1 Physical Sciences Social Sciences Technolog gy Foundation STW Call for proposalss Cyber Security 2014 The Hague, November 2013 Netherlands Organisationn for Scientificc Research
2 Contents 1 Introduction Background Available budget Validity of the call for proposals 2 2 Aim 3 3 Guidelines for applicants Who can apply What can be applied for Co-funding Conditions for co-funding Requirements and accountability for co-funding When can applications be submitted Preparing a Letter of Intent Preparing an application Specific conditions Submitting an application 8 4 Assessment procedure Role description of parties involved Procedure Letter of Intent Formal admissibility of full proposals Reviews and rebuttals Pre-selection of the proposals Ranking of the proposals Decision-making Criteria 12 5 Contact details and other information Contact Specific questions Technical questions about the electronic application system Iris Other information 14 6 Annexes Arrangement for in-kind contributions by consortium partners in the Cyber Security research programme IPR and Knowledge transfer arrangement NWO Projects Format for the Letter of Intent Research proposal application form 21
3 1 Chapter 1: Introduction / Cyber Security 1 Introduction 1.1 Background NWO Physical Sciences, NWO Social Sciences and Technology Foundation STW hereby invite researchers, to participate in the cyber security research call by submitting project proposals for long term research on behalf of public-private consortia. More and more we embrace the convenience and effectiveness of the internet (of things) in our business and personal lives. With this we have also subjected ourselves to new dangers, threats and privacy issues. On-going (multidisciplinary) research in cyber security is needed to reach and maintain an acceptable level of security and trust in cyber space. After a first impulse with the Sentinels programme in three calls between 2003 and 2008, a young cyber security research community became manifest. The growing need of cyber security research, experts and knowledge justified a second impulse in Research remains important to face the challenges, as described in a national cyber security research agenda, released in New knowledge is needed as investment in cyber security solutions, products and innovations. This trend continued and made six ministries and three science areas within NWO decide to invest in a third impulse, after the release of an updated research agenda. The Dutch government has appointed nine economic top sectors for growth in its current economic and innovation approach. These top sectors describe a number of themes, ranging from High Tech Systems and Materials to Creative industry and Logistics. In order to bundle the need for research and innovation in ICT, the Dutch government has asked for the development of a research and innovation agenda for ICT, related to the nine top sectors. This resulted in the Roadmap ICT. This 2014 call for proposals for long term cyber security research projects: is based on the National Cyber Security Research Agenda II (NCSRA-II); contributes to the top sector policy as well as to the execution of the national cyber security strategy; is written within the context of the Roadmap ICT 1 and The Scientific Answer to the Roadmap ICT for the Top Sectors 2 ; is associated with the ICT research and innovation theme 3.1 ICT one can rely on within the Roadmap ICT, and with two Grand scientific ICT Challenges in The Scientific Answer to the Roadmap ICT for the Top Sectors, i.e. How do we create secure and robust ICT? and How do we protect our digital privacy and identity?. The Roadmap ICT and the Scientific Answer recognise that fundamental and applied strategic ICT research is crucial for achieving the ambitions of all Dutch top sectors. 1 Roadmap ICT for the Top Sectors, 2012 (www.ictonderzoek.net/3/assets/file/documenten/roadmap%20ict%20for%20the%20top%20sectors.pdf) 2 The Scientific Answer to the Roadmap ICT for the Top Sectors, 2013 (www.ictonderzoek.net/content/ict+onderzoeknl)
4 2 Chapter 1: Introduction / Cyber Security The NCSRA-II (www.nwo.nl/cybersecurity) could be seen as an implementation agenda of the research and innovation theme and grand challenges mentioned above, and forms the framework for this call. Cyber security aspects in different top sectors, like HTSM and Energy all come together in the NCSRA-II. That is why the HTSM Security Roadmap refers to this agenda. NWO sees it as its task to encourage the collaboration with other parties to strengthen the knowledge base for the cyber security industry and to encourage research and the valorisation of the results emerging for this for the benefits of the sector. This cyber security research initiative contains a call for long term research (this one) and a call for short term research, making use of the SBIR-instrument, and is the second initiative in the National Cyber Security research programme (after a first in 2012). This call, aimed at long term research, is funded by NWO Physical Sciences, NWO Social Sciences and STW, and executed by the (programme) office of NWO Physical Sciences. The call for short term research is funded by six ministries (VenJ, EZ, BZK, Def, I&M, FIN) and executed by Agentschap NL. This call for proposals is part of the NWO-propositie voor het doorsnijdende thema ICT Available budget The budget available for this call for long term research is approximately M 3.5. Within this research scheme collaboration with at least one partner other than a knowledge institute is compulsory, possibly supplemented with other private and/or public or semi-public partners. This partner(these partners) should make (a) financial/cash and/or in-kind contribution(s) to the realisation of the project additional to the NWO-funding. Co-funding conditions, additional to the main funding of M 3.5 are described in paragraph Validity of the call for proposals This call for proposals is valid until the closing date March 4, For acceptance in this call, the application of a Letter of Intent (LoI) is mandatory. Deadline for application of the LoI is January 16 th, NWO-propositie voor het doorsnijdende thema ICT (www.nwo.nl/binaries/content/documents/nwo/algemeen/documentation/application/nwo/topsectore n/nwo-propositie-voor-het-doorsnijdende-thema-ict-voor /nwo-propositie-voor-hetdoorsnijdende-thema-ict-voor /nwo%3adocument)
5 3 Chapter 2: Aim / Cyber Security 2 Aim The aim of this programme is to strengthen long term research in the area of cyber security. The importance of cyber security for our society requires an investment in knowledge generation in this area, and the ultimate delivery of (scientifically educated) cyber security experts to the Dutch society. Because cyber security threats have multidisciplinary dimensions, also multidisciplinary solutions are needed. Cyber security is essential for public and private sectors as well as for individual citizens. This is why cybercrime is an important focus area, which is even specifically mentioned in the coalition agreement of the current Dutch government. The way we view cyber security is changing: in addition to the traditional defensive and reactive perspective, a more proactive form of cyber security is receiving more and more attention. It is essential that responsible parties safeguard the ICT infrastructure. Very regularly news media report on the enormous damage resulting from security breaches. Security has become a growth market, providing an opportunity for businesses, science, NGOs and governments to gain a head start. This requires expertise that remains up to date, to be able to deal with the current problems and challenges in the Netherlands, including passports, public-transport smartcards, electronic patient records and energy metres. The perspectives on security and privacy vary among different countries. This field is of particular significance to the Netherlands as a consequence of the country s exceptionally high broadband- Internet penetration rate. Cyber security research projects contribute to the development of knowledge in the Netherlands, with the goal of strengthening the defence against IT disruptions and cyber-attacks and of staying alert. Findings of such research will create commercial opportunities worldwide. (Long term) cyber security research spans a broad range from applied to fundamental, from focussed to broad (multi-disciplinary) research. The research themes as identified by the NCSRA-II Research questions in the area of cyber security are manifest in a variety of different application domains in which ICT plays an increasingly vital role, for instance: domestic, commerce, industry (so-called SCADA systems), finance, government, and defence. In connection with the two comprehensive focus areas of security and trust for citizens and security and trustworthiness in the ICT infrastructure, the NCSRA-II identifies the following research themes: 1. Identity, privacy and trust management 2. Malware and malicious infrastructures 3. Attack detection, attack prevention and monitoring 4. Forensics and incident management 5. Data, Policy and Access Management 6. Cybercrime and the underground economy 7. Risk Management, Economics and Regulation 8. Secure Design and Engineering 9. Offensive Cyber Capabilities These themes provide the context for this call for research proposals. The full NCSRA-II can be downloaded from the NWO Cyber Security grants page.
6 4 Chapter 3: Guidelines for applicants / Cyber Security 3 Guidelines for applicants 3.1 Who can apply Applicants of proposals should be employed at a research institute recognised by NWO. Article of the NWO Regulation on Granting (www.nwo.nl/regelingsubsidieverlening) states from which organisations a proposal to NWO can be submitted. In principle these are Dutch institutions for academic education and research and/or researchers from institutes recognised by NWO. This list is supplemented with the Netherlands Forensic Institute (NFI), which is given the opportunity to apply in this call for proposals. Project proposals are expected to be prepared by a consortium, i.e. Public-Private Partnership. An application for project funding can only be submitted, on behalf of a consortium, by a professor, associate professor (UHD) or assistant professor (UD) employed at one of the above mentioned organisations. The main applicant should: have a PhD, have sufficient research experience, be in a position to remain effectively involved in the research to which the grant application refers for the duration of the period for which the grant is being requested. Researchers with a tenure track appointment 4 at one of the above mentioned institutions are also allowed to apply as main applicant. The main applicant will be responsible for both the scientific coherence and the results and reporting of the financial results of the project. Each project consortium must include at least one knowledge institute, being the employer of the main applicant, and at least one consortium partner other than a knowledge institute, e.g. from the profit or non-profit sector. NWO defines co-applicants as partners requesting NWO funding for scientific research. Co-applicants should be employed at one of the research institutes recognised by NWO. For this call for proposals, NWO defines consortium partners as partners within the research consortium, providing in-kind and/or cash co-funding as matching to the requested funding of the main applicant and possible co-applicant(s). Consortium partners may belong to the private or public sector but do not represent a knowledge institute. There is no limit to the number of project proposals consortium partners are participating in. At most, applicants can apply twice, but only once as main applicant in this call. This means (a) the applicant acts as main applicant for one proposal and as co-applicant for another proposal or (b) the applicant acts as co-applicant for two different proposals. 4 NWO defines a tenure track appointment as an appointment for experienced scientific researchers with prospects on a permanent contract and a professorship on the long term.
7 5 Chapter 3: Guidelines for applicants / Cyber Security 3.2 What can be applied for This call is aimed at fundamental and applied scientific research. Researchers formulate research questions in cooperation with the consortium partners for midand long term research. NWO finances research being done by knowledge institutes (as described in paragraph 3.1), and requests co-funding by consortium partners of at least 20% of the funding requested from NWO (see also paragraph on cofunding). Applicants can apply under the following conditions: The project should at least employ one PhD for four years or postdoc for a period of two or three years. The maximum amount of additional budget that can be requested is The maximum total funding requested from NWO is The maximum co-funding from consortium partners is 100% of the total funding requested from NWO. Funding can be applied for: Temporary personnel (junior researcher, PhD and postdoc). In the case of a junior researcher the budget requested will be assessed on experience and the type of activities. The personnel costs will be funded in accordance with the most recent version of the Agreement for Funding Scientific Research, signed by NWO, VSNU, NFU, ZonMW, KNAW, and VFI. This agreement and the maximum amount for personnel costs are published on the NWO website. Temporary non-scientific personnel, for example a scientific programmer, to support the project. The personnel costs will be funded in accordance with the most recent version of the Agreement for Funding Scientific Research, signed by NWO, VSNU, NFU, ZonMW, KNAW, and VFI. This agreement and the maximum amount for personnel costs are published on the NWO website. Material costs and other additional costs that are directly related to the project, such as the costs of knowledge transfer, valorisation and costs for internationalisation can be requested as additional budget. The maximum amount of requested additional budget is Costs for computers, standard software and other costs that belong to the standard facilities of universities, research institutes, studios or labs are not eligible for funding. General costs for project management and coordination are also not eligible for funding. Neither can these be requested as co-funding in the proposal. 3.3 Co-funding Conditions for co-funding Co-funding, i.e. contributions by research consortium partners can be either in-kind or in cash. The minimum amount of total co-funding (cash and in-kind) should be 20% of the total funding requested from NWO, with a minimum cash contribution of 10% of the total funding requested from NWO. NWO accepts personnel input and the material contributions as in-kind co-funding provided that these are capitalised and they form an integral part of the project. This should be made clear in the description and the planning/phasing of the research proposal. Certain tariffs apply as indicated below (for junior and senior researchers). Note that in-kind co-funding contributions are binding, and should be accounted for in progress reports of the research project.
8 6 Chapter 3: Guidelines for applicants / Cyber Security Co-funding, to be provided by consortium partners, must be confirmed in a letter of support. The letter should contain an explicit statement of the pledged financial or capitalised material or personnel contribution. The amount stated in the letter of support should agree with the amounts put forward in the budget. In the case of inkind co-funding in the project, the letter of support should explicit: - The total hours pledged as in-kind support; - The hourly cost tariff of the pledged hours; - The total capitalized in-kind support of the partner. Letters of support should be addressed to the main applicant and should mention the title of the proposal explicitly. After the research proposal has been approved, NWO will ask the consortium partners for confirmation on the co-funding ( confirmation of the commitment by third parties ) and, in relevant cases, lay down further arrangements in an agreement Requirements and accountability for co-funding For in-kind co-funding by consortium partners, NWO accepts the following integral cost tariffs for a maximum of hours a year: A senior-researcher tariff of 116 an hour, applicable to all personnel with a Masters- or corresponding degree. A junior-researcher tariff of 81 an hour, applicable to all personnel with a Bachelors- or corresponding degree. All in cash co-funding by consortium partners should be justified in the project application, in the Requested budget paragraph. A more detailed explanation of the required contributions is given in Annex When can applications be submitted Before submitting an application, all applicants have to submit a mandatory Letter of intent, containing a short description of the research proposal, the involved scientific personnel in the project, an outline of the requested budget and the consortium partners participating in the project. A format for the letter of intent can be found in Annex 6.3. Only proposals from which NWO received and accepted a Letter of Intent will be admitted to the review procedure. The deadline for submitting the Letter of Intent is January 16 th, 2014, 11:59 a.m. (CET). Letters of intent should be submitted to NWO through Iris. The closing date for the submission of proposals is March 4 th, 2014, 11:59 a.m. (CET). Further information about the procedure can be found in Chapter 4.
9 7 Chapter 3: Guidelines for applicants / Cyber Security 3.5 Preparing a Letter of Intent Submission of a Letter of Intent by the main applicant is mandatory for all applications and must be drafted in English. The Letter of Intent should include a scientific summary of the proposed research as well as a first sketch of the composition of the consortium. Furthermore the letter should include names of possible co-applicants, researchers connected to the research proposal and the provisional required budget. In the Letter of Intent the main applicant should make clear that chances of the formation of a relevant project consortium are high, with partners committed to invest in the research by delivering in kind and/or in cash contributions. This is done by mentioning names or sectors of the intended consortium partners and, in addition, by indicating what their contribution comes down to (type of in kind contribution and/or amount of intended cash). You can find a format for the Letter of Intent in Annex 6.3. Letters of Intent will be used by NWO to assess the fit of the research proposal within the scope of the research scheme, and to start a preliminary search for reviewers. The letter may also be a reason for NWO to give some sort of advice in subsequent steps leading to a full proposal. Note that the Letter of Intent will not be used for the actual review of the proposal. Further note that NWO will treat these letters as confidential. NWO reserved the right to reject a Letter of Intent if the proposed research does not fit the aim of the research scheme (refer to paragraph 2). Acceptance of the Letter of Intent is mandatory for submitting a full proposal. 3.6 Preparing an application All proposals must be drafted in English, in order to make them accessible to international reviewers. The proposal needs to stand on its own, and all references to internal literature should be avoided. Only references to open accessible literature are allowed. When a reference to a pre-print is unavoidable, a copy of the pre-print should be included in the application, for access by the reviewers. For preparing your application, the following steps should be followed: Download the application form from the electronic application system Iris or from the NWO-website (on the grant page for this programme). Complete the application in the format described in Annex 6.4. Save the application form as a PDF file and upload it in Iris. Complete the other information asked in Iris and send in the application. 3.7 Specific conditions For proposals for a grant from NWO, the NWO Regulation on Granting (www.nwo.nl/regelingsubsidieverlening) applies. NWO Code of Conduct on Conflicts of Interest NWO's Code of Conduct on Conflicts of Interest applies to all persons and NWO personnel involved in the assessment and decision-making procedure of this call (www.nwo.nl/code).
10 8 Chapter 3: Guidelines for applicants / Cyber Security Intellectual property rights (IPR) and knowledge transfer NWO has a regulation for Intellectual Property Rights (IPR) and knowledge transfer. If a researcher submits a proposal on behalf of an institution recognised by NWO then the project partners must confirm that they have taken note of the IPR and knowledge transfer regulation as described in the Appendix IPR regulation NWO Projects (see Annex 6.2). NWO will act in conformity with the Spelregels Intellectueel Eigendom paragraph Onderzoeksmodellen fundamenteel, published by the Regiegroep spelregels in the Spelregels voor privaat-publieke samenwerking bij programmering en uitvoering van fundamenteel en toegepast onderzoek Submitting an application An application can only be submitted to NWO via the electronic application system Iris. Applications not submitted via Iris will not be considered. A principal applicant must submit his/her application via his/her own Iris account. If the principal applicant does not have an Iris account yet then this should be created at least one day before the application is submitted to ensure that any registration problems can be resolved on time. If the principal applicant already has an Iris account, or an Iris account (the former electronic application system of NWO) then he/she does not need to create a new account to submit a new application. For technical questions please contact the Iris helpdesk, see Section Spelregels voor privaat-publieke samenwerking bij programmering en uitvoering van fundamenteel en toegepast onderzoek
11 9 Chapter 4: Assessment procedure / Cyber Security 4 Assessment procedure 4.1 Role description of parties involved Programme office The programme office consists of the members of the NWO Physical Sciences bureau associated with this call for proposals, supplemented with members of the STW and NWO Social Sciences bureau. The programme office is responsible for the execution of this call for proposals, e.g. by checking admissibility and supporting the assessment procedure. International experts/external reviewers International experts will be contacted by the programme office for peer-review of the research proposals submitted in this call. International experts are selected based on their expertise in relation to the proposed research. International experts are requested to assess the research proposal on the criteria mentioned in paragraph 4.3. SBIR assessment committee The call for short term research is executed by Agentschap NL and uses the SBIRinstrument 6. Budgets for the SBIR and NWO call are independent, i.e. there is money flow between them. To connect the NWO long term research call with the SBIR call for short term R&D one or two people are member of both assessment committees. NWO assessment committee The assessment committee consists of a number of (international) scientific experts in the field of cyber security, and relevant members of the private sector (independent representatives of industrial parties, and representatives of social enterprises in the field of cyber security). The assessment committee assesses all applications, the reviews from international experts and the rebuttals from applicants, and advises the Steering group on the ranking of the research proposals, based on the criteria mentioned in paragraph 4.3. Steering group The steering group is the main decision making board for this call for proposals. The steering group consists of the Board of NWO Physical Sciences, supplemented with members of the NWO Social Sciences Board and members of the STW Board. 4.2 Procedure Mandatory Letters of Intent are assessed by NWO on completeness, correctness and fit within the themes of this research call (refer to paragraph 2). Upon acceptance of the Letter of Intent, applicants receive a formal invitation from NWO to submit a research proposal in the Cyber Security 2014 programme. Research proposals are assessed by the NWO assessment committee. The NWO Code of Conduct on Conflicts of Interest applies to all persons and NWO staff involved in the assessment and/or decision-making process. The selection procedure is described below. 6 SBIR = Small Business Innovation Research
12 10 Chapter 4: Assessment procedure / Cyber Security Letter of Intent The first step in the assessment procedure is the assessment of the Letter of Intent. The NWO programme office will assess all Letters of Intent submitted on the following criteria: The Letter of Intent is completed correctly, or the applicant responds in time to a request to rectify the Letter of Intent. the Letter of Intent is submitted by a professor, associate professor (UHD) or assistant professor (UD) employed at one of the knowledge institutes mentioned in paragraph 3.1 on behalf of a consortium, the Letter of Intent is consistent with the aims and objectives of the Cyber Security programme, the Letter of Intent is submitted in PDF by to the Letter of Intent is submitted before the deadline, the budget outline in the Letter of Intent is consistent with the maximum amount of project funding requested and the maximum total project budget, as defined in paragraph 3.2 of this call; NWO reserves the right to reject Letters of Intent which do not fit within the aims and objectives of this research scheme. Aims and objectives of this call are described in chapter 2 of this call, and the scope of this call can be found in the NCSRA-II. Concerning minor shortcomings in the Letter of Intent, NWO will request the main applicant to rectify the Letter of Intent within 48 hours Formal admissibility of full proposals The first step in the assessment procedure of full proposals is to determine the admissibility of the application. This is done by the NWO programme office using the conditions stated in Chapter 3 of this call for proposals. The NWO programme office will process full proposals submitted, if the requirements of this call are fully met. This means that: the application form is completed correctly, and submitted by a professor, associate professor (UHD) or assistant professor (UD) employed at one of the knowledge institutes mentioned in paragraph 3.1 on behalf of a consortium, the application is consistent with the objective of the programme, the application is submitted online through the Iris portal, the application is submitted before the deadline, the application is consistent with the maximum amount of project funding requested and the maximum total project budget, as defined in paragraph 3.2 of this call, the application meets the requirements for co-funding as stated in this call for proposals, The applicant submitted a Letter of Intent concerning the same research proposal that was accepted by NWO, and the applicant received a formal invitation for submission of a research proposal within this call. Only applications that meet the above mentioned conditions can be taken into consideration. In the event that an application does not meet all the criteria which can be rectified with minor changes in the proposal, NWO will request the main applicant to rectify within 48 hours. If the application is not corrected within that timeframe, the application will not be admissible, i.e. will not be taken into consideration in the further procedure.
13 11 Chapter 4: Assessment procedure / Cyber Security Reviews and rebuttals All admissible full applications will be presented to external peer reviewers for assessment. Applicants will have an opportunity to respond to the reviewers anonymised reports Pre-selection of the proposals NWO reserves the right to add a pre-selection to the procedure, in case of a very high number of applications. Pre-selection may be used when the number of applications transcends the number of reasonable acknowledgeable applications by a minimum of four times Ranking of the proposals The selection procedure is as follows: (Pre-selected) proposals will be subjected to peer-review by independent (international) experts. The experts will be requested to review the research proposal on the criteria mentioned in paragraph 4.2 of this call. All peer-review reports will be submitted to the applicant for rebuttal. An assessment committee will rank the proposals, taking into account the research proposal, the peer reviews, and the rebuttal provided by the applicant. The assessment committee will submit their motivated ranking to the cyber security steering group. The cyber security steering group will make the final decision on the granting of research proposals. The assessment committee ranks the proposals, using the reviewers arguments and the applicant s rebuttal in order to arrive at its own assessment of the application. The role of the committee thus differs from that of the reviewers in that: the committee considers the applicant s rebuttal, while the reviewers are unaware of it and cannot therefore take it into consideration; the committee can take all the applications, reports and rebuttals into account, while reviewers do not generally see more than one application, and cannot discuss their opinions among themselves. As a result, the committee s assessment may differ from that of the reviewers. When compiling your application, bear in mind that it will be assessed by a varied group of experts ranging from expert reviewers to the broad-based assessment committee. The assessment committee includes scientists from Social Sciences and Physical sciences, and relevant members of the private sector Decision-making The Cyber Security steering group will decide whether to accept or reject applications on the basis of the assessment committee s recommended ranking and the available budget. NWO gives all full proposals a qualification. The applicant is informed of this qualification when the decision about whether or not to award funding is announced. For further information about the qualifications see Timetable
14 12 Chapter 4: Assessment procedure / Cyber Security January 16 th, 2014 Deadline submission of Letter of Intent March 4 th, 2014 Deadline submission of proposal March 2014 May 2014 Consultation peer reviewers May 2014 Obtaining rebuttals from applicants. On average researchers are given 1 weeks to give a response. June 2014 Advice assessment committee to the cyber security steering group. June 2014 Decision Cyber Security steering group. July 2014 NWO informs the applicants about the decision Successful (i.e. granted) applicants must start their research within six months after the receiving the grant. In case applicants fail to do so, NWO reserves the right to withdraw funding granted to the applicant. 4.3 Criteria Applications will be assessed by the assessment committee on the following three criteria: Relevance; Scientific quality; Valorisation. The criterion Relevance is a gating criterion. Relevance of all applications should be assessed as sufficient by the external reviewers and the assessment committee. Applications with an insufficient assessment of the criterion Relevance will not be eligible for funding. For proposals with assessed as sufficiently relevant to the NCSRA-II objectives and themes, relevance of the proposal will not further impact the review score. The criteria Scientific quality and Valorisation (knowledge utilization) are weighed equally in the ranking process. Relevance (gate): The contribution to or impact on (one of) the objectives and research themes described in the NCSRA-II; Relevance and urgency of the research for scientifically strengthening the Dutch cyber security community in an international perspective; Economic and/or societal added value of the foreseen research results. Scientific quality (50%): The potential for innovative research; Quality and originality of the research; Scientific impact of the research; Research method and approach; Theoretical background and framework; The plan of work and its feasibility; Competence of the research team; Adequacy of budget and infrastructure.
15 13 Chapter 4: Assessment procedure / Cyber Security Valorisation (50%): The added value of the cooperation with the private and/or societal partners in the consortium in regards to the goals of the research proposal; The concentration of resources (people and means) in the cooperation between private and public consortium partners. Examples are the availability of datasets and/or facilities, internships; The expected results of the research project, both for the public and private partners (like IP, human capital, demand inspiration, software product, product/service demonstrator, golden demo, new policies); Valorisation possibilities with partners outside the research consortium. Valorization Every year, NWO invests over 675 million euros of public funds in academic research. Such research may be anywhere on the scale from fundamental to applied and may be either curiosity-driven and response-mode or part of a thematic programme. Use of the results of scientific research by the public and private sector can increase the prosperity and well-being of the nation, as well as helping the Netherlands to achieve its ambition of becoming a knowledge society. For this reason, NWO asks applicants to provide information on the potential for the wider utilisation of knowledge resulting from their proposed research. This information will be taken into account when assessing their proposals. NWO defines valorization or knowledge utilisation as: a process promoting the use of the outcomes of scientific research both outside academia and by other academic disciplines. This process frequently requires interaction between the researcher and the potential knowledge user and such interaction may occur at any stage of the research, from the formulation of the research question right through to the dissemination of the results. NWO asks applicants to consider the potential for knowledge utilisation and, where relevant, to suggest how the results of the proposed research could be used by third parties. This does not mean the use of such knowledge by fellow researchers within the same academic discipline; after all, the relevance of the proposed research to the advancement of science within the applicant s own discipline is assessed through the application of other quality criteria. The valorisation criterion relates to the use of knowledge by third parties outside the academic sector or working in other academic disciplines.
16 14 Chapter 5: Contact details and other information / Cyber Security 5 Contact details and other information 5.1 Contact Specific questions For specific questions about Cyber Security and this call for proposals please contact Jan Piet Barthel ) or Joep van Wijk at NWO ) Technical questions about the electronic application system Iris For technical questions about the use of Iris please contact the Iris helpdesk. Read the manual first before asking the helpdesk for advice. The Iris helpdesk can be contacted from Monday to Friday between and CET on Unfortunately, not all foreign telecom companies support phoning to 0900 numbers. However, you can also submit your question by to An answer will be sent to you by within two working days. 5.2 Other information The call text and further information related to this tender can be downloaded from the NWO Cyber Security website: See also paragraph 3.4.
17 15 Chapter 6 Annexes / Cyber Security 6 Annexes 6.1 Arrangement for in-kind contributions by consortium partners in the Cyber Security research programme Definitions 1. Private parties Private parties are defined as businesses. NWO understands a business to be: an organisational association unit or person focussed on sustained participation in the economic system with the aid of labour and capital and with a profit motive. SMEs fall under this category Public and semi-public parties Public and semi-public partners are defined as knowledge or other institutions that are not one of the knowledge institutions recognised by NWO (such as universities of applied sciences, heritage institutions, municipalities, intermediary organisations or foundations) and which do not belong to the category private parties. Provisions 1. Possibility of participation in NWO research by private and/or public and semi-public parties with in-kind and cash contributions Private parties and public or semi-public parties can participate in NWO research programs by means of a financial contribution to the program budget or project budget which NWO allocates to research groups of knowledge institutes to carry out an approved research proposal. Private parties can participate in the NWO research program with a partial in-kind contribution under the following conditions: a. The total private contribution to an NWO research project in the Cyber Security Research call should be at least 20% of the total requested funding from NWO, and a maximum of 100% of the funding requested from NWO; b. The cash contribution by private and/or public semi-public parties should at least be 10% of the total requested funding from NWO; c. in-kind support / efforts must: be essential to the project; be included in the NWO-approved budget of the research costs of the project application in which the private party participates (see provision 3 for permitted in-kind contributions) and must fall within one of the cost categories referred to under 3 a through c. 2. Commitment If a private party, public party or semi-public party participates in the research project with a partial in-kind support as described above, this party will commit itself to NWO for the in-kind support as well as the financial (in cash) support as described in the proposal. NWO will invoice the promised financial (cash) contribution in semi-annual instalments. 3. Permitted in-kind contributions 7 The SME definition from the European Commission is used. An SME is understood to be a business that has fewer than 250 employees, a turnover of less than 50 million euros and a total balance of less than 43 million euros. Consideration should also be given to participations ( 25%) in and from other businesses that affect the autonomy of the business. Documentation: DG Enterprise,
18 16 Chapter 6: Annexes / Cyber Security The following costs, directly attributable to the research project and incurred by the private party, public party or semi-public party, may be contributed by private party, public party or semi-public party as in-kind contributions (see also provision 1): a. Hours worked within the scope of the project: wage costs, it being understood that these are based on an hourly wage, calculated on the basis of the annual wage at full employment according to the column income for income tax of the wage statement, plus the surcharges for social contributions payable by law or under individual contract or collective bargaining agreement, and based on productive hours per year. This amount may be increased with a surcharge for other general costs, subject to a maximum of 50% of the wage costs referred to above. The ensuing hourly rate to be attributed to the project, including said 50% surcharge for general costs, is capped the tariff as mentioned in paragraph 3.2 in the call for proposals. Contribution of costs for supervision or for project management is possible in the event of active participation of the intended supervisor or project manager in the research project (cf. under 1c of this annexe). b. Costs of material and resources to be used, based on the original purchase prices, distinguishing between products owned by the co-funder (list price) and products from other companies, bought by the co-funder (purchase price). c. Use of equipment and machines Costs associated with the purchase and use of machines and equipment, it being understood that these are based on the depreciation costs to be attributed to the project, calculated on the basis of the original purchase prices and a depreciation period of at least five years; costs of consumables and maintenance during the period of use. Costs of purchase and use of machines and equipment that were not purchased solely for the project will only be considered project contributions pro rata based on the foregoing if there is a time log for each machine or for the equipment that conclusively establishes the operating hours. In-kind contributions in the form of a discount on the regular purchase price in economic transactions (list price) of machines and equipment. The discount must be at least 25% of the list price. The costs charged to the project s equipment budget will then amount to the list price less said discount. When there is no list price a discount is not accepted. 4. Accounting of in-kind contributions Private parties, public parties and semi-public parties must render account of their in-kind contributions to NWO by means of a statement of the contributed costs, to be provided to NWO within three months after the end of the research project to which the in-kind contribution was made. The application for approval of the in-kind contribution must be submitted simultaneously with the application for approval of the subsidy amount by the university partner(s), accompanied by a collective final report. If the in-kind contribution for which account must be rendered exceeds 125,000, an auditor s report must be submitted; in other cases, a written statement by the holder of a power of attorney stating that the contributed in-kind efforts can actually be attributed to the project will suffice. If the private party, public party or semi-public party that committed itself to a research project with an in-kind contribution, ultimately fails to make such in-kind contribution in full or in part, or cannot render account of the same, NWO will invoice this private party for such part or the full in-kind contribution, so that the total contribution as undertaken is honoured.
19 17 Chapter 6: Annexes / Cyber Security 6.2 IPR and Knowledge transfer arrangement NWO Projects General When submitting a project proposal within the scope of the NWO Research Projects of the Cyber Security Call, the project parties shall confirm that they have taken note of the IP and knowledge transfer arrangement described in this document. Before a granted project commences, the project parties will enter into a Project Agreement with NWO regarding IP and knowledge transfer, as well as regarding other matters such as finance, progress reviews and confidentiality (vide the Project Agreement model that will be available on the site in due course). The conclusion of a Project Agreement between NWO and the project parties is one of the conditions to which the grant of a subsidy for the relevant project is subject. Background Information The parties participating together in a research project shall provide NWO with a written statement of the background knowledge they wish to make available for use in a project before the project commences. NWO will include the statements obtained from the parties in an annex to the Project Agreement to be concluded. During the project, additional background knowledge may be contributed in an analogous manner. Any contributed background knowledge remains the property of the contributing party (hereinafter: the Provider) and may be used by the receiving party or parties solely for the purposes of the project within the context of the objectives of the research. Upon written request, the Provider shall make the necessary background knowledge available to the requesting party at no cost by means of a non-transferable, non-exclusive licence for the duration of the project. In this respect, the Provider shall in good faith provide the receiving party/parties with all relevant information on the background knowledge in question, including a statement that the knowledge is free of third-party claims, or, if such claims exist, what restrictions apply to the use of the knowledge and any further exploitation of such knowledge. Foreground Knowledge -- Results Initially, the Results within a research project accrue to NWO. In this process, NWO acts as an intermediary and does not aim for a patent portfolio itself. If an invention is made within a project, the participating project parties shall have the first right of refusal to (cause to) protect this invention in their name and at their expense and subsequently obtain a patent on said invention in consideration of fair market compensation to NWO. The guideline for the maximum amount of compensation is formed by the project costs or sub-project costs incurred that led to the invention in question, minus the relative private contribution to said costs. The parties shall negotiate with NWO about the definitive amount of compensation and the stages, if any, of payment, and reach agreement on these issues within four months after the negotiations commenced, after which a patent application can be filed. SME parties may obtain a discount on the compensation payable by setting off the costs for obtaining IP against the compensation to be agreed. The compensation will be routed, via NWO, to the project party concerned where the invention was made for further research for the purposes of the subject/program. If multiple project parties are interested in (causing) the protection of the same invention and obtaining a patent, they will mutually agree, if possible even before the project commences, which party or parties will be the ultimate proprietor(s). If no agreement is reached in this respect, NWO will decide with regard to the right to patent the invention after separate consultation with the project parties involved. Publication of Results The project parties shall not publish or otherwise disclose results, other than with the other project parties consent. The parties involved shall respond in writing within 4 weeks after the request for publication. If the parties have not responded in writing within this period, this may be considered consent. Within two months after the publication request, the parties may require changes in order to protect their interests with regard to the patentability of the results, however without jeopardising the scientific integrity of the publishing party. If the results give rise to a specific possibility for a
20 18 Chapter 6: Annexes / Cyber Security patent application, the publication may be suspended for no more than nine months after the request for publication in order to give the opportunity to protect the results.
Call for proposals Green Genetics Designing genotypes, improving phenotypes A STW TKI-U/Plantum Programme Deadline for submission of applications: Pre proposals: March 3, 2015 Full proposals: May 31, 2015
SCIENCE FOUNDATION IRELAND SFI Investigators Programme 2015 Call for Submission of Proposals Key Dates Call announcement: 31 st March 2015 Deadline for proposal submission: 26 th June 2015, 13.00 Dublin
EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE and CONSUMERS Call for proposals for action grants CALL FOR PROPOSALS Action grants to support transnational projects aiming to prevent, inform about and
Photo: Elisabeth Tønnessen/UiS Guide for PhD Education at UiS At the University of Stavanger, we strive to provide relevant PhD of the highest quality. We are keenly aware that the need for doctoral candidates,
Call 2016 Phase 1 Applications North-Driven Development Research Projects: Denmark South-Driven Development Research Projects: Ghana, Tanzania, and Nepal Ministry of Foreign Affairs of Denmark Deadline:
EUROPEAN COMMISSION DIRECTORATE-GENERAL JUSTICE CALL FOR PROPOSALS Action grants to support projects on non-discrimination and Roma integration RIGHTS, EQUALITY AND CITIZENSHIP PROGRAMME (2014-2020) TABLE
Ref. Ares(2014)2617191-07/08/2014 EUROPEAN COMMISSION Enterprise and Industry CALL FOR PROPOSALS Call ID : 127-G-ENT-PPA-14-7722 Transnational cultural tourism products and Tourism and accessibility for
Grand Challenges Explorations Round 15 Rules & Guidelines Proposals due by Wednesday May 13, 2015 11:30 a.m. U.S. Pacific Daylight Time I. Overview Grand Challenges Explorations (GCE) supports hundreds
EUROPEAN COMMISSION DG Employment, Social Affairs and Inclusion Europe 2020: Employment Policies Sectorial Employment Challenges, Youth Employment and Entrepreneurship BUDGET HEADING 04 04 18 Preparatory
Draft Horizon 2020 Work Programme 2014-2015 In the area Important notice: This paper is made public just before the adoption process of the work programme to provide potential participants with the currently
Ref. Ares(2015)576470-11/02/2015 ERC Frontier Research Grants Information for applicants to the Advanced Grant 2015 Call 10 February 2015 This document is published by the ERC Scientific Council on http://erc.europa.eu
Call for proposals No. VP/2012/014 Preparatory action Your first EURES job Budget Heading 04.03.13 In view of the large number of enquiries, please do not telephone. Questions should be sent by email only
GUIDE FOR APPLICANTS Marie Skłodowska-Curie Actions Individual Fellowships (IF) Call identifier: H2020-MSCA-IF-2015 Closing Date: 10 September 2015 at 17:00:00 (Brussels local time) Date of publication:
- AIRC - Associazione Italiana per la Ricerca sul Cancro CALL FOR PROPOSALS 2015 My First AIRC Grant (MFAG) AIRC Via San Vito 7, 20123 Milano tel. 02/7797374-222-350 fax 02/7797259 e-mail: email@example.com
Kopiëren, rechtvaardig en eenvoudig geregeld Today s rights management the Dutch way Transparency and governance in collective management of copyright and neighbouring rights in the Netherlands: a progress
EUROPEAN RESEARCH COUNCIL Guide for ERC Grant Holders Part II Reference Manual on Financial Management and Administration of the ERC Grants Starting and advanced grants Version 1-24/06/2008 Disclaimer:
REQUEST FOR PROPOSALS (RFP) [RFP/2015-007] Development of IT Solution for IRENA African Clean Energy Corridor (ACEC) Project Facilitation Platform International Renewable Energy Agency Abu Dhabi, UAE [March,
GUIDELINES FOR THE ENGAGEMENT OF CONSULTANTS AND OTHER EXTERNAL SUPPORT BY THE CIVIL SERVICE Department of Finance 2006 1 INTRODUCTION... - 4-1.1 CONSULTANTS, CONTRACTORS AND EXTERNAL SERVICE PROVIDERS...-
Due diligence for joint ventures, mergers and acquisitions in China There are many ways to enter the Chinese market, including the establishment of a representative office, outsourcing production, founding
EUROPEAN COMMISSION Employment, Social Affairs and Inclusion DG Europe 2020: Employment Policies Skills, Mobility and Employment Services BUDGET HEADING 04 03 02 01 EaSI - PROGRESS European Sector Skills
EVALUATION GUIDE FCT Evaluation of R&D Units 2013 31 July 2013 Contents 1. Introduction... 4 FCT mission... 4 Funding of R&D Units... 4 2. 2013 Evaluation of R&D Units... 6 Objectives and main criteria...
Audit Manual PART TWO SYSTEM BASED AUDIT Table of content 1. Introduction...3 2. Systems based audit...4 2.1. Preparing for & planning the audit assignment...5 2.2. Ascertaining and recording the system...7