1. Indiana HB1179: Transfers of IP Developed with IU Resources
What it does: Requires IU to prohibit the transfer, license, or sublicense of IP developed with university resources to certain foreign-adversary entities.
How IU implements this:
2. IU Research Security Policy (RP-11-012)
Indiana University’s Research Security Policy (RP-11-012) applies to all students, faculty, staff, and anyone conducting research or sponsored activity under the auspices of IU.
Key responsibilities & disclosures:
Research security training:
- Senior/Key Personnel on proposals/awards must complete recurring research security training (e.g., annually or as sponsor-required) covering export controls, IP protection, data safeguards, and foreign-influence risk.
Restrictions on talent recruitment programs:
- IU personnel are prohibited from participating in foreign recruitment programs sponsored by a Foreign Country of Concern; IU certifies compliance with federal requirements (e.g., CHIPS & Science Act).
International engagements, restricted parties, and approvals:
- No agreements/disbursements to restricted parties (e.g., OFAC SDNs, BIS Entity List/Unverified List/Military End-User List, certain §1286 institutions) unless lawful, licensed, and formally approved by IU leadership; cross-border agreements must follow IU vetting (OVPIA) and coordinate with RSO.
Sensitive research materials, data, and IP protection:
- Sensitive Research Materials require formal agreements (e.g., MTAs) and, in some cases, written approval from IU leadership when a Foreign Country of Concern is implicated; protect research data and IP per IT- 12/DM-01 and any elevated controls; consult RSO before any transaction implicating export controls.
3. U.S. Export Controls & Sanctions
Even when IU policy permits an engagement, federal rules may still prohibit or require licenses/authorizations for sharing items, software, technology, technical data, or services.
- EAR (BIS): dual-use items & technology; includes deemed exports to foreign persons in the U.S.
- ITAR (DDTC): defense articles, defense services, and technical data.
- OFAC sanctions: embargoes, sectoral controls, SDNs/sanctioned parties, etc.
IU uses Visual Compliance to conduct restricted party screenings. Please contact rsohelp@iu.edu for screening requests, or for access requests to our screening software.
- Expands end-user controls to affiliates of listed entities: ≥50% owned (directly/indirectly) by a listed party can be treated as restricted even if not named.
- Raises the bar for ownership/beneficial-owner due diligence.
- Click here to read the IU Research announcement.
4. DOJ “Bulk Data Rule” (28 CFR 202)
Effective April 8, 2025, the DOJ rule restricts or prohibits certain transactions involving bulk sensitive personal data (e.g., genomic, health, financial, biometric, precise geolocation) and U.S. government-related data when parties, routing, infrastructure, or beneficiaries involve a foreign country of concern. Read more on Bulk Data here.
5. NIH Biospecimen Security Policy (NIH-funded work)
NIH’s Policy on Enhancing Security Measures for Human Biospecimens (effective October 24, 2025) sets requirements for the collection, storage, use, and distribution of human biospecimens supported by NIH funds—aligned with EO 14117/28 CFR Part 202.
IU announcement: NIH Announces New Biospecimen Security Policy for NIH-Funded Research