
TMCSF ESTABLISHED 1998

Learning Objectives
You after having read and reflected on this post have an opportunity to learn about the following.
OUR COMMITMENT TO PRIVACY AND CONFIDENTIALITY
Both privacy and confidentiality are fundamental values in the context of mediation, counselling, the arts, and support services. To read more about privacy and the limitations of AI and technology generally read – Artificial Intelligence and Counselling. We understand the importance of taking reasonable measures to safeguard personal information shared in these sensitive settings.

Our Digital Privacy Policies
We do not compile, sell, or share lists of names, preferences, or personal information to third-party organisations. Our website places a strong emphasis on user privacy by reducing the collection of data and information. It has been developed with a focus on safeguarding user privacy, keeping data and information collection to a minimum.
Important Caveats and our privacy policies
In certain situations, we may need to break confidentiality. For example, when there is :-
Imminent risk:
If we believe you are at risk of harm to yourself or others.
Legal obligations:
If we are required to report certain information by law.
In these rare instances, your safety and compliance with the law take priority over confidentiality.

Topics Covered
This blog post provides an outline of the following.
- Privacy and technology: Both privacy and confidentiality are important in the context of mediation, counselling, and support services;
- Our privacy policies and the digital environment: We do not compile or share lists of names and preferences for sale to organisations, and we streamline the functions on our website for ease of use; and,
- Important caveats and our privacy policies: Should you be at imminent risk, pose a danger to others, or there are lawful requirements to report we do not maintain privacy.

Privacy and Technology
In industry, including the maritime sector, cybersecurity breaches occur (Muniz & Lakhani, 2018). Moreover, privacy and the right to have obsolete data and information deleted is essential in the digital age. Read more about this in telehealth.
What is Technology?
Technology incorporates computers, communication, network and navigational aspects, and media. This includes mainframes, nets and hardware. Data and information is embedded in a worldwide framework, including Artificial Intelligence (AI). Wiggins et al. (2020) argued that AI and robots potentially limit human error in advanced areas such as surgery and the interpretation of medical images. Nonetheless, Brown and Esterhuysen (2019) assert that when cybersecurity is breached, essential infrastructure, including power grids, can be incapacitated, leading to questionable democratic processes and the closure of hospitals.
The integrity of technological systems security has come under scrutiny. Ongoing discussions regarding the impact of human factors on the enhancement or limitation of cybersecurity within various industries, including maritime, are widespread (Direnzo et al., 2017; Postman, 1993). Tegmark (2017) mentioned that AI is being positioned to replace human ingenuity and labour. This ushers in attendant risks. AI can augment human creativity and labour. Nonetheless, regardless of the sophistication of technology, it remains susceptible to exploitation.
AI raises pertinent legal concerns, including autonomy, the formation of agreements, and the disparity and similarities between human and computer standards (Pagallo et al., 2023). These implications extend to privacy, digital environments, and potential caveats.
Our Privacy Policies and the Digital Environment
The American Convention on Human Rights (1978) recognised “Article 11. RIGHT TO PRIVACY. 1. Everyone has the right to have his honor respected and his dignity recognized.” We value and make reasonable efforts working towards data and information confidentiality and security. We apply two step verification, regular data and information monitoring, and information anonymization.
The online landscape is constantly changing, making it challenging to secure communications effectively. The original purpose for collecting data and information may become redundant and people have a right to have respect for correspondence (American Convention on Human Rights, 1978). Before sharing personal information online, please carefully consider the potential consequences and implications (Amin et al, 2024).

Adopting Reasonable Measures
We take reasonable measures to safeguard the sensitive information required for our interactions with you. Moreover, our aim is to uphold your privacy and confidentiality while also being upfront about constraints in digital environments. Unfortunately, in such environments there are few guarantees.
We do not engage in fundraising activities and do not sell, barter, or lease donor information (Office of The Privacy Commissioner of Canada, 2024).
It is crucial that you are aware there are privacy limitations involving electronic transactions and make informed decisions about your support. The relationship between computers and the Internet is intertwined with a variety of intricate biological, economic, educational, legal, and psychological factors. The benefits of streamlining networked environments is significant. We respect and value your qualified confidentiality and privacy rights.

We hold the view that simplifying our website by eliminating complex features such as unnecessary personal information is highly beneficial. It is undeniable that commercial websites can be crucial for government entities and businesses of all sizes, as their mission, vision, values, strategic planning, and budgeting are essential for safeguarding data, and information.
Our Servers
We aim to adhere to the principle of simplicity (Keep it Simple KIS). Our servers have the following features:
- Password Safeguarded Directory;
- Encryption; when possible;
- SSL Manager;
- SSL Certificate;
- Firewall;
- Two stage authentication processes; and,
- Regular Updates.

Our Collection of Aggregated Data and Information
We are eager to communicate with you. At this time, we are in the process of collecting data and information, which encompasses aggregated details, and we store this material. We utilise cookies to analyse website traffic and improve your browsing experience. By continuing to navigate this site, you consent to our use of cookies. Your data will be combined with that of other users. Please be assured that we do not sell private or confidential information.
Caveats
There are exceptions to privacy in the circumstances, for example, where there is a substantive and imminent risk to self or others. Therefore, please do not provide personal and sensitive details, such as your Social Insurance Number or financial data online. For example do not share financial information through our contact form. By doing so, you are accepting the potential risks involved with online communications. Moreover, your information may be processed in a foreign country and is accessible to law enforcement and national security authorities of that jurisdiction. For example, your Internet Protocol address allows computers linked to the Internet to know where to transmit data so that it reaches you.
We enhance the digital environment by simplifying functionality, thereby reducing the risks associated with the collection and storage of identity information. We are not responsible for external websites’ behaviours or policies. Finally, by using this website, including its architecture and functions, you agree to the Privacy Policies. If you have questions, please get in touch with us. There are limits to privacy and confidentiality, for example, when disclosure is necessary for the proper administration of justice, lawful proceedings, or where there is an impending risk of injury to you or others in situations of negligence.
In today’s interconnected world, the importance of privacy and wellbeing cannot be overstated. This is crucial for maintaining personal security and freedom, while promoting wellbeing focusing on enhancing the quality of life for all individuals. This helps prevent unauthorised access and protects people from potential harms such as identity theft, discrimination, or manipulation. We are unable to respond to unsolicited and generally spam messages and phone calls that do not provide adequate information regarding their purpose. Thank you for your understanding.

Key Considerations: Terms and Conditions
Kindly review the terms and conditions governing the use of this website. You acknowledge your responsibility to defend, indemnify, protect, and hold harmless TMCASF and TMCSF from any and all demands, liabilities, losses, costs, and claims.
Furthermore, you acknowledge and accept that your use of this website and the services offered herein is your own choice.
The information available through this website may contain errors such typographical flaws, and omissions. Updates to the content are made periodically. Moreover, please keep these and the following factors in mind.
Website Responsibility
TMCASF and TMCSF generally make diligent efforts to maintain the ongoing accessibility of this website. However, we are not liable for any consequential or indirect losses to the extent permitted by law. Also, we are not liable for technical errors, omissions, interruptions, or damages that may occur to your computer as a result of visiting this site. Additionally, we are not culpable for the uploading or downloading of software or materials.
Website Accuracy
TMCASF and TMCSF do not guarantee the precision or completeness of the information presented on this website. While we strive as available resources allow to provide accurate content on or accessible through this site, we do not warrant that the information contained herein is free from errors or that the website will be continuously available without interruption.
Website Purpose
Lord Wilberforce noted in dictum the significance of considering the intentions of all parties involved and the complexities of the environment in which the agreement is made (Brinkibon v Stahl and Stahlwarendelgessellschaft mBH [1983]).
This website is to provide content and this does not replace the necessity for specific advice relevant to your personal circumstances. The website is intended, for instance, for informational and educational support and should not be considered a substitute for professional advice.
You acknowledge and agree during your electronic transactions with TMSAF and TMCSF that no information or suggestions provided on or available through this website constitute professional advice (Argy & Martin, 2001; Forder & Svantesson, 2008). This advice, includes but is not limited to, health, legal, or financial.
Website Disclaimer
TMCASF and TMCSF disclaim all liability for any loss or damage resulting from the use of this website.
Third Party Links
TMCASF and TMCSF are not responsible for the content of third-party websites. We make no representations regarding the condition, content, or products offered on third-party websites. A link to a third-party website does not imply endorsement, either expressly or impliedly, of the website or its offerings (Register Com Inc. v. Verio Inc., 2004). Your access to any third-party websites and your use of their products or services is entirely at your personal discretion.
Intellectual Property
TMCASF and TMCSF retain ownership of the copyright and all other intellectual property rights associated with the website and its contents. TMCASF’s and TMCSF’s name, logo, graphics, photos, and designs are our exclusive property, and no permission is granted for their use. Except as expressly stated below, no part of this website may be altered, reproduced, or used for any purpose without our prior written and signed consent.
Overall, TMCSAF and TMCSF provide this website without warranty or guarantee. To the extent permissible by law, we our excluded from all liability and responsibility for loss or damage of any nature arising from or in connection with your access to or use of this website. Additionally, this is regardless of whether such loss or damage would arise in the ordinary course of events or otherwise, is reasonably foreseeable or otherwise, or is caused by any error or omission in the website.
In Closing
This blog entry encompassed an examination of the following topics:
- Privacy and technology;
- Our privacy policies in the digital landscape; and,
- Fundamental caveats and our privacy policies; and,
- How to contact us.
References
A-C
Amin, M. (2024, August 26). The Importance of Cybersecurity and Protecting of Digital Assets and Understanding the Role of Cybersecurity Laws in Safeguarding Digital Assets. Indian Journal of Public Administration. Sage.
https://journals.sagepub.com/doi/10.1177/00195561241271520
American Convention on Human Rights, opened for signature 22 November 1969, 114 UNTS 123 (enacted into force 18 July 1978). https://treaties.un.org/doc/Publication/UNTS/Volume%201144/volume-1144-I-17955-English.pdf
Argy, P. & Martin, N. (2001). The effective formation of contracts by electronic means. New South Wales Society for Computers and the Law.Australasian
https://www5.austlii.edu.au/au/journals/ANZCompuLawJl/2001/33.pdf
Brinkibon v Stahl and Stahlwarendelgessellschaft mBH [1983]
Brown, D., & Esterhuysen (2019). Why cybersecurity is a human rights issue, and it is time to start treating it like one. Association for Progressive Communications.
https://www.apc.org/en/news/why-cybersecurity-human-rights-issue-and-it-time-start-treating-it-one
Canadian Charter of Rights and Freedoms, s 7, Part I of the Constitution Act, 1982, being Schedule B to the Canada Act 1982 (UK), 1982, c11.
D-M
Direnzo, J., Drumhiller, N. K., & Roberts, F. S. (2017). Preface. In J. Direnzo, N. K. Drumhiller & F. S. Roberts (Eds.). Issues in maritime cyber security (pp. ix–xiii). Westphalia Press.
https://westphaliapress.org/2017/06/26/issues-in-maritime-cyber-security/
Forder, J, & Svantesson, D. (2008). Internet and E-Commerce Law.
Government of British Columbia (2018). British Columbia’s Coat of Arms.
Government of Canada (2024). Guide to the Canadian Charter of Rights and Freedoms.
Muniz, J., & Lakhani, A. (2018). Investigating the cyber breach. The digital forensics guide for the network engineer. Cisco Press. https://www.ciscopress.com/store/investigating-the-cyber-breach-the-digital-forensics-9780134755816
O-W
Office of the Privacy Commissioner of Canada (n.d). How PIPEDA applies to charitable and non-profit organizations. https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/r_o_p/02_05_d_19/
Pagallo, U., Bassi, E., & Durante, M. (2023). he Normative Challenges of AI in Outer Space: Law, Ethics, and the Realignment of Terrestrial Standards. Philosophy and Technology 36 (2).
Postman, N. (1993). Technopoly. The surrender of culture to technology. Vintage Books.
Register Com Inc. v. Verio Inc (2004).
https://caselaw.findlaw.com/court/us-2nd-circuit/1420249.html
Tegmark, M. (2017). Life 3.0: Being human in the age of artificial intelligence. Vintage Books.
https://mitpressbookstore.mit.edu/book/9781101970317
Wiggins, M.W., Aston, J., & Carrigan, A. (2020). Optimising the future of technology in organisations: A human factors perspective. Australian Journal of Management , 45 (3).
https://doi.org/10.1177/0312896220918915


