Code of Ethics
Time Dynamics' products and services should empower individuals and organizations to contribute constructively to society and their own lives.
Time Dynamics Ltd offers powerful tools for the purposes of time management but we do not wish to support unethical, predatory or criminal practices. To this
end we have defined a Code of Ethics to define businesses we do wish to engage with, and those we do not.
We hope to engage with businesses that aim to be a constructive and productive force in society. Businesses contributing to engineering, science and technology,
art and design, innovation and industry, businesses that promote truth, justice, peace and liberty, businesses that recognize their responsibilities
beyond their immediate financial goals, actively seek opportunities for improvement and aim to build a brighter future not only for themselves but also
the rest of the world.
We aim to build long productive business relationships, to inspire progress towards a constructive and cooperative future for the world.
Your Data
We consider all data provided by you, that is not in the public domain, to be your data, irrespective of local legislation. Our commitment to your data privacy
and security is fundamental to maintaining our service effectively. We currently adopt common accepted practices to ensure that data is handled responsibly
and securely, including but not limited to;
- Use of https for secure communication between client browsers and our server,
- Use of a second layer of basic encryption so as to avoid URL spoofing,
- From time to time we conduct vulnerability assessments to ensure our systems are resilient against breaches.
Additionally, our server and database is written in house in Ada, the language used by life critical systems such as air-traffic control, aerospace and many
railways. This means we are not vulnerable to the many of the classic server attacks such as;
- PHP or SQL Injection. Our server uses niether.
This is our normal domestic level of service and ranks as equally secure to many other primary internet services.
For international business activities with significant incentives to attract espionage by intelligence agencies and other advanced operators we recommend;
- Not using services provided over the internet,
- Using in-house servers only or software installed on local machines with encrypted hard drives,
- Running a secure LAN to the Internet even with a firewall,
- Enquiring about high security applications to be released in the future subject to demand.
Your data is your data so we aim to;
- Ensure transparency with you about the data we hold,
- We will delete data at any time at your request unless we suspect premeditated or reckless predatory, unethical or criminal practices,
- We will notify you in a timely manner should a data breach occur while taking corrective actions to minimize the impact.
By adopting these practices, we aim to create a safe and secure environment for clients, where their information is respected and protected.
Transparency and Accountability
We prioritize transparency and accountability in all aspects of our operations, clear communication and openness with our clients is key. We aim to;
- providing clear policies to assist clients in making informed decisions about their use of our products and services,
- respond to inquiries promptly and with transparency,
- be forthright about any challenges we face, along with our strategies for addressing them,
- take swift and appropriate corrective actions when we identify issues or failures, learning and improving,
- provide clear communication channels for clients to ask questions, share feedback, and express concerns,
- keep clients informed about the direction of the company.
Unintended Unethical Use
Where we suspect unintended, unethical or criminal practices, we will first reserve the right to take action without notification which means:
- First, advise the company of the situation and ask for clarification in case we are mistaken,
- Second, if we are not mistaken we will ask for remedial action to be taken,
- Third, we will make reasonable efforts to support remedial action,
- Fourth, if remedial action does not begin promptly, we will take steps to withdraw the service, minimising the inconvenience of doing so, for the client, as best we decide we are able.
Intended Unethical Use
Where we have reason to suspect premeditated or reckless predatory, unethical or criminal practices We reserve the right to act with prior notice which means:
- Examining client data, without notification, to the extent necessary to verify non-compliance while maintaining confidentiality,
- Where malpractice is confirmed, collect evidence from client data, and pass it to the relevant authorities, inside or outside the client's organisation, as we see fit,
- Terminate the business relationship as soon as possible with speed appropriate to the degree of non-complience.
- These actions may be emmediate and without notice, if the client is linked to the serious destruction of infrastructure or if civilian injuries or deaths are involved.
Weapons
Time Dynamics supports the principles of maintaining peace, ensuring world security, protecting civilian infrastructure and civilian life from destruction.
We aim to support development efforts to provide the world with effective genuine "Open Source Defence" systems designed to safeguard people, territories,
and infrastructure from attacks. Everyone has a right to defend themselves.
We cannot support the use of our products, services, or technologies in the development, testing, or deployment of weapons;
- used against civilians, infrastructure or non-military targets,
- used against military targets but that are unnecessarily destructive, or costly in terms of human life,
- that leave dangerous chemical or radioactive residues or remain hidden and active long after the targets have gone,
- intended to gain submission through overwhelming destructive power whether non-nuclear, nuclear, biological, chemical or some other technology,
- designed primarily for counter attack but also capable of use in premptive attacks and therefore an inherent threat at the time of deployment so generating instability,
- designed to threaten or intimidate,
- Technologies designed to disable critical civilian infrastructure or civilians.
Environment
Time Dynamics supports the responsible environmental practices including but are not limited to:
- Minimizing waste through efficient use of materials, re-use and genuine recycling,
- Reducing greenhouse gas emissions by utilizing renewable energy sources and improving energy efficiency,
- Protecting biodiversity by avoiding activities that pollute habitats,
- Using sustainable sourcing for raw materials, minimising environmental impact and ethical labour practices,
We cannot support activities that prioritize short-term gains at the expense of long-term sustainability. Examples of irresponsible practices include:
- Polluting air, water, or land through improper disposal of hazardous materials or excessive emissions,
- Overexploiting natural resources in a way that depletes them for future generations,
- Generation of toxic waste and leaving it for future generations,
- Manufacturing or supporting products designed with planned obsolescence that increase waste and resource consumption.
Competative Practices
Time Dynamics supports businesses fostering a spirit of collaboration, that innovate and compete fairly, which ultimately benefits consumers and the
market as a whole. Collaboration means working with other businesses to create value without stifling competition. This includes:
- Participating in industry groups or joint ventures that promote shared knowledge and technological advancement while maintaining competitive integrity,
- Sharing information and best practices that benefit the wider industry, provided it does not undermine fair competition,
- Collaborating with partners in a way that respects each party's autonomy and promotes mutual growth without creating anti-competitive dependencies.
We cannot support companies engaging in conduct intended to destroy competitors rather then develop themselves. These include:
- Engaging in price-fixing, collusion, or bid-rigging to artificially inflate prices or restrict competition in the market,
- Establishing monopolies or unfairly excluding others from access to essential resources, products, or services,
- Using deceptive or false advertising to unfairly discredit competitors and mislead consumers about the qualities of a product or service,
- Undertaking predatory pricing, where a company sets prices below cost with the intent of driving competitors out of business and subsequently raising prices,
- Engaging in "tying" arrangements, where consumers are forced to purchase unrelated products or services to access a desired offering,
- Destroying or acquiring smaller businesses by market manipulation.