Have questions about export controls (ITAR), conflicts of interest, research misconduct, plagiarism, IRBs, clinical trials, animal use, or flying UAVs on campus?
The College of Engineering has a compliance liaison, Elizabeth Wagner (734.647.7007, email@example.com), on hand to help you navigate the compliance processes. She can point you to the right people and resources, and help you as needed along the way.
- The University of Michigan Office of Research is now providing a plagiarism detection software application, iThenticateTM, for faculty use.
- The iThenticate system is designed to verify originality in published works and research proposals. It allows you to compare the text of your uploaded documents against the internet and a content database of over 150 million source materials (e.g., periodicals, journals, newspapers, scholarly articles, abstracts, books, archived web pages).
- For more information and links to training, see the UMOR website (http://research-compliance.umich.edu/research-integrity/plagiarism-detection) and the FAQs, which can be found below.
- To learn more about how journals use iThenticate, check out these blogs from Professor Mike Liemohn, the JGR-Space Physics Editor-in-Chief
Conflict of Interest:
- Learn about the College of Engineering’s Conflict of Interest policy.
- See the Research Compliance website or contact COI.Support@umich.edu with questions about COI policy, outside interest disclosure, or COI review and management processes.
- Faculty/Staff should disclose any outside interests annually in the M-Inform Disclosure System.
- Are you considering or starting a project with export control restrictions? Special IT security requirements?
- Are there publication or foreign national restrictions on your research?
- Give Elizabeth a call at 734.647.7007 or swing by 1008 LEC to learn more about available resources.
- Email firstname.lastname@example.org to be provisioned with ITAR-compliant ITS Exchange email, with your uniqname and full name with a cc to your department IT manager. It typically takes 24 to 36 hours to be provisioned.
- RCRS workshops are designed for Ph.D. students, postdoctoral research fellows, and any Master’s or undergraduates who are NSF/NIH funded. This faculty-led training teaches students and fellows about best research practices and engineering ethics.
Guidance on sensitive data and safe computing:
- See the ITS Sensitive Data Guide.
- Contact email@example.com.
- See the Compliance Resource Center to guide you with IT Security.
- Find the Permitted and Restricted Uses Standard on sensitive regulated data here.
- Institutional Review Board Application Process