Establishing Secure and Compliant Research Partnerships

Blog

STRIDER

This is the fourth post of four in our Research Security blog series. To read the previous post, click here.

Introduction  

As the landscape of global research becomes increasingly complex, it is becoming more important to adopt best practices for ensuring research security. These practices not only protect intellectual property but also help maintain compliance with regulatory standards and safeguard national interests.  

This blog outlines best practices for establishing secure and productive research partnerships, with a focus on mitigating risks associated with collaborations involving the PRC. 

Know Your Partner Organization  

Before entering into any partnership, conduct thorough due diligence to assess potential risks. Key indicators to consider include: 

  • Mission Alignment: Does the partner organization’s mission align with nationalistic S&T concepts such as "self-reliance," “breaking the foreign technology,” or "indigenous innovation"? 
  • Subsidies and Funding: Is the organization funded by government programs aimed at advancing strategic technology goals? 
  • Ownership and Control: Is the organization owned or controlled by government or military entities? 
  • Military Ties: Does the organization support military-civil fusion strategies or have procurement relationships with the military? 
  • Government Advisory Roles: Does the organization participate in government policy development related to science and technology? 
  • Talent Recruitment: Is the organization involved in talent recruitment programs that could facilitate technology transfer? 
  • Cybersecurity: Does the organization have connections to known ATP actors 
  • Partners: Does the organization have strategic partnerships with other organizations that have high-risk relationships?  

Know Your Partner Key Persons  

It is crucial to assess the backgrounds of key individuals involved in the partnership. Key indicators to consider include: 

  • Government and Military Experience: Has the individual previously worked for government or military organizations? 
  • Talent Program Participation: Is the individual a member of talent programs aimed at recruiting overseas experts? 
  • Funding and Research History: Has the individual received funding from government programs with strategic objectives? 
  • Previous Collaborations: Has the individual collaborated with government or military organizations in the past? 
  • Area(s) of Expertise: Is the person an expert in a technology that other governments have identified for self-reliance? Is the person an expert in a technology the Western governments have identified as sensitive, strategic, or controlled technology?  

Define and Adhere to Partnership Scope  

Clearly define the scope of the partnership to limit the potential for strategic information transfer and talent loss. Consider the following: 

  • Objectives: What are the specific goals of the partnership? 
  • Ownership: Who will own and use the outcomes of the partnership? 
  • Scope of Work: What specific areas of science and technology will be covered? 
  • Location: Where will the partnership activities take place? 
  • Personnel: Which departments and individuals will participate and have access to shared information? 

Implementing Strategic Security Measures 

By employing sophisticated data analysis and risk assessment tools, academic institutions can pinpoint potentially hazardous collaborations. These measures not only secure research activities but also ensure compliance with necessary regulations, protecting funding streams and maintaining a competitive edge. 

Advanced platforms like Strider offer detailed insights into potential collaborators and key individuals, enabling institutions to perform rigorous due diligence. This proactive approach helps identify and mitigate risks, ensuring that research partnerships remain secure and productive. 

Conclusion  

Adopting best practices for research security is essential for protecting intellectual property, maintaining compliance, and safeguarding national interests. By leveraging Strider’s advanced intelligence capabilities, institutions can establish secure and productive research partnerships that drive innovation while mitigating risks.