Responsible Conduct of Research

Hosting Visitors, Students, and Scholars

Hosting visitors in research areas may increase security risks. Follow these best practices to safely host visitors, students, and scholars.

Preparing to host

Paper and pencil icon in red

Work with your department business office to complete the appropriate packets for any visitor.

Globe icon

Review resources for hosting international visitors.

Checklist with three items, two are checked off icon

Develop an access plan for data and equipment the visitor needs access to. Limit access to only what is necessary.

Checkmark in a scalloped circle icon

Obtain sponsor approval as needed for foreign nationals’ engagement in the research.

Person with a W on their shirt next to an open book icon

If a foreign national will have access to controlled technology, work with the Export Controls office to determine if a license or technology control plan is needed.

While hosting

Person at whiteboard in a classroom icon

Ensure the visitor completes all necessary data safety and security training.

Shield and lock icon in red

Clearly communicate expectations for data use including security requirements (e.g. never storing data on personal devices, limitations for continued access).

Checklist with three items, two are checked off icon

Follow the access plan and technology control plan (if applicable).

Globe icon

Short term foreign visitors may require additional security measures such as requiring an escort. Work with the Export Controls office to develop a plan.