Science and Security Policy

Summary

UNC-Chapel Hill is committed to protecting the integrity of its programs and activities and ensuring compliance with all applicable legal requirements and federal, sponsor, and University requirements, policies, standards, and procedures related to science and security, including research security (“Applicable Requirements”). This policy establishes the standards and structures necessary to safeguard University activities and maintain compliance.

Body

University Policy

Title

University of North Carolina at Chapel Hill Policy on Science and Security

Introduction

Purpose

The University of North Carolina at Chapel Hill (“UNC-Chapel Hill” or “University”) is committed to protecting the integrity of its programs and activities and ensuring compliance with all applicable legal requirements and federal, sponsor, and University requirements, policies, standards, and procedures related to science and security, including research security (“Applicable Requirements”). This policy establishes the standards and structures necessary to safeguard University activities and maintain compliance, and is in addition to other security policies, including those related to information security.

Scope

This policy applies to all individuals (“Covered Individuals”) who participate in, or propose to participate in, University activities that are subject to Applicable Requirements. These requirements are designed to protect UNC-Chapel Hill’s programs, personnel, and resources from risks such as unauthorized access, inappropriate foreign influence, misappropriation of intellectual property, and noncompliance with disclosure obligations.

Covered Individuals include, but are not limited to:

  • Faculty
  • Permanent and Temporary Staff (SHRA and EHRA non-faculty)
  • Students
  • Guest researchers and staff (e.g., visiting scholars, unpaid volunteers, unpaid interns)
  • Collaborators and consultants working on University projects
  • Subawardees and other external partners subject to University oversight

Policy

Policy Statement

All Covered Individuals must comply with Applicable Requirements. The UNC-Chapel Hill Science and Security Program (“Science and Security Program”), overseen by the Institutional Science and Security Officer, has the authority to establish and maintain the structures necessary to ensure compliance. This includes providing training, monitoring adherence, and updating requirements in accordance with new or updated Applicable Requirements.

Responsibilities

  • Covered Individuals: Must comply with all aspects of the Science and Security Program, including adherence to Applicable Requirements, participating in audits, reviews, investigations as needed; and providing certifications when required.
  • Science and Security Program: Establish and maintain compliance structures, provide training, update compliance requirements, monitor adherence, and communicate changes in Applicable Requirements.
  • Supervisors, Administrative Staff, and Principal Investigators: Ensure that team members understand and fulfill obligations under this policy.

Compliance

All Covered Individuals are expected to comply with this policy. The Science and Security Program monitors adherence and communicates changes in Applicable Requirements to ensure the University remains aligned with external and internal mandates.

Failure to comply with this policy, including false or fraudulent statements or certifications, may result in disciplinary actions under University processes and could also lead to civil, administrative, and/or criminal penalties under applicable law.

Possible University actions as a result of a Covered Individual’s failure to comply include, but are not limited to: 

  • Disciplinary action through faculty, staff, or student conduct procedures
  • Revocation of research privileges or eligibility for certain projects and funding
  • Referral to appropriate federal and/or law enforcement authorities as applicable

Definitions 

  • Applicable Requirements: All applicable legal requirements, as well as all applicable federal, sponsor, and University requirements, policies, standards, and procedures related to science and security, including research security.
  • Certification: A formal attestation by covered individuals that they are in compliance with Applicable Requirements.
  • Disclosure: The requirement to provide full and accurate information about resources, appointments, affiliations, and support (both domestic and foreign) as required by federal law and/or University policy. 
  • Research Security: A component of science and security that focuses specifically on safeguarding research activities. This includes, but is not limited to, ensuring compliance with federal and sponsor disclosure obligations, protecting against inappropriate foreign influence, safeguarding intellectual property, and otherwise maintaining the integrity of the University’s research.
  • Science and Security Program: The University program, overseen by the Institutional Science and Security Officer, that establishes and maintains compliance structures related to science and security requirements.
  • Training: Mandatory instruction provided by the Science and Security Program to ensure a Covered Individuals understanding of Applicable Requirements related to University activities.

Related Requirements

External Regulations

University Policies, Standards, and Procedures

  • Standard on Research Security Training

Contact Information

Primary Contact

Name: Brian Collier

Title: Institutional Science and Security Officer  

Unit: Science and Security Program, Office of the Vice Chancellor for Research

Email: bcollier@email.unc.edu

Details

Details

Article ID: 158839
Created
Wed 10/8/25 8:56 AM
Modified
Tue 12/2/25 1:50 PM
Responsible Unit
School, Department, or other organizational unit issuing this document.
Science and Security Program
Issuing Officer
Name of the document Issuing Officer. This is the individual whose organizational authority covers the policy scope and who is primarily responsible for the policy.
Policy Contact
Person who handles document management. Best person to contact for information about this policy. In many cases this is not the Issuing Officer. It may be the Policy Liaison, or another staff member.
Next Review
Date on which the next document review is due.
11/03/2026 12:00 AM
Last Review
Date on which the most recent document review was completed.
11/03/2025 12:00 AM
Last Revised
Date on which the most recent changes to this document were approved.
11/03/2025 12:00 AM
Effective Date
If the date on which this document became/becomes enforceable differs from the Origination or Last Revision, this attribute reflects the date on which it is/was enforcable.
11/03/2025 12:00 AM
Origination
Date on which the original version of this document was first made official.
11/03/2025 12:00 AM