Do I Need to Include an Authentication Plan in my Application?


The authentication plan is only for established key biological and/or chemical resources, as defined on our website. Do not include plans for the authentication of data sets, databases, machinery, or electronics in the authentication plan attachment.

If the Research Strategy does not propose use of key biological and/or chemical resources, the authentication plan attachment should include a brief statement indicating that no key biological and/or chemical resources will be used in the activities proposed in the application.

Applicants proposing to generate a new key biological and/or chemical resource (such as a human cancer cell line) should describe development and authentication of the resource in the Approach section.

Learn more about rigor and transparency in your application from theĀ page on rigor and reproducibility, and related resources, including answers to otherĀ frequently asked questions.

Before submitting your comment, please review our blog comment policies.

Leave a Reply

Your email address will not be published. Required fields are marked *