Our Privacy Policies
Our Privacy Policies

Our Privacy Policies

Our Privacy Policies.
We offer services to you combining head (cognition), heart (empathy), and hand (practice)!

 

TMCSF ESTABLISHED 1998

 

Our Privacy Policies.
Safely engaging in private moments in elevated or coastal regions can be invigorating and rejuvenate your vitality.

Learning Objectives

You after having read and reflected on this post have an opportunity to learn about the following.

Our Commitment to Privacy and Confidentiality

Both privacy and confidentiality are fundamental values in the context of mediation, counselling, the arts, and support services. We understand the importance of taking reasonable measures to safeguard personal information shared in these sensitive settings.

Our Digital Privacy Policies

We do not compile, sell, or share lists of names, preferences, or personal information to third-party organisations. Our website places a strong emphasis on user privacy by reducing the collection of data and information. It has been developed with a focus on safeguarding user privacy, keeping data and information collection to a minimum.

Important Caveats and our privacy policies

In certain situations, we may need to break confidentiality. For example, when there is :-

Imminent risk:

If we believe you are at risk of harm to yourself or others.

Legal obligations:

If we are required to report certain information by law.

In these rare instances, your safety and compliance with the law take priority over confidentiality.

 

Our Privacy Policies.
Your privacy and welfare include not just your physical health, but also your mental, social and, spiritual well-being.

 

Topics Covered

This blog post provides an outline of the following.

  • Privacy and technology: Both privacy and confidentiality are important in the context of mediation, counselling, and support services;
  • Our privacy policies and the digital environment: We do not compile or share lists of names and preferences for sale to organisations, and we streamline the functions on our website for ease of use;
  • Important caveats and our privacy policies: Should you be at imminent risk, pose a danger to others, or there are lawful requirements to report we do not maintain privacy; and,
  • How to contact us.

 

Our Privacy Policies.
Abraham Lake, Alberta: How many secrets from the past lay dormant in the frozen slab below?

 

Privacy and Technology

In industry, including the maritime sector, cybersecurity breaches occur (Muniz & Lakhani, 2018). Moreover, privacy and the right to have obsolete data and information deleted is essential in the digital age.

What is Technology?

Technology incorporates computers, communication, network and navigational aspects, and media. This includes mainframes, nets and hardware. Data and information is embedded in a worldwide framework, including Artificial Intelligence (AI). Wiggins et al. (2020) argued that AI and robots potentially limit human error in advanced areas such as surgery and interpret medical images. Nonetheless, Brown and Esterhuysen (2019) assert that when cybersecurity is breached, essential infrastructure, including power grids, can be incapacitated, leading to questionable democratic processes and the closure of hospitals.

The integrity of technological systems security has come under scrutiny. Ongoing discussions regarding the impact of human factors on the enhancement or limitation of cybersecurity within various industries, including maritime, are widespread (Direnzo, et al., 2017; Postman, 1993).

Tegmark (2017) mentioned that AI is being positioned to replace human ingenuity and labour. This ushers in attendant risks. AI can augment human creativity and labour. Nonetheless, regardless of the sophistication of technology, it remains susceptible to exploitation.

Our Privacy Policies and the Digital Environment

The American Convention on Human Rights (1978) recognised “Article 11. RIGHT TO PRIVACY. 1. Everyone has the right to have his honor respected and his dignity recognized.” We value and make reasonable efforts working towards data and information confidentiality and security. We apply two step verification, regular data and information monitoring, and information anonymization.

The online landscape is constantly changing, making it challenging to secure communications effectively. The original purpose for collecting data and information may become redundant and people have a right to have respect for correspondence (American Convention on Human Rights, 1978).

 

Our Privacy Policies.
Banff National Park, along with several other alpine parks, provides magnificent trees that offer shade, privacy, and an ideal spot for picnicking. Nevertheless, exercise caution, especially if you come across a tree that emits creaking sounds, as it may not possess the stability you desire.

 

Adopting Reasonable Measures

We take reasonable measures to safeguard the sensitive information required for our interactions with you. Moreover, our aim is to uphold your privacy and confidentiality while also being upfront about constraints in digital environments. Unfortunately, in such environments there are few guarantees.

Office of The Privacy Commissioner of Canada (2004) states, “Most non-profits are not subject to the Act because they do not engage in commercial activities.” It is essential that you know the limits and make informed support decisions. We respect and value your qualified confidentiality and privacy rights.

The relationship between computers and the internet is intertwined with a variety of intricate biological, economic, educational, legal, and psychological factors. The benefits of streamlining networked environments is significant.

 

Our Privacy Policies.
Implement technology that aligns with your mission, vision, values, strategic objectives, and remains within your financial constraints. There are instances where it is beneficial to focus on the bear aspects of technology.

 

We hold the view that simplifying our website by eliminating complex features such as unnecessary personal information is highly beneficial. It is undeniable that commercial websites can be crucial for government entities and businesses of all sizes, as their mission, vision, values, strategic planning, and budgeting are essential for safeguarding data, and information.

Our Servers

We aim to adhere to the principle of simplicity (Keep it Simple KIS). Our servers have the following features:

  • Password Safeguarded Directory;
  • SSL Manager;
  • SSL Certificate;
  • Firewall; and,
  • Two stage authentication processes.

 

Our Privacy Policies.
When you endeavour to understand the facets of your privacy and confidentiality, you may experience a sense of being in tumultuous waters, on the verge of being struck by jagged rocks.

 

Our Collection of Aggregated Data and Information

We are eager to communicate with you. At this time, we are in the process of collecting data and information, which encompasses aggregated details, and we store this material. We utilise cookies to analyse website traffic and improve your browsing experience. By continuing to navigate this site, you consent to our use of cookies. Your data will be combined with that of other users. Please be assured that we do not sell private or confidential information.

Caveats

There are exceptions to privacy in the circumstances, for example, where there is a substantive and imminent risk to self or others. Therefore,  please do not provide personal and sensitive details, such as your Social Insurance Number or financial data, through email. By doing so, you are accepting the potential risks involved. Moreover, your information may be processed in a foreign country and is accessible to law enforcement and national security authorities of that jurisdiction. For example, your Internet Protocol address allows computers linked to the Internet to know where to transmit data so that it reaches you.

We enhance the digital environment by simplifying functionality, thereby reducing the risks associated with the collection and storage of identity information. We are not responsible for external websites’ behaviours or policies. Finally, by using this website, including its architecture and functions, you agree to the Privacy Policies. If you have questions, please get in touch with us. There are limits to privacy and confidentiality, for example, when disclosure is necessary for the proper administration of justice, lawful proceedings, or where there is an impending risk of injury to you or others in situations of negligence.

In today’s interconnected world, the importance of privacy and wellbeing cannot be overstated. This is crucial for maintaining personal security and freedom, while promoting wellbeing focusing on enhancing the quality of life for all individuals. This helps prevent unauthorised access and protects people from potential harms such as identity theft, discrimination, or manipulation.

In Closing

This blog entry encompassed an examination of the following topics:

  • Privacy and technology;
  • Our privacy policies in the digital landscape; and,
  • Fundamental caveats and our privacy policies; and,
  • How to contact us.

References

A-C

American Convention on Human Rights, opened for signature 22 November 1969, 114 UNTS 123 (enacted into force 18 July 1978).
https://treaties.un.org/doc/Publication/UNTS/Volume%201144/volume-1144-I-17955-English.pdf

Brown, D., & Esterhuysen (2019). Why cybersecurity is a human rights issue, and it is time to start treating it like one. Association for Progressive Communications.

https://www.apc.org/en/news/why-cybersecurity-human-rights-issue-and-it-time-start-treating-it-one

D-M

Direnzo, J., Drumhiller, N. K., & Roberts, F. S. (2017). Preface. In J. Direnzo, N. K. Drumhiller & F. S. Roberts (Eds.). Issues in maritime cyber security (pp. ix–xiii). Westphalia Press.

https://westphaliapress.org/2017/06/26/issues-in-maritime-cyber-security/

Muniz, J., & Lakhani, A. (2018). Investigating the cyber breach. The digital forensics guide for the network engineer. Cisco Press.
https://www.ciscopress.com/store/investigating-the-cyber-breach-the-digital-forensics-9780134755816

O-Z

Office of the Privacy Commissioner of Canada (n.d). How PIPEDA applies to charitable and non-profit organizations.
https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/r_o_p/02_05_d_19/

Postman, N. (1993). Technopoly. The surrender of culture to technology. Vintage Books.

https://ia601802.us.archive.org/27/items/235p-technopoly-neil-postman/235p%20technopoly-neil-postman.pdf

Tegmark, M. (2017). Life 3.0: Being human in the age of artificial intelligence. Vintage Books.

https://mitpressbookstore.mit.edu/book/9781101970317

Wiggins, M.W., Aston, J., & Carrigan, A. (2020). Optimising the future of technology in organisations: A human factors perspective. Australian Journal of Management , 45 (3).
https://doi.org/10.1177/0312896220918915

How to Contact Us

Ⓒ TMCASF & TMCSF