Michigan Tech is committed to protecting research security while maintaining our core values, including openness and transparency. This program is compliant with National Security Presidential Memorandum 33 (NSPM-33) as required for all institutions with greater than $50 million of federal research funding per year. The “Chips and Science Act of 2022”, establishes research security initiatives and aligns with NSPM-33 to implement the goals to address foreign interference in research and development.
Components of this program include cybersecurity, international travel security, foreign visitors, research security training, export control training when appropriate, and other security programs.
As stated in Policy 1.09-Information Security Compliance, Michigan Tech will take a University-wide approach to information security to identify and prevent the compromise of information security and the misuse of University information technology. Michigan Tech implements cybersecurity measures that are consistent with standards set by National Institute of Standards and Technology (NIST) for the university network and follows our institutional Information Security Plan with defined information security roles and responsibilities.
Michigan Tech has a comprehensive international travel security program that includes both international travel by University personnel and foreign nationals hosted at the University.
International travel by University personnel is covered by the International Travel Policy (under revision). This describes the required approvals for international travel, the device loaner program offered by Information Technology Services, and screening of destinations in accordance with the International Collaboration Policy.
Hosting of international visitors on campus is in accordance with the Foreign Visitor Policy. All international visitors are approved by the Provost or Vice President for Research following screening according to the Foreign Visitor Approval Process.
Michigan Tech encourages reporting potential threats or vulnerabilities to reduce risk to ensure the well-being of our people and our research. We strive to build systems and solutions that can detect, identify, assess, and manage risks to the research enterprise. The Insider Threat Program also seeks to establish a protective, supportive, safe, and non-threatening environment. Visit Insider Threat for more information.
Michigan Tech incorporates research security training into our training for the responsible conduct of research. All personnel involved in research activities—whether faculty, staff, or students—are required to complete training that covers key areas such as data protection, export controls, conflict of interest disclosures, security awareness, insider threat, and cybersecurity. Additional security training may be provided when required, such as in the event of a security incident. These trainings support a culture of transparency, compliance, and ethical research practices.
Michigan Tech’s export compliance program assists Michigan Tech employees with navigating export control laws and regulations. Export Compliance training is provided as needed by the Research Security Office. When required, the Research Security Office will work with faculty or staff to create a Technology Control Plan (TCP) to identify and implement measures to control the dissemination of Export Controlled (EC) and/or Controlled Unclassified Information (CUI).
Foreign Influence on Research Activities
Michigan Tech and all other US educational institutions must comply with federal reporting and disclosure requirements. Michigan Tech’s Conflict of Interest Policy (Board of Trustees Policy 4.7 Conflict of Interest Policy) and Procedures (Faculty Handbook Appendix B) require the disclosure of activities that may create a financial conflict of interest or more generally a conflict of commitment, whether compensated or not, to your immediate supervisor and, under some conditions, to the conflict of interest coordinator.
Any external support or engagement that you would acknowledge in a presentation or publication must generally be disclosed in funding applications and through the University's conflict of interest procedures. Visit Foreign Influence on Research Activities for more information.
International Collaboration Policy
Michigan Tech is committed to supporting international collaborations and partnerships as an important and necessary component of the research enterprise. The International Collaboration Policy defines our basic principles and highlights sources of information that is available on foreign institutions. It also highlights procedures for screening of individuals and institutions.
National Security-Related Research
Michigan Tech will pursue national security projects that may have publication restrictions or prohibit foreign nationals from working on a project. The conditions under which we will accept such restrictions is outlined in the Export Controls website.
Predatory Publishing
Michigan Tech is aware of some predatory publishers who promise to publish academic articles for a fee. However, these publishers may not conduct adequate or any peer review and may request bank account or other personal information. Additionally, some of these publishers may be working to acquire unpublished research for the benefit of a foreign adversary. Some of these publishers request that faculty become members of their ‘editorial board’ but do not require the faculty to review or look at any of the articles submitted for publication. These publishers can damage the reputation of those who choose to publish with them or who are convinced to let their names be associated with the publisher. For more information, visit Predatory Publishing.
If you have any questions, contact the Research Security Office at researchsecurity-l@mtu.edu.