Confidentiality

Confidentiality

What Materials Are Confidential

Our Best Practices for Confidentiality

All submitted materials, manuscripts, data, reviewer feedback, editorial correspondence, are strictly confidential. They must not be shared, disclosed, or used outside authorized editorial processes without explicit permission.

By accepting a review, reviewers agree to keep the manuscript and related materials private. They must not distribute or upload them to external platforms (including AI systems) unless confidentiality, privacy, and data-use standards are ensured. Reviewers also must never use unpublished data, ideas, or findings from the review for personal research or benefit.

Editors and staff must safeguard decision rationale, reviewer identities, and internal communications. Information gained through editorial work, including methods, ideas, or data, must not be exploited for external use without written permission.

Confidentiality obligations persist even if a manuscript is rejected, withdrawn, or transferred. Review reports, editorial correspondence, and decision letters may not be disclosed or published without explicit consent.

In cases of suspected misconduct (e.g. plagiarism, data fabrication), limited disclosure to institutions, oversight bodies, or funders may occur, but always under controlled conditions, respecting privacy, procedural fairness, and journal policy. If open peer review is used, reviewer identities or reports may be made public, but only under prior policy and consent. Confidentiality does not apply to content already publicly available.

When using AI tools or external platforms, we require assurances of confidentiality and data protection. Manuscript content, reviewer reports, or internal communication must never be uploaded to systems that do not meet our privacy and security standards.

Duties & Responsibilities

Editors & Staff

Reviewers

Authors

Data Protection & Confidentiality in Research

To further reinforce privacy and trust, authors conducting empirical or human-subject research should observe the following safeguards

Planning & Oversight

Confidentiality protocols should be in place before data collection begins, with the Principal Investigator (PI) responsible for data security, oversight, and compliance.

Access Control

Limit data access to only essential team members; restrict permissions based on roles and necessity.

Physical Security

Hardcopy materials (surveys, logs, consent forms) should be stored in locked cabinets or secure rooms with limited public access. Identifying information should be coded or anonymized, with decryption keys stored separately.

Team Training

Every research team member must receive training in data handling, confidentiality, and secure procedures before interacting with sensitive information.

Electronic Data Security

Use encryption (at rest and in transit), strong passwords, regular password changes, firewalls, intrusion detection, and antivirus software. Restrict wireless and cloud access where possible.

Backups & Version Control

Maintain regular backups (onsite, offsite) of datasets and associated files, with clear version tracking.

Data Lifecycle Management

After use, data must be securely archived, anonymized, or destroyed per preplanned protocols.

Third-Party Services

If external IT or storage services are used, they must comply with confidentiality, privacy, and contract terms that guarantee data protection.

Risks, Implications & Vigilance

Exceptions & Ethical Disclosures

We welcome authors, institutions, reviewers, and partners to join us in this green mission

In cases of confirmed misconduct, such as falsification, plagiarism, or ethical breaches, limited, controlled disclosures may be made to relevant institutions, funders, or oversight committees, following due process.

Written agreements between publishers and editors should define terms, responsibilities, and dispute resolution processes.

Editorial decisions should not be influenced by commercial, political, or personal interests.

For more about how we protect personal information and maintain privacy, see our Data Care policy page