All Key Personnel listed on NSF, DOE, USDA, and NIH proposals must have completed Research Security Training (updated to cover disclosure training for NIH)
The CU Proposal Analyst (CU Authorized Organizational Representative (AOR)) must certify that all individuals identified as senior/key personnel have completed the requisite research security training (disclosure training). Acceptable training for this can be the 1-hour CU Course at https://www.colorado.edu/researchinnovation/node/8496/research-security/research-security-training/new-research-security-training-requirements or the 4 module NSF Training at https://www.nsf.gov/research-security/training
OTHER KEY POINTS:
The certification requirement is that *all* Key Personnel have completed the Research Security Training, thus proposals cannot be submitted until all Key Personnel have completed the training.
We are defining “Key Personnel” as any person who would be required to submit Biosketch and Current & Pending documentation with the proposal.
When the proposal is submitted, the OCG Proposal Analyst (as CU’s Authorized Organizational Representative) is certifying CU Boulder’s compliance with the sponsor’s Research Security training requirement.
The Research Security Training is accessed and the completion recorded in Percipio (SkillSoft). The completion data feeds from Percipio to HCM, and then from HCM to InfoED. The completion data will then appear in the CIRES Proposal Tool, via our data feed from InfoEd.
FOR SUBAWARDS:
Subawardees will complete their Research Security training requirement in compliance with their home institution’s processes. Subrecipient training completion is verified by the subrecipient institution through the Subrecipient Commitment Form or the Subrecipient Statement of Collaborative Intent.
FOR CONSULTANTS OR COLLABORATORS WHO ARE CONSIDERED “KEY PERSONNEL” ON THE PROJECT
Alert each Consultant/Collaborator (who are not subawardees) that they are responsible for providing verification of their Key Personnel having completed the NSF Research Security Training, and that the proposal cannot be submitted until all verifications of training completion have been received. the Verification of completion must be included in the InfoEd record along with the other required subrecipient’s required documents. The Consultant/Collaborator will have to take the 4 NSF modules.