Research Security & Integrity Program

Requirements for Research Security Programs per NSPM-33 

Northeastern University Research Enterprises Services (NU-RES) serves as the centralized hub for assisting faculty in preparing and submitting their research and sponsored proposals. For matters regarding research integrity, research misconduct, and research security, the NU-RES Compliance team helps researchers navigate foreign collaborations and engagements while protecting their work from foreign influence. The NU-RES Compliance team coordinates with IT to ensure that all researchers are completing the required training and abiding by research security rules and regulations regarding controlled unclassified information (CUI), technology and export controls. 

The purpose of NSPM-33 is to “provide guidance to Federal departments and agencies regarding their implementation of National Security Presidential Memorandum 33 on National Security Strategy for U.S. Government-Supported Research and Development”. The guidance requires a certification from research institutions awarded more than $50 million per year in total Federal research funding confirming that they have implemented a research security program meeting the four requirements highlighted in NSPM-33: Cybersecurity, Foreign Travel Security, Research Security Training, and Export Control Training (see pgs. 18-20). Northeastern is currently working to fulfill all the requirements set forth by the National Security Presidential Memorandum (NSPM-33) and its supporting (draft) Research Security Programs Standard Requirement document as released by the Office of Science and Technology (OSTP).

What is Research Security?

Research security is a broad term that refers primarily to national security concerns surrounding research involving certain types of sensitive data, intellectual property, export-controlled information, and other risks. Foreign government interference threatens the U.S. science and technology (S&T) research ecosystem and the U.S. research community by undermining the principles and values foundational to the conduct of research, and the openness necessary for the research enterprise to thrive.

Research Security Program at NU

As a global research institution, Northeastern University encourages collaboration with investigators at other institutions, both domestic and internationally. However, it is important for all investigators to be aware of and take steps to ensure that foreign influence does not threaten the integrity of research. The NU-RES Compliance team is here to help researchers navigate foreign collaborations and engagements while protecting their work from foreign influence. Northeastern University committed to providing the necessary guidance, education, and support to its faculty engaged in research. The components of Northeastern University’s research security program are below. NU-RES Compliance collaborates with various university offices to maintain a robust and up-to-date research security program.

Questions about the Research Security Program at NU? Contact our Chief Research Operations Officer, Amanda Humphrey:


Research Compliance works heavily with Northeastern’s Office of Information Security to assist researchers in safeguarding their research data and information. For more information regarding the purpose, principles, and resources for cybersecurity at Northeastern, please visit the below websites:

Office of Information Security (OIS)

Policy on Appropriate Use of Computer and Network Resources

Digital Persistent Identifiers (DPIs) & Digital CVs

Digital Persistent Identifiers (DPIs) and Digital CVs make it easier for researchers to create and maintain a complete and up to date record of their publications and achievements in one location, thereby streamlining the grant proposal process.

Northeastern is a full member of ORCID – Open Research and Contributor ID – a platform that provides a free and unique DPI for individuals engaged in research, scholarship, and innovation activities globally.

Science Experts Network Curriculum Vitae (SciENcv) is an electronic system created by the National Center for Biotechnology Information (NCBI) that allows researchers to assemble their professional information needed for participation in federally funded research. SciENcv is a digital CV that documents information regarding education, employment, honors, publications, and research grants. SciENcv will become mandatory for any NSF funded research beginning October 23, 2023, as outlined in the NSF PAPPG 2023.

More information on ORCID and SciENcv can be found here.

Disclosure Management

As stated above, disclosure and transparency surrounding relationships with, and research support from, foreign entities have been identified by the federal government as key to managing and protecting the security of our research. Prior to engaging in any international collaborations or outside activities Researchers are expected to:

Export Controls

The Export Control Officer maintains responsibility for enforcing University-wide export compliance policies, procedures, and guidelines designed to meet or exceed the requirements of the various federal laws governing the export of goods, technology, and information, including compliance with ITAR, EAR, and OFAC regulations.  

More information about Export Controls at NU can be found here.

Click here to access the Export Control Decision Tree.

Questions on export controls? Contact us at

Related policies: Policy on Export Controls

Foreign Visitors & International Engagements

As a global university, Northeastern prides itself on its breadth of international students and faculty and encourages international engagements. Prior to hosting any foreign visitors and/or participating in any international collaborations or activities, faculty should review the below definitions and risk mitigation techniques.

Faculty must comply with the university’s Policy on External International Engagements and the international engagement approval process. Faculty are required to complete the International Engagements Intake Form and review these FAQs about the approval process, which includes roles and responsibilities and the rationale behind the policy. Please visit the International Engagements page to access the intake form.

Please make sure to review information regarding Foreign Talent Recruitment Programs.

Foreign Travel Security

NU-RES Research Compliance works with the Global Safety and Support Network to ensure that students, faculty and staff traveling internationally have the most accurate information and guidance ahead of their trip. The network provides detailed travel compliance information including travel protocols, connectivity requirements and lists of high-risk countries and high cyber risk destinations.

For international travel, students, faculty and staff are required to complete an Acknowledgement of Risk (AOR) form prior to departure, which requires disclosure of travel details, including identification of the Host or Sponsoring Institution, Organization, Department/College or Person. Information on AOR forms can be found here.

To request a loaner device (i.e. laptop) for travel to a high-risk country, please submit a ticket to the IT Service Desk here.

Travel briefings regarding research security, export control, and/or international travel best practices, including cybersecurity safety, may be required.

Related policies:

Policy on Travel and Expense Reimbursement

Policy Requiring Registration of University Travel

Policy on Travel to High-Risk and Sanctioned Destinations

Policy on Computers and Mobile Devices for Travel to Destinations with Heightened Cybersecurity Risk

Policy on Export Control

Research Security & Transparency

Research Security & International Collaboration Authorship FAQs

Data Management & Sharing Plans (DMSP)

Generative AI in Research FAQ

NIH Policy Guidance for Subaward/Consortium Written Agreements

Research Integrity & Misconduct
What is Research Integrity

In addition to our robust RCR training program (insert link to RCR) we handle other research integrity matters, including allegations of plagiarism, as well as authorship disputes. Please see this guidance document which outlines how we assess authorship disputes versus matters of plagiarism.

Research Misconduct

Northeastern University is committed to the fair and thorough investigation of Research Misconduct allegations. Research misconduct is defined in accordance with federal policy as:

  • Fabrication: The making up of data or results and the recording or reporting them;
  • Falsification: The manipulation of research materials, equipment or processes, or the change or omission of data or results such that the research is not accurately represented in the research record;
  • Plagiarism: The appropriation of another person’s ideas, processes, results or words without giving appropriate credit.

Research misconduct does not include honest error or differences of opinion. Any individual with reason to believe that research misconduct has possibly occurred must report the matter to University officials. To report a concern, email or contact the EthicsPoint confidential and anonymous reporting hotline.

For information on Northeastern’s process for responding to and handling allegations of research misconduct, please read our Procedures for Responding to Alleged Research Misconduct

Related Policies

Lab Practices to Support Research Integrity

Research Compliance recommends that faculty running a lab create and utilize a Lab Policy and Expectations Manual to ensure their students are acting with integrity within their lab. More information on lab manuals can be found here.

If you are interested in having a training for your lab on Research Integrity in the Lab and/or a lab walkthrough, please contact Research Compliance.

Risk Mitigation Policies
What is risk mitigation?

Risks may affect overseas partners differently, and it is important to have policies in place that acknowledge and assess the existence of these risks. Some risk mitigation policy recommendations include:

  • Undertaking regular due diligence on overseas partners,
  • Recognizing the risks related to institutional autonomy and academic freedom overseas,
  • Balancing requirements for local autonomy with robust, centralized risk management,
  • Establishing clear reporting lines for communication with local stakeholders,
  • Developing an exit strategy that is supported by a comprehensive, rules-based arrangement and high-level principles.
How does IP theft factor in?

Faculty should also be aware of intellectual property (IP) theft attempts. IP includes all exclusive rights to intellectual creations. All research can be at risk, but areas around applied research are particularly vulnerable. The consequence of research outcomes being exploited could be far greater and could result in the loss of intellectual property and misuse of research. 

For individual researchers, interference with (or loss of) research is likely to limit their ability to publish first or take credit for the resulting intellectual property. This could potentially affect a researcher’s reputation and ability to demonstrate the impact of their research.

Hostile states target universities to steal personal data, research data and IP with the hopes that it could be used to help their own military, commercial and authoritarian interests. 

Research funding organizations and private companies are important stakeholders when it comes to research that may result in the development of intellectual property. They may impose dissemination and/or publication restrictions to ensure the IP is protected. Some tips on limiting IP theft are below:

Collaboration Engagement Risk

Faculty should consider what risks come with partnering with the collaborator (ex. High risk country) and the risk of the engagement (ex. What is being studied or researched?). The below risk matrix illustrates how faculty should understand the relationship and the risks that will come from collaboration with a certain individual, institution, or company, and should serve as a starting point in the process of determining if a collaboration is low or high risk.


Due Diligence

Conducting robust checks on potential collaborators (individuals or organizations) to ensure all parties are aligned in their goals and ethical standards.

Foreign Interference (FI)

Activities carried out by, or on behalf of, a foreign state-level actor, which are coercive, covert, deceptive, or corrupt and are contrary to the sovereignty, values, and interests of another sovereign nation-state. FI does not have to be executed by a person with direct ties to the foreign state in question and should be considered without regard to national origin, race, etc. FI is possible with non-hostile actors.


Internationalization describes the purposeful integration of international and intercultural dimensions into aspects of university activity.

Influence vs. Interference
Reciprocity in the relationshipUnlawful retrieval of information
Transparent flow of information (Open Science)Lack of transparency
Open disagreement is permissible (freedom of speech)Undermine values that run contrary to state policy (i.e., misinformation or restriction on speech)
Influence of policy through dialogue and exchangeInfluence policy by bribing or otherwise silencing dissenters
All governments seek to have influence over policy, opinions, and perceptions of people and ministries around the world.

Related Government Guidance & Policies






Research Security Training

Please visit the Research Policies & Related Training page for required Research Security Program trainings.

last updated 05.07.2024