Confidentiality Protocols

ECRL prioritizes technical data security to protect the intellectual property of engineering and computing researchers.

1. Confidentiality of Manuscripts

  • Technical IP: Manuscripts are confidential intellectual property. Reviewers must not use unpublished technical proofs or software designs for personal gain.

  • Deletion: Any digital or printed copies of the manuscript must be destroyed after the review process is complete.

2. Secure Handling and Access

  • System Access: Access is restricted to authorized personnel. All users are responsible for protecting their login credentials.

  • File Transfer: Sharing files outside the secure editorial platform is strictly prohibited without formal approval.

3. Post-Decision Confidentiality

  • Unpublished Content: Editors and reviewers are prohibited from using or citing ideas from rejected manuscripts.

  • Ongoing Commitment: ECRL adheres to COPE guidelines, treating all review histories as confidential records.