Skip to main content



Child-Maltreatment-Research-L (CMRL) List Serve

Browse All Past CMRL Messages

Welcome to the archive of past Child-Maltreatment-Research-L (CMRL) list serve messages (11,000+). The table below contains all past CMRL messages (text only, no attachments) from Nov. 20, 1996 - August 5, 2025 and is updated every two months.

Instructions: Postings are listed for browsing with the newest messages first. Click on the linked ID number to open a message.

Message ID: 10812
Date: 2020-04-22

Author:Kelly, Daniel

Subject:Re: secure texting with participants

First, who is telling you this isn’t secure enough and why? Second, who are you trying to secure the information from? If it is traffic over the net, is the texting application secure/encrypted? Happy to help, just need more information. Feel free to reach out privately, -Daniel --------------------------------------------------- Dr. Daniel P. Kelly Pronouns: he, him, his Assistant Professor of Instructional Technology Department of Educational Psychology and Leadership Texas Tech University - College of Education EDIT Master’s Degree Program Coordinator Affiliate Faculty - Human Development & Family Studies Editor-in-Chief – Journal of Foster Care Associate Editor – Engineering Design Graphics Journal Phone: 806.834.5391 daniel.kelly@ttu.edu http://drdanielkelly.com Attention: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom addressed. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please contact the sender by reply e-mail and destroy all copies of the original message. From: on behalf of "Silovsky, Jane F. (HSC)" Reply-To: "Child Maltreatment Researcher List (CMRL)" Date: Wednesday, April 22, 2020 at 8:49 AM To: "Child Maltreatment Researcher List (CMRL)" Subject: secure texting with participants What strategies and policies do research teams have in place to allow texting of research participants and keep this process secure? We previously have used encrypted cell phones for texting, but now have been told this isn’t secure enough because the cell phones of the participant isn’t encrypted. Participants do not want to be managing multiple devices. Any recommendations? Jane Silovsky

First, who is telling you this isn’t secure enough and why? Second, who are you trying to secure the information from? If it is traffic over the net, is the texting application secure/encrypted? Happy to help, just need more information. Feel free to reach out privately, -Daniel --------------------------------------------------- Dr. Daniel P. Kelly Pronouns: he, him, his Assistant Professor of Instructional Technology Department of Educational Psychology and Leadership Texas Tech University - College of Education EDIT Master’s Degree Program Coordinator Affiliate Faculty - Human Development & Family Studies Editor-in-Chief – Journal of Foster Care Associate Editor – Engineering Design Graphics Journal Phone: 806.834.5391 daniel.kellyttu.edu http://drdanielkelly.com Attention: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom addressed. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please contact the sender by reply e-mail and destroy all copies of the original message. From: on behalf of "Silovsky, Jane F. (HSC)" Reply-To: "Child Maltreatment Researcher List (CMRL)" Date: Wednesday, April 22, 2020 at 8:49 AM To: "Child Maltreatment Researcher List (CMRL)" Subject: secure texting with participants What strategies and policies do research teams have in place to allow texting of research participants and keep this process secure? We previously have used encrypted cell phones for texting, but now have been told this isn’t secure enough because the cell phones of the participant isn’t encrypted. Participants do not want to be managing multiple devices. Any recommendations? Jane Silovsky