How Do You Handle Confidentiality?

You’re about to share your dissertation with people outside your university.
Your original research. Your proprietary data. Maybe interview transcripts with sensitive information. Maybe datasets from your employer. Maybe findings that could be published in top journals if they stay confidential until you’re ready.
And you’re wondering: can I trust these people with my work? What happens to my files after they edit them? Who else might see my research? Could my ideas get stolen or shared?
These are legitimate concerns. Horror stories exist about dissertation mills that resell student work, use your research as examples for future clients, or farm out editing to random freelancers who have no accountability.
Let me give you the reassurance you need right up front: We maintain strict confidentiality from day one through final approval and beyond.
Short answer: NDAs plus secure processes plus minimal-access workflows.
Long answer: Confidentiality isn’t an afterthought for us—it’s built into every aspect of how we operate. Before you share any materials, you receive a mutual non-disclosure agreement. Only your assigned professor and a quality assurance reviewer (when required) access your files. We use encrypted storage and transfer. We follow your IRB protocols for sensitive data. We delete files when you request it.
Most of all, we’re real professors with reputations and careers at stake. We don’t resell work. We don’t use your research as training examples. We don’t farm editing out to anonymous contractors. Your confidentiality is protected by legal agreements, technical safeguards, and professional ethics.
Let me walk you through exactly how we handle confidentiality at every stage.
NDAs and Legal Protections
Before you share a single file with us, you receive a mutual non-disclosure agreement.
This isn’t some vague promise of confidentiality. It’s a legally binding contract that specifies:
- What information is considered confidential (your dissertation content, data, research findings, communications)
- How that information can and cannot be used (only for providing editing and mentoring services to you)
- Who can access it (only personnel directly working on your project)
- How long confidentiality lasts (perpetually, even after services are complete)
- Remedies if confidentiality is breached (legal liability and damages)
The NDA makes clear that you remain the sole author and rights holder of your intellectual property. We don’t claim any ownership of your research, your data, your findings, or your dissertation. You’re hiring us for a service, not transferring any rights to your work.
This is fundamentally different from some academic services that include language in their terms claiming ownership or usage rights to work you commission. Read those terms carefully—many dissertation mills want the right to use your work as examples, repurpose your content, or even resell portions to other clients.
We have zero interest in your intellectual property. It’s yours, completely and permanently.
If you have school-specific or employer-specific confidentiality requirements, we can accommodate those with addenda to the standard NDA.
Maybe your university requires specific confidentiality language for dissertation work done with external consultants. Maybe your employer’s data comes with restrictions on who can access it and how it must be stored. Maybe you’re working with proprietary business information that has particular handling requirements.
Tell us your specific needs and we’ll adjust our NDA accordingly. Your confidentiality requirements become our confidentiality requirements.
Data Handling and Access Control
Confidentiality requires limiting who sees your work. We operate on need-to-know access only.
Your assigned PhD professor works directly on your dissertation. That’s one person who knows your research intimately—the same person from initial consultation through final approval.
When quality assurance review is required (typically before major submissions), a second PhD-level reviewer checks your dissertation for errors and consistency. That reviewer signs the same NDA and follows the same confidentiality protocols.
That’s it. Two people maximum who access your complete files. No administrative assistants browsing your research. No junior editors practicing on your chapters. No rotating cast of different people seeing your work.
This controlled access serves multiple purposes. Obviously it protects confidentiality. But it also ensures consistency—you’re not explaining your research to different people repeatedly or getting conflicting guidance from multiple editors who don’t communicate with each other.
No subcontracting to anonymous freelancers. This is critical. Many editing services advertise themselves as companies but actually operate as brokers—they take your money and farm the work out to whoever’s available on freelance platforms. You have no idea who’s editing your dissertation. That person might be qualified. They might not be. They definitely haven’t signed any confidentiality agreement with you.
We don’t operate that way. The professor you consult with is the professor who works on your dissertation. We don’t hand your files off to strangers.
No AI tools used to generate content. AI language models train on data they process. When you input your dissertation into ChatGPT or similar tools, you’re potentially exposing your research to the company operating that tool. Their terms of service may allow them to use your input for training future models, which means your confidential research could end up incorporated into an AI that other people query.
We don’t use AI to write or edit your dissertation. Real professors only. This protects confidentiality and ensures quality, since AI can’t do original scholarly research anyway.
Role-based permissions control who can see what. Your assigned professor has full access to your working files. Quality reviewers see only final drafts at specific milestones. Administrative staff handling invoicing or scheduling never access your academic content.
This compartmentalization ensures that even internally, people who don’t need to see your research don’t see it.
Secure Storage and Transfer
Technical security matters as much as access controls.
Encrypted storage means your files are stored with industry-standard encryption at rest. If someone somehow accessed our storage systems (which they can’t, but hypothetically), they’d see encrypted data they can’t read without decryption keys.
Encrypted-in-transit file exchange protects files when you send them to us and when we send revisions back to you. We don’t email Word documents as unencrypted attachments. We use secure file transfer protocols that encrypt data during transmission.
Supported channels include:
- Your university’s Google Drive or OneDrive with appropriate permission settings
- SFTP (Secure File Transfer Protocol) if you prefer that method
- Secure portals that meet healthcare or business data security standards if your research requires that level of protection
You choose the transfer method that meets your comfort level and any institutional requirements you’re under.
Versioned backups ensure we don’t lose your work if technical issues occur, but those backups follow the same security protocols as active files. Encrypted storage. Access controls. Retention limits.
Audit trails track who accessed what files when. If you ever need to verify that confidentiality was maintained, we can provide logs showing exactly who opened your dissertation and when. This documentation can be important if your university or employer requires proof of data handling practices.
Sensitive Materials and Human Subjects
Dissertations involving human subjects research require special confidentiality considerations.
We respect IRB protocols and embargoes. If your IRB approval includes specific confidentiality requirements for how data can be shared, stored, or reported, tell us those requirements and we’ll follow them precisely.
If your dissertation is under embargo—meaning it can’t be publicly shared until a certain date, typically to protect your ability to publish findings—we maintain that embargo. Your dissertation doesn’t get shared with anyone, doesn’t get used as an example, doesn’t get referenced publicly until you give permission.
De-identification of participant data in shared working files protects human subjects. If your dissertation includes interview transcripts, you should de-identify those before sharing them with us—removing names, replacing identifying details with pseudonyms, redacting information that could allow someone to identify participants.
If you need guidance on appropriate de-identification for your specific study, we can help. We know IRB standards and can advise on what needs to be redacted for different types of data.
Guidance on safe handling of transcripts, datasets, and consent records ensures you’re not inadvertently violating your IRB protocol by sharing materials inappropriately.
Generally, we need to see your analysis and reporting of data, not raw identifiable data itself. You can share:
- De-identified transcripts or excerpts showing themes and representative quotes
- Summary statistics and analysis output rather than individual-level data files
- Descriptions of your data collection process without consent forms containing participant signatures
If we do need to see raw data for any reason (for example, to verify that your statistical analysis was conducted correctly), we follow whatever confidentiality protocols your IRB requires—additional NDAs, HIPAA compliance, secure data use agreements, whatever applies to your research.
Confidential Communication Practices
Confidentiality extends beyond file handling to how we communicate about your work.
Private one-on-one meetings are the norm. We don’t discuss your research in group settings or copy other clients on emails mentioning your dissertation unless you explicitly request that.
Redaction of personal identifiers happens if we ever need to use your work as an example. For instance, if you give permission for us to mention your success in a testimonial, we’d redact your name, university, and any identifying details about your research unless you specifically approve sharing those.
We never use client work as examples in marketing or teaching without explicit written permission. And when permission is given, we redact anything you want kept private.
Optional code names or project IDs provide extra discretion if you want it. Instead of referring to your dissertation by your name, we can assign a project code. “Project Delta-7” instead of “Sarah Johnson’s dissertation on healthcare disparities.”
This is probably unnecessary for most clients, but it’s available if you’re working on particularly sensitive topics or if you’re concerned about anyone recognizing your research before it’s publicly defended.
Retention and Destruction Policy
You need to know what happens to your files after we’re done working together.
Our default retention window is 90 to 180 days after final delivery. This allows you time to complete your defense and handle any final committee revisions that might require our support. During this period, your files remain in secure storage with the same access controls and encryption.
After the retention period, we conduct secure deletion of your files. Not just moving them to a trash folder—actual secure deletion that overwrites data so it can’t be recovered.
Immediate purge available upon written request. If you want your files deleted before the standard retention period ends, just ask. We’ll delete them immediately and provide a confirmation certificate documenting the deletion.
This might be relevant if you’re publishing from your dissertation and want to ensure no copies exist outside your control. Or if employer confidentiality requirements dictate how long external parties can retain your data. Or if you simply want the peace of mind that your research isn’t sitting in anyone else’s systems.
One email requesting deletion, and it happens. With documentation provided for your records.
Third Parties and Subprocessors
You need to know if anyone else might see your work.
No resale, no disclosure, no training data use. Your dissertation never becomes a product we sell or share. It’s not training material for new editors. It’s not an example in our marketing. It’s not data we analyze for research purposes.
It’s your work, used only to provide services to you, then deleted when you’re done with us.
If specialized support is requested—for example, if you need a statistician to verify your regression analysis or a qualitative methods expert to review your coding—that specialist signs the same NDA and follows identical confidentiality controls.
You’d know before we brought in any additional expertise. We wouldn’t farm out a portion of your dissertation to a specialist without telling you and ensuring they’re bound by the same confidentiality protections you have.
Typically, additional specialists aren’t needed because the professor assigned to you has expertise in your methods. But if specialized review would benefit your dissertation, it happens with your knowledge and approval, under the same confidentiality protections.
The Real Professors Difference
Confidentiality with dissertation mills and paper mills is a joke. They’re churning out generic content for hundreds of clients, using templates and recycled material, often with anonymous contractors doing the actual work.
Real professors operate differently. We have reputations and careers to protect. We’re identifiable individuals with professional credentials, not anonymous services hiding behind websites.
We’re real professors with committee experience, not contractors with uncertain qualifications. Our names and credentials are associated with our work. We’re not some faceless entity you found online and hope is legitimate.
This accountability matters for confidentiality. If we violated your trust, it would destroy our professional reputations. That’s not something we’d risk under any circumstances.
Unlimited revisions without expanding the access circle. When your committee requests changes, the same professor who worked on your initial drafts handles revisions. We don’t bring in new people or expand who sees your work just because you’re in a revision cycle.
Consistent personnel throughout the process protects confidentiality and ensures continuity.
Alignment with your university’s confidentiality requirements means if your school has specific policies about external editing or consulting services, we’ll meet those requirements. Some universities want documentation of who worked on your dissertation and what services were provided. Some require consultants to sign institutional confidentiality agreements. Some have reporting requirements if you used external support.
Whatever your university needs, we’ll provide it. Confidentiality doesn’t mean hiding that you worked with us if your program requires disclosure—it means protecting your research content and data regardless of who knows you received editing support.
Your Research Stays Protected
Your ideas, your data, and your identity stay protected at every step of working with real professors.
Legal protections through NDAs. Technical safeguards with encrypted storage and transfer. Minimal access with only assigned personnel seeing your work. Respect for IRB protocols and embargo periods. Secure deletion when services are complete.
You’re not trusting strangers with your research. You’re working with identifiable PhD-level professors who have careers and reputations to protect. People who understand that confidentiality is non-negotiable in academic work.
Compare this to paper mills where you have no idea who’s actually editing your dissertation, where your work might get used as examples for other clients, where files might sit on unsecured servers indefinitely because the company doesn’t have serious data handling practices.
Your dissertation represents years of work. Your data might be proprietary, sensitive, or publishable. You can’t afford to trust it to services with weak confidentiality practices.
Working with real professors means confidentiality is guaranteed by legal agreements, protected by technical safeguards, and ensured by professional accountability.
Ready to work with people you can actually trust with your research? Ready for confidentiality protections that go beyond vague promises to actual enforceable agreements and secure practices?
Book a confidential consultation today. NDA available before we talk if you want it. We’ll discuss your confidentiality concerns, explain our protocols in detail, and customize protections to meet any special requirements your research involves.
Because your dissertation deserves the same confidentiality protections that professional research collaborations always include. And that’s exactly what working with real professors provides.