Essential Research Knowledge Series
Name
Name
First Name
Last Name

This form is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Workshop Descriptions

Cybersecurity

Workshop Details:

This 30-minute workshop addresses critical cybersecurity practices and responsibilities for Northeastern University’s research community. Participants will learn about common cyber threats targeting research environments, security protocols for protecting sensitive research data, and institutional resources available to support secure research practices. Through interactive case studies, attendees will learn about real-world strategies to safeguard valuable research information.

Learning Objectives:

By the end of this workshop, participants will be able to:

  1. Identify common cybersecurity threats to research environments
  2. Implement essential security practices for protecting research data
  3. Evaluate the security implications of research collaboration tools, cloud services, and mobile device usage in research contexts
  4. Access and utilize Northeastern University’s resources to make informed decisions about cybersecurity risks and take appropriate protective measures
Research Data Management

Workshop Details:

This 30-minute workshop focuses on responsible and ethical research data management practices essential for faculty, postdocs, students, and research staff at Northeastern University. Participants will explore best practices and resources for data collection, storage, sharing, and preservation. The session will highlight available resources at Northeastern and engage participants in case-based discussions to reinforce key concepts. 

Learning Objectives:

By the end of this workshop, participants will be able to:

  1. Identify core components for crafting an effective data management plan. 
  2. Describe best practices for secure data storage, backup, and access control throughout the research data lifecycle. 
  3. Differentiate the storage options available on the HPC cluster and apply best practices for effective utilization. 
  4. Locate and utilize Northeastern University’s data management
Privacy Concerns with AI in Research

Workshop Details:

As artificial intelligence becomes increasingly integrated into research workflows, researchers face new challenges in protecting human subject data. This workshop, presented in collaboration with the Office of General Counsel and the Department of Human Research, will examine the critical distinctions between confidentiality, privacy, and security in the context of AI-enabled research and what university policies and processes you need to be aware of when considering the use of AI in your research.

Through case studies and guided discussion, attendees will gain clarity on regulatory requirements, institutional policies, and best practices for responsible AI integration in human subjects research. This session is essential for researchers, research staff, and administrators working with human participant data in an AI-enhanced research environment.

Learning Objectives:

By the end of this workshop, participants will be able to:

  1. Differentiate between confidentiality, privacy, and security in research contexts and explain how each concept applies specifically to AI systems handling human subject data.
  2. Identify potential privacy and security risks introduced when AI tools are used in human subjects research, including data processing, cloud storage, and algorithmic analysis.
  3. Evaluate whether proposed AI applications in their research comply with IRB requirements, HIPAA regulations, and institutional data governance policies.
  4. Apply risk assessment frameworks to determine appropriate safeguards when integrating AI tools into human subjects research workflows.
  5. Develop strategies for maintaining participant confidentiality and data security throughout the research lifecycle when using AI systems.
  6. Recognize when to consult with legal counsel, IRB, or IT security teams regarding AI use in human subjects research.
Contracting Hot Topics in Research- Part 1

Workshop Details:

Description

This 30-minute training addresses current issues and best practices in research contracting at Northeastern University. The session focuses on the most commonly encountered agreement types in research settings and highlights recent developments, compliance considerations, and practical challenges. Participants will gain insights into key contractual provisions and risk management approaches for various research agreements. The training emphasizes real-world scenarios and emerging trends that impact how researchers engage with external partners, sponsors, and collaborators.

Learning Objectives:

By the end of this workshop, participants will be able to:

  1. Identify the primary types of research agreements and their distinct purposes (NDAs, MTAs, DUAs, MOUs, SRAs, federal/state contracts, and subcontracts)
  2. Recognize key contractual provisions and “hot button” issues commonly encountered in research agreement negotiations
  3. Distinguish between different agreement structures and when each type is most appropriate for specific research activities
  4. Identify common pitfalls, action areas and risk factors in research contracting and strategies to mitigate them
  5. Know when to engage contracting professionals early in the research planning process
Contracting Hot Topics in Research – Part 2 (The Re-Hottening)

TBD

Export Controls

Workshop Details:

This 30-minute training focuses on U.S. export control regulations and their application to university research and activities. The session covers the three primary regulatory frameworks (ITAR, EAR, and OFAC), fundamental research exemptions, controlled unclassified information (CUI) requirements, and practical compliance measures. Participants will learn to identify when export controls may apply to their research or activity, resources available to ensure compliance with export regulations, and understand when Technology Control Plans are necessary to safeguard controlled research projects.

Learning Objectives:

By the end of this workshop, participants will be able to:

  1. Define export controls and identify the three main regulatory agencies governing exports (State Department/ITAR, Commerce/BIS, Treasury/OFAC)
  2. Distinguish between fundamental research and controlled research, including when export control restrictions may apply
  3. Recognize critical and emerging technologies that commonly trigger export control requirements in university settings
  4. Understand the concept of “deemed exports” and how they apply to foreign national participation in research
  5. Identify when international shipping requires an export license review and the information needed for compliance assessment
  6. Describe Controlled Unclassified Information (CUI) requirements and the role of Technology Control Plans (TCPs)
  7. Know when to consult with the Export Compliance team and available resources
International Travel & Collaboration

Workshop Details:

This 30-minute training provides essential guidance for Northeastern faculty, staff, and students engaged in international research activities. Participants will learn about the university’s policies for international engagements, foreign visitor protocols, travel security requirements, and disclosure obligations. The session covers risk assessment frameworks, compliance with federal research security requirements under NSPM-33, and practical steps to ensure safe and compliant international collaboration while protecting research integrity and institutional research security.

Learning Objectives:

By the end of this workshop, participants will be able to:

  1. Identify the key requirements of Northeastern’s Policy on External International Engagements and when the International Engagements Intake Form must be completed
  2. Recognize high-risk countries and cyber risk destinations that require special travel protocols and security measures
  3. Understand disclosure requirements for foreign collaborations, including current and pending support documentation and conflict of interest reporting
  4. Evaluate collaboration risks using Northeastern’s risk assessment matrix for international partnerships
  5. Review Northeastern’s Travel Registry, best practices for cybersecurity while in transit, and when travel briefings are required
  6. Apply proper procedures for hosting foreign visitors and managing international research partnerships 
  7. Recognize signs of potential foreign talent recruitment programs and elicitation threats and understand reporting obligations