«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»
• Consortia agreements are required for all actions.
• Particular requirements for participation, evaluation and implementation:
The minimum number of participating entities required, for all funding schemes, is set out in the Rules for Participation: For Collaborative projects, the minimum condition shall be the participation of 3 legal entities, each of which is established in a Member State or Associated Country and no two of which are established in the same Member State or Associated Country. For Coordination and Supporting Actions aiming at supporting research activities and policies the minimum condition shall be the participation of one legal entity. For Coordination and Supporting Actions aiming at coordinating research activities and policies the minimum condition shall be the participation of three legal entities, each of which is established in a Member State or Associated Country, and no two of which are established in the same Member State or Associated Country.
Proposers should indicate in which of the two specific foci of the call their proposal best fits. There will be a joint evaluation of proposals submitted under the two specific foci.
During the evaluation, evaluators could move, in a transparent manner, proposals from one specific focus to the other, if they consider that a proposal would fit better there and that this would be to the benefit of the proposers.
Proposals must not contain any classified information, this will immediately lead to declaring them ineligible (note that the proposed action itself can involve classified information).
If classified inputs are required to carry out a proposed action or the output of the action needs to be classified, proposers have to ensure and provide evidence of the clearance of all relevant persons and facilities. Consortia have to clarify issues such as e.g. access to classified information or export or transfer control with the national authorities of their Member States / Associated Countries prior to submitting the proposal. Proposals need to provide a security aspect letter, indicating the levels of classification required. Appropriate arrangements have to be included in the consortium agreement.
Proposers addressing topics of the specific focus 2 and claiming that their proposal should receive Community funding up to 75% should demonstrate in the proposal that the required conditions (very limited market size and a risk of "market failure", the need for accelerated equipment development in response to new threats) apply. The final decision will be based on the recommendations of the relevant evaluation panel.
Consortia are strongly encouraged to actively involve SMEs and end users. Their presence in the consortia will be judged under the evaluation criterion ‘Quality and efficiency of the implementation and the management’ with a view to meeting the main objectives of the theme.
The evaluation panel will comprise end users as well.
Page 51 of 53 FP 7 Cooperation Work Programme: Security
The evaluation criteria (including weights and thresholds) and sub-criteria, together with the eligibility, selection and award criteria for the different funding schemes are set out in Annex 2 to this work programme.
Positively evaluated proposals involving sensitive and classified information, those involving international co-operation as well as those collaborative projects where 75% funding for all participants is foreseen will be flagged to the members of the Security Programme Committee configuration and dealt with according to its Rules for Procedure.
As a result of the evaluation, a ranked list of proposals retained for funding will be drawn up as well as a reserve list of proposals that may be funded in case budget becomes available during negotiations.
The forms of grants which will be offered are specified in Annex 3 to the Cooperation work programme
IV INDICATIVE PRIORITIES FOR FUTURE CALLSIndicative roadmap of future calls 12/2006: Security Research Call 1 08/2007: Joint Call ICT & Security 1 06/2008: Security Research Call 2 06/2009: Security Research Call 3 09/2009 Optional Call (for Demonstration projects phases 2) 06/2010: Security Research Call 4 09/2010 Optional Call (for Demonstration projects phases 2) 06/2011: Security Research Call 5 06/2012: Security Research Call 6 Indicative approach of future calls
• Security Research Call 2 will be open for the first phases of two to three more demonstration projects and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.
The demonstration projects (phase 1 only) called for will be in Activity 1: Security of citizens o Logistic and supply chain security o CBRNE (Chemical, Biological, Radiological, Nuclear agents and Explosives) in Activity 4: Restoring security and safety in case of crisis o Aftermath crisis management system The integration projects called for will be those called for but not sufficiently covered by
the first call, as well as:
For more information on these demonstration and integration project topics, the ESRAB report can be consulted.
The capability projects called for will be selected from those not yet sufficiently covered by the first call, as well as those recommended by ESRAB but not included in the first call.
• Security Research Call 3 will be open for the second phases of the demonstration projects* called for in Security Research Call 1 and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.
• Security Research Call 4 will be open for the second phases of the demonstration projects* called for in Security Research Call 2 and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.
* If required, additional calls to the main annual calls can be launched especially with a view to the second phases of demonstration projects.
• Security Research Calls 5 and 6 will offer reserve opportunities for the second phases of the demonstration projects called for in Security Research Calls 1 and 2, in case no proposal will have been selected for funding in earlier calls, and for more integration and capability projects to establish all necessary building blocks. Activities 6 and 7 will be open as well.
All calls will follow the building block approach of the Security theme. While focussing on the demonstration projects, these will be supported and enabled by the output of the capability and integration projects.
On the level of the capability projects, future calls will invite actions along the following
functions, which group the capabilities as required in all security missions:
Function A: Risk assessment, modelling & impact reduction Function B: Doctrine & operation Function C: Training & exercises Function D: Detection, identification & authentication Function E: Positioning & localisation Function F: Situation awareness & assessment (surveillance) Function G: Information management Function H: Intervention & neutralisation Function I: Communication Function J: Command & control Function K: Incident response