Confidentiality Protocols

Confidentiality Protocols Given the sensitive nature of clinical data, TPT enforces the strictest confidentiality protocols to protect both authors and research participants.

1. Confidentiality of Manuscripts

  • Clinical Privacy: Editors and reviewers must treat case studies and clinical data as highly sensitive. Disclosure of participant details is a primary violation.

  • Restricted Access: Manuscript access is limited to the minimum number of personnel required for evaluation.

2. Double-Blind Protection

  • Identity Concealment: Identities are hidden to ensure clinical evaluations are based solely on scientific merit.

  • System Security: Editorial platforms are audited to ensure reviewer names are never disclosed.

3. Secure Storage and Data Protection

  • Encryption: All files must be stored on encrypted, password-protected devices.

  • Deletion: Full deletion of all materials related to rejected or published manuscripts (except for required archival records) is mandatory for reviewers.

4. Ethical Oversight: TPT operates under COPE and ICMJE standards. Breaches result in immediate revocation of system access.