Do I Need to Include an Authentication Plan in my Application?

The authentication plan is only for established key biological and/or chemical resources, as defined on our website. Do not include plans for the authentication of data sets, databases, machinery, or electronics in the authentication plan attachment.

If the Research Strategy does not propose use of key biological and/or chemical resources, the authentication plan attachment should include a brief statement indicating that no key biological and/or chemical resources will be used in the activities proposed in the application.

Applicants proposing to generate a new key biological and/or chemical resource (such as a human cancer cell line) should describe development and authentication of the resource in the Approach section.

Learn more about rigor and transparency in your application from the grants.nih.gov page on rigor and reproducibility, and related resources, including answers to other frequently asked questions.

Email this to someoneTweet about this on TwitterShare on Facebook0Share on LinkedIn3Share on Google+0Pin on Pinterest0Print this page

Leave a Reply

Your email address will not be published. Required fields are marked *