MJH is committed to protecting the privacy of its users, including authors, reviewers, editors, and subscribers. This privacy statement outlines the types of personal information we collect, how we use it, and the steps we take to protect it.

Information Collection

MJH collects personal information from users in several ways, including:

  • Submissions: When authors submit manuscripts, we collect their names, email addresses, affiliations, and contact information.
  • Reviews: We collect the names and email addresses of reviewers who agree to evaluate manuscripts.
  • Subscriptions: Subscribers provide their names, email addresses, and payment information.
  • Website Usage: We may collect information about your interactions with our website, such as your IP address, browser type, and pages visited.  

Information Use

MJH uses personal information for the following purposes:

  • Manuscript Management: We use author and reviewer information to manage the submission, review, and publication process.
  • Communication: We use email addresses to communicate with authors, reviewers, editors, and subscribers about the journal and their submissions.
  • Subscription Fulfillment: We use subscriber information to process payments and fulfill subscriptions.
  • Website Analytics: We use website usage data to improve our website and services.

Information Sharing

MJH does not share personal information with third parties for marketing purposes. However, we may share your information with:

  • Manuscript Reviewers: We may share your manuscript with reviewers to facilitate the peer review process.
  • Editors and Editorial Board Members: We may share your information with editors and editorial board members to facilitate the publication process.
  • Service Providers: We may share your information with third-party service providers who help us operate our website and services.  

Data Security

MJH takes reasonable measures to protect personal information from unauthorized access, disclosure, alteration, and destruction. We use industry-standard security practices, including encryption and access controls.