Home » Office for Research Protections » Research Security
Research Security
Protecting Open Global Collaboration
Penn State’s research security program is an interdisciplinary collaborative effort among various offices at the University. This program is a central point of contact for research security at Penn State. Email research-security-orp@psu.edu
What is Research Security?
Research security, as defined by the U.S. federal government,
safeguards the research enterprise from actions that could harm national security or economic competitiveness. In practical terms, this means that research security protects the U.S research enterprise from theft, foreign interference, and ethical violations. Find out what this means for researchers at Penn State.
Research Security Components
Disclosure Management
Disclosure management is a critical component of research security as it ensures transparency regarding
researchers’ affiliations and financial interests. It is important to disclose outside activities and interests as well as Other Support/Current & Pending Support to comply with U.S. federal regulations.
Travel Security
Faculty, staff and students traveling for University purposes (regardless of the funding source) must record international travel in the Global Safety Network database at least 30 days prior to departure.
Guidance for International Activities
Engage globally and securely. Explore the essential steps for successful international collaborations, from risk assessments to navigating U.S. federal compliance.
Export Controls
Export controls are federal regulations that restrict the sharing or shipment of
certain sensitive technologies, data, software, and materials to protect national security and foreign policy interests. Export control regulations can impact international collaborations, travel, publications, and the handling of specific information or items used in your research projects.
Foreign Visitors
The Visiting Scholars process (per
Policy AC01) is composed of reviews by a number of University offices to ensure that our esteemed visitors comply with regulatory requirements.
Cybersecurity
Cybersecurity best practices are
essential to safeguard sensitive
information and prevent unauthorized access or reaches that could compromise research findings and collaborations. Research taking place under government contracts may be subject to additional security controls.
Stay Compliant
Regulatory Information & Resources
The U.S. federal government has established a framework of laws and directives to advance research security and protect national and economic security. Learn about the regulatory background that impacts the University and your research.
Frequently Asked Questions
What is a "Country of Concern"?
- The U.S. State Department designates China, Iran, North Korea, and Russia as “foreign countries of concern.” This designation also includes entities located outside these countries but owned, controlled, or subject to their jurisdiction.
- The Secretary of State has the authority to add countries to this list.
- Research Security Implications: These designations lead to heightened scrutiny of international research collaborations.
Why does collaborating with individuals or entities from "Countries of Concern" require caution?
- Export Control: U.S. export control laws (BIS and OFAC) may restrict or prohibit sharing certain technologies, information, and materials.
- Sanctions: U.S. economic sanctions can impact interactions with individuals and entities in these countries.
- Funding Risks: Collaborating with these countries can increase your risk profile with federal funding agencies, potentially affecting your ability to secure grants.
- Malign Foreign Talent Recruitment Programs: Countries of concern actively seek to recruit researchers, often with the intention of acquiring sensitive research. Participation in a MFTRP is prohibited by University Policy RA20.
Can I conduct research with individuals or entities from China, Iran, North Korea, or Russia?
It depends. Due to U.S. export control laws and potential risks, collaborations with individuals or entities from these “countries of concern” require a Research Security and Export Control review.
Federal funding agencies are increasingly scrutinizing such collaborations. Sponsor or program-specific restrictions may apply.
Recommendation: Request a Research Security Review via this Microsoft Form before conducting any research collaboration.
Can I co-author with an individual from China, Iran, North Korea, or Russia?
- Due to U.S. export control laws and potential risks, collaborations with individuals or entities from these “countries of concern” require a Research Security Review. It is important to be aware that federal funding agencies are increasingly scrutinizing such collaborations and sponsor or program-specific restrictions may apply.
- Recommendation: Before initiating any collaboration, including co-authoring, with individuals or entities from these designated “countries of concern”, request a Research Security Review using this Microsoft Form.
Can I continue to collaborate with a former graduate student or postdoc who is now affiliated with a university in one of the countries of concern (China, Iran, North Korea, or Russia)?
- It depends. Even if you have a pre-existing relationship, any ongoing or new collaboration with individuals now located at institutions in China, Iran, North Korea, or Russia is subject to U.S. export control laws and potential security risks.
- Recommendation: Before continuing or initiating a new collaboration, please request a Research Security Review via this Microsoft Form.
Can I collaborate with individuals from other countries not designated as countries of concern?
- Generally, collaborations with individuals from countries other than China, Iran, North Korea, and Russia are permissible. However, if your research involves emerging technologies (such as artificial intelligence, quantum computing, biotechnology, etc.), U.S. export control regulations may still apply.
- Resource: In February 2024, the National Science and Technology Council, within the Executive Office of the President of the United States, published the document Critical and Emerging Technologies List Update, which lists critical and emerging technology areas that are of particular importance to the national security of the United States.
- Recommendation: If your research falls within a designated critical or emerging technology area, please contact the Research Security Program at research-security-orp@psu.edu to determine if a review is necessary before sharing any sensitive information or materials.
Office for Research Protections
Address
200 Innovation Blvd.
Suite 110
University Park, PA 16802
The Office for Research Protections (ORP) ensures that research at the University is conducted in accordance with federal, state, and local regulations and guidelines that protect human participants, animals, students, and personnel involved with research.