Confidentiality Protocols
Confidentiality Protocols Given the sensitive nature of clinical data, TPT enforces the strictest confidentiality protocols to protect both authors and research participants.
1. Confidentiality of Manuscripts
-
Clinical Privacy: Editors and reviewers must treat case studies and clinical data as highly sensitive. Disclosure of participant details is a primary violation.
-
Restricted Access: Manuscript access is limited to the minimum number of personnel required for evaluation.
2. Double-Blind Protection
-
Identity Concealment: Identities are hidden to ensure clinical evaluations are based solely on scientific merit.
-
System Security: Editorial platforms are audited to ensure reviewer names are never disclosed.
3. Secure Storage and Data Protection
-
Encryption: All files must be stored on encrypted, password-protected devices.
-
Deletion: Full deletion of all materials related to rejected or published manuscripts (except for required archival records) is mandatory for reviewers.
4. Ethical Oversight: TPT operates under COPE and ICMJE standards. Breaches result in immediate revocation of system access.