Conducting research responsibly, rigorously, and ethically is fundamental to producing successful results. Research information and intellectual property must also be secured and safeguarded throughout the research lifecycle to ensure it does not fall into the wrong hands.

Unethical research conduct can affect your career, WashU, and public trust in research. You have a responsibility to conduct research ethically. You also have an obligation to report concerns of others acting unethically.

There are many components of responsible and secure research. This page provides information on five key RCR components:

Responsible conduct of research also encompasses:

Training Requirements

Many sponsors require Responsible Conduct of Research (RCR) training. In addition to WashU’s Responsible Conduct of Research policy, individuals are required to follow any sponsor, program, and award requirements. The RCR Training page provides additional information on requirement, available opportunities, and tracking completions.


Paper and pencil icon in red

Study Design

Designing a quality study, collecting data, and analyzing that data is the foundation of research. The responsible and ethical use of data throughout this process is crucial.

Review these pages for additional guidance:

Circle graph icon in red

Data Management

Effective stewardship of data is fundamental to high-quality research. WashU expects everyone to follow the highest standards for management, retention, and sharing.

Most sponsors require the establishment of appropriate data management and sharing plans. Developing this plan is a good practice even if your sponsor does not require it. Plans typically include the types and the amount of data to be collected and how that data will be validated, organized, stored, protected, and shared.

Data must be retained in accordance with university policy. The Office of Information Security offers guidance on available secure storage and communication services.

The Research Data page includes information on data management planning; data acquisition and collection; storage, security, and analysis; and dissemination and preservation.

Shield and lock icon in red

Research Security

Research security is collective system of controls and best practices that protect the research enĀ­terpriĀ­se from misappropriation, violations of research integrity, and foreign government interference. Following these proactive measures protects your work and prevents sensitive data from being exposed or misused.

Review these pages for additional guidance:

Three interconnected people icon in red

Mentorship

Mentoring helps properly train the next researchers and expand their networks. Review these pages for additional guidance:

Magnifying glass icon in red

Peer Review

Peer review is most often used to review proposed research in an application for research and research to be presented in a publication.

Peer reviewers have an obligation to follow ethical review practices, including maintaining confidentiality, during the review process. This is essential to allow for the candid exchange of scientific opinions and evaluations.

Other resources:

All RCR Resources