 The main objective of a research in social sciences is primarily concerned with looking into minimizing the risk and managing the risk in social sciences. The benefit of research often lies in its importance of the knowledge to begin and to contribution is to make in science or to the contribution to the society in general. Here it is very important to see that whatever the research we are going to conduct in social sciences is either going to give some benefit to the society or to the mankind or any other person who is involved in the research directly or indirectly. But we also have to see that if there are any kind of the risk involved, the risk should be very minimum. So we have to either minimize the risk or either we have to manage the risk to see that the benefit should be must in a large size which should be delivered to the community. Most researches in social and behavioral sciences poses little or almost no research risk to the society but there are certain cases where scenario could be different. When the primary source of risk is nothing else but the data itself. So you know those situations where itself data is a threat to us, a risk, a source of contention. It is very important to see that how we have to protect the data. When a possible disclosure of participants' responses is a primary source of potential harm, data protection from the unauthorized access can be accompanied in various ways. So these various ways could be managed in different terms. Like probably when we are taking the data of the participants which is very sensitive nature in which there is some kind of information which can lead to their social identity, their psychological identity, their physical identity, any threat which can be a threat, then in that situation data code and then further decode is a very important process because we have to issue some identifiers, some codes so that we can save our data in any software in the computer, either it is data, either it is SPSS, either it could be any other statistical software or package but we have to give certain identification and codes to each participants so that their data is not being shown by their names, rather it is being shown by an IDC and a code. And when we need it, then a mechanism should also be available that if we have to identify that data as a potential threat, it seems to us that there is potential abuse in the data. It seems that there are some kind of symptoms which show the high intensity of psychological behavior. So, we have to remove all the direct identifiers as soon as possible so that we can decode that data. So, this is the process which we have to involve some systems so that we can minimize the risk so that the identity can be saved in computers so that it can not be misused during any data handling. So, we have to remove all the direct identifiers as soon as possible the data has been entered into the computer system, maintain the code list and data files in separate secure equations. Then use and protect computer passwords. First step, we have to take care of the protection of the data sheet and we have to put codes and identifiers on it. But the second step, the computer should have a password and login so that only relevant people can access that system. Then access and store data on computers without internet connections. This is something very important and this is something to be understood on the next level because when internet connectivity is available in a system, it is very easy to hack the data from there. So, by looking into the factors which can manage and minimize the risk, the next thing is to see that in certain circumstances, we can assure that here we can give the certificate of confidentiality and where we can waive the certificates of confidentiality looking at the potential participants who are going to participate in the study. Because it is very important that we do researches in social sciences where we cannot assure confidentiality and we have to see whether the informed consent will reveal our intentions and our objectives to the participants. Will there be a potential threat source for that, whether it is emotionally or sociably disturbed. So, in situations to see, we will talk about certificates of confidentiality further. Certificates of confidentiality are provided to protect identifiable research information from forced disclosure, it may be granted for studies collecting information that if disclosed could damage the financial standing, employability, insurability of the participants. So, if any of these three factors are involved, so we have to see that either the certificate of confidentiality should be given or not. These certificates do not overrule certain requirements and these requirements are to report suspicion of child, elder abuse or any other statement related reporting requirements. Confidentiality is very important but when it comes to a situation where there is an abuse going on, either it is an abuse on a child or a minor, either it is an abuse on a woman, whether it is economical abuse, social abuse, psychological abuse, physical abuse, violence, all of these we have to see that by ensuring a certificate of confidentiality, whether we are bringing security to the threat, if we feel that a researcher at some stage feels that he or she is bound to do that, because these certain situations to individual risk, confidentiality certificate maintained is not so important. Information that can be protected include substance abuse behavior, sexual attitude and preferences, genetic information and psychological well-being. These four are the main corners where we see that if someone is involved in any of the related to the poor paradigms which are enlisted here, they can be protected under the confidentiality certificate. Because if someone's psychological well-being is not disclosed openly, his sexual preferences and his genetic information are not open, then this is not going to give a threat to any other person. However, when it comes to abuse, neglect, trauma and any such thing, then the confidentiality certificate must be broken down. Now, managing other risks. Participants could be at risk simply by being involved in a study on stigmatization or illegal activity. One way to diminish their risk to exposure is to consider applying for a waiver of documentation of consent. If consent form is only document that links them to the study. Now, such potential situations where participating in a study itself is risky for you, where there is an illegal activity, where there is a study on such behavior which is not socially appropriate, where there is a stigma involved. If there is no need to document that we write down all the details of the volunteers, then we can waive it off so that it is not present as a proof that other people can manipulate it so that you participate in such research. So, I think one of a very good example for that is that in certain social circles where prostitution is considered to be a very illegal practice, if data is collected there, then consent form is not taken, the confidentiality certificate is insured, but their details, their residential address, the different methods to approach them, or their identity is not asked by them at all because they are only asking about their experiences, their issues, their psychosocial traumas are being asked, but it is not so important that their identity is also noted down. And this goes with all other sensitive cases such as HIV population and things like that. Participants may also be placed at risk by nature of inquiry and trauma. In certain situations, there are issues where there are some injuries or traumas which can be psychological or physical, if we expose them towards the questionnaire and interview items so that they can go back to their trauma. For instance, if someone has been through any rape victim or is suffering from this type of problem, if we are asking such sensitive questions in the interview, if we are taking all the consent from them to ask their identity she or he can go back to that situation where he or she has gained that experience, so that is also very traumatizing. So, it is very important to see this with sensitivity that what kind of the questions we are going to ask and either if the only document is the consent form and it is not that important to get it filled by them, then we can also waive it. In some studies, maybe involved a complete assessment of nature of the impact of trauma with the potential to be distressing to participants. Like if there is a grief trauma, at least we can talk about it. There is a chance of a distress cause. So, investigators need to plan appropriate resources such as supportive counseling, referrals and access to research staff. Why? Because in any situation where maybe the distressful symptoms may trigger, then we will need psychological counseling, assessment, referral because the well-being of the participants is very much important to the researcher and psychologist while conducting any research in social sciences.