Notice on Printing and Distributing the Administrative Measures of the National Cryptographic Science Fund (for Trial Implementation)

Date of issue: 2023-12-13 Source:
[Font: large in Small Print

All relevant units:

In order to further strengthen the top-level planning of basic research on cryptography and optimize the allocation of scientific and technological resources, the National Cryptographic Administration optimized the National Cryptographic Development Fund and renamed it the National Cryptographic Science Fund. The Administrative Measures of the National Cryptographic Science Fund (for Trial Implementation) is hereby printed and distributed to you. Please implement it carefully.

 

 

            State Password Administration

            December 12, 2023


 

Measures for the Administration of the National Cryptographic Science Fund (for Trial Implementation)

 

Chapter I General Provisions

Article 1 These Measures are formulated in accordance with the Password Law of the People's Republic of China and relevant regulations in order to standardize the management of the National Cryptographic Science Fund and improve the efficiency of the use of the National Cryptographic Science Fund.

Article 2 The National Cryptographic Science Foundation, facing the national strategic needs, aims at the forefront of international cryptography technology, focuses on the research of original and cutting-edge cryptography theories and common key technologies, focuses on strengthening the top-level planning of basic research on cryptography and optimizing the allocation of scientific and technological resources, improves the original innovation ability in the field of cryptography, and cultivates talents and teams in the field of cryptography, It provides important support for achieving a high level of self-reliance in cryptography technology.

Article 3 The management of the National Cryptographic Science Fund shall follow the principles of openness, fairness and impartiality, and adopt a mechanism of macro guidance, independent application, equal competition, peer review and preferential support.

Chapter II Organization and Responsibilities

Article 4 The State Cryptographic Administration is responsible for the administration of the National Cryptographic Science Fund, formulating the National Cryptographic Science Fund plan (hereinafter referred to as the Fund plan) and the National Cryptographic Science Fund project application guide (hereinafter referred to as the project guide), and organizing the implementation of the administration of the National Cryptographic Science Fund projects (hereinafter referred to as the projects), Make decisions on major issues in the management of the National Cryptographic Science Fund.

Article 5 The State Cryptographic Administration shall establish the Advisory Committee of the National Cryptographic Science Fund to give advice on the development strategy, support policies, priority development directions and key scientific issues of the National Cryptographic Science Fund.

Article 6 The State Encryption Administration shall establish the Management Office of the National Cryptographic Science Fund to be responsible for the daily management of the Fund.

Article 7 The State Encryption Administration shall establish the expert database of the National Cryptographic Science Fund, select experts in the database to participate in the preparation of fund planning and project guidelines, project demonstration and check, etc. The expert database shall be dynamically updated.

Article 8 The supporting units of the National Cryptographic Science Foundation (hereinafter referred to as the supporting units) shall be institutions of higher learning, scientific research institutions, enterprises and institutions registered in the People's Republic of China, with independent legal personality, and with good foundation and conditions for cryptographic research. The supporting unit shall perform the following responsibilities in the project management process:

(1) Review the authenticity, accuracy and completeness of the materials submitted by the applicant or project leader;

(2) Provide necessary conditions for project implementation, and guarantee the time for project leaders and participants to implement the project;

(3) Track project implementation and supervise the use of project funds;

(4) Cooperate with the State Password Administration to supervise and manage the project.

Chapter III Planning and Organization

Article 9 The State Encryption Administration shall, in view of the strategic needs of the State Encryption and in combination with the development trend of cryptography science and technology, formulate fund planning and project guidelines on the basis of widely listening to opinions and expert review and argumentation.

Article 10 The State Encryption Administration shall formulate a fund plan every five years, specifying the priority development direction, budget estimate and annual distribution proposal for the next five years.

Article 11 The State Encryption Administration shall regularly issue project guidelines, specifying the research direction, project type and organization mode of priority support. In principle, the project guide is issued once a year.

Article 12 In order to stimulate the innovation and creativity of scientific research talents, the National Cryptographic Science Foundation may, according to the actual needs of the project, implement new project organization and management models such as "unveiling and leading" and "horse racing system".

"Uncovering the list" refers to the project management mode in which the demander puts forward specific technical research and development needs, takes the National Cryptographic Science Foundation as the platform, releases the task of unveiling the list, facilitates the connection between supply and demand, and establishes projects to accelerate the solution of technical problems.

The "horse racing system" refers to a project management mode in which the same research content is demonstrated by experts, multiple selected project undertaking units are first established in parallel, then focused, and finally selected from the best.

Chapter IV Application and Review

Article 13 Scientific and technical personnel of supporting units may apply for projects if they meet the following conditions:

(1) Support the leadership of the Communist Party of China and abide by the Constitution and laws of the People's Republic of China;

(2) Have the ability to carry out research independently and organize research, and be able to undertake substantive research work;

(3) Having a senior professional title or a doctor's degree;

(4) The applicant shall be the actual person in charge of the project, limited to one person.

Article 14 The number of application items shall meet the following requirements:

(1) As an applicant, there is only one application project in the same year;

(2) If the project leader is undertaking a project, and the implementation cycle of the project overlaps with that of the applied project, the application shall not be made;

(3) Restrictions on the number of applications in the project guide.

Article 15 The applicant shall file an application within the specified time limit in accordance with the requirements of the project guide. The applicant shall be responsible for the authenticity, accuracy and integrity of the application materials submitted, and the supporting unit shall review the application materials.

Article 16 The project applicant shall, in accordance with the principles of policy consistency, goal relevance and economic rationality, prepare the project budget scientifically, reasonably and realistically according to the project research needs and the scope of capital expenditure.

If several units jointly undertake a project, the project applicant of the supporting unit and the participants of the cooperative research unit shall prepare and submit the project budget according to their respective research tasks, which shall be summarized and prepared by the project applicant.

Article 17 Project funds refer to the relevant expenses incurred during the implementation of the project, mainly including equipment costs, business costs, labor costs, etc.

Article 18 The State Encryption Administration shall complete the formal examination of the application materials within 45 days from the deadline of the project application. Those meeting the provisions of these Measures shall be accepted, and those in any of the following circumstances shall not be accepted:

(1) The applicant does not meet the requirements of these Measures;

(2) The application materials do not meet the requirements of the project guidelines;

(3) The number of items applied for by the applicant exceeds the specified number;

(4) Failing to submit the application within the prescribed time limit;

(5) The applicant or participant is in the blacklist period;

(6) The supporting unit is in the blacklist period.

Article 19 The State Encryption Administration shall randomly select peer experts from the expert database to review the accepted project applications. The review forms include communication review and meeting review.

Article 20 The evaluation experts shall make independent judgments and evaluations on the scientific value, innovation, social impact, feasibility of the research scheme, budget relevance and rationality of the applied project, put forward objective and fair evaluation opinions, and determine the amount of project funds.

Article 21 The State Encryption Administration shall, in accordance with the provisions of these Measures, the annual support plan and the review opinions put forward by experts, determine the list of support projects, timely notify the applicant and supporting units of the review results, and feed back the experts' review opinions.

Article 22 If the applicant disagrees with the evaluation result, he or she may, within 7 days from the date of receiving the notice, submit a written application for objection to the State Encryption Administration. Different opinions on the academic judgment of the evaluation experts shall not be used as the reason for raising objections. The applicant can only file an objection application once.

The State Encryption Administration shall, within 30 days from the date of receiving the application, give its handling opinions and notify the applicant.

Article 23 In the process of project review, if the review expert has any of the following circumstances, he/she shall apply for withdrawal or the State Password Administration shall decide to withdraw:

(1) Review experts apply for or participate in the application for the project of this year;

(2) The evaluation expert is closely related to the applicant and participants;

(3) The evaluation experts, applicants and participants belong to the same unit;

(4) Other conflicts of interest or those that may affect the fairness of the review.

Article 24 Fund management personnel shall not apply for or participate in the application projects, and shall not interfere in the evaluation work of evaluation experts.

Fund management staff and evaluation experts shall not disclose the basic information, evaluation opinions, evaluation results and other information related to the evaluation of undisclosed evaluation experts.

Chapter V Project Initiation and Implementation

Article 25 The applicant who has obtained project support shall, within 20 days from the date of receiving the notice, fill in the project contract according to the review opinions and the determined amount of funds, and submit it to the State Encryption Administration for review. If there are no special circumstances, it will be deemed that the applicant has given up the project if it fails to submit it within the time limit.

The applicant shall not make changes to other contents except for adjusting the contents of the submitted application according to the review opinions and the determined amount of funds.

The State Encryption Administration shall review the project contract within 30 days from the deadline for submission of the project contract, and the approved project contract shall serve as the basis for project implementation, fund allocation, supervision and inspection, and project closure.

Article 26 The State Encryption Administration shall, in accordance with the characteristics of different types of scientific research projects, research progress, funding needs, etc., make a reasonable appropriation plan. The State Encryption Administration shall, within 30 days after the signing of the project contract, allocate the funds to the supporting units as planned to ensure the needs of scientific research activities. The supporting unit shall, within 15 days from the date of receiving the project funds, provide the State Password Administration with relevant vouchers for the funds in place.

If several units jointly undertake a project, the supporting unit shall timely transfer the funds of the cooperative research unit according to the project contract, and strengthen the supervision and management of the transferred funds.

Article 27 The project funds shall be included in the financial management of the supporting units, accounted for separately, and used for a specific purpose.

The project leader shall use the project funds in strict accordance with the budget, and the supporting unit shall supervise the project leader's use of the project funds. During the implementation of the project, the relevant national regulations on government procurement, bidding, asset management, expenditure management, etc. shall be strictly implemented, and in principle, "official card" settlement and bank transfer settlement shall be implemented.

The following behaviors shall not exist in the management and use of project funds:

(1) Prepare and report false budget;

(2) Project funds are not accounted for separately;

(3) Expenditures irrelevant to the project tasks;

(4) Failing to implement and adjust the budget according to regulations, and transferring project funds in violation of regulations;

(5) Transferring, obtaining and reimbursing project funds through false contracts, false bills, fictitious matters and false reports of personnel;

(6) Intercept, occupy and misappropriate project funds;

(7) Set up off book accounts, adjust accounts and change expenditures at will, modify accounting vouchers at will, and provide false financial and accounting information;

(8) Relevant expenses that should be borne by individuals when using project funds and paying various fines, donations, sponsorships, investments, debt repayment, etc;

(9) Other acts in violation of national financial discipline.

Article 28 In the process of project implementation, if the project budget needs to be adjusted under the following circumstances, it shall be reported to the State Encryption Administration for approval according to relevant procedures:

(1) The total budget needs to be adjusted due to major adjustment of research content or research plan;

(2) If there are multiple units undertaking a project together, and funds need to be reallocated between them.

During the implementation of the project, if the budget needs to be adjusted without changing the budget quota of the project, it shall be adjusted according to the following provisions:

(1) If the equipment cost budget needs to be adjusted, the project leader shall submit an application according to the actual needs of scientific research activities and submit it to the supporting unit for approval. The supporting unit shall take overall consideration of the existing equipment configuration, the actual needs of scientific research projects, etc., and handle the adjustment procedures in a timely manner;

(2) If the budget of labor costs and business costs needs to be adjusted, the project leader shall make independent arrangements according to the actual needs of scientific research activities.

Article 29 The project leader shall organize the research work according to the project contract, keep the original records of the project implementation, and submit the annual progress report of the project to the State Encryption Administration after the review of the supporting unit.

Article 30 The State Encryption Administration shall organize experts at key nodes of project implementation to inspect project progress, fund use and management, and notify the project leader and supporting units of the inspection results and handling opinions.

Article 31 Supporting units and project leaders shall ensure the stability of participants. If it is really necessary to change participants due to objective reasons, the project leader shall make a written explanation, which shall be submitted to the State Password Administration for filing after being reviewed by the supporting unit.

Article 32 During the implementation of the project, it is not allowed to change the research content and research plan without authorization. If it is necessary to make major adjustments due to special reasons, the project leader shall submit a written application, which shall be reviewed by the supporting unit, and then submitted to the State Encryption Administration for approval.

Article 33 In principle, the supporting unit or project leader shall not be changed during the implementation of the project. If adjustment is needed for special reasons, the supporting unit shall submit a written application to the State Password Administration for approval.

For the project with the change of the supporting unit approved by the State Password Administration, the original supporting unit shall timely transfer the project funds to the new supporting unit.

Article 34 Under any of the following circumstances, the supporting unit shall timely file an application for termination of project implementation and submit it to the State Encryption Administration for approval; The State Encryption Administration may also directly make a decision to terminate the implementation of the project:

(1) The project leader is unable to continue the research work and there is no substitute;

(2) Plagiarism of others' scientific research achievements, infringement of intellectual property rights, fraud and other academic misconduct in project implementation;

(3) It is proved by practice that the technical route of the project is unreasonable and infeasible, or the project cannot achieve the progress specified in the assignment and there is no improvement method;

(4) The funds, raw materials, personnel, support conditions, etc. needed to complete the project tasks are not implemented or changed, which makes the research unable to proceed normally;

(5) The project cannot be carried out due to other major problems.

If the project is terminated, the supporting unit shall make a written report on the work that has been carried out, the use of funds, the equipment and instruments that have been purchased, the phased achievements, and the intellectual property rights. After the verification and approval of the State Password Administration, the follow-up work shall be completed in accordance with the regulations. If the project is terminated due to improper reasons, it shall be included in the credit file of the supporting unit or project leader.

Article 35 If the research plan cannot be completed on time due to objective reasons, the project leader may apply for extension once, and the period of application for extension shall not exceed one year. The project leader shall submit a written application for extension 60 days before the expiration of the project support period, which shall be reviewed by the supporting unit and then submitted to the State Encryption Administration for approval. The annual progress report of projects approved for extension shall be submitted before the completion of the project.

Article 36 In case of any of the circumstances listed in Article 29, Article 33 to Article 36 of these Measures and the State Encryption Administration makes a decision of approval, disapproval or termination, it shall timely notify the project leader and supporting units.

Article 37 Within 30 days from the date of expiration of the project support period, the project leader shall submit the project closing report, final account of funds and other closing materials to the State Encryption Administration, cooperate in the project closing and auditing work, and the project leader shall be responsible for the authenticity of the closing materials. The supporting unit shall review the closing materials.

Article 38 The State Encryption Administration shall timely organize experts to carry out a closing review of the project completion, and notify the project leader and supporting units of the closing review results and acceptance opinions.

The completion of the project is included in the reputation archives of the supporting unit and the project leader as an important reference for subsequent project approval review.

In any of the following circumstances, the party concerned shall be ordered to make corrections within a time limit. If the party fails to make corrections within the time limit, the project shall not be closed:

(1) Failing to submit closing materials on time;

(2) The submitted closing materials are incomplete, do not meet the filling requirements or the procedures are incomplete;

(3) Other situations that do not meet the requirements of the State Password Administration.

Article 39 Where the State Encryption Administration approves or refuses to close the project, or terminates the implementation of the project for some reason, the supporting unit shall be responsible for returning the balance funds to the original channel within 30 days after the issuance of the notice.

For projects that have been canceled according to law for some reason, the supporting unit shall be responsible for returning all the allocated funds to the original channel within 60 days after the issuance of the notice.

Article 40 The research achievements of the project shall be signed and marked according to the requirements of the State Encryption Administration.

Article 41 The ownership of research results obtained by the project shall be subject to Article 32 of the Law of the People's Republic of China on Science and Technology Progress and the provisions of relevant laws, regulations and rules. The State Encryption Administration, supporting units and project leaders shall sign a tripartite contract to make specific provisions on the possession, use, benefits and disposal of research results.

Chapter VI Supervision and Handling

Article 42 The State Encryption Administration shall conduct a spot check on the implementation of the project, and shall check the original records of the implementation of the project during the spot check.

Article 43 The State Encryption Administration shall establish the reputation archives of the applicant, the project leader and the supporting unit, and take them as the important basis for approving the project application.

Article 44 The State Encryption Administration shall regularly evaluate the performance of evaluation duties by evaluation experts; According to the evaluation results, establish the reputation archives of evaluation experts.

Article 45 Where an applicant or participant forges or alters the application materials, the State Encryption Administration shall give a warning; If the application project has been supported, the original support decision shall be revoked and the allocated funds shall be recovered; If the case is serious, it shall be included in the blacklist, and shall not apply for or participate in the application project for 3 to 5 years.

Article 46 If the project leader or participant violates the provisions of these Measures and commits one of the following acts, the State Encryption Administration shall suspend the appropriation of funds and order them to make corrections within a time limit; If it fails to make corrections within the time limit, the original support decision shall be revoked and the allocated funds shall be recovered; If the case is serious, it shall be included in the blacklist and shall not apply for or participate in the application project within 5 to 7 years:

(1) Failing to conduct research in accordance with the project contract;

(2) Unauthorized change of research content or research plan;

(3) Failing to submit the annual progress report and closing materials of the project in accordance with the provisions of these Measures;

(4) Submitting fraudulent reports, original records or relevant materials;

(5) Occupying or misappropriating funds.

Article 47 The State Encryption Administration shall order the supporting unit to correct within a time limit in any of the following circumstances:; If the case is serious, it shall be included in the blacklist and shall not be used as a supporting unit for 3 to 5 years:

(1) Failing to perform the duty of guaranteeing the research conditions of the project;

(2) Not examining the authenticity, accuracy and completeness of the materials or reports submitted by the applicant or the project leader;

(3) Indulging and shielding applicants and project leaders to practice fraud;

(4) Failing to cooperate with project supervision and inspection;

(5) Withholding or misappropriating funds.

Article 48 If an evaluation expert commits any of the following acts, the State Encryption Administration shall order him to make corrections within a time limit; If the circumstances are serious, the State Encryption Administration will no longer employ them as evaluation experts:

(1) Failing to perform the review duties prescribed by the State Password Administration;

(2) Failing to apply for withdrawal in accordance with these Measures;

(3) Disclosing unpublished information related to the review;

(4) Unfair review of project application;

(5) Seeking illegitimate interests by taking advantage of work convenience.

Article 49 Fund management personnel who commit any of the following acts shall be given sanctions:

(1) Disclosing unpublished information related to the review;

(2) Intervention in the review work of review experts;

(3) Seeking illegitimate interests by taking advantage of work convenience.

Article 50 Where an applicant, project leader or participant violates the provisions of these Measures and constitutes a crime, he or she shall not apply for or participate in the application project for life.

Article 51 The State Encryption Administration shall make an announcement on the violation of the provisions of these Measures.

Chapter VII Supplementary Provisions

Article 52 The State Password Administration is responsible for the interpretation of these Measures.

Article 53 These Measures shall come into force as of the date of promulgation.



Office of the State Password Administration

Printed and distributed on December 12, 2023

 

 

 

 

 

 

 

 

 


Editor in charge:
Related manuscripts