What Kind of Information Should I Include in My Application’s Resource Authentication Plan?

If you are submitting a research or career development application and plan to propose the use of key biological and/or chemical resources, then you need to address in your application how you intend to authenticate these resources. For due dates between now and May 24, 2016, the authentication plan should be included as an additional attachment (not as part of the research strategy) and it should be brief – no more than one page is suggested. The plan should include a description of the methods proposed to authenticate key resources prior to use and at regular intervals, if appropriate. Key resources and the methods for authentication will vary by research field. For example, applicants proposing to use cell lines should describe the method they plan to use to verify the identity of the lines, which might include short tandem repeat (STR) profiling. Authentication data should not be included in the plan. For due dates after May 25, 2016, you will be required to use the new version of the application forms (FORMS-D). The PHS 398 Research Plan and PHS 398 Career Development Award Supplemental forms included in FORMS-D application packages will have a specific attachment field called “Authentication of Key Biological and/or Chemical Resources” that you will use for this information. If you do not propose the use of key biological and/or chemical resources, then a plan for authentication does not need to be included. Learn more about rigor and transpa...
Source: NIH Extramural Nexus - Category: Research Authors: Tags: You Ask, We Answer Source Type: funding