Confidentiality Protocols

Editors

All submitted manuscripts are treated as confidential intellectual property. Editors must not disclose, distribute, or discuss any part of a submission—including data, findings, or supplementary materials—outside of the editorial team and assigned peer reviewers. Under no circumstances may unpublished content be used for personal research or institutional purposes.

Reviewers

Reviewers are required to treat manuscripts as confidential documents. Reviewers must not:

  • Share, copy, or store content in any form (print or digital).

  • Discuss the manuscript with third parties without editorial authorization.
    All materials must be securely deleted or disposed of following the completion of the review.

Journal Staff

Administrative staff involved in manuscript processing are bound by confidentiality agreements. Access to the manuscript submission system is strictly limited to authorized personnel. All content handling must be secure and compliant with journal protocols.


2. Confidentiality in the Peer Review Process

Double-Blind Protocol

IJBMFI operates a double-blind peer review model. Editors must ensure that all author-identifying details (e.g., names, affiliations, acknowledgments) are removed before sending the manuscript to reviewers.

Reviewer Anonymity

Reviewer identities remain confidential and must never be disclosed to authors or other reviewers—during or after the review. Editors are responsible for ensuring system settings and communication practices protect reviewer anonymity at all times.


3. Confidential Correspondence

Author Communications

All editorial correspondence with authors—including review reports, revision requests, and final decisions—must be handled confidentially. Only authorized members of the editorial team may access or send such communications. Forwarding reviewer comments or emails without proper approval is strictly prohibited.

Reviewer Communications

Correspondence with reviewers must also be treated as confidential. Editorial instructions and manuscript details should not be shared beyond the intended reviewer. Reviewer comments shared with authors must be anonymized and free of any identifying language.


4. Data Security and Document Handling

Access Control

Only authorized users may access the IJBMFI manuscript management system. Editors, staff, and reviewers are responsible for protecting their login credentials and following best practices for secure digital access.

Secure Storage and Handling

Manuscript files handled outside the system must be stored in secure, password-protected environments. Files must not be saved on public or unsecured devices. Sharing content with unauthorized individuals is strictly prohibited.


5. Post-Decision Confidentiality

Rejected Submissions

Rejected manuscripts and associated review reports must remain confidential. No part of the content may be reused, referenced, or disclosed by any party. Locally stored copies should be deleted or archived in accordance with journal policy.

Published Articles

While the content of published manuscripts becomes publicly accessible, all records related to the peer review process—including reviewer identities, editorial discussions, and decision rationales—must remain confidential indefinitely.


6. Breach of Confidentiality

Investigation and Response

Any suspected or confirmed breach of confidentiality will be promptly investigated by the editorial office. The affected parties will be informed, and remedial actions will be taken to prevent further violations.

Consequences

Violations of confidentiality may result in disciplinary measures, including:

  • Removal from the reviewer or editorial board.

  • Restriction of access to the submission system.

  • Notification of the violator’s institution, where appropriate.

These protocols reflect IJBMFI’s unwavering commitment to ethical publishing and professional responsibility. Full compliance is expected from all contributors, and adherence will be monitored as part of the journal’s editorial governance.