Introduction to Trusted Research and Export Controls
Duration 1 hour 30 minutes
Team Researcher Academy

This online course is run by the 
Researcher Academy


Trusted Research and Knowledge Exchange is concerned with security in international collaboration and ensuring your research and knowledge exchange activities are fully protected.

Trusted Research is applicable to anyone who has international collaborations but is particularly relevant to researchers in STEM subjects, dual-use technologies, emerging technologies and commercially sensitive research areas. Please see SharePoint pages for more information  

Government guidance and the Centre for Protection of National Infrastructure have outlined increasing concern that hostile state actors may target UK universities to steal personal data, research data and intellectual property and this could be used to help their own military, commercial and authoritarian interests.

International collaboration offers hostile state actors the opportunity to benefit from research without the need to undertake traditional espionage or cyber compromise. Collaboration can provide those with hostile intent access to people, IT networks, and participation in research which may be sensitive or have sensitive applications.

Individual researchers may be targeted by a hostile state actor, but equally you may also be targeted by an academic institution to undertake research which is of strategic benefit to that country.

Traditional academic engagement provides an easy route for a hostile foreign intelligence service to gain access to you, for example at a conference or research placement.

You might also be targeted through a cyber-attack, such as a phishing email, which might try to trick you into revealing sensitive information or contain links to a malicious website or infected attachment.

Trusted Research:

  • Allows the identification and management of potential risks to your Research/ Knowledge Exchange activities
  • Helps researchers, UK universities and industry partners to have confidence in international collaboration and make informed decisions around those potential risks
  • Explains how to protect research and staff from potential theft, misuse or exploitation​​​​​​​

This session will

  • Introduce researchers to Trusted Research
  • Provide an overview of what and when it applies

Learning outcomes/objectives

  • To be able to determine whether a project is within the Trusted Research remit or not.
  • To gain an understanding of the steps required to comply and protect your research.

Process: The webinar will involve a mixture of presentation, discussion and examination of case-studies and exemptions.

Course Accessibility

The following table shows a summary of what is needed to participate in the course. 

If you feel you will experience any difficulties participating, please let us know via the ‘special requirements’ tab, providing as much information as possible. The special requirements tab can be completed when you book your place. Alternatively, you can contact us directly at

Access MS Teams
Attend the course at the specified date and time
Use MS Teams chat box function

Booking Conditions

Our webinars/ online courses are very popular, especially in the current period and we are experiencing large volumes of people on our waiting lists.  

Please do let us know if you would like to cancel your place on this course so we can offer your place to another delegate. 

Please note, attendances for courses will be recorded. There are no training points associated with courses run by the Researcher Academy.

LocationStart DateAll DatesTimesPlaces AvailableBook
Online Course03 July 202403 July 202411:00am - 12:30pm990