Training & Compliance
Training, Awareness, and Required Actions
All individuals who work with I at Boulder, or expect to do so must complete Boulder’s I training annually and before accessing secure research environments.
To access the training:
- Log in to.
- Click " Resources," then "Training."
- Click the “Percipio" tile.
- In the "Search" field, type “Controlled” and select ": Controlled Unclassified Information (I) - u00189.”
- The course will open in a pop-up window.
I Compliance Review and Secure Research Environments
Researchers who require a secure environment (such as the Preserve) for I should coordinate with the Office of Contracts and Grants (OCG) during the proposal phase to ensure PIs are aware of compliance requirements and to budget for secure systems. A new page on the Research Security site will soon provide additional guidance.
For more information, visit the Research Security: Cybersecurity and I page.
Resources, Policies, and Supporting Links
Boulder Resources
CMMC Federal Resources
Who to Contact
- For proposal or contract questions: Office of Contracts & Grants
- For secure environment setup or technical issues: Research Cybersecurity Program (OIT Security)
- For general I program guidance: Office of Compliance, Ethics and Policy (OCEP) compliance@colorado.edu