Authentication of Key Biological and/or Chemical Resources in NIH Grant Applications

The fourth and final segment in our series on rigor and transparency in research grant and career development award applications focuses on authentication of key biological and/or chemical resources. Research performed with unreliable or misidentified resources can negate years of hard work and eliminate any chance for a study to be reproduced or expanded upon. For this reason, it is imperative that researchers regularly authenticate key resources used in their research. Updated application instructions under “Additional Attachments” ask the applicant to: Briefly describe methods to ensure the identity and validity of key biological and/or chemical resources used in the proposed studies. Key biological and/or chemical resources may or may not be generated with NIH funds and: 1) may differ from laboratory to laboratory or over time; 2) may have qualities and/or qualifications that could influence the research data; and 3) are integral to the proposed research. These include, but are not limited to, cell lines, specialty chemicals, antibodies, and other biologics Standard laboratory reagents that are not expected to vary do not need to be included in the plan. Examples are buffers and other common biologicals or chemicals. The authentication plan should be included as an additional attachment (not as part of the research strategy), and it should should state, in one page or less, how you will authenticate key resources, including the frequency, as needed for your proposed...
Source: NIH Extramural Nexus - Category: Research Authors: Tags: blog Open Mike applications authentication reagents reproducibility Resources rigor Source Type: funding