  {"id":3399,"date":"2025-01-26T18:41:48","date_gmt":"2025-01-27T00:41:48","guid":{"rendered":"https:\/\/uwm.edu\/officeofresearch\/?page_id=3399"},"modified":"2025-04-14T09:10:26","modified_gmt":"2025-04-14T14:10:26","slug":"research-security-training","status":"publish","type":"page","link":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/","title":{"rendered":"Research Security Training"},"content":{"rendered":"\n<p>The current regulatory landscape informing the research enterprise includes serious growing concerns by the U.S. government regarding malign influence over federally funded research. To address the growing concerns around research security, U.S. federal regulations such as the <a href=\"https:\/\/trumpwhitehouse.archives.gov\/presidential-actions\/presidential-memorandum-united-states-government-supported-research-development-national-security-policy\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Security Presidential Memorandum 33 <\/a>(NSPM-33) and the <a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/4346\/text\" target=\"_blank\" rel=\"noreferrer noopener\">CHIPS and Science Act of 2022 <\/a>require specific individuals involved in federally funded research to complete research security training.&nbsp;<\/p>\n\n\n\n<p>Research Security Training includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Introduction to Research Security<\/li>\n\n\n\n<li>The Importance of Disclosure<\/li>\n\n\n\n<li>Risk Mitigation and Management<\/li>\n\n\n\n<li>International Collaboration<\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/new.nsf.gov\/research-security\/training#take-the-research-security-training-66a\">National Science Foundation Research Security Course<\/a><\/p>\n\n\n\n<p>The National Science Foundation, in partnership with the National Institutes of Health, the U.S. Department of Energy and the U.S. Department of Defense, have developed online research security training for the research community. The training provides recipients of federal research funding with information on risks and threats to the global research ecosystem \u2014 and the knowledge and tools necessary to protect against these risks.<\/p>\n\n\n\n<p><a href=\"https:\/\/uws-td.instructure.com\/enroll\/83ACNW\">51ÁÔÆæ Research Security Course<\/a> (<em>Canvas Training)<\/em><\/p>\n\n\n\n<p>This course is a condensed and combined version of the National Science Foundation\u2019s more extensive Research Security Training.<\/p>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/hr\/compliance-training\/\">Information Security Awareness<\/a><\/p>\n\n\n\n<p>All 51ÁÔÆæ employees are required by UW System policy to receive Information Security Awareness training.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The current regulatory landscape informing the research enterprise includes serious growing concerns by the U.S. government regarding malign influence over federally funded research. To address the growing concerns around research security, U.S. federal regulations such as the National Security Presidential &hellip;<\/p>\n","protected":false},"author":1650,"featured_media":0,"parent":1962,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-3399","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Office of Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research Security Training\" \/>\n<meta property=\"og:description\" content=\"The current regulatory landscape informing the research enterprise includes serious growing concerns by the U.S. government regarding malign influence over federally funded research. To address the growing concerns around research security, U.S. federal regulations such as the National Security Presidential &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Office of Research\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-14T14:10:26+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/research-security-training\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/research-security-training\\\/\",\"name\":\"Research Security Training - Office of Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#website\"},\"datePublished\":\"2025-01-27T00:41:48+00:00\",\"dateModified\":\"2025-04-14T14:10:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/research-security-training\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/research-security-training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/research-security-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research Integrity &amp; Compliance\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Security\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Research Security Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\",\"name\":\"Office of Research\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/wp-content\\\/uploads\\\/sites\\\/577\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/wp-content\\\/uploads\\\/sites\\\/577\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Office of Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/","og_locale":"en_US","og_type":"article","og_title":"Research Security Training","og_description":"The current regulatory landscape informing the research enterprise includes serious growing concerns by the U.S. government regarding malign influence over federally funded research. To address the growing concerns around research security, U.S. federal regulations such as the National Security Presidential &hellip;","og_url":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/","og_site_name":"Office of Research","article_modified_time":"2025-04-14T14:10:26+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/","url":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/","name":"Research Security Training - Office of Research","isPartOf":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#website"},"datePublished":"2025-01-27T00:41:48+00:00","dateModified":"2025-04-14T14:10:26+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/research-security-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/officeofresearch\/"},{"@type":"ListItem","position":2,"name":"Research Integrity &amp; Compliance","item":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/"},{"@type":"ListItem","position":3,"name":"Research Security","item":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/"},{"@type":"ListItem","position":4,"name":"Research Security Training"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/officeofresearch\/#website","url":"https:\/\/uwm.edu\/officeofresearch\/","name":"Office of Research","description":"","publisher":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/officeofresearch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/officeofresearch\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/officeofresearch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/officeofresearch\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/officeofresearch\/wp-content\/uploads\/sites\/577\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/officeofresearch\/wp-content\/uploads\/sites\/577\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/users\/1650"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/comments?post=3399"}],"version-history":[{"count":5,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3399\/revisions"}],"predecessor-version":[{"id":4446,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3399\/revisions\/4446"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/1962"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/media?parent=3399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}