Confidentiality Protocols

Moving forward with the Confidentiality Protocols for journals 6 through 10, focusing on technical data security, clinical privacy, and policy integrity:


6. Higher Education and Intelligent Systems Journal (HEISJ)

Confidentiality Protocols Maintaining strict confidentiality is fundamental to the ethical integrity and technical security of the editorial process at HEISJ.

1. Confidentiality of Manuscripts

  • For Editors: Manuscripts are privileged materials. Editors must not use unpublished algorithms, code, or datasets for personal academic benefit or share them externally.

  • For Reviewers: All submissions are treated as confidential intellectual property. Digital copies must be securely deleted once the review is finalized.

  • For Staff: Access is restricted to designated personnel via secure, password-protected systems.

2. Peer Review Integrity

  • Double-Blind Model: Author identities are concealed from reviewers to ensure unbiased technical evaluation.

  • Reviewer Anonymity: Reviewer names remain strictly confidential and must never be disclosed to authors or external parties.

3. Data Protection

  • Secure Handling: Manuscript files must be stored on encrypted devices. Cloud storage is only permitted if it meets institutional data protection standards.

  • Post-Decision: Materials from rejected papers—including technical documentation—remain confidential and must be deleted.