Research Security

The U.S. Government defines Research Security as 鈥渟afeguarding the research enterprise against misappropriation of research and development to the detriment of national or economic security, related violations of research integrity, and foreign government interference.鈥

The University recognizes that international academic collaborations are an essential part of the research community and critical to scholarship and scientific advancement.听 However, it is important that 艾可直播and staff engaging in international partnerships are aware of their reporting obligations and the concerns associated with research security, including improper foreign influence. Researchers should be completely transparent about their foreign relationships and activities, and they should fully comply with all disclosure requirements established by 艾可直播 College policy and Federal statutes, regulations and policies.

艾可直播 College鈥檚 Research Security Program is based on Federal laws and policies, including NSPM-33 (National Security Strategy for U.S. Government-Supported Research and Development) and the CHIPS and Science Act of 2022.听听

The Research Security Program, which includes the University鈥檚 Foreign Influence Working Group, is designed to mitigate threats to the University鈥檚 academic activities and research enterprise, including, but not limited to:

  • Improper foreign influence in federally-funded research;
  • Researchers鈥 failure to disclose their foreign affiliations and support, Conflicts of Interest, and Conflicts of Commitment, to Federal funding agencies and the University; and
  • Economic and academic espionage, including Intellectual Property (IP) theft, conducted by foreign actors and entities

The Research Security Program鈥檚 support for Faculty and Research Staff includes, but is not limited to, the following:

  • Hosting foreign national visitors on campus
  • Disclosure of foreign collaborations, affiliations, and activities to Federal funding agencies and the University
  • International travel, including attending conferences and guest lectures
  • Appointments at foreign universities and institutions
  • Foreign government talent recruitment programs
  • Assessment of research portfolios to assess risk levels and implement mitigation strategies if necessary
  • Review of international activities to assess risk from undue foreign influence
  • Guidance on U.S. Government security reviews and risk mitigation processes

Additional Information

U.S. Government Resources

U.S. Government Resources

NSPM-33

CHIPS Act/h3>

External Activities and Disclosures to Funding Agencies

Security Assessments and Risk Mitigation Processes by Federal Funding Agencies

Training

Training

Policies and Guides

Policies and Guides

More to Come

and change the keyframes to use dynamic height var style = document.head.appendChild(document.createElement("style")), rule1 = " expand {\ from {height: 0; }\ to {height:" + contentHeight + "px;}\ }"; rule2 = " collapse {\ from {height:" + contentHeight + "px;}\ to {height: 0; }\ }"; if (CSSRule.KEYFRAMES_RULE) { // W3C style.sheet.insertRule("@keyframes" + rule1, 0); } else if (CSSRule.WEBKIT_KEYFRAMES_RULE) { // WebKit style.sheet.insertRule("@-webkit-keyframes" + rule1, 0); } if (CSSRule.KEYFRAMES_RULE) { // W3C style.sheet.insertRule("@keyframes" + rule2, 0); } else if (CSSRule.WEBKIT_KEYFRAMES_RULE) { // WebKit style.sheet.insertRule("@-webkit-keyframes" + rule2, 0); } if(!$thisBreakRow.hasClass('active')) { if($prevBreakRow) { $prevBreakRow.removeClass('active'); $prevBreakRow.addClass('inactive'); } if($prevBreakRowTablet) { $prevBreakRowTablet.removeClass('active'); $prevBreakRowTablet.addClass('inactive'); } if($prevBreakRowMobile) { $prevBreakRowMobile.removeClass('active'); $prevBreakRowMobile.addClass('inactive'); } $thisBreakRow.removeClass('inactive'); $thisBreakRow.addClass('active'); $thisBreakRowTablet.removeClass('inactive'); $thisBreakRowTablet.addClass('active'); $thisBreakRowMobile.removeClass('inactive'); $thisBreakRowMobile.addClass('active'); } //content fade in $('div.inactive .info-inner.fadeIn').removeClass('fadeIn'); item.find('.info-inner').addClass('fadeIn'); } $( window ).load(function() { var $appSquare = $('.application .app-square'); var $appInfo = $('.application .app-info'); $appSquare.height($appSquare.width()); //override position based on app square height var $topPosition = $appSquare.innerHeight() + 20; $appInfo.css('top', $topPosition + 'px'); //get height of deadlines dropdown var $dropdownList = $('.application .deadlines dl'); var $dropdownHeight = $dropdownList.outerHeight(true); }); //resize app boxes height on window resize $( window ).resize(function() { var $appSquare = $('.application .app-square'); var $appInfo = $('.application .app-info'); $appSquare.height($appSquare.width()); //override position based on app square height var $topPosition = $appSquare.innerHeight() + 20; $appInfo.css('top', $topPosition + 'px'); }); //print only the application information $('.application .icon-print').click( function() { $thisAppInfo = $(this).closest('.application'); $thisAppInfo.printThis(); }); //add video player var bcLoadVid = true; $(document).ready(function () { if(bcLoadVid){ bcLoadVid = false; addModal(); var trigger = $("body").find('[data-intent="initiate-video"]'); trigger.click(function (){ videoModal($(this)); }); } }); // add fragments if(typeof pageContainsContentFragment !== 'undefined' && pageContainsContentFragment ){ var bcContentFragmentsLoaded = false; $(document).ready( function() { if(!bcContentFragmentsLoaded){ bcContentFragmentsLoaded = true; doFragments(); } }); }

Foreign Influence Working Group

In response to Congressional concerns that the misappropriation of sensitive IP and acquisition of certain emerging technologies potentially compromise national security, U.S. Government agencies have substantially increased their investigative focus on U.S. universities and research institutions. Broadly referred to as 鈥淔oreign Influence,鈥 this threat has been defined to include attempts by a foreign entity to gain unauthorized access to federally-funded research; influence the direction of research activities based on sponsorship, financial donation, and other forms of in-kind support; and obtain intellectual property through IT penetration and other illegal activities.
In response to these concerns, and consistent with how other peer national research universities are responding, the Office of the Provost and Dean of Faculties, with the support of the Office of the Executive Vice President, tasked the Vice Provost for Research with establishing a Foreign Influence Working Group to proactively protect the University from Foreign Influence and address research security concerns, as well as to build awareness within the University community to better mitigate future risks.
The 艾可直播 College Foreign Influence Working Group is chaired by the Director of Research Security, Integrity, and Compliance, and its membership includes staff and 艾可直播representatives from several key University functional areas.听 The Working Group meets on a quarterly basis and has several subcommittees focused on specific areas of concern.听

Contact

Leigh-Alistair Barzey

Director of Research Security, Integrity, and Compliance听
617-552-1144
leigh-alistair.barzey@bc.edu

EthicsPoint Hotline

The University ethics reporting hotline provides an anonymous channel for employees to facilitate reporting of possible illegal, unethical, or improper conduct when normal channels of communication are not available or are impractical under the circumstances. You can submit an anonymous report through the EthicsPoint Hotline at听