Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl Security Work Programme 2009 Information Day 15 September 2008.

Slides:



Advertisements
Similar presentations
Guide on Financial Issues A.Vutsova – Ministry of Education and Science Bulgaria INCO _ NET project.
Advertisements

Petr Cerveny Unit Administration and Finance 31/5/2010 Major FP7 Negotiation Issues.
EURALINET, March 2008, Buenos AiresNot legally binding European Commission Research DG-D4 Ana Juárez FP7 Contractual Obligations and Financial Issues.
Characteristics of projects in EU research programmes
FP7 Grant Agreement Amendments: basic principles and processing
Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl Information Day 16th September 2009 REA - Brussels Seventh Framework.
SMEs in the. SMEs in FP7 - why? SMEs are at the core of European industry and key players in the innovation system. SMEs have to respond increasingly.
1 Financial Procedures in FP7 Projects Reporting and Audits Karolina Lis Research Assistant DCU, Finance Office
Stefano Fontana European Commission DG RTD Research for the benefit of SMEs SMEs in the.
DG Research and Innovation
Research and Innovation Summary of MS questions on the Commission's proposal for DG Research & Innovation Research and Innovation Rules for Participation.
Policy Research and Innovation Research and Innovation Implementation of FP7 support actions InnovaBalt KICK-OFF MEETING 3-4 September 2013 Riga Luc Janssen.
SECURITY RESEARCH SEVENTH FRAMEWORK PROGRAMME Mark Stroud Home Office Scientific Development Branch UK Security Programme Committee Member.
“Regions of Knowledge” and “Research Potential” Briefing Session « RESEARCH POTENTIAL » « CAPACITIES » SPECIFIC PROGRAMME European Commission Research.
FP7 EC Rules – Groupe recherche 16 January 2006Megan Richards European Community FP7 Participation Rules (Commission proposal adopted )
Policy Research and Innovation Research and Innovation Implementation of FP7 support actions READi KICK-OFF MEETING 26 September 2013 MURCIA Carmen Madrid.
HORIZON 2020: FINANCIAL ISSUES
Training Module: The MED-Dialogue project (611433) is co-funded by the European Community's ICT Programme under FP7 6 - Resource Allocation and Budgeting.
Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl 4 th call FP7-SEC Seventh Framework Programme
IP rights in FP7 PROTECT Study Visit 10th June 2008 (Alicante) IPR-Helpdesk is a constituent part of the IP-BASE project which is financed by the CIP Programme,
Funding Schemes. Legal and Financial Rules in the 7th Framework Programme PHOENIX Training Laulasmaa, 1 Sept 2007.
Research Contracts and IP Services TRAINING WORKSHOPS ON HORIZON 2020 – 27 NOV 2014 The Grant Agreement Roger Wallace – Research Contracts & IP Services.
European Commission DG for Fisheries and Maritime Affairs Research & scientific analysis SSP Kick-off meeting The 6 th Framework Programme
Sustainable Energy Systems Overview of contractual obligations, procedures and practical matters KICK-OFF MEETING.
Not legally binding FP7 Rules for Participation and Grant agreement FP7 Helpdesk 
Training & research for academic newcomers A project of the King Baudouin Foundation © 2013 Gabriella Calderari1.
EHEROES EC Grant Agreement Negotiations June 1, 2011 K.U.Leuven Research & Development Myriam Witvrouw.
FP7 Regler för deltagande 18 december 2006 Monica Hjertman, Enheten för Europaprogrammen, VINNOVA
Lisbon 19 Jan Rules for participation European Commission Research DG – Legal aspects Carmen Madrigal 7th Framework Programme 7th Framework Programme.
FINANCIAL REPORTING Rules and Regulations
FP7 Rules for Participation and contractual aspects Mag. Carla Chibidziura FFG – European and International Programmes – FP7 Energy.
Reporting requirements (2)
Culture Programme - Selection procedure Katharina Riediger Infoday Praha 10/06/2010.
Call ref.: FP ACC-SSA-2 (10/2004) Contract Negotiation - Sofia - Bulgaria 10 February, Mrs Marina ZANCHI DG Research Directorate N International.
Training Seminar on an Information Point for FP7 in Palestine Witkowski Jacob, BA,CPA, CIA Nicosia, Cyprus November 2008.
APRE Agency for the Promotion of European Research Lifecycle of an FP 7 project Caterina Buonocore Riga, 13th September, 2007.
Legal & Financial Issues
FP7 : Model Grant agreement and Participation Rules
Katarina Lenova, 4 February 2014 H RULES FOR PARTICIPATION AND FINANCIAL RULES.
October 25, 2005 Pathways To Successful EU-Research Projects Financial management in FP 6 projects Praha, October 25, 2005 Claudia Labisch KoWi Office.
Ljubljana, Slovenia 2 March Rules for participation Carmen Madrigal Legal aspects European Commission - Research DG « FP7 Challenges to thirve the.
Basic principles of FP7 Grant Agreement Financial management and reporting.
SOTERIA Reporting May 30, 2011 K.U.Leuven Research & Development Myriam Witvrouw.
Communication campaign Most common issues identified: analysis per cost category Antonio Requena Fernández FCH JU Financial Officer.
Megan Richards RTD FP6 Kick Off Meeting Priority 7 and 8 11 November 2004 Sixth Framework Programme MANAGING FP6 CONTRACTS.
1 NOT LEGALLY BINDING Energy Info day FP7-ENERGY-2008-RUSSIA 13th December 2007 International Co-operation FP7 Energy Theme Energy EU-Russia Call European.
SeaDataNet Pan-European infrastructure for Ocean & Marine Data management An Integrated research Infrastructure Initiative (I3) Kick-off Meeting June 8-10.
Dr. Marion Tobler, NCP Environment Evaluation Criteria and Procedure.
Provisional FP-ICT InfoDay, Torino, 11/12/ The ICT Theme in FP7 How to submit a proposal 1. The Rules of the Programme.
1 SMEs – a priority for FP6 Barend Verachtert DG Research Unit B3 - Research and SMEs.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Participation in 7FP Anna Pikalova National Research University “Higher School of Economics” National Contact Points “Mobility” & “INCO”
P.Ignatiadis & Prof Vassilios Zacharopoulos ELKE TEI CRETE March 2011 FP7 Training Courses for TEI Crete 1 FP7 - FINANCIAL AND PROJECT MANAGEMENT.
1 Eurostat’s grant policy for 2010 Luxembourg, 23/03/2010 Unit A4 – Financial Management Section 3 – Grant procedures and agreements.
Participation and dissemination Rules and Contracts FP6.
Proposals and projects in FP7 On-line Information Day Brussels/Budapest 22nd January 2007.
Megan Richards 6FP - Contract 18 March 2003 Sixth Framework Programme CONTRACTS.
Financial Guidelines FP6 – IST Directorate C 1 st Evaluation proposals co-ordinators Briefing 17 July 2003.
Sixth Framework Programme : Contracts è Legal Framework & General Principles è Contract Structure è Collective Approach l signature and entry.
FP7 Security Theme /1 CAST Kick-off meeting 15 July '09 – Salzburg Eva-Maria Engdahl - European Commission – DG Enterprise & Industry Security Research.
Practical Aspects of participation in FP7 Tania Friederichs DG RTD International Cooperation FP7 Info Day Sarajevo, 23 April.
EU - China 11 Guidelines for Applicants rules for applications European Union Delegation to China & Mongolia Beijing Information Session 14 th November.
1 FP6 – Financial Management and Reporting 1 April 2006 Sofia, Bulgaria.
2. The funding schemes ICT Proposer’s Day Köln, 1 February 2007 The ICT Theme in FP7 How to participate to ICT in FP 7.
EuroRisNet: training on legal and financial issues – Bonn, 3 February 2009 Documentation Monique Bossi APRE Agency for the Promotion of European.
M3D month 12 meeting European Commission DG Research and Innovation
Participation and dissemination Rules
Helene Skikos DG Education and Culture
Financial and Administrative presentation on PARTICULATES project
FP7 Grant Agreement & reporting requirements
Presentation transcript:

Work programme 2009 – Info Day European Commission – DG Enterprise & Industry E-M. Engdahl Security Work Programme 2009 Information Day 15 September 2008 Seventh Framework Programme Security Research

Total 50,5 M€ FP7:

Security Theme in FP7: Four Security missions / activities: 1.Security of citizens 2.Security of infrastructure and utilities 3.Intelligent surveillance and border security 4.Restoring security and safety in case of crisis Three Cross cutting activities: 5.Security systems integration, interconnectivity and interoperability 6.Security and Society 7.Security Research coordination and structuring

Research routes to meet the Security theme objectives System development and validation - Combination of capabilities - Mission specific Systems of systems demonstration - Combination of IP results - Multi-mission Capability development - Technology development - Multi mission and mission specific

Content of the Work Programme 2009  Introductory part: policy context and approach  Content of the Security Call 2  fewer topics (26 in total) but more than one proposal per topic can be selected  more flexibility in choosing among the different funding schemes  Implementation of the Security Call 2  Other actions  Indicative priorities for future calls

Policy context Specific issues:  Up to 75% funding for limited market  Active involvement of end-users  Sensitive activities and information (clearance already at proposal stage)  Ethical principles, including questions of privacy need to be taken into account also in technological proposals

Budget of the 2 nd Call Indicative Call budget: M€  Collaborative projects: integrated projects ~40% (30-50%), capability projects ~50% (40-60%)  Coordination and support actions (incl. Demo phase 1) and Networks of Excellence ~10% (5-20%)  Up to ~3% for international cooperation and up to ~3% for ERA-NET

 Collaborative projects:  Integration projects (large scale)  Capability projects (small and medium scale)  Coordination and support actions (including Demo phase 1)  Networks of Excellence Funding schemes for the 2 nd Call

Research topics in the 2 nd call  3 topics for Demo project phase 1 (CSA): activities 1 and 4  7 topics for Integration project: activities 1-4  8 topics for Capability project: activities 1,2 and 4  1 topic for Coordination and Supporting Action (CSA): activity 3 Flexible topics:  5 topics for Capability project, CSA or Networks of Excellence: area 6  2 topics for CSA or Networks of Excellence: area 7

 Demonstration projects phase 1 should define the strategic roadmap and trigger Europe wide awareness, involving end-users, industry and academia; Phase 2 will then technically implement the systems of systems demonstration projects, taking into account steps which have to follow the research (standardisation, development of marketable products, etc). Workshops during phase 1 (Spring 2009) will aim to define the requirements for the first two phase 2 Demonstration projects: Demonstration projects (phase 1) - European-wide integrated border control system - Security of mass transportation

Security of citizens  Logistic and Supply chain Security  CBRNE (Chemical, Biological, Radiological, Nuclear agents and Explosives) Restoring security and safety in case of crisis  Aftermath crisis management system Demonstration projects (phase 1) – 3 topics

Integration projects Integration projects are large-scale integrating Collaborative projects, which aim at combining mission specific individual capabilities providing a security system and to demonstrate its performance. Indicative total cost M€, duration ~ 4 years (indicative EC funding>3.5M€)

Integration projects -7 topics  Security of citizens: - Information and knowledge management for the prevention of terrorism and organised crime  Security of infrastructures and utilities: - Integrated protection of rail transportation; - Integrated comprehensive approach to airport security  Intelligent surveillance and border security: - Main port security system; - Sea borders surveillance system; - Exploitation of open source information in support of decision making processes  Restoring security and safety in case of crisis: - First responder of the future

Capability projects Capability projects are small and medium scale Collaborative projects. They aim at building up and/or strengthening security capabilities in the required missions. This will be done by adapting available technologies and by developing security specific technology and knowledge aimed at tangible results. Indicative total cost 2-5 M €, 2-4 years (indicative EC funding =<3.5M € )

Capability projects - 12 topics Security of citizens: - B-agent and detection - Drug precursors - Properties of improvised explosive devices, additives to precursors… -Advanced forensic toolbox Security of infrastructures and utilities: - Built infrastructure protection, incl building in resilience to attack at the design stage Restoring security and safety in case of crisis: - Neutralisation of CBRNE effects following a terrorist event - Bio-dosimetric tools to manage radiological casualties - Simulation, planning and training tools and methods for management of crises and complex emergencies 10.6 Security and society: all 5 topics in area 6.1, 6.2, 6.3 and 6.4

Networks of excellence Networks of excellence are designed for research institutions that wish to combine and functionally integrate in a durable way a substantial part of their activities and capacities in a given field, with a view to creating in this field a European ‘virtual centre of research’. No indicative total cost or duration (very exceptional cases > 5 years)

Networks of excellence – 7 topics 10.6 Security and Society: 6.1 Better understanding of the rationale and the drivers underlying the radicalisation processes and how these drivers interact 6.2 Inventories of existing national resources, institutional mandates and practices across relevant sectors Foresight activities as action research to inspire public debate, to foster shared understanding and self-organisation… Research on rigorous methodologies for assessment of security investments and trade-off between security and other societal objectives (e.g. privacy and social cohesion) 6.4 European Security Indicator: methodological research to provide a few select indicators of security and security policy in Europe measuring the effects… 10.7 Security research coordination and structuring: Transparency and networking amongst Member States and Associated States (ERA-NET activities) Supply chains and market integration

Coordination and support actions CSA can be either supporting or coordinating. Co-ordination (or networking) actions aim at coordinating research activities and policies, while support actions aim at contributing to the implementation of the FP and to prepare future research policy or to develop synergies with other policies, or to stimulate, encourage and facilitate the participation of SMEs, civil society organisations, small research teams, etc, or for setting up of research-intensive clusters across the EU regions. Support actions often focus on one specific activity and on one specific event. Indicative total cost M€, years (up to 100% EC funding)

Coordination and support actions – 8 topics 10.3 Intelligent surveillance and border security: Continuity, coverage, performance (incl. UAV; secure data link) 10.6 Security and Society: all 5 topics in area Security research coordination and structuring: both topics in area 7

Seventh Framework Programme Security Research FP7-SEC Submission, Evaluation, practical issues

Timing of the Security Research Call 2 FP7-SEC September 2008Publication 4 December h00Deadline January/February 2009Evaluation March 2009Initial information letters (incl. ESR) April 2009Ethical review / Security scrutiny May / JuneInvitation to negotiate Rejection letters From 2 nd half of 2009Signature of first Grant Agreements

Unavoidable readings The Work Programme  The topics against which the proposals will be judged  The philosophy, the logic, the context Guide(s) for applicants  The funding schemes  The templates, all required sections  Tips, advices, explanations… Check on Cordis that you have the relevant and latest versions !

Topic / funding schemes One proposal: One (major) topic One type of project (funding scheme) Different requirements and expectations for:  Integration Project, Capability Project, Demo phase 1 (Areas 1 to 4)  Collaborative Project, Network of Excellence, Support Action, Coordination Action (Areas 6 & 7)

Types of projects vs funding schemes Capability projects  2 to 4 years, budget: M€  Capability development, research oriented  (Demonstrated) Tangible results Integration projects  ~ 4 years, budget: M€  Large scale combination of capabilities  Demonstration of a security systems FP7 funding schemes : Collaborative project

Evaluation Process - Basic Principles TRANSPARENCY EXCELLENCE FAIRNESS & IMPARTIALITY CONFIDENTIALITY ETHICAL & SECURITY CONSIDERATIONS EFFICIENCY & SPEED

Evaluation Criteria Same 3 criteria for all FP7-cooperation : Scientific / technological quality Implementation Impact But different sub-criteria for CP,CA, SA, NoE (see Guides for Applicants) Assessed vis-à-vis the topic addressed

Evaluation process – peer review Experts selection based on Competence Geographical balance Balance between end users and technical experts Gender balance Public / private balance

Evaluation process – peer review Reading – individual assessment* Minimum 3 external experts by projects Balance backgrounds No conflict of interest Consensus meeting Consensus report Chaired by a Commission official Panel meeting Ranked list(s) of proposals *could be done remotely

Reminders All 3 (5) evaluators will not be technical experts in your specific area Limited time to read each proposal No access to external information B&W paper copies only Measurable and achievable objectives

End users involvement Police forces, border guards, firemen, first responders, public authorities… Part of the consortium or “end-user club” Quality of the involvement is more important than quantity

Cross cutting issues Societal acceptability (Economical) feasibility, sustainability Ethical questions Interoperability European added value Structuring effect Human factors issues => To be taken into account in all projects

International cooperation Definition: Third countries which are not associated countries General rule: welcome Need to justify the benefit of the international cooperation Own financing except for developing countries In the 2nd call, all topics are open to international cooperation

Feed back from 1st call 1st call was 7 times over-subscribed “Good (3/5)” in all 3 criteria is below threshold Don’t miss the deadline ! Ask from feed back from experienced colleagues (use NCP)

More information EU Security research website: Helpdesk: Centralised FP7 Enquiries Service: National Contact Points:   European Security Research Conference: 

INFO day – 15 september 2009FP7 Security Theme /35 Seventh Framework Programme Security Research FP7-SEC FP7 rules for participation and legal/financial issues

INFO day – 15 september 2009FP7 Security Theme /36 1.Upper funding limits Reimbursement according to the type of organisation, of action and/or activity Research and technological development activities: up to 50% of eligible costs. However, it can be up to 75% for: Non profit public bodies, secondary and higher education establishments and research organisations, SMEs Demonstration activities: up to 50% Other activities including management: up to 100% Coordination and support actions: up to 100%

INFO day – 15 september 2009FP7 Security Theme /37 2. Eligible Costs  Eligible actual during duration of project in accordance with its usual accounting and management principles recorded in the accounts of beneficiary used for the sole purpose of achieving the objectives of the project  Non-eligible identifiable indirect taxes, including VAT…

INFO day – 15 september 2009FP7 Security Theme /38 2. Indirect Costs (2) For all:  either Actual Indirect Costs  Simplified Method ( to calculate indirect costs at the level of the legal entity, and not at a detailed level )  Standard Flat Rate of 20% of direct costs Non-profit Public Bodies Secondary and Higher Education establishments, Research Organisations SMEs unable to identify real indirect costs, may apply for a Special Transitional Flat Rate of 60% of direct costs For CSA limit of 7% of direct costs

INFO day – 15 september 2009FP7 Security Theme /39 3. Payment modalities  One pre-financing (within 45 days upon entry into force of G.A.) for the whole duration, depending on how many reporting periods are foreseen: a) 1 or 2 : between 60 & 80% of total EC contribution b) 3+: 160% of the average fund per period (around 53% of total EC contribution)  Interim payments based on financial statements (EC contribution= amounts justified & accepted * funding rate)  Retention (10%)  Final payment

INFO day – 15 september 2009FP7 Security Theme /40 4. Certification (1) 2 types of certificates: certificate on financial statements (CFS) (Form D)- expenditure verification certificate on the methodology (Form E) - system verification  Personnel & Overheads N.B.: The submission of a certificate does not waive the right of the Commission to carry out its own audits (Article II.22 of the FP7 model grant agreement).

INFO day – 15 september 2009FP7 Security Theme /41 4. Certification (2) Certificate on financial statements (CFS) Mandatory for a beneficiary when its requested funding for the project equal or more than 375,000€  exception for project of 2 years or less, no intermediate CFS submitted, only at the end

INFO day – 15 september 2009FP7 Security Theme /42 4. Certification (3) These certificates can be provided by auditors:  Qualified ( according to Directive 2006/43/CE)  Independent 1.Public bodies 2.Secondary and higher education establishments 3. Research organisations may opt for a competent public officer

INFO day – 15 september 2009FP7 Security Theme /43 5. Subcontracts Subcontractors charge a price, which usually includes a profit (different from third parties, which charge only the costs of the activity) Tasks have to be indicated in Annex I awarded according to best value for money principle shall not be a “ core ” part of the work (based on qualitative criteria more than quantitative) Can be under framework contracts Public entities: must follow national procurement principles Private entities: should follow the rules that they usually apply for the selection of procurement contracts e.g. submission of several quotes

INFO day – 15 september 2009FP7 Security Theme /44 5. Third parties -Costs may be claimed by the beneficiary if tasks to be performed, an estimation of the costs and the resources allocated to the Project are indicated in Annex I -Same rules of beneficiaries apply a. Third parties making available resources 1.Free of charge 2.Beneficiary reimburses the third party b. Third parties carrying out part of the work (special clause No. 10) Requirements : 1. relationship is broad and not limited to the G.A. 2. its duration goes beyond the duration of the Project 3. formal external recognition (legal structure or sharing facilities) e.g. European Economic Interest Grouping, Joint Research Units, affiliates and groupings Need to be validated in Unique Registration Facility as the beneficiaries!!

INFO day – 15 september 2009FP7 Security Theme /45 6. Receipts 2 kinds of receipts must be taken into consideration to avoid any profit: Transfers from third parties to the beneficiary (if specifically attributed to the project and not reimbursed):  Financial transfers  Contributions in kind Income generated by the project

INFO day – 15 september 2009FP7 Security Theme /46 6. Receipts (2) At final payment the EC contribution will take into account any receipts of the project For each beneficiary: the eligible costs ≥ EC contribution + the receipts for the project

INFO day – 15 september 2009FP7 Security Theme /47 7. Reporting (1) Periodic reports to be submitted by coordinator 60 days after end of period: overview of progress of the work, including a publishable summary report, use of the resources and Financial Statement (Form C) Final reports to be submitted by coordinator 60 days after end of project: publishable summary report, conclusions and socioeconomic impact, covering wider societal implications and a plan on use and dissemination of foreground.

INFO day – 15 september 2009FP7 Security Theme /48 7. Reporting (2) Commission has 105 days to evaluate and execute the corresponding payment:  No tacit approval of reports  Automatic payment of interests (NEW) After reception Commission may:  Approve  Suspend the time-limit requesting revision/completion  Reject them giving justification, possible termination  Suspend the payment

INFO day – 15 september 2009FP7 Security Theme /49 8. Guarantee Fund The Fund belongs to all beneficiaries of grant agreements under the FP7 All beneficiaries contribute to the Fund to insure against financial losses of the project The contribution equals 5% of the EC financial contribution foreseen for each participant Deducted from the pre-financing Financial interest generated by the Fund will serve to cover financial risk In principle the amount contributed to the Fund will be reimbursed at the end of the action No bank/financial guarantee requested anymore

INFO day – 15 september 2009FP7 Security Theme /50 9. Financial viability Since Guarantee Fund, financial check only for - Coordinators - beneficiaries requesting more than € Exempted: -public entities, -International Organisations, -higher and secondary education establishments -entities whose participation is guaranteed by a Member State or Associated country, -natural persons in receipt of a scholarship Financial Viability checktool available on CORDIS! Audit report certifying the amounts of the checktool to be provided (if not available, business plan) Insufficient beneficiaries can not participate! Weak beneficiaries can not be coordinator (could participate under certain conditions, e.g. voluntary bank guarantee)

INFO day – 15 september 2009FP7 Security Theme / Amendments Principles - Continuity with main lines of FP6 policy - Exchange of letters - Coordinator requests amendments on behalf of the consortium - For addition/withdrawal tacit approval after 45 days - Model Letters to be used

INFO day – 15 september 2009FP7 Security Theme / Amendments (2) Main Novelties: Procedure (1) Coordinator can accept on behalf of the Consortium an amendment proposed by the Commission One single amendment procedure: exchange of letters – One letter from the Consortium – One letter from the Commission Possibility for the Commission to make a counter- proposal to the Consortium request (no need for the Consortium to re-submit a request)

INFO day – 15 september 2009FP7 Security Theme / Amendments (3) Main Novelties: Information Letters Information letters to be used in case of: – Universal transfer of rights & obligations – Change of legal name or details – Change of FP7 legal status (i.e. SME which is no longer an SME) and mistake in indirect cost calculation Advantages: – Directly from the beneficiary to the Commission – One letter per beneficiary not per GA – Signature of Contact person enough

INFO day – 15 september 2009FP7 Security Theme / Sanctions Recovery procedures Liquidated damages (if overstatement) Financial penalties (if false declarations)

INFO day – 15 september 2009FP7 Security Theme /55 Information Find a document  FP7 Helpdesk  Seventh Framework Programme: cfm Information requests:

INFO day – 15 september 2009FP7 Security Theme /56 Seventh Framework Programme Security Research FP7-SEC Handling Sensitive Proposal

INFO day – 15 september 2009FP7 Security Theme /57 Handling “Sensitive” Proposals What is a sensitive project?  A “Sensitive” Project is handling (*): – Data or information requiring protection against unauthorised disclosure: classified information  No “Sensitive” Proposals are allowed in the call (no classified information in a proposal)  BUT: a Proposal could lead to a “Sensitive” Project (project that could use classified background and/or produce classified foreground) (*)- Information or materials subject to security restrictions - Material subject to export- or transfer- control Legal basis for classified Grant agreements 2001/844/EC amended by 2006/548/EC – OJ L215,

INFO day – 15 september 2009FP7 Security Theme /58 Handling “Sensitive” Projects Sensitive proposals with non-EU participants EU classification is limited to EU Member States Sensitive projects can include participants from associated or third countries Countries having a security agreement with the EU (Council level) could refer to that security agreement for handling sensitive information and material Special MoU (Memorandum of Understanding) could be agreed between the countries involved in the handling of sensitive information/material of a project limited to that project No restriction for the participation to sensitive projects for associated countries and from third countries if no access foreseen to sensitive information/material

INFO day – 15 september 2009FP7 Security Theme /59 Handling “Sensitive” Proposals Information to Proposers: Use of sensitive information No classified information to be used in the proposal However, the project could use classified/sensitive background and/or produce classified/sensitive foreground If this is the case,  The proposal should be flagged on page 1 of the part B of the proposal as security sensitive  The table of deliverables must specify the level of classification for each deliverable  When self flagged: a Security Aspect Letter (SAL) + its annex the Security Classification Guide (SCG) must be attached to the proposal; evidence of Facility Security Clearance (FSC) must be given.

INFO day – 15 september 2009FP7 Security Theme /60 Handling “Sensitive” Proposal Scrutiny Procedure For all proposals of the selection list:  The concerned Security Committee Members or Security Committee Observers will be requested (via their national security authority representative) to verify that all security aspects are properly addressed and to reach an agreement among themselves  this scrutiny procedure is done, in a 2 months period, following the evaluation and before the start of the negotiation of the projects The results of the scrutiny could be:  No classification: go ahead with negotiation (and possibly some recommendation);  Classification of some part of the foreseen work/deliverables: recommendation for the negotiation;  Recommendation not to finance the proposal Proposers are informed of the conclusions of the scrutiny procedure

INFO day – 15 september 2009FP7 Security Theme /61 Handling “Sensitive” Projects Some recommendations Give the greatest attention to the sensitivity declaration Consider carefully the requirements for accessing classified information/material in a project (limit it as far as possible) Get reference of all applicable EU and national legislation For non-EU countries find out if there are some security agreement between your country and EU Contact your National Contact Point (NCP) – see CORDIS Contact your National Security Authority (NSA) - see list on (OJ L193 of p.31-36) Contact ENTR SECURITY HELPDESK