Privacy Policy
UnoLock Privacy Policy
1.1 Introduction
Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the "Services"), is committed to ensuring the privacy and security of all users ("you," "your," "user"), including those designated as LegacyLink nominees, as defined in the UnoLock Terms of Service ("Terms"), Section 3 (Services Overview). This Privacy Policy outlines our practices for collecting, using, protecting, and managing user data, emphasizing our zero-knowledge, stateless architecture to guarantee Absolute Anonymity and Payment Anonymity. This policy is incorporated into the Terms, available at https://www.unolock.com/tos.html, and aligns with our commitment to comply with Canadian and international privacy laws, including PIPEDA, GDPR, and HIPAA, where applicable, as detailed in Section 17 (Compliance with Privacy Regulations) of the Terms.
1.2 Absolute Anonymity
UnoLock's core principle is Absolute Anonymity, ensuring that your identity and activities within the Services are untraceable to personal identifiers. Our zero-knowledge architecture, as described in Section 9 (Privacy and Anonymity) of the Terms, prevents Techsologic Incorporated ("Techsologic," "we," "us," or "our") or third parties from accessing your data or linking it to your identity.
1.2.1 Implementation Tactics
- Elimination of Personal Identifiers: No personal identifiable information (PII), such as usernames, email addresses, or phone numbers, is required to create or access a vault. Authentication relies on biometric, FIDO2, or PIN-based methods, as per Section 3.4 (Key Features) of the Terms.
- Non-Tracking Policy: We do not track IP addresses, digital footprints, or metadata linking your activities to your identity, ensuring anonymity during vault access, messaging, or feature use.
- Encrypted Identifiers: Secure, random identifiers (e.g., vault IDs, session keys) are used to manage user interactions, preventing traceability to real-world identities.
You are responsible for maintaining anonymity through secure practices, as outlined in Section 5.8 (User Responsibilities) of the Terms.
1.3 Payment Anonymity
Techsologic ensures Payment Anonymity to protect the privacy of financial transactions, isolating them from user identities and vault contents, as described in Section 9.4 (Payment Anonymity) of the Terms.
1.3.1 Operational Process
- Financial Data Separation: Payment data (e.g., credit card details via Stripe, Bitcoin transactions) is processed separately from vault contents, ensuring no linkage to your identity or data, as per Section 3.5 (Payment and Billing) of the Terms.
- Anonymity Tools: Bitcoin payments use one-time session keys, and Stripe payments are handled with isolated billing data, maintaining confidentiality.
- Third-Party Processors: We engage trusted third-party processors (e.g., Stripe) compliant with financial regulations, ensuring payment data is not shared with Techsologic's vault infrastructure.
1.3.2 Key Benefits
- Enhances financial privacy by preventing linkage between transactions and user activities.
- Mitigates risks of financial profiling based on payment data.
- Fosters trust in Techsologic's commitment to privacy across all tiers.
You are responsible for ensuring payment methods comply with applicable laws, as per Section 5.5 (Compliance with Laws) of the Terms.
1.4 Communication Data Management
While UnoLock's zero-knowledge architecture minimizes data collection, communication with Techsologic (e.g., via email or support channels) may involve limited PII, handled with stringent privacy measures.
1.4.1 Collection of Communication Data
- Email Correspondence: Contacting Techsologic via support@unolock.com or the support portal at https://www.unolock.com/support.html may involve providing an email address or other identifiable information (e.g., in support inquiries).
- Purpose: Such data is collected solely for addressing inquiries, feedback, support requests, or compliance with legal obligations.
- Minimal Collection: Only information necessary for the specific purpose is collected, in alignment with data minimization principles under PIPEDA and GDPR.
1.4.2 Use of Communication Data
Communication data is used exclusively to:
- Respond to your inquiries, feedback, or support requests.
- Improve the Services and customer support processes.
- Ensure compliance with applicable legal and regulatory frameworks, as per Section 17 (Compliance with Privacy Regulations) of the Terms.
1.4.3 Retention and Deletion
- Retention Period: Communication data is retained only as long as necessary to fulfill its purpose (e.g., resolving a support issue) or meet legal requirements, per the Data Retention Policy at https://www.unolock.com/policies.
- Secure Deletion: Data is securely deleted or anonymized once no longer needed, using industry-standard methods to prevent recovery.
- Zero-Knowledge Limitation: Techsologic cannot access or retain vault-related data, ensuring communication data remains isolated, as per Section 9.2 (Zero-Knowledge Architecture) of the Terms.
You are responsible for minimizing PII shared in communications, as per Section 5.8 (User Responsibilities for Privacy) of the Terms.
1.5 Data Security
Techsologic implements robust security measures to protect any data under our custody, aligning with Section 6 (Data Security and Encryption) of the Terms.
- Encryption: All data, including communication data, is encrypted using AES-256-GCM (client-side) and TLS 1.3 (transmission), with post-quantum cryptography (ML-KEM-1024, ML-DSA Dilithium) for future-proof security.
- Storage Security: Data stored on servers (e.g., AWS S3) is encrypted with dual-layer AES-256, ensuring protection at rest.
- Audits and Monitoring: Regular security audits and continuous monitoring comply with ISO/IEC 27001 and SOC 2 Type II standards.
You must use secure devices and practices to prevent unauthorized access, as per Section 5.9 (Shared Security Responsibility) of the Terms. Techsologic is not liable for breaches due to user errors, as per Section 10 (Limitations of Liability) of the Terms.
1.6 Minimal Logging Practices
Techsologic maintains minimal, anonymized server logs for operational purposes, as per Section 9.5 (Minimal Logging Practices) of the Terms.
- Log Content: Logs contain only non-identifiable technical data (e.g., error codes, performance metrics), with no PII or metadata linking to user activities.
- Retention: Logs are purged every 72 hours to minimize retention risks.
- No Activity Tracking: No logs track user actions (e.g., vault access, messaging), preserving anonymity.
1.7 Your Privacy Rights and Choices
While UnoLock's zero-knowledge model eliminates traditional PII collection, you retain rights over any PII shared via communication (e.g., email):
- Access and Correction: You may request access to or correction of communication data by contacting support@unolock.com.
- Deletion: You may request deletion of communication data, subject to legal retention requirements, as per the Data Retention Policy.
- GDPR Rights: EU users may exercise GDPR rights (e.g., data portability, objection to processing), though vault data access is limited by our zero-knowledge architecture.
- HIPAA Compliance: Users storing protected health information (PHI) may request a Business Associate Agreement (BAA) via support@unolock.com, as per Section 17.4 (Compliance with HIPAA) of the Terms.
Requests are processed within 30 days, where feasible. You acknowledge that vault data cannot be accessed or recovered by Techsologic, as per Section 9.2 (Zero-Knowledge Architecture) of the Terms.
1.8 Compliance with Privacy Regulations
Techsologic's practices comply with applicable privacy regulations, as detailed in Section 17 (Compliance with Privacy Regulations) of the Terms:
- PIPEDA: Governs incidental PII handling, ensuring transparency and security under Canadian law.
- GDPR: Supports data minimization, user rights, and secure processing for EU users.
- HIPAA: Enables secure PHI storage with encryption and optional BAAs.
- Other Laws: Complies with equivalent privacy laws (e.g., CCPA) where applicable.
You are responsible for ensuring your use complies with these regulations, as per Section 5.5 (Compliance with Laws) of the Terms. Techsologic is not liable for your non-compliance, as per Section 10 (Limitations of Liability).
1.9 Modifications to the Privacy Policy
Techsologic may revise this Privacy Policy to reflect changes in practices, technology, or legal requirements, as per Section 14 (Modifications to Terms) of the Terms. Material changes will be notified via email, the support portal at https://www.unolock.com/support.html, or platform announcements, with at least 30 days' notice where feasible. Continued use of the Services after the effective date constitutes acceptance. Your sole remedy for disagreement is to cease using the Services, as per Section 13.1 (User-Initiated Termination) of the Terms.
1.10 Contact Information
For questions, concerns, or notices regarding this Privacy Policy or the Services, contact:
- Mail: Techsologic Incorporated, 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada
- Email: support@unolock.com
- Security Reports: https://www.unolock.com/support.html
- Support Portal: https://www.unolock.com/support.html
Techsologic will respond within 10 business days, where feasible. For social media engagement, follow us at https://www.youtube.com/@UnoLock, https://www.instagram.com/unolock, or other platforms listed in Section 19.4 (Social Media and Public Presence) of the Terms.
1.11 User Acknowledgment
By using the Services, you acknowledge and agree that:
- Techsologic's zero-knowledge architecture ensures your data and identity remain private, as per Section 9 (Privacy and Anonymity) of the Terms.
- No PII is collected unless required for communications or payments, and such data is isolated and securely handled.
- You are responsible for maintaining anonymity and complying with privacy laws, as per Section 5 (User Responsibilities) of the Terms.
- Techsologic is not liable for privacy breaches due to your actions, as per Section 10 (Limitations of Liability) of the Terms.
Your engagement with UnoLock signifies trust in our commitment to unparalleled privacy and security.