uconn health

Academic Solicitation

What Is Academic Solicitation?

Academic Solicitation is the use of students, professors, scientists, or researchers as collectors improperly attempting to obtain sensitive information. Placing academics at, and requesting to collaborate with, U.S. research institutions under the guise of legitimate research in order to access developing technologies and cutting-edge research. These attempts can include requests for, or arrangement of, peer or scientific board reviews of academic papers or presentations; requests to study or consult with faculty members; and requests for and access to software and dual-use technology. Academic solicitation can also occur when a faculty member, student, employee, or visiting scholar seeks access to this same information. The number of foreign academics requesting to work with classified programs continues to rise, and the academic community will likely remain a top target for the foreseeable future. Although most academic contacts are likely legitimate, some foreign academics may ultimately take advantage of their placement and access to further their country’s research and development goals. 

 

Who Is Being Targeting? 

  • Researchers, scientists, and subject matter experts conducting research/ projects on behalf of a U.S. Government customer 
  • Researchers, scientists, and subject matter experts employed at academic institutions or with published in scientific or technical journals or presented at conferences
  • Students, professors, and researchers with access to research and technical information (especially graduate and post-doctorate students) 
  • Researchers, scientists, and subject matter experts working on cutting-edge technology 
  • Subject matter experts teaching technical courses

 

What To Report  

Any contact (i.e., emails, telephone, personal contact) that is suspicious because of the manner or subject matter of the request. This may include requests from U.S. persons or from foreign nationals located in the United States or abroad, and may consist of:  

  • Unsolicited applications or requests for undergraduate, graduate, postgraduate, or other research positions 
  • Unsolicited requests for access to research papers or other research-related publications or documents 
  • Unsolicited requests for assistance with or review of thesis papers, draft publications, or other research related documents 
  • Unsolicited invitations to attend and/or present at international conferences
  • Unsolicited grants or gifting of funds/equipment to conduct joint research projects from foreign academic institutions or foreign governments

 Contact the UConn Research Security Office at researchsecurity@uconn.edu with any concerns or questions.  If you suspect academic solicitation is taking place you can also file an anonymous report at compliance.uconn.edu. 

 

Economic Espionage

Economic espionage is foreign power-sponsored or coordinated intelligence activity directed at the U.S. government or U.S. corporations, establishments, or persons, designed to unlawfully or clandestinely influence sensitive economic policy decisions or to unlawfully obtain sensitive financial, trade, or economic policy information; proprietary economic information; or critical technologies. This theft, through open and clandestine methods, can provide foreign entities with vital proprietary economic information at a fraction of the true cost of its research and development, causing significant economic losses. 

 Our Nation’s secrets are in jeopardy, the same secrets that make your company profitable. The FBI estimates billions of US dollars are lost to foreign competitors every year. These foreign competitors deliberately target economic intelligence in advanced technologies and flourishing US industries.  

Foreign competitors operate under three categories to create an elaborate network of spies: 

  • Aggressively target present and former foreign nationals working for US companies and research institutions;
  • Recruit and perform technical operations to include bribery, discreet theft, dumpster diving (in search of discarded trade secrets) and wiretapping; and,
  • Establish seemingly innocent business relationships between foreign companies and US industries to gather economic intelligence including proprietary information.

 What Are Trade Secrets? 

Trade secrets are all forms and types of financial, business, scientific, technical, economic or engineering information, including patterns, plans, compilations, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, complied, or memorialized physically, electronically, graphically, photographically or in writing, (1) which the owner has taken reasonable measures to protect; and (2) which have an independent economic value from not being generally known to the public.  

Commonly referred to as proprietary information, economic policy information, trade information, proprietary technology, or critical technology. 

 What Are Some Methods Of Targeting Or Acquiring Trade Secrets? 

  • Steal, conceal, or carry away by fraud, artifice, or deception;
  • Copy, duplicate, sketch, draw, photograph, download, upload, alter, destroy, photocopy, replicate, transmit, deliver, send, mail, communicate, or convey; and,
  • Receive, buy, or possess a trade secret, knowing the same to have been stolen or appropriated, obtained, or converted without authorization.

 Know The Signs 

  • Working odd hours without authorization 
  • Taking proprietary information home without authorization
  • Unnecessarily copying material 
  • Disregarding company policies on personal software and hardware 
  • Accessing restricted websites
  • Downloading confidential material 
  • Conducting unauthorized research

Personal Behaviors 

  • Unexplained short trips to foreign countries 
  • Engaging in suspicious personal contacts with competitors, business partners or unauthorized individuals 
  • Buying items they normally cannot afford
  • Overwhelmed by life crises or career disappointments 
  • Showing concern about being investigated

Common Factors  

  • Financial need 
  • Greed 
  • Unhappiness in the workplace 
  • Different allegiances to another company or country 
  • Drug/Alcohol abuse 
  • Vulnerability to blackmail 
  • Job offers from other organizations

Targeted Industries Or Sectors 

  • Information and communication technology 
  • Business information that pertains to supplies of scarce natural resources or that provides global actors an edge in negotiations with U.S. businesses or the U.S. government 
  • Military technologies (marine systems, unmanned aerial vehicles, and aerospace/aeronautic technologies) 
  • Civilian and dual-use technologies in fast-growing sectors (clean energy, health care and pharmaceuticals, and agricultural technology)
  • Academia

 https://www.fbi.gov/video-repository/newss-the-company-man-protecting-americas-secrets/view 

As part of a nationwide campaign to raise awareness of the growing economic espionage threat, the FBI has released a short video, “The Company Man: Protecting America’s Secrets.” Based on an actual case, the video illustrates how one company was targeted by foreign actors and what the FBI did to help. 

 Contact the UConn Research Security Office at researchsecurity@uconn.edu with any concerns or questions.  If you suspect economic espionage is taking place you can also file an anonymous report at compliance.uconn.edu.

Controlled Unclassified Information

Controlled Unclassified Information (CUI) is information the Government creates or possesses, or that an entity creates or possesses for or on behalf of the Government, that requires safeguarding or dissemination controls consistent with applicable laws, regulations, and Government-wide policies but is not classified under Executive Order 13556 “Classified National Security Information” or the Atomic Energy Act, as amended. 

  CUI Regulations

The CUI security controls must be compliant with the federal regulations specified in 32 CFR Part 2002(link is external) and by the National Archives and Records Administration (NARA), who acts as the CUI Executive Agent (EA) to oversee the federal agency CUI compliance. The most commonly encountered Federal CUI requirements and guidelines include:

NATIONAL INSTITUTES OF STANDARDS AND TECHNOLOGY (NIST) SPECIAL PUBLICATION (SP)

FEDERAL ACQUISITION REGULATION (FAR) SECURITY REQUIREMENTS

DEPARTMENT OF DEFENSE FEDERAL ACQUISITION REGULATION (DFARS)

Other requirements and guidance as directed in agency-specific regulations and certain legal documents may also apply.

“Information” as defined by the Federal CUI Program may include research data and other project information, including non-public Federal Contract Information (FCI).  FCI is normally protected in accordance with FAR 52.204-21 when a research team receives, possesses, or creates FCI in the performance of a sponsored contract.

“Information system” means a discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Information systems may include electronic media, non-electronic media, and physical environments.

 

CUI Onboarding

UConn research contracts, projects, and/or meetings that have Controlled Unclassified Information (CUI) as indicated in the research contract, we will need to meet with the University Research Security Office to display the documents listed below in order to complete their USPERS/citizenship verification.

 The United States Government has instituted a requirement that United States Persons (USPERS) be granted access to CUI. The Government defines a USPERS for the purpose of CUI access as those naturalized citizens, Lawful Permanent Resident Aliens, and those born in the United States.  The following acceptable forms of documentation will be utilized to establish USPER status for UConn CUI project participants: 

 List A: Valid US Passport, I-551 Permanent Resident Card 

List B: US Military Photo ID, State Issued Driver’s License, or Government issued photo ID 

List C: Original or Certified Copy of State Issued Birth Certificate, US Consular Report of Birth FS-240, DoS Certificate of Birth Abroad DS-1350, Certificate of US Citizenship, or Certificate of US Naturalization 

 A determination of USPER status will require one item from List A; or one item from List B and one item from List C. All documents produced to verify birth in the US must be either the originals or certified copies. 

 Training Requirements 

DoD CUI Training (as mandated by DoD and provided by DCSA) 

All Personnel handling (CUI) must receive initial and annual refresher CUI education and training, and maintain documentation of this training for audit purposes. The University of Connecticut provides a mandatory training course for all DOD personnel with access to CUI. This course also fulfills CUI training requirements for industry when it is required by Government Contracting Activities for contracts with CUI requirements. 

University of Connecticut Technology Control Plan Briefing Acknowledgement and Non-Disclosure Statement 

 

OVPR Export Control trainings required (2 modules, offered by CITI) 

  • Authorized USPER project participants will be required to successfully complete the following CITI online export training prior to working on the project and shall provide proof of completion to the Director of Export Compliance. CITI training can be accessed at https://www.citiprogram.org/?pageID=668 
  • Then, type in “UConn” to find the university. 
  • Then, sign in with your UConn SSO login.
  • Under the “Learner Tools” section of the website after you log in (you’ll have to scroll down in the webpage to see this section), click “Add a Course”
  • Then, check the box for the Export Compliance course, and follow the remaining steps to enroll and take the courses.
  • Contact the Export Control Officer, exportcontrol@uconn.edu if you have any difficulty accessing these required trainings.

NIST 800-171 compliance training (2023 version) 

NIUVT User Agreement (NIUVT projects only) 

OVPR Export Control User Agreement (for all non-NIUVT projects)           

 

 Background Screening for CUI 

 All university researchers and staff who handle or have access to Controlled Unclassified Information (CUI) are required to undergo background investigations as a condition of their access as required by NIST 800-171. Background investigations are necessary to verify the trustworthiness, reliability, and suitability of individuals with access to sensitive information.

Employee Background Checks:

Employees of the university will have their background checks conducted by the Human Resources department as part of the standard hiring process as required by the Pre-Employment Background Check Policy. Any employee hired prior to the implementation of background checks by the university will be required to undergo a background investigation prior to accessing CUI.  The University Research Security Office will provide you with additional information during your onboarding.

Undergraduate and Graduate Student Background Checks:

Undergraduate student and graduate students who are state employees are also required to undergo a background check in order to handle or have access to CUI as part of their research activities. The background investigation process for these students must be initiated through the Research Security Office prior to beginning any CUI research.

Background Investigation Process:

Background investigations may include, but are not limited to, criminal history checks, employment verification, education verification, and reference checks. The results of background investigations will be used to assess the suitability of individuals for access to CUI.

FAQ:

https://research-compliance.umich.edu/research-information-security/controlled-unclassified-information-cui

Additional Resources:

National Policy 

DOD Policy 

 Useful Links 

CUI Resources: https://www.dcsa.mil/Portals/91/Documents/CTP/CUI/DOD-CUI_Resources_One-Pager_for_DOD.pdf 

Foreign Travel Security

Researchers who travel domestically or overseas should be aware of security considerations that apply to themselves. Our office has provided a list of some useful travel tips for those of you who work on any sponsored research.  These tips are useful for any traveler and are often overlooked in the rush to acquire tickets, hotel reservations, visas, etc.

Please remember that secure research cannot be conducted outside the United States – this includes traveling with devices that may contain research.  Please contact us or the Export Control office with any questions as they may pertain to your situation: researchsecurity@uconn.edu or exportcontrol@uconn.edu

Depending on your travel situation, we are available to provide country-specific travel briefings.  Please contact our office researchsecurity@uconn.edu to arrange an agency briefing.

All university-sponsored international travel requests are routed through the Concur system, of which the Export Control office is part of the approval workflow for specific destination countries, to included sanctioned and high-risk countries.

Travelers to sanctioned countries are prohibited from taking regular use laptops, tablets, and/or university-provided equipment.

Loaner equipment is provided to travel to high risk countries to ensure sensitive or export-controlled information, data or materials with them.

If you are planning to travel to a country which is comprehensively sanctioned by the United States Government, you are required to submit a Pre-Travel Application for Embargoed Country Travel.

Contact exportcontrol@uconn.edu with any questions, to access the Pre-Travel Application for Embargoed Country Travel form, or to request a pre-travel informational meeting.

Travel Security ‘101’

Every time you move away from your residence, place of work, or some other safe static location you need to focus on what is going on ‘around you’; to be always situationally aware.  Notice what is ‘normal’ to include people, objects, and environment and pay attention when that ‘normal’ adjusts or changes.  Never disregard your gut feeling as the human body amazingly is able to detect stimulus long before our brains consciously pull it all together.  Prepare for the unexpected.  Noticing small things consistently can better assist with preparing yourself and those you might be traveling with anything threat-wise that may come later.

Plan Ahead

Always be prepared before you travel, research where and how you are traveling, staying, or living – – what does the on-the-ground situation look like?  Are there beyond normal security and safety considerations to focus on?  Areas to avoid?  Ongoing demonstrations and/or political strife that could affect movements and onward travel?  Your pre-travel preparations should be deliberate and fulsome.

Keeping A Low Profile

Do your best to minimize unwanted attention.  Review what you are packing or wearing, clothing, jewelry, and even overtly displayed religious items if you typically display them on your person.  Avoid items that might necessarily identify you as an American by alternately wearing non-descript attire that enables you to blend in as best as possible especially moving through public venues.  Do not accept letters, personal messages, photographs, packages, or other material to be carried in or out of the country.

Airports and Airplanes

Arrive early for your flights and proceed as quickly as possible through check-in and security to your gate as this offers the best level of in-depth security against a possible terrorist or criminal threat(s).  Keep close control of all carry-on items and stay alert to those other passengers and airport personnel moving around you until you board the aircraft.  Once onboard, pay attention to the location of the closest exits by counting rows of seats, both in front and behind if that is your closest exit.  Remember if and when smoke fills the cabin, you will be unable to see the lighted strips on the floor so counting seats and placing that fact in your muscle memory can be critical in evacuating safely.  When placing carry-on bags in overhead compartments, place them with their zippers and openers towards the back making it more difficult for potential thieves to get inside.  If placing bags underneath seats, turn your bag upside down to cover the zipper or even wrap the bags strap around your foot for an additional security measure.

Hotel Safety

Request a room between the second and fifth floors as those are rooms too high typically for thieves but would allow fire equipment to reach in the event of a potential fire emergency.  Locate your closest emergency exit(s) and develop a plan when/if there is a fire or other emergency where quicker egress is necessary minus using elevators.  When in your room, always use all the provided door locking hardware, and check to ensure if there are any opening windows or sliding glass doors, that they too are secured properly.  Keep your room neat so you can quickly notice anything that might be out of place or conversely messy which might do the same trick.  When leaving the room typically use the ‘do not disturb’ sign on the door and keep a light on and the television also at a low volume to give the impression that someone is in the room.

Vehicle Safety

Always keep your doors locked and windows rolled up, especially if transiting busy thoroughfares with multiple stoplights or anything that reduces your vehicle speed.  Leave distance between you and the vehicle in front of you, typically if you cannot see the rear wheels of the vehicle in front, then you are too close and would be unable to move in the event you needed to. When parked, find well illuminated areas and keep any valuables you might have locked in your trunk and out of sight to passersby.

​​​​​​​Other Travel Related Resources

The U.S. Department of State, Bureau of Consular Affairs maintains a comprehensive library of information that can help you prepare for a unexpected crisis overseas. Their site includes links to additional information about other aspects of security for persons living overseas, including children.

The U.S. Department of State Smart Traveler Enrollment Program (STEP) is a free service to allow U.S. citizens and nationals traveling and living abroad to enroll their trip with the nearest U.S. Embassy or Consulate, receive information from the Embassy about safety conditions in the destination country, and help the U.S. Embassy contact you in an emergency, whether natural disaster, civil unrest, or family emergency.

Traveling overseas with mobile phones, laptops, PDAs, and other electronic devices from The National Counterintelligence and Security Center.  Additionally, the Air Force Office of Special Investigations has created a similar brochure with additional information

U.S. Department of State Current Travel Warnings are issued to describe long-term, protracted conditions that make a country dangerous or unstable. A Travel Warning is also issued when the U.S. government’s ability to assist American citizens is constrained due to the closure of an embassy or consulate or because of a drawdown of its staff.

Also see the CIA World Factbook, which contains a plethora of excellent travel data in one-page synopses.

The State Department’s annual Country Reports on Terrorism details key developments in 2020 in the global fight against international terrorist groups.​​​​​​​

Research Security

Research security at universities is crucial for safeguarding sensitive information, intellectual property, and national security interests. NSPM-33, or National Security Presidential Memorandum 33, outlines the guidelines and policies for securing research activities, particularly those involving sensitive or classified information. This memorandum emphasizes the need for universities to implement robust security measures to prevent unauthorized access, disclosure, or exploitation of research findings that could potentially harm national security or economic interests. By adhering to NSPM-33 and implementing research security measures, universities can ensure the protection of valuable research assets while also fostering a collaborative and transparent research environment. 

EXPORT CONTROLS

Export control laws are federal regulations that govern how certain information, technologies, and commodities can be transmitted overseas or to a foreign national on U.S. soil. The scope of the regulations is broad: they cover exports in virtually all fields of science, engineering, and technology and apply to research activities regardless of the source of funding. Failure to comply with these laws can have serious consequences, both for the institution and for the individual researcher. Potential penalties include fines and possibly imprisonment. It is thus critical for UConn researchers to understand their obligations under these regulations and to work with the UConn Export Control Office to ensure that the University is in compliance.

UConn adheres to multiple federal agencies’ regulations pertaining to export controls, but there are three main regulations which the university is concerned with:

  • The International Traffic in Arms (ITAR) from the U.S. Department of State, which covers defense articles and defense services.
  • The Export Administration Regulations (EAR) from the U.S. Department of Commerce, which govern some commodities, software, technology, and “dual-use” civilian/military articles and technology.
  • The Office of Foreign Assets Control (OFAC) from the U.S. Department of the Treasury, which enforces economic and trade sanctions based on U.S. foreign policy and national security goals.

UConn’s Export Control Office supports the university’s faculty, staff, and students with questions about and guidance for actions required in order to comply with these various federal regulations.

Questions about ClinicalTrials.gov?

ClinicalTrials.gov is an online database of clinical trials. At UConn Health, Principal Investigators are responsible for registering and posting results per the federal regulations as well journal policies. That National Institutes of Health definition of a clinical trial is a research study in which one or more human subjects2 are prospectively assigned3 to one or more interventions4 (which may include placebo or other control) to evaluate the effects of those interventions on health-related biomedical or behavioral outcomes.5  

Do you have questions about ClinicalTrials.gov registration or results posting? To schedule a virtual or in-person session with the UConn Health contact for ClinicalTrials.gov, email Ellen Ciesielski, Research Compliance Monitor in Research Integrity & Compliance in the OVPR. To learn more about ClinicalTrials.gov requirements, please see our webpages.

 

 

 

 

 

1See Common Rule definition of research at 45 CFR 46.102(d).
2See Common Rule definition of human subject at 45 CFR 46.102(f).
3The term “prospectively assigned” refers to a pre-defined process (e.g., randomization) specified in an approved protocol that stipulates the assignment of research subjects (individually or in clusters) to one or more arms (e.g., intervention, placebo, or other control) of a clinical trial.
4An intervention is defined as a manipulation of the subject or subject’s environment for the purpose of modifying one or more health-related biomedical or behavioral processes and/or endpoints.  Examples include:  drugs/small molecules/compounds; biologics; devices; procedures (e.g., surgical techniques); delivery systems (e.g., telemedicine, face-to-face interviews); strategies to change health-related behavior (e.g., diet, cognitive therapy, exercise, development of new habits); treatment strategies; prevention strategies; and, diagnostic strategies.
5Health-related biomedical or behavioral outcome is defined as the pre-specified goal(s) or condition(s) that reflect the effect of one or more interventions on human subjects’ biomedical or behavioral status or quality of life.  Examples include:  positive or negative changes to physiological or biological parameters (e.g., improvement of lung capacity, gene expression); positive or negative changes to psychological or neurodevelopmental parameters (e.g., mood management intervention for smokers; reading comprehension and /or information retention); positive or negative changes to disease processes; positive or negative changes to health-related behaviors; and, positive or negative changes to quality of life.

March Remote RCR Training 3/26

The Responsible Conduct of Research (RCR) Office within Research Integrity & Compliance in the OVPR hosts monthly remote RCR training sessions. For our March remote event, we will be discussing several case studies. This 1-hour event will count towards the 8-hour in person requirement for NIH, however all those who conduct research are strongly encouraged to attend!

For more details about RCR requirements, please visit our RCR Program website.

For questions, please contact Research Compliance Monitor, Ellen Ciesielski or Karen Moré, Director of Research Compliance.

What: March RCR remote training session featuring case study discussions

When: Tuesday, March 26th from 12:00 p.m. to 1:00 p.m.

Where: Remote WebEx Registration Link

IACUC Policy on Use of Isoflurane

Purpose:         

In order to ensure appropriate use of Isoflurane, UConn Health’s Institutional Animal Care and Use Committee (IACUC) has implemented a policy on the use of this drug.  Isoflurane is a halogenated anesthetic gas commonly used to anesthetize research animals.  Researcher exposure occurs primarily through the inhalation of waste anesthetic gases that are unintentionally released into the laboratory environment if equipment is not setup or functioning properly or the waste anesthetic gas is not properly exhausted.  Short term overexposure may result in irritation of the eyes, skin and respiratory tract, cough, sore throat, and may impair consciousness and motor skills. Adverse effects on the liver and kidneys are possible as a result of overexposure. As a volatile anesthetic gas, it must be used with a vaporizer to ensure its safety for use in survival surgery.

Any proposed deviation from these guidelines must be fully explained and justified to the IACUC in the research proposal.

 

Action:

Anesthesia for Survival Surgery

  1. Isoflurane must be used via a vaporizer designed for its use. The laboratory may choose to own its own vaporizer or rent a vaporizer for occasional use from the Center for Comparative Medicine.
  2. Vaporizers must be calibrated on a yearly basis; please review the IACUC Policy on Vaporizer Calibration and Maintenance.

Anesthesia for Terminal procedure using the “Drop Method”

  1. The IACUC will allow the “Drop Method” for use with isoflurane for terminal procedures; however, this requires continuous monitoring of the animals.
  2. Use of isoflurane via this method must be performed in a chemical fume hood or equivalent (e.g., down draft table) to control the anesthetic waste gas.
  3. A chamber can be used that is large enough to accommodate the animal for anesthesia. A small amount of anesthesia liquid is placed in either a reservoir or on an absorbable material (such as gauze, cotton balls, etc.).  The reservoir or absorbable material must be positioned so that the animal cannot come in direct contact with the isoflurane.
  4. There are two ways to use isoflurane in the drop method:
    1. Diluted. A mixture of 20% v/v anesthetic in propylene glycol is recommended for mice and a 30% v/v liquid anesthetic in propylene glycol is recommended for rats.  A general guideline for the amount of diluted mixture is approximately 1.0cc for every 500cc volume of the chamber to be used.
    2. Undiluted. If undiluted gas is used, it is extremely important to use the appropriate amount to prevent over-anesthetizing the animal.  This should be based on the volume of the chamber. Anesthesia usually will be adequate at 1.0-1.5%.
ml per liter volume of container Equals %
0.05 1
0.10 2
0.15 3
0.20 4
  1. For a short procedure prior to euthanasia, once the anesthetic has been loaded into the chamber, the animal is placed inside and monitored for unconsciousness. A deep plane of anesthesia is indicated by lack of movement to a firm toe pinch.  Once the animal is adequately anesthetized, the animal can be removed from the chamber.
  2. For a slightly longer period of anesthesia, a tube (e.g., 15-ml conical tube for mice or a 50-ml conical tube for rats) can be loaded with gauze containing several drops of anesthesia liquid. The animal should be restrained and the nose held to the tube until the anesthesia takes effect.

Sedation for non-surgical procedures

  1. Use of isoflurane for non-surgical procedures must be performed in a chemical fume hood or equivalent (e.g., down draft table) to control the anesthetic waste gas.
  2. A chamber can be used that is large enough to accommodate the animal for anesthesia. A small amount of anesthesia liquid is placed in either a reservoir or on an absorbable material (such as gauze, cotton balls, etc.).  The reservoir or absorbable material must be positioned so that the animal cannot come in direct contact with the isoflurane.
  3. The animal can be removed once a sedative effect has taken place. Care must be taken to watch the animal closely as over-anesthetizing, and thereby euthanizing the animal, can happen.

 

References:

1. Johns Hopkins University IACUC policy “Use of Anesthetic Gasses:  Drop Method”

2. Bodnar, M., et al. “Mouse Isoflurane Anesthesia using Drop Method”. Laboratory Animals, May 2023.

 

Effective Dates:            December 21, 2023 through December 31, 2026

This policy has been approved by a majority vote of the IACUC Members

 

 

Scholarship and Collaboration in Humanities and Arts Research (SCHARP)

NOTICE as of 5/05/2025: Due to the need to reserve funds for the recently announced EMERGE emergency funding program, all FY26 OVPR Internal Funding Programs are on hold for at least the first few months of the new fiscal year-we will provide updates as more information becomes available.

The Office of the Vice President for Research (OVPR) Scholarship and Collaboration in Humanities and Arts Research (SCHARP) Awards aim to support innovative works of scholarship and creative activities in the arts and humanities that have the potential to transform a field of study, impact the common good, or chart a new direction in scholarly, creative, or artistic development.  Proposal reviews will be conducted by a committee composed of representatives from UCHI, the College of Liberal Arts and Sciences, and the School of Fine Arts.

To learn more about the SCHARP Awards, visit the OVPR Storrs site.

UConn Innovations in Quantum STEM Education

Advances in quantum science have the potential to have transformative social and economic impact.  New technologies are poised to revolutionize major industries, creating opportunities for new applications that will fuel economic growth.

Taking full advantage of emerging quantum technologies requires a STEM-educated workforce that is ready to put these new technologies to work.  The Innovations in Quantum STEM Education program seeks to inspire and seed research into quantum-ready STEM education and workforce training that will enable our communities to rise to meet the new employment opportunities that quantum technologies will bring.  We encourage collaborations between UConn and Yale faculty, as well as other academic, workforce development, and corporate/industry partner organizations, to pursue innovative educational research related to quantum.  We particularly encourage collaborations that include faculty from quantum-related fields, STEM Education or curriculum development, and/or digital media and design.

Areas of interest include (but are not limited to): assessing the current state of STEM education approaches in our region and our readiness for quantum, developing/testing new educational approaches to teaching quantum-related STEM concepts, developing training modules and game-based techniques for teaching quantum concepts, developing/implementing quantum-informed curriculum plans for all educational levels, and developing/implementing quantum-informed workforce development approaches for specific industries.

This program is offered as a companion program to the Quantum-CT Regional Innovation Engine project. Quantum-CT, led by UConn and Yale University, is an effort to build an innovation ecosystem of researchers, educators, industry, and state/local stakeholders to harness the economic impact of new quantum-enabled technologies through technology development, innovation and entrepreneurship, and advances in STEM education and workforce development.

To learn more about the program, visit the OVPR Storrs site.