of funding. Failure to comply with these laws can have serious consequences, both for the institution and for the individual researcher. Potential penalties include fines and possibly imprisonment. It is thus critical for UConn researchers to understand their obligations under these regulations and to work with the UConn Export Control Office to ensure that the University is in compliance.

UConn adheres to multiple federal agencies’ regulations pertaining to export controls, but there are three main regulations which the university is concerned with:

  • The International Traffic in Arms (ITAR) from the U.S. Department of State, which covers defense articles and defense services.
  • The Export Administration Regulations (EAR) from the U.S. Department of Commerce, which govern some commodities, software, technology, and “dual-use” civilian/military articles and technology.
  • The Office of Foreign Assets Control (OFAC) from the U.S. Department of the Treasury, which enforces economic and trade sanctions based on U.S. foreign policy and national security goals.

UConn’s Export Control Office supports the university’s faculty, staff, and students with questions about and guidance for actions required in order to comply with these various federal regulations.

Quantum-related Funding Opportunities and Resources

Advances in quantum science have the potential to have transformative social and economic impact.  New technologies are poised to revolutionize major industries, creating opportunities for new applications that will fuel economic growth.

To meet these challenges, UConn has partnered with Yale University and other key stakeholders to lead the Quantum-CT Regional Innovation Engine project. Quantum-CT is an effort to build an innovation ecosystem of researchers, educators, industry, and state/local stakeholders to harness the economic impact of new quantum-enabled technologies through technology development, innovation and entrepreneurship, and advances in STEM education and workforce development.

Want to contribute to the quantum revolution?  We strongly encourage interested faculty in all disciplines to partner together and with Yale University, other regional academic/educational institutions, corporate/industry stakeholders, and community partners on research projects that will:

  • Develop use-inspired applications of quantum technologies;
  • Transform STEM education and workforce training to create a quantum-ready workforce; and
  • Investigate the societal and economic impact of new quantum technologies;

    To support the success of the Quantum-CT effort, we encourage

    • Grant submissions, particularly in 2024
    • Cross-institution applications, not only among UConn and Yale, but also with other schools and colleges in CT, especially minority-serving institutions
    • Submissions for projects whose education and workforce development component may be provided by partnering with the QuantumCT workforce and education team
    • Submissions for the development of education materials with a quantum science theme that can be facilitated by partnering with a QuantumCT research team

    To assist faculty in finding funding opportunities to support their quantum-related research, OVPR Research Development Services has curated a list of relevant funding opportunities, below, which is updated monthly (last updated 9/16/2024).

    Research Funding Opportunities

    Workforce and Education Funding Opportunities

    IRB Virtual Office Hours 4/22 & 4/23

    Research Integrity & Compliance (RIC) will hold office hours via Webex extending support to both students and faculty regarding IRB submissions and regulations pertaining to human subjects research. Late afternoon appointments are made available to accommodate the schedules of students and faculty researchers. Evening appointments are available upon request.

     

    Research Integrity & Compliance (RIC) staff are available to answer questions for research teams and faculty and student investigators who have questions about submitting to the IRB, human subjects regulations, post-approval support, or general queries related to IRB procedures.

     

    Virtual office hours will be held on the following dates and times:

     

    April:

    Monday April 22, 2024, from 2:00pm-5:00pm

    Tuesday April 23, 2024, from 10:00am-1:00pm

     

    When reserving a slot, it is helpful to add information under “reason” why you would like to meet with RIC staff. You will receive a confirmation email from Nexus that includes the Webex link. Please use the following Nexus link to sign up for an open meeting slot to schedule an appointment:

     

    https://nexus.uconn.edu/secure_per/schedule1.php?stser=4475

     

    For questions related to the sessions, please contact Joan Levine at joan.levine@uconn.edu

     

    Questions about ClinicalTrials.gov?

    ClinicalTrials.gov is an online database of clinical trials. At UConn, Principal Investigators are responsible for registering and posting results per the federal regulations as well journal policies. That National Institutes of Health definition of a clinical trial is a research study in which one or more human subjects2 are prospectively assigned3 to one or more interventions4 (which may include placebo or other control) to evaluate the effects of those interventions on health-related biomedical or behavioral outcomes.5  

    Do you have questions about ClinicalTrials.gov registration or results posting? To schedule a virtual or in-person session with the UConn contact for ClinicalTrials.gov, email Ellen Ciesielski, Research Compliance Monitor in Research Integrity & Compliance in the OVPR. For details about ClinicalTrials.gov requirements, please see our webpages.

     

     

    1See Common Rule definition of research at 45 CFR 46.102(d).

    2See Common Rule definition of human subject at 45 CFR 46.102(f).

    3The term “prospectively assigned” refers to a pre-defined process (e.g., randomization) specified in an approved protocol that stipulates the assignment of research subjects (individually or in clusters) to one or more arms (e.g., intervention, placebo, or other control) of a clinical trial.

    4An intervention is defined as a manipulation of the subject or subject’s environment for the purpose of modifying one or more health-related biomedical or behavioral processes and/or endpoints.  Examples include:  drugs/small molecules/compounds; biologics; devices; procedures (e.g., surgical techniques); delivery systems (e.g., telemedicine, face-to-face interviews); strategies to change health-related behavior (e.g., diet, cognitive therapy, exercise, development of new habits); treatment strategies; prevention strategies; and, diagnostic strategies.

    5Health-related biomedical or behavioral outcome is defined as the pre-specified goal(s) or condition(s) that reflect the effect of one or more interventions on human subjects’ biomedical or behavioral status or quality of life.  Examples include:  positive or negative changes to physiological or biological parameters (e.g., improvement of lung capacity, gene expression); positive or negative changes to psychological or neurodevelopmental parameters (e.g., mood management intervention for smokers; reading comprehension and /or information retention); positive or negative changes to disease processes; positive or negative changes to health-related behaviors; and, positive or negative changes to quality of life.

    April In-Person Responsible Conduct of Research Training

    The UConn/UConn Health RCR Office offers monthly Responsible Conduct of Research trainings to provide an opportunity to discuss and explore RCR topics, as well as count toward fulfilling funder requirements.  

     

    This month’s RCR Offering

    Who: April’s session focuses on clinical research but we highly encourage anyone conducting human subjects research to join us! 

    What: We will meet in the library to view a live broadcast from UConn Health titled Regulatory Compliance in Clinical Research,” sponsored by UConn Health’s Clinical Research Center (CRC). The presentation is being given by Research Integrity & Compliance AVP for UConn/UConn Health, Michael Centola.

    Following the 1-hour broadcast, we will have a group discussion to wrap up our session. This is an informal gathering. Snacks and drinks will be provided! Also please feel free to bring your lunch!

    When: Tomorrow, Tuesday, April 16th from 12:00 p.m. to 1:30 p.m.

    Where: Babbidge Library, Class of ’47 Classroom

    Registration is required. To register, please email Research Compliance Monitor, Ellen Ciesielski. For questions, please contact Karen Moré, Director of Research Compliance.

     

    For more details about RCR requirements, please visit our RCR Office website.

     

    Student Involvement in External Human Subjects Research

    The IRB offices at UConn and UConn Health have developed guidelines to help clarify when student involvement in external human subjects research (i.e., research that is being conducted at or by another organization) requires interaction with the UConn HRPP/IRB office.  These guidelines represent common scenarios that are presented to the office, not all possible scenarios.  When unsure, please reach out to IRB-reliance@uconn.edu. The UConn Storrs and Regional Campuses guidelines can be found on the IRB Reliance – General tab on the IRB website. UConn Health’s companion guidelines can be located within the IRB Frequently Asked Questions section of their website, under the question “Does a student project involving humans require IRB review?” These guidelines can be provided to external organizations’ IRBs if there is a question about whether submission to a UConn IRB is required.

     

    If you have any questions, please contact IRB@uconn.edu.

    March Remote RCR Training 3/26

    The Responsible Conduct of Research (RCR) Program within Research Integrity & Compliance in the OVPR hosts monthly remote RCR training sessions. For our March remote event, we will be discussing several case studies. This 1-hour event will count towards the 8-hour in person requirement for NIH, however all those who conduct research are strongly encouraged to attend!

    For more details about RCR requirements, please visit our RCR Program website.

    For questions, please contact Research Compliance Monitor, Ellen Ciesielski or Karen Moré, Director of Research Compliance.

    What: March RCR remote training session featuring case study discussions

    When: Tuesday, March 26th from 12:00 p.m. to 1:00 p.m.

    Where: Remote WebEx Registration Link