Confidentiality Protocols
ECRL prioritizes technical data security to protect the intellectual property of engineering and computing researchers.
1. Confidentiality of Manuscripts
-
Technical IP: Manuscripts are confidential intellectual property. Reviewers must not use unpublished technical proofs or software designs for personal gain.
-
Deletion: Any digital or printed copies of the manuscript must be destroyed after the review process is complete.
2. Secure Handling and Access
-
System Access: Access is restricted to authorized personnel. All users are responsible for protecting their login credentials.
-
File Transfer: Sharing files outside the secure editorial platform is strictly prohibited without formal approval.
3. Post-Decision Confidentiality
-
Unpublished Content: Editors and reviewers are prohibited from using or citing ideas from rejected manuscripts.
-
Ongoing Commitment: ECRL adheres to COPE guidelines, treating all review histories as confidential records.