Research security
All applicants must include an appendix with their application that contains a self-assessment of research security issues and, if necessary, a more detailed description of the risks and a risk management plan. The assessment must be prepared using the template provided, and it must be included with the application in all calls for applications issued by the RCF and the Strategic Research Council (SRC).
Save the appendix in PDF format; do not print to PDF. Name the file as follows: researchsecurity_RCFyear_yoursurname.pdf.
You may submit the appendix in English, Finnish or Swedish, regardless of the language of your application. The appendix will not be peer-reviewed, but as part of the application it will be available to the reviewers.
The appendix concerns research security in relation to international cooperation. Other project-related risks are described as part of the research plan.
The security assessment shall cover the following aspects:
- Are there any collaborators (individuals or organisations) involved in the project that increase security risks?
- You may use the support services provided by your organisation to check the collaborators’ backgrounds.
- Does the project presented in the application fall within the area of critical technology?
- See, for example, Critical technology areas for the EU's economic security (PDF).
- Do the results of the project presented in the application have dual-use potential, or does the project use equipment with dual-use potential (civilian and military use)?
- See, for example, EU Commission recommendation on research involving dual-use items.
- Are there any other identifiable risks related to research security in the application
When preparing the appendix, you can use the information and lists published on the websites accessible via the links above. Please note, however, that the RCF is not responsible for ensuring that the information presented on these external websites is accurate, comprehensive or up to date. The assessment to be attached to the application must be based on the situation at the time of application.
Research focusing on the above-mentioned topics does not in itself preclude the possibility of being granted funding. However, if the research does address these themes, it is particularly important to pay attention to collaborators operating outside the EU. For example, applicants must assess whether the collaborator has connections to the armed forces or whether there are reasonable grounds to suspect that the results of the research could be used to violate human rights. Furthermore, from the perspective of the possible dual use of research results, it is necessary to examine issues related to export control.
When examining other factors affecting research security, it is advisable to take into account, for example, possible political influence on the content of the research, the realisation of academic freedom, the risk of disinformation being spread through the research, and the possible effects of external funding and other ties. The assessment can be supported by using indicators such as the Academic Freedom Index, Country Corruption Index, the Human Freedom Index and the Rule of Law Index, as well as by examining the possible affiliations of the individuals participating in the research.
If the self-assessment questions identify security risks in the project, the applicant must describe the identified risks in more detail in line with the instructions on the form provided, assess their impact and probability, and draw up a risk management plan.
The self-assessment and plan will together form a mandatory appendix, which must be properly prepared in order for the application to be processed.
What we expect from the site of research
The site of research undertakes to ensure that the risks associated with research security and the management of those risks are described in the application and taken into account appropriately in the research and cooperation carried out in the project, as well as in the utilisation of the research results.