This privacy statement outlines the journal's commitment to protecting the privacy of individuals who submit manuscripts, review articles, or otherwise interact with the journal. It details the types of information collected, how it is used, and the measures taken to ensure its security.

Information Collected

The journal may collect personal information from individuals, including but not limited to:

  • Author Information: Names, affiliations, email addresses, postal addresses, and contact phone numbers.
  • Reviewer Information: Names, affiliations, email addresses, postal addresses, and contact phone numbers.
  • Manuscript Submissions: Manuscript content, author names, affiliations, and contact information.
  • Correspondence: Email correspondence related to submissions, reviews, and other journal business.

How Information is Used

The journal uses personal information for the following purposes:

  • Manuscript Review Process: To facilitate the peer review process, including sending manuscripts to reviewers and communicating with authors.
  • Publication: To publish accepted manuscripts, including author names, affiliations, and contact information.
  • Journal Administration: To manage journal operations, such as subscription services, editorial correspondence, and website maintenance.
  • Research and Analysis: To conduct research and analysis related to journal readership, impact, and trends.

Information Sharing

The journal may share personal information with:

  • Peer Reviewers: To facilitate the peer review process.
  • Editorial Board Members: To support the editorial decision-making process.
  • Production and Publishing Partners: To facilitate the publication process.
  • Third-Party Service Providers: To assist with journal operations, such as website hosting, email delivery, and data analysis.

Data Security

The journal implements reasonable security measures to protect personal information from unauthorized access, disclosure, alteration, and destruction. These measures include:  

  • Access Controls: Restricting access to personal information to authorized personnel.
  • Encryption: Using encryption to protect sensitive data transmitted over the internet.
  • Regular Monitoring: Regularly monitoring systems for security vulnerabilities.
  • Data Retention: Retaining personal information only for as long as necessary to fulfill the purposes for which it was collected.