|Text of Recommendation|| |
2. Based on results of NIH's risk assessment of grant applicants, include in the funding opportunity announcements or grant terms and conditions or both the cybersecurity controls that should be implemented.
|Recommendation Number|| |
|Recommendation Status|| |
|Significant Recommendation|| |
|Recommendation Questioned Costs|| |
|Recommendation Funds for Better Use|| |