A stock photo of the Spitfire laser system for illustration onlySpecific research fields or research programmes may be targeted, and collaboration can provide easy access to people, IT networks, and participation in research which may be sensitive or have sensitive applications.

Individual academic or research staff may also be targeted, be that through an overseas government, academic institution, or through a commercial partner. This may happen by engagement at a research conference or through academic visits or research placements.

Most research will not have sensitive application and so will not be a cause for concern but being clear on which areas of research are sensitive is critical. Consider whether your research is commercially sensitive, has potential for patent protection, is or could be related to sensitive defence or national security technology, and/or could have a second use in military/defence applications (dual-use). Be aware of what is most sensitive in your work, as this is most likely to be a potential target.

Case Studies - NPSA and Cabinet Office

Trusted Research case study (NPSA)

Trusted Research case study (NPSA)

Trusted Research case study (NPSA)

This is a case study from the National Protective Security Authority on Trusted Research

Case study 1: Reputational Risk (Cabinet Office)

Case study 1: Reputational Risk (Cabinet Office)

This case study from the Cabinet Office contextualises reputational risks in overseas collaborations

Case study 2: National Security Investment (Cabinet Office)

Case study 2: National Security Investment (Cabinet Office)

This case study from the Cabinet Office contextualises the National Security Investment Act

Case study 3: Intellectual Property (Cabinet Office)

Case study 3: Intellectual Property (Cabinet Office)

This case study from the Cabinet Office contextualises risks to IP in overseas collaborations

Contact

An image of the South Kensington campus

Please contact the following if you have queries regarding Trusted Research generally or specific areas

Trusted Research - Ben Hughes or Lynne Cox

Export controls and NSI Act - Research Office

Data protection - Dept. Data Protection Coordinator

Intellectual Property - Enterprise Division

IT Security - ICT Service Desk

Research Contracts - Faculty Research Services Team