Our Privacy Policies
Our Privacy Policies

Our Privacy Policies

This image shows three triangles and a half Sun.
We offer services to you combining head (cognition), heart (empathy), and hand (practice)!

 

TMCSF ESTABLISHED 1998

 

Imagine you are standing in an impressive Legislature Building and as you look up you see an extraordinary flag with a combination of red and white.
The image above was taken at the British Columbia Legislature Building in Victoria. The full motto featuring the words in Latin ” Splendour Sine” is “Splendour sine occasu”. The English translation is “Splendour without diminishment”. You might also notice Canada’s national flag is proudly featured. In Canada, Section 8 of the Charter of Rights and Freedoms frequently protects individuals against unreasonable searches and seizures, which could also encompasses digital privacy, including the examination of electronic devices (Government of Canada, 2024).

 

Learning Objectives

You after having read and reflected on this post have an opportunity to learn about the following.

OUR COMMITMENT TO PRIVACY AND CONFIDENTIALITY

Both privacy and confidentiality are fundamental values in the context of mediation, counselling, the arts, and support services. To read more about privacy and the limitations of AI and technology generally read – Artificial Intelligence and Counselling. We understand the importance of taking reasonable measures to safeguard personal information shared in these sensitive settings.

 

Life can become overwhelming, making it essential to seek private moments in tranquil environments, as illustrated here, to unwind and rejuvenate.
Safely engaging in private moments in elevated or coastal regions can be invigorating and rejuvenate your vitality.

 

Our Digital Privacy Policies

We do not compile, sell, or share lists of names, preferences, or personal information to third-party organisations. Our website places a strong emphasis on user privacy by reducing the collection of data and information. It has been developed with a focus on safeguarding user privacy, keeping data and information collection to a minimum.

Important Caveats and our privacy policies

In certain situations, we may need to break confidentiality. For example, when there is :-

Imminent risk:

If we believe you are at risk of harm to yourself or others.

Legal obligations:

If we are required to report certain information by law.

In these rare instances, your safety and compliance with the law take priority over confidentiality.

 

 There are limits to confidentiality and privacy, including in the online realm. However, the aspirational goal of having one's communications realised is worthwhile. Ushering in metaphoric blue skies as featured here.
Your privacy and welfare include not just your physical health, but also your mental, social and, spiritual well-being.

 

Topics Covered

This blog post provides an outline of the following.

  • Privacy and technology: Both privacy and confidentiality are important in the context of mediation, counselling, and support services;
  • Our privacy policies and the digital environment: We do not compile or share lists of names and preferences for sale to organisations, and we streamline the functions on our website for ease of use; and,
  • Important caveats and our privacy policies: Should you be at imminent risk, pose a danger to others, or there are lawful requirements to report we do not maintain privacy.

 

This image was taken on frozen Abraham Lake, looking down on the methane bubbles below.
Abraham Lake, Alberta: How many secrets from the past lay dormant in the frozen slab below?

 

Privacy and Technology

In industry, including the maritime sector, cybersecurity breaches occur (Muniz & Lakhani, 2018). Moreover, privacy and the right to have obsolete data and information deleted is essential in the digital age. Read more about this in telehealth.

What is Technology?

Technology incorporates computers, communication, network and navigational aspects, and media. This includes mainframes, nets and hardware. Data and information is embedded in a worldwide framework, including Artificial Intelligence (AI). Wiggins et al. (2020) argued that AI and robots potentially limit human error in advanced areas such as surgery and the interpretation of medical images. Nonetheless, Brown and Esterhuysen (2019) assert that when cybersecurity is breached, essential infrastructure, including power grids, can be incapacitated, leading to questionable democratic processes and the closure of hospitals.

The integrity of technological systems security has come under scrutiny. Ongoing discussions regarding the impact of human factors on the enhancement or limitation of cybersecurity within various industries, including maritime, are widespread (Direnzo et al., 2017; Postman, 1993). Tegmark (2017) mentioned that AI is being positioned to replace human ingenuity and labour. This ushers in attendant risks. AI can augment human creativity and labour. Nonetheless, regardless of the sophistication of technology, it remains susceptible to exploitation.

AI raises pertinent legal concerns, including autonomy, the formation of agreements, and the disparity and similarities between human and computer standards (Pagallo et al., 2023). These implications extend to privacy, digital environments, and potential caveats.

Our Privacy Policies and the Digital Environment

The American Convention on Human Rights (1978) recognised “Article 11. RIGHT TO PRIVACY. 1. Everyone has the right to have his honor respected and his dignity recognized.” We value and make reasonable efforts working towards data and information confidentiality and security. We apply two step verification, regular data and information monitoring, and information anonymization.

The online landscape is constantly changing, making it challenging to secure communications effectively. The original purpose for collecting data and information may become redundant and people have a right to have respect for correspondence (American Convention on Human Rights, 1978). Before sharing personal information online, please carefully consider the potential consequences and implications (Amin et al, 2024).

 

If your confidences are not maintained the idea of travelling to a private beach just like this one can be appealing.
Banff National Park, along with several other alpine parks, provides magnificent trees that offer shade, privacy, and an ideal spot for picnicking. Nevertheless, exercise caution, especially if you come across a tree that emits creaking sounds, as it may not possess the stability you desire.

 

Adopting Reasonable Measures

We take reasonable measures to safeguard the sensitive information required for our interactions with you. Moreover, our aim is to uphold your privacy and confidentiality while also being upfront about constraints in digital environments. Unfortunately, in such environments there are few guarantees.

We do not engage in fundraising activities and do not sell, barter, or lease donor information (Office of The Privacy Commissioner of Canada, 2024).

It is crucial that you are aware there are privacy limitations involving electronic transactions and make informed decisions about your support. The relationship between computers and the Internet is intertwined with a variety of intricate biological, economic, educational, legal, and psychological factors. The benefits of streamlining networked environments is significant. We respect and value your qualified confidentiality and privacy rights.

 

Just as people need privacy and confidentiality so too do our pawed friends. Bears are featured in this image.
Implement technology that aligns with your mission, vision, values, strategic objectives, and remains within your financial constraints. There are instances where it is beneficial to focus on the bear aspects of technology.

 

We hold the view that simplifying our website by eliminating complex features such as unnecessary personal information is highly beneficial. It is undeniable that commercial websites can be crucial for government entities and businesses of all sizes, as their mission, vision, values, strategic planning, and budgeting are essential for safeguarding data, and information.

Our Servers

We aim to adhere to the principle of simplicity (Keep it Simple KIS). Our servers have the following features:

  • Password Safeguarded Directory;
  • Encryption; when possible;
  • SSL Manager;
  • SSL Certificate;
  • Firewall;
  • Two stage authentication processes; and,
  • Regular Updates.

 

Vancouver island's rugged and at times unforgiving coastline is depicted in this image. Sometimes, your right and hope for privacy are dashed rather like the waves upon these rocks.
When you endeavour to understand the facets of your privacy and confidentiality, you may experience a sense of being in tumultuous waters, on the verge of being struck by jagged rocks.

 

Our Collection of Aggregated Data and Information

We are eager to communicate with you. At this time, we are in the process of collecting data and information, which encompasses aggregated details, and we store this material. We utilise cookies to analyse website traffic and improve your browsing experience. By continuing to navigate this site, you consent to our use of cookies. Your data will be combined with that of other users. Please be assured that we do not sell private or confidential information.

Caveats

There are exceptions to privacy in the circumstances, for example, where there is a substantive and imminent risk to self or others. Therefore,  please do not provide personal and sensitive details, such as your Social Insurance Number or financial data online. For example do not share financial information through our contact form. By doing so, you are accepting the potential risks involved with online communications. Moreover, your information may be processed in a foreign country and is accessible to law enforcement and national security authorities of that jurisdiction. For example, your Internet Protocol address allows computers linked to the Internet to know where to transmit data so that it reaches you.

We enhance the digital environment by simplifying functionality, thereby reducing the risks associated with the collection and storage of identity information. We are not responsible for external websites’ behaviours or policies. Finally, by using this website, including its architecture and functions, you agree to the Privacy Policies. If you have questions, please get in touch with us. There are limits to privacy and confidentiality, for example, when disclosure is necessary for the proper administration of justice, lawful proceedings, or where there is an impending risk of injury to you or others in situations of negligence.

In today’s interconnected world, the importance of privacy and wellbeing cannot be overstated. This is crucial for maintaining personal security and freedom, while promoting wellbeing focusing on enhancing the quality of life for all individuals. This helps prevent unauthorised access and protects people from potential harms such as identity theft, discrimination, or manipulation. We are unable to respond to unsolicited and generally spam messages and phone calls that do not provide adequate information regarding their purpose. Thank you for your understanding.

Check out this photo of a hiker exploring Banff National Park. They’re getting their bearings near Johnson Lake, with a hiking trail and a waterway in the background.
Please discover the terms and conditions that regulate the use of this website.

Key Considerations: Terms and Conditions

Kindly review the terms and conditions governing the use of this website. You acknowledge your responsibility to defend, indemnify, protect, and hold harmless TMCASF and TMCSF from any and all demands, liabilities, losses, costs, and claims. 

Furthermore, you acknowledge and accept that your  use of this website and the services offered herein is your own choice. 

The information available through this website may contain errors such typographical flaws, and omissions. Updates to the content are made periodically. Moreover, please keep these and the following factors in mind.

Website Responsibility

TMCASF and TMCSF generally make diligent efforts to maintain the ongoing accessibility of this website. However, we are not liable for any consequential or indirect losses to the extent permitted by law. Also, we are not liable for technical errors, omissions, interruptions, or damages that may occur to your computer as a result of visiting this site. Additionally, we are not culpable for the uploading or downloading of software or materials.  

Website Accuracy

TMCASF and  TMCSF do not guarantee the precision or completeness of the information presented on this website. While we strive as available resources allow to provide accurate content on or accessible through this site, we do not warrant that the information contained herein is free from errors or that the website will be continuously available without interruption.

Website Purpose

Lord Wilberforce noted in dictum the significance of considering the intentions of all parties involved and the complexities of the environment in which the agreement is made (Brinkibon v Stahl and Stahlwarendelgessellschaft mBH [1983]).  

This website is to provide content and this does not replace the necessity for specific advice relevant to your personal circumstances. The website is intended, for instance, for informational and educational support and should not be considered a substitute for professional advice.

You acknowledge and agree during your electronic transactions with TMSAF and TMCSF that no information or suggestions provided on or available through this website constitute professional advice (Argy & Martin, 2001; Forder & Svantesson, 2008). This advice, includes but is not limited to, health, legal, or financial. 

Website Disclaimer

TMCASF and TMCSF disclaim all liability for any loss or damage resulting from the use of this website.

Third Party Links

TMCASF and TMCSF are not responsible for the content of third-party websites. We make no representations regarding the condition, content, or products offered on third-party websites. A link to a third-party website does not imply endorsement, either expressly or impliedly, of the website or its offerings (Register Com Inc. v. Verio Inc., 2004). Your access to any third-party websites and your use of their products or services is entirely at your personal discretion.

Intellectual Property

TMCASF  and TMCSF retain ownership of the copyright and all other intellectual property rights associated with the website and its contents. TMCASF’s and TMCSF’s name, logo, graphics, photos, and designs are our exclusive property, and no permission is granted for their use. Except as expressly stated below, no part of this website may be altered, reproduced, or used for any purpose without our prior written and signed consent.

Overall, TMCSAF and TMCSF provide this website without warranty or guarantee. To the extent permissible by law, we our excluded from all liability and responsibility for loss or damage of any nature arising from or in connection with your access to or use of this website. Additionally,  this is regardless of whether such loss or damage would arise in the ordinary course of events or otherwise, is reasonably foreseeable or otherwise, or is caused by any error or omission in the website. 

In Closing

This blog entry encompassed an examination of the following topics:

  • Privacy and technology;
  • Our privacy policies in the digital landscape; and,
  • Fundamental caveats and our privacy policies; and,
  • How to contact us.

References

A-C

Amin, M. (2024, August 26). The Importance of Cybersecurity and Protecting of Digital Assets and Understanding the Role of Cybersecurity Laws in Safeguarding Digital Assets. Indian Journal of Public Administration. Sage.

https://journals.sagepub.com/doi/10.1177/00195561241271520

American Convention on Human Rights, opened for signature 22 November 1969, 114 UNTS 123 (enacted into force 18 July 1978).
https://treaties.un.org/doc/Publication/UNTS/Volume%201144/volume-1144-I-17955-English.pdf

Argy, P. & Martin, N. (2001). The effective formation of contracts by electronic means. New South Wales Society for Computers and the Law.Australasian
https://www5.austlii.edu.au/au/journals/ANZCompuLawJl/2001/33.pdf

Brinkibon v Stahl and Stahlwarendelgessellschaft mBH [1983]

Brown, D., & Esterhuysen (2019). Why cybersecurity is a human rights issue, and it is time to start treating it like one. Association for Progressive Communications.

https://www.apc.org/en/news/why-cybersecurity-human-rights-issue-and-it-time-start-treating-it-one

Canadian Charter of Rights and Freedoms, s 7, Part I of the Constitution Act, 1982, being Schedule B to the Canada Act 1982 (UK), 1982, c11.

D-M

Direnzo, J., Drumhiller, N. K., & Roberts, F. S. (2017). Preface. In J. Direnzo, N. K. Drumhiller & F. S. Roberts (Eds.). Issues in maritime cyber security (pp. ix–xiii). Westphalia Press.

https://westphaliapress.org/2017/06/26/issues-in-maritime-cyber-security/

Forder, J, & Svantesson, D. (2008). Internet and E-Commerce Law. 

Government of British Columbia (2018). British Columbia’s Coat of Arms.

https://www2.gov.bc.ca/gov/content/governments/celebrating-british-columbia/symbols-of-bc/coat-of-arms

Government of Canada (2024). Guide to the Canadian Charter of Rights and Freedoms.

https://www.canada.ca/en/canadian-heritage/services/how-rights-protected/guide-canadian-charter-rights-freedoms.html

Muniz, J., & Lakhani, A. (2018). Investigating the cyber breach. The digital forensics guide for the network engineer. Cisco Press.
https://www.ciscopress.com/store/investigating-the-cyber-breach-the-digital-forensics-9780134755816

O-W

Office of the Privacy Commissioner of Canada (n.d). How PIPEDA applies to charitable and non-profit organizations.
https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/r_o_p/02_05_d_19/

Pagallo, U., Bassi, E.,  & Durante, M. (2023). he Normative Challenges of AI in Outer Space: Law, Ethics, and the Realignment of Terrestrial Standards. Philosophy and Technology 36 (2).

Postman, N. (1993). Technopoly. The surrender of culture to technology. Vintage Books.

https://ia601802.us.archive.org/27/items/235p-technopoly-neil-postman/235p%20technopoly-neil-postman.pdf

Register Com Inc. v. Verio Inc (2004).
https://caselaw.findlaw.com/court/us-2nd-circuit/1420249.html

Tegmark, M. (2017). Life 3.0: Being human in the age of artificial intelligence. Vintage Books.

https://mitpressbookstore.mit.edu/book/9781101970317

Wiggins, M.W., Aston, J., & Carrigan, A. (2020). Optimising the future of technology in organisations: A human factors perspective. Australian Journal of Management , 45 (3).
https://doi.org/10.1177/0312896220918915

How to Contact Us

Ⓒ TMCASF & TMCSF 1998-2025