MinerAlert
Mario E. Caire, Ph.D.
Research Security Officer
Kelly Hall, 4th floor, North Wing
500 W University Ave
El Paso, TX 79968
Office: 915-747-8470
rso@utep.edu
mcaire@utep.edu
All ¹û½´ÊÓÆµ projects with applicable CUI needs must go through a certification process wherein all environments involved with CUI must comply fully with the NIST 800-171 standards (either directly or through compensating controls).
Additionally, all environments that are involved with CUI must undergo an annual NIST 800-171 compliance assessment by Information Security before continued interaction with CUI. These assessments will result in an attestation report signed by the Chief Information Security Officer (CISO) or designee. All environments that are involved with CUI must also operate in a manner which facilitates rapidly reporting cyber incidents involving CUI. Report all CUI incidents immediately to security@utep.edu.
For more information or assistance on specific training requirements, contact either of the following:
Follow these guidelines when reproducing (copying, faxing, scanning, printing, electronic duplication) CUI.
Please reach out to ISO (security@utep.edu) or Research Protections (rso@utep.edu) for any questions or assistance.
References
What is Unsolicited CUI?
Unsolicited Controlled Unclassified Information (CUI) refers to information that is shared or received without a specific request and is designated as CUI according to federal regulations.
How is Unsolicited CUI obtained?
Unsolicited CUI might be received through various means, such as emails, faxes, regular mail, or verbal communications. Handling such information requires
Lookout for potential indicators of CUI
How to Safeguard Unsolicited CUI
If you have received or believe you have received unsolicited CUI via Outlook Email in a non-compliant environment (i.e. a workstation that does not meet NIST 800-171 requirements):
CUI Training
If access to CUI is required in the conduct of your work, you will be required to take approved training before you access any type of controlled unclassified information. The training modules and instructions for certifying completion can be found on the Controlled Unclassified Training webpage. Upon reporting an unsolicited CUI training incident, you will also receive an email notification with instructions on how to complete the training and how to submit your training certificates.
When developing a proposal for submission to a federal agency or flow down, researchers are advised to,
Research Protections advises that any project involving CUI must have a designated CUI coordinator who is responsible for overseeing compliance throughout the research lifecycle. In the absence of a CUI coordinator, the PI is responsible for overseeing compliance.
Follow this general process to ensure CUI safeguards are in place prior to working on a new Federal (or Federal flow down) award with CUI safeguarding requirements:
Follow this process to determine if an award requires access to CUI. It may be necessary to search various documents (contracts, subagreements, security questionnaires, exhibits, addendums, etc.) for keywords and clauses that may indicate access to CUI is required. Refer to the Quick Reference Guide for Identifying FCI and CUI for guidance on what to look for.
Tips: