Controlled Research Support Program

Controlled Research Support Program


Controlled Unclassified Information (CUI) is unclassified information that is created by or on behalf of the federal government. CUI must be safeguarded or shared only in specific ways. While it is not classified, it is still sensitive and subject to legal, regulatory, or contractual protections.

In a university setting, CUI most often appears in federally sponsored research projects. A sponsor may provide data, technical information, or research outputs that come with restrictions on how the information can be accessed, stored, transmitted, or shared. When these restrictions apply, the information is designated as CUI.

CUI requirements do not exist to limit academic inquiry. They exist to ensure that sensitive federal information is protected appropriately, while still allowing research to move forward.

Why CUI Matters in University Research

When a research project involves CUI, the university is contractually obligated to follow specific safeguarding requirements. These requirements affect how data is handled, who may access it, what systems can be used, and how incidents must be reported.

For researchers and project teams, this means that some projects require additional planning, infrastructure, and oversight beyond what is needed for non-restricted research. For the university, compliance protects our ability to continue participating in federally sponsored research and reduces institutional and individual risk.

CUI compliance is a shared responsibility. Researchers, administrators, IT staff, and support teams all play a role in ensuring that projects meet sponsor and federal requirements from proposal through closeout.

Common Examples of CUI in University Research

CUI can take many forms, and its presence is not always obvious at first glance. Common examples in a university research environment include:

  • Technical data or specifications provided by a federal sponsor
  • Research data with restrictions on dissemination or reuse
  • Information subject to export control or national security considerations
  • Data labeled by the sponsor with handling or distribution controls
  • Research outputs that cannot be shared publicly without approval

Not every federally sponsored project involves CUI. However, when restrictions appear in a solicitation, award document, data use agreement, or sponsor communication, additional review is required.

If you are unsure whether a project involves CUI, that uncertainty is expected. The purpose of this site is to help you recognize potential indicators early and connect you with the appropriate support before work begins.

Determining if a Project Involves CUI

Not every federally sponsored research project involves Controlled Unclassified Information. However, CUI requirements are often identified through sponsor language or award conditions that may not be immediately obvious, especially to researchers working on a CUI project for the first time.

This section is designed to help you recognize common indicators and understand the next steps for confirming whether CUI requirements apply to the project.

Quick Indicators That a Project May Involve CUI

CUI requirements are most likely to appear in projects funded by the DOD/DOW, NASA, DARPA, DOE and industry contracts supporting defense related research. NIH supported projects involving genomic data sharing may also include CUI-like data protections. Key terms and contract clauses include but are not limited to:

  • Controlled Unclassified Information
  • Controlled Technical Information
  • Controlled Defense Information
  • DFARS 252.204-7012
  • DFARS 252.204-7008
  • CMMC: Cybersecurity Maturity Model Certification
  • NIST 800-171
  • 32 CFR 2002: CUI
  • ITAR / Export Controlled

Language indicating restrictions on access, handling, storage, transmission, or sharing of data should be reviewed carefully.

CMMC and Cybersecurity Requirements

Some awards, particularly those associated with the Department of Defense, may reference cybersecurity frameworks such as the Cybersecurity Maturity Model Certification (CMMC) or related safeguarding requirements.

If the project documentation references specific cybersecurity standards, system security requirements, or compliance attestations, this is a strong signal that CUI may be involved and that approved systems and environments will be required.

How to Know for Sure

Researchers and project teams are not expected to make a final determination about CUI on their own.

If the project includes any of the indicators above, the next step is to contact the Controlled Research Support Program (CRSP) for review. This review confirms whether CUI requirements apply and identifies what safeguards, systems, and planning are needed before work begins.

Early identification is critical. Confirming CUI involvement at the proposal or award stage helps avoid delays, unplanned costs, and compliance issues later in the project lifecycle.

What Happens After CUI Is Confirmed

If a project is determined to involve CUI, you can expect:

  • Guidance from the CRSP on required safeguards and approved environments
  • Support in developing a Technology Control Plan, if needed
  • Coordination with IT and CRSP Office
  • Clear expectations for roles, responsibilities, and next steps

You will not be expected to navigate these requirements alone. The goal is to ensure that the project can proceed smoothly while meeting sponsor and federal obligations.

Budgeting for a CUI Project

Projects that involve Controlled Unclassified Information often require additional resources to meet federal safeguarding requirements. Planning for these needs early helps avoid delays, unanticipated costs, and compliance challenges after an award is made.

Many of the expenses associated with protecting CUI are allowable costs under federal awards when they are reasonable, allocable, and clearly tied to project requirements. This section provides a high-level overview of common cost considerations to help researchers and administrators plan appropriately.

Why Budget Planning Matters for CUI Projects

CUI requirements can affect where data is stored, what systems are used, and how project teams access and manage information. These requirements may introduce costs that are not present in non-restricted research projects.

Including CUI-related expenses at the proposal stage allows project teams to:

  • Select approved systems and environments from the start
  • Ensure appropriate access for project personnel
  • Avoid mid-project changes that can disrupt research timelines

Early coordination with the Controlled Research Support Program is strongly encouraged when developing a proposal that may involve CUI.

Common Cost Considerations for CUI Projects

While specific requirements vary by sponsor and project, common cost categories for CUI projects may include:

  • Secure computing environments, such as approved research computing platforms
  • Secure cloud storage approved for CUI data
  • Secure Microsoft O365 accounts designated for controlled research use and communication
  • Dedicated or restricted-use computers for accessing or processing CUI
  • Cybersecurity and system support services required to meet sponsor requirements

Not all CUI projects require all of these resources. Required safeguards are determined based on sponsor requirements, the type of data involved, and how the data will be used.

Including CUI Costs in Proposal Budgets

Federal sponsors generally allow reasonable data protection and security-related expenses when they are necessary for project performance. These costs should be:

  • Clearly justified in the proposal budget and budget justification
  • Directly related to safeguarding project data
  • Consistent with sponsor and university policies

Examples of commonly allowable expenses include secure storage, approved computing environments, and required system access. The research administrator and the Controlled Research Support Program can help determine which costs are appropriate to include.

Planning Ahead

If you believe a project may involve CUI, discussing potential cost implications early can help ensure the project is fully supported from the outset. Identifying requirements before submission or at award review allows the university to align systems, resources, and budgets with sponsor expectations.

Required First Step: Contact the Controlled Research Support Program

If the project involves, or may involve, Controlled Unclassified Information, the first required step is to contact the Controlled Research Support Program. Early engagement helps ensure that CUI requirements are identified correctly and addressed before work begins.

Researchers and project teams are not expected to interpret federal CUI requirements on their own. The Controlled Research Support Program serves as the university’s central resource for reviewing projects, confirming requirements, and coordinating next steps.

Coordination with the Controlled Research Support Program

Contact the Controlled Research Support Program as early as possible if:

  • Your proposal, solicitation, or award includes indicators of CUI
  • Your sponsor references data safeguarding, access restrictions, or cybersecurity requirements
  • You are unsure whether project data may be subject to handling or dissemination controls

Early review, ideally at the proposal stage or immediately upon award, helps avoid delays, unplanned costs, and compliance issues later in the project.

University Review and Approval Workflow

Once contacted, the Controlled Research Support Program will:

  • Review sponsor and award documentation for CUI requirements
  • Confirm whether CUI applies to the project
  • Identify required safeguards, systems, and approvals
  • Coordinate with the research team, information security, IT, and research administration teams as needed

This process is designed to support research activity while ensuring sponsor and federal requirements are met.

Technology Control Plan Overview

For projects involving CUI, a Technology Control Plan (TCP) will be required. A TCP documents how CUI will be protected throughout the project lifecycle, including:

  • Where CUI will be stored and processed
  • Who may access the information
  • What systems and environments will be used
  • How data will be safeguarded and monitored

The Controlled Research Support Program provides guidance and templates to support TCP development and approval.

Roles and Responsibilities

CUI compliance is a shared responsibility across the project team. Roles may include:

  • Principal Investigators, who oversee project activities and ensure requirements are followed
  • Research administrators, who assist with proposal development, budgeting, and documentation
  • IT and support staff, who help implement and maintain approved systems and safeguards
  • Project personnel, who are responsible for handling CUI in accordance with established requirements

Clear roles and early coordination help ensure projects proceed smoothly and remain compliant throughout their duration.

Working on a CUI Project: What to Expect

Once a project is confirmed to involve Controlled Unclassified Information, certain requirements apply to how the work is performed. These requirements are designed to protect sensitive information while allowing research activities to proceed in a structured and compliant way.

This section provides a high-level overview of what project teams can expect when working on a CUI project at the university.

Controlled Research Environments

CUI projects must use approved computing and storage environments that meet federal safeguarding requirements. These environments are designed to protect data through technical, administrative, and physical controls.

Depending on the project, this may include:

  • Use of designated secure research computing platforms
  • Approved secure cloud storage solutions
  • Restricted system configurations for accessing or processing CUI

Public or open systems are generally not permitted for CUI work unless explicitly approved.

Personnel and Access Restrictions

Access to CUI is limited to authorized individuals with a legitimate project need. In many cases, sponsor requirements may restrict access to U.S. Persons only.

Before accessing CUI, project personnel will be required to:

  • Complete required training
  • Receive approval for system and data access
  • Acknowledge project-specific handling requirements

Access is granted based on role and project responsibilities, not convenience.

Physical and Cybersecurity Requirements

CUI projects are subject to both physical and cybersecurity safeguards. These may include:

  • Secure workspace requirements for handling CUI
  • Project specific, dedicated computers and laptops
  • Restrictions on the use of personal devices
  • Specific system security configurations
  • Monitoring and logging of system access

The exact requirements depend on the sponsor, data type, and approved project environment.

Compliance and Monitoring

Projects involving CUI are subject to ongoing compliance expectations. This may include:

  • Periodic reviews of access and system usage
  • Verification that safeguards remain in place
  • Monitoring to detect unauthorized access or misuse

Compliance activities are not meant to disrupt research, but they are a required part of working with federally controlled information.

Support Throughout the Project

Working on a CUI project does not mean working alone. The Controlled Research Support Program, along with IT and security partners, provides ongoing support to help project teams understand requirements, resolve issues, and adapt as projects evolve.

Early communication and continued coordination help ensure that research can proceed efficiently and in compliance with sponsor expectations.

Report an Incident

Protecting Controlled Unclassified Information includes promptly reporting potential incidents involving unauthorized access, receipt, disclosure, or loss of CUI. Early reporting allows the university to respond appropriately, limit impact, and meet federal and sponsor obligations.

Reporting a concern does not imply wrongdoing. If something does not seem right, reporting it is the correct and expected action.

What Should Be Reported

You should report any situation involving CUI that may include:

  • Unauthorized access to or disclosure of CUI
  • Receipt of CUI by someone not approved for the project
  • Loss, theft, or improper storage of devices or media containing CUI
  • Inappropriate receipt of CUI into university email
  • Use of unapproved systems, accounts, or storage for CUI
  • Suspected cybersecurity incidents affecting CUI systems

If you are unsure whether an event qualifies as an incident, it is still appropriate to report it.

How to Report an Incident

If you believe there may have been an incident involving Controlled Unclassified Information, it is important to report it as soon as possible.

At this time, incidents involving CUI should be reported by contacting the Controlled Research Support Program directly:

Email: crsp@austin.utexas.edu

The Controlled Research Support Program will coordinate with the appropriate university offices, including information security and research compliance, to assess the situation and determine next steps.

If you are unsure whether an event qualifies as an incident, it is still appropriate to reach out for guidance.

What Happens After You Report

Once an incident is reported:

  • The appropriate response teams will assess the situation
  • You may be contacted for additional information
  • Required notifications to sponsors and corrective actions will be coordinated centrally

Project teams are not responsible for determining severity or regulatory reporting obligations. That responsibility rests with the university.

Why Prompt Reporting Matters

Timely reporting helps:

  • Protect sensitive federal information
  • Reduce risk to the project and the university
  • Ensure compliance with sponsor and federal requirements

Delaying or failing to report a potential incident can increase risk and complicate response efforts.

Support and Contact Information

Support is available at every stage of a Controlled Unclassified Information project. Whether you are developing a proposal, reviewing an award, or working on an active project, the university’s support teams are here to help.

Controlled Research Support Program

The Controlled Research Support Program is the primary point of contact for questions related to CUI in sponsored research. This team can assist with:

  • Determining whether a project involves CUI
  • Interpreting sponsor requirements
  • Coordinating required reviews and approvals
  • Connecting you with information security and IT resources

Email: crsp@austin.utexas.edu

Researchers and project teams are encouraged to reach out early. Asking questions before work begins helps ensure projects move forward smoothly and in compliance with sponsor requirements.

Additional Support

Depending on the nature of the project, you may also be connected with:

  • Research administration staff
  • Information security and IT support teams
  • Export control or compliance specialists

The Controlled Research Support Program will help coordinate these resources as needed.

On this page: