Training & Compliance

Training, Awareness, and Required Actions

All individuals who work with I at Boulder, or expect to do so must complete Boulder’s I training annually and before accessing secure research environments.

To access the training:

  1. Log in to.
  2. Click " Resources," then "Training."
  3. Click the “Percipio" tile.
  4. In the "Search" field, type “Controlled” and select ": Controlled Unclassified Information (I) - u00189.”
  5. The course will open in a pop-up window.

I Compliance Review and Secure Research Environments

Researchers who require a secure environment (such as the Preserve) for I should coordinate with the Office of Contracts and Grants (OCG) during the proposal phase to ensure PIs are aware of compliance requirements and to budget for secure systems. A new page on the Research Security site will soon provide additional guidance.

For more information, visit the Research Security: Cybersecurity and I page.

Resources, Policies, and Supporting Links

Who to Contact

  • For proposal or contract questions: Office of Contracts & Grants
  • For secure environment setup or technical issues: Research Cybersecurity Program (OIT Security)
  • For general I program guidance: Office of Compliance, Ethics and Policy (OCEP) compliance@colorado.edu