Research Security Management
Are You Operating in a “Country of Concern”? The Infrastructure Investment and Jobs Act has Changed the Rules
The Infrastructure Investment and Jobs Act has Changed the Rules The "Infrastructure Investment and Jobs Act," Public Law 117-318, includes provisions related to the prohibition of Department of Health and Human Services (HHS) funding to countries of concern....
Deemed Exports and the Influence on Research Security
The world of research security is a confusing environment to navigate with ever-changing policy initiatives, persistent threats from insider threats, and external targeting, all while upholding the valued open research and development culture in the United States. Of...
Blink and You Might Miss it: How the NDAA 2023 Impacts Research Security
On December 23, 2022, President Biden signed the Fiscal 2023 National Defense Authorization Act (NDAA 2023). While research security is not the primary focus of the NDAA 2023, it still makes an appearance and continues to build on the efforts laid out in the CHIPS...
iSRA – 2023 Research Security: Fundamental Building Blocks
IPTalons is excited to announce that we are leading the Society of Research Administrators International (SRAI) 2023 Research Security: Fundamental Building Blocks, a Mini Training Intensive. This Mini Training course will be led by IPTalons very own CEO Allen...
Funding Agencies Race to Find Unreported Researcher COI: What That Means for Research University Compliance Teams
As the National Science Foundation (NSF) announced recently, the research grant funding agency has invested considerable resources to leverage big data and advanced analytics to identify principal investigators and other researchers who have foreign research...
The Leaky Research Funding Pipeline in the United States
The Leaky Research Funding Pipeline in the United States Is it possible that nearly half of all the research grants provided by the National Institutes of Health (NIH) to research organizations have been compromised by Foreign Influence activities? As noted in...
How to Lose Your Trade Secrets (and maybe your job) in 5 Easy Steps
As a corporate investigator specializing in the loss, theft and misappropriation of trade secrets, I have been asked by employees, contractors and other insiders caught misusing their employer's trade secret how they should have handled the trade secret incident...