Skip to navigation | Skip to main content | Skip to footer
Menu
Search the Staffnet siteSearch StaffNet

Research security hub

All the support and information you need to ensure your work and working practices comply with all security guidance.

Earth from space


 

A message from Professor Nalin Thakkar

Watch Vice President for Social Responsibility and Chair of Research Compliance Committee and Research Relationships Oversight Group, Professor Nalin Thakkar explain why our research security is essential (53 secs).

Read the transcript

Research security information and guidance

We have created two ways to navigate the information, guidance and support:

  • Click on the left-hand box below to find the teams who can help you plan your research, welcome visitors and stay safe while travelling - plus UK government guidance.
  • Click on the right-hand box to see research or teaching activity flowcharts. You can click on the stage that is relevant to you to reach the information you need, and also visit the connected case studies to see how your peers have navigated the same process. 

It is important for you to be clear on the security of your own work in 3 key areas listed below. Our Policy on Responsible International Research will guide you on these areas if you are collaborating with international partners, while our teams - found by clicking on the left-hand box - can help everyone in our research community keep work secure. You can also refer to our research security definitions document as required.

The 3 key areas are:

Research funding

Make sure you know the interests your funders represent and that they do not conflict with our own, and that you understand who owns the research and what your funders can do with it.

Research partners

Look into the background and connections of your research partners so that you are clear on whether they have any conflicts of interest with other research and how they represent or are connected with other organisations/countries.

Research applications

Research may be applied in different ways that weren’t intended by the researcher. Think about how your research results could be used and consider how to prevent partners or other people with access to the research from doing this inappropriately.