1,000+ Opportunities
Find the right grant
Search federal, foundation, and corporate grants with AI — or browse by agency, topic, and state.
The Mozilla Foundation Responsible Computing Challenge is a grant jointly supported by the Mozilla Foundation and the Mellon Foundation that funds innovative interdisciplinary curricula connecting Computer Science and STEM fields with the humanities and social sciences at U.S. universities.
In 2026, the program anticipates awarding grants to ten U.S. universities and faculty teams for projects with the potential to create meaningful curricular models bridging disciplines and promoting responsible computing. Grants of up to $125,000 per institution over two years support faculty-led projects developing undergraduate curricula and pedagogy.
Eligible applicants are U.S. university faculty teams proposing interdisciplinary curricular models for the third cohort of the Responsible Computing Challenge.
Get alerted about grants like this
Save a search for “Mozilla Foundation” or related topics and get emailed when new opportunities appear.
Search similar grants →Extracted from the official opportunity page/RFP to help you evaluate fit faster.
Responsible Computing Challenge | Mozilla Foundation Responsible Computing Challenge funding opportunity Supporting faculty, students, and local communities Funding for innovative interdisciplinary curricular models In 2026, The Responsible Computing Challenge (RCC), jointly supported by Mozilla Foundation and the Mellon Foundation, anticipates awarding grants to ten U.S. universities and faculty teams.
We seek projects with the potential to create innovative curricular models that connect Computer Science and related STEM fields with the rich inquiry of those in the Humanities and Social Sciences. Grants of up to $125,000 per institution over two years will support the third US cohort of faculty-led projects that develop undergraduate curricula and pedagogy designed to bridge disciplines.
Subversion, imagination & insignificance We encourage thematic projects that spark ideas across disciplinary boundaries. Some illustrative examples to spark ideas: Subversion by connecting Indigenous knowledge in sociology with practices of version control in software development Imagination by linking critical inquiry in speculative fiction, and AI-generated media.
Insignificance by examining statistical null results alongside questions of rejection and loss. “Responsible computing is much more than a technical requirement. It’s an invitation to engage with deep questions about power.
” This RCC grant is open to accredited institutions of higher education in the United States. Proposals are ineligible if they: Create a standalone “ethics in computing” course without curricular integration. If the PI is uncertain whether their institution will permit these terms, they should check with their contracting/grants office before submission.
Primarily serve non-undergraduate audiences, Do not agree to open licensing (e.g. Creative Commons) for outputs, or List PIs who are ineligible to accept/administer grants at their institutions. At its core, RCC is about community. Grantees join a Global Community of Practice that now spans more than 75 institutions across four countries.
Participation in this community is not incidental to the award– it is central to RCC’s long-term impact. All submissions must demonstrate: Curricular integration: how socially responsible and critical computing will be woven thematically into undergraduate curricula and pedagogy in ways that promote responsible technology ecosystems.
Interdisciplinary collaboration: plans for representative project teams that may include academics, researchers, librarians, practitioners, pedagogy experts, and others. Student engagement: embedded activities such as mentorship programs, student clubs, or student-led initiatives as a core deliverable. Community participation: meaningful involvement of relevant local community organizations in curricular interventions .
Based on current listing details, eligibility includes: Organizations and individuals working on responsible computing initiatives. Applicants should confirm final requirements in the official notice before submission.
Current published award information indicates Varies Always verify allowable costs, matching requirements, and funding caps directly in the sponsor documentation.
The current target date is rolling deadlines or periodic funding windows. Build your timeline backwards from this date to cover registrations, approvals, attachments, and final submission checks.
Federal grant success rates typically range from 10-30%, varying by agency and program. Build a strong proposal with clear objectives, measurable outcomes, and a well-justified budget to improve your chances.
Requirements vary by sponsor, but typically include a project narrative, budget justification, organizational capability statement, and key personnel CVs. Check the official notice for the complete list of required attachments.
Yes — AI tools like Granted can help research funders, draft proposal sections, and check compliance. However, always review and customize AI-generated content to reflect your organization's unique strengths and the specific requirements of the solicitation.
Review timelines vary by funder. Federal agencies typically take 3-6 months from submission to award notification. Foundation grants may be faster, often 1-3 months. Check the program's timeline in the official solicitation for specific dates.
Many federal programs offer multi-year funding or allow competitive renewals. Check the official solicitation for continuation and renewal policies. Non-competing continuation applications are common for multi-year awards.
The Mozilla Foundation Democracy x AI Cohort is a 12-month incubator program that funds 10 projects building AI technology at the intersection of artificial intelligence and democratic governance. Each selected project receives $50,000 in the Build Track for 12 months. Two finalists will advance to a Sustain Track worth an additional $250,000 per team to continue scaling impact, bringing total possible support to $300,000 per team. The cohort focuses on three categories: (1) information ecosystem resilience (tackling misinformation, building collective verification, improving algorithmic transparency); (2) institutional transparency and accountability (government data infrastructure, public records tools); and (3) civic space protection (privacy-preserving coordination for activists, surveillance resistance). Beyond funding, selected projects receive monthly cohort calls, expert mentorship, tailored workshops, and access to Mozilla's global network of technologists, activists, and funders. Initial proposals due March 16, 2026 at 11:59 PM Pacific. Full proposals due April 30, 2026. Selections announced mid-June 2026 with the cohort launching June 2026.
Mozilla Technology Fund is sponsored by Mozilla Foundation. The Mozilla Technology Fund supports open source projects at the intersection of environmental justice and AI, aiming to make a positive impact in ecosystems and human communities. Mozilla's current strategic focus centers on trustworthy AI, internet health, data stewardship, and digital rights.
America's Seed Fund (SBIR/STTR) - Cybersecurity and Authentication is sponsored by U.S. National Science Foundation (NSF). Supports startups and small businesses to translate research into products and services, including cybersecurity and authentication, to secure national defense and protect the public. Includes research requiring privacy and security-preserving resources for artificial intelligence.
Local Government Cybersecurity Grant Program (Florida) is sponsored by Florida Digital Service. This Florida state grant program enhances cybersecurity resilience in local governments, with a priority focus on fiscally constrained rural areas. Rather than issuing direct funding, the Florida Digital Service will procure cybersecurity solutions directly on behalf of awarded applicants. The grant supports new or expanded capabilities in preventing, detecting, responding to, and recovering from cyber threats.