Innovation Actions

Core Partner(s) Application/Proposal Template

(Administrative Section)

PART B. II

- 27 November 2015 -

Note: This is for information only. The definitive template for your call will be available in the submission system, which you can then use when writing your proposal.

Please follow the structure of this template when preparing your application/proposal. It has been designed to ensure that you can present information on your operational capacity, ethics and security in a way that will enable the JU to make an effective assessment of your proposal.

Only proposals that successfully address all the required aspects will have an opportunity of being funded.

Part B. II is not subject to the 50-page limit as set for Part B. I. The page size is A4, and all margins (top, bottom, left, right) should be at least 15 mm (not including any footers or headers).

Part B.I and Part B. II should be submitted as separate documents.

The system will not allow a proposal to be submitted until this document is uploaded.

Please note that by submitting this proposal electronically, all documents and attachments uploaded into the submission system form a legally binding part of your proposal. The documents are submitted under the applicants password controlled access and are time-stamped by the system. Therefore it is not necessary to print documents for hand signature and re-scan them before uploading. Applicants, particularly proposal coordinators, should ensure that proposal content uploaded under their password is correct because they are legally responsible for it and the proposal cannot be updated after the call deadline has passed. It is recommended that documents be converted directly from editable to PDF versions to optimise quality and file size rather than scan printed versions.

4.  Members of the consortium

This paragraph is not covered by the page limit.

The information provided here will be used to judge the operational capacity.

4.1. Participants (applicants)

Please provide, for each participant[1], inputs and evidence related to the operational capacity as set out in the Work Plan (B of the General Annexes):

·  a description of the legal entity and its main tasks, with an explanation of how its profile matches the tasks in the proposal.

·  curriculum vitae or description of the profile of the persons who will be primarily responsible for carrying out the proposed research and/or innovation activities;

·  the applicant reports of research and development activities, products, services executed in the same relevant area;

·  a lists of previous projects and activities performed and connected to the topic and Programme area;

·  a description of the key capabilities of the entity, significant infrastructures, technical equipment, design and test tools, facilities, design offices patents and other IP rights at the disposal of the applicant;

·  Other inputs to assess the operational capacity when requested in the topic description.

4.2. Third parties involved in the project (third party resources)

Please complete, for each participant, the following table (or simply state "No third parties involved", if applicable):

Does the participant plan to subcontract certain tasks of the action (please note that only limited part of the tasks of the action may be subcontracted and that core tasks should not be subcontracted) / Y/N
If yes, please describe and justify the tasks to be subcontracted
Does the participant envisage that part of its work is performed by third parties[2] / Y/N
If yes, please describe the third party, the link of the participant to the third party, and describe and justify the foreseen tasks to be performed by the third party
Does the participant envisage the use of contributions in kind provided by third parties (Articles 11 and 12 of the General Model Grant Agreement) / Y/N
If yes, please describe the third party and their contributions

5.  Section 5: Ethics and Security

This paragraph is not covered by the page limit.

5.1 Ethics

Are there any ethics issues that should be taken into consideration? If yes, please specify.

(YES/NO)

Note that if you have entered any ethics issues in the ethical issue table in the administrative proposal forms, you must:

·  submit an ethics self-assessment, which:

o  describes how the proposal meets the European, national legal and ethical requirements of the country or countries where the tasks raising ethical issues are to be carried out;

o  explains in detail how you intend to address the issues in the ethical issues table, in particular as regard:.

o  research objectives (e.g. study of vulnerable populations, dual use, etc.)

o  research methodology (e.g. protection of any data collected, etc.)

o  the potential impact of the research and the measure and safeguards which will be taken to prevent, monitor and mitigate any ethical issue (e.g. dual use issues, environmental damage, stigmatisation of particular social groups, political or financial retaliation, benefit-sharing, malevolent use , etc.).

5.2 Security[3]

Please indicate if your proposed project involves:

·  activities or results raising security issues: (YES/NO)

·  'EU-classified information' as background or results: (YES/NO)

·  potential for military applications: (YES/NO)

·  any material imported from non-EU countries into the EU: (YES/NO)

·  any material exported from the EU to non-EU countries: (YES/NO)

PART B. II of the Core Partner(s) Application/Proposal Template (Administrative Section) – R1 2

[1] NB: This declaration should be made on behalf of and for all applicants participating in this proposal, including members of any consortium (where applicable) and including the members of any cluster (where applicable) whenever a cluster is an applicant as legal entity in this proposal.

[2] A third party is an affiliated entity (e.g affiliate or subsidiary of an applicant) or has a legal link to a participant implying a collaboration which is not limited to the action (ref. Article 14 of the Model Grant Agreement). A description shall be provided of any such third party and its contribution in performing part of the action

[3] Article 37.1 of Model Grant Agreement: Before disclosing results of activities raising security issues to a third party (including affiliated entities), a beneficiary must inform the coordinator — which must request written approval from the Joint Undertaking; Article 37. Activities related to ‘classified deliverables’ must comply with the ‘security requirements’ until they are declassified; Action tasks related to classified deliverables may not be subcontracted without prior explicit written approval from the Joint Undertaking.; The beneficiaries must inform the coordinator — which must immediately inform the Joint Undertaking — of any changes in the security context and — if necessary —request for Annex 1 to be amended (see Article 55)