Terms of Service

Introduction


0.1 Welcome to UnoLock

Techsologic Incorporated (“Techsologic,” “we,” “us,” “our,” or “UnoLock”), a Canadian corporation (Corporation Number 734340-0) headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada, provides UnoLock, a privacy-first digital vault platform designed to empower individuals, families, and high-risk professionals with sovereign-grade tools for managing digital assets, sensitive data, and communications. Our mission is to deliver a zero-knowledge, stateless, post-quantum secure platform that prioritizes user anonymity and data sovereignty.

This subsection introduces UnoLock’s purpose and corporate identity, establishing Techsologic as the provider of the Services and setting the foundation for the legal agreement.

0.2 Scope of Terms

These Terms of Service (“Terms”) constitute a legally binding agreement between you (“you,” “user,” or, where applicable, “LegacyLink nominee”) and Techsologic Incorporated, governing your access to and use of the UnoLock platform, including all services, features, applications, websites, and related offerings (collectively, the “Services”). “You” encompasses any individual or entity interacting with the Services, whether browsing, creating a vault, making payments, storing data, utilizing features, or designated as a successor under the LegacyLink inheritance feature.

By accessing or using the Services, you affirm your understanding and acceptance of these Terms in their entirety. If you disagree with any provision, you must not access or use the Services.

This subsection defines the scope of the Terms, clarifies the parties to the agreement, and establishes user consent as a condition of access.

0.3 Associated Policies

Your use of the Services is also governed by UnoLock’s associated policies, including the Privacy Policy, GDPR Compliance Policy, Cookie Policy, Acceptable Use Policy, Refund/Cancellation Policy, Data Retention Policy, Security Policy, Fair Use Policy, and Disclosure Policy (collectively, “UnoLock Policies”), available at https://www.unolock.com/policies.html. These policies are incorporated by reference into these Terms and form part of your agreement with Techsologic. You are responsible for reviewing the UnoLock Policies before using the Services. Disagreement with any policy requires you to refrain from using the Services.

This subsection integrates UnoLock’s policies into the Terms, ensuring users are aware of additional governing documents and their obligation to comply.

0.4 Updates to Terms

Techsologic reserves the right to modify these Terms at any time to reflect changes in the Services, legal requirements, or operational needs. Material changes will be communicated via email, platform announcements, or other methods, with at least 30 days’ notice where feasible. Your continued use of the Services after the effective date of any updates constitutes your acceptance of the revised Terms. If you do not agree with the updated Terms, you must discontinue using the Services.

This subsection outlines the process for updating the Terms, ensuring transparency and user consent to modifications.

0.5 Legal Compliance and Jurisdiction

Techsologic operates under the laws of Canada, with its principal place of business at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada. The Services are designed to comply with stringent Canadian privacy and data security laws, including the Personal Information Protection and Electronic Documents Act (PIPEDA), as well as international regulations such as the General Data Protection Regulation (GDPR) and, where applicable, the Health Insurance Portability and Accountability Act (HIPAA). By using the Services, you agree to comply with all applicable laws in your jurisdiction and those governing Techsologic’s operations. Any disputes arising from these Terms or the Services shall be resolved exclusively in the courts of Ontario, Canada.

This subsection establishes Techsologic’s legal framework, user compliance obligations, and the governing jurisdiction.

0.6 Contact Information

For questions, concerns, or notices regarding these Terms or the Services, contact Techsologic Incorporated at:

  • Email: support@unolock.com
  • Mail: Techsologic Incorporated, 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada

Techsologic will respond promptly to inquiries in accordance with our support policies. For security-related issues, use the designated security reporting channel at https://www.unolock.com/support.html.

This subsection provides clear contact details, ensuring users can reach Techsologic for support or legal matters.

0.7 Corporate Identity and Commitment

Techsologic Incorporated, a Canadian corporation (Corporation Number 734340-0), is committed to delivering a secure, anonymous, and user-centric platform. UnoLock’s zero-knowledge architecture ensures that we cannot access your data, reinforcing our dedication to privacy and sovereignty. Our headquarters at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada, serves as the hub for our operations, where we uphold the highest standards of data protection and operational integrity.

This subsection reinforces Techsologic’s corporate identity and commitment to user privacy, concluding the Introduction.

Acceptance of Terms and Legal Compliance

1.1 Agreement to Be Bound

By accessing, browsing, or using the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), you acknowledge that you have read, understood, and agree to be bound by these Terms of Service (“Terms”) and all associated policies of Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), collectively referred to as “UnoLock Policies.” These Terms form a legally binding contract between you and Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”). If you do not agree with any provision of these Terms or the UnoLock Policies, you must immediately cease accessing or using the Services.

This subsection establishes the legally binding nature of the Terms, requiring explicit user consent and providing a clear exit option for non-agreement.

1.2 Scope of Acceptance

Your acceptance of these Terms applies to all interactions with the Services, whether you are a registered user, a guest browsing the platform, a payer for Services, a data storer, a feature utilizer, or a designated successor under the LegacyLink inheritance feature. Acceptance extends to any actions performed on the Services, including but not limited to creating a vault, making payments, storing data, sending messages, or configuring security features. You agree that your use of the Services is voluntary and at your own risk, subject to the obligations and rights outlined herein.

This subsection clarifies the broad applicability of the Terms to all user interactions, protecting Techsologic by defining the scope of user consent.

1.3 Responsibility to Review

You are responsible for thoroughly reviewing these Terms and the UnoLock Policies, available at https://www.unolock.com/policies.html, prior to using the Services. The UnoLock Policies include the Privacy Policy, GDPR Compliance Policy, Cookie Policy, Acceptable Use Policy, Refund/Cancellation Policy, Data Retention Policy, Security Policy, Fair Use Policy, and Disclosure Policy, all of which are incorporated by reference into these Terms. You must also periodically review these documents for updates, as they may be modified in accordance with Section 12 (Modifications to Terms). Ignorance of the Terms or Policies does not excuse non-compliance.

This subsection assigns responsibility to users for staying informed, reducing Techsologic’s liability for user oversight and reinforcing policy integration.

1.4 Continued Use as Consent

Your continued access or use of the Services following any updates to these Terms or UnoLock Policies constitutes your acceptance of the revised documents. Techsologic will notify users of material changes via email, platform announcements, or other methods, as described in Section 12. If you disagree with any updated provisions, your sole remedy is to discontinue using the Services. Continued use after the effective date of changes signifies your unequivocal consent to be bound by the updated Terms and Policies.

This subsection ensures that ongoing use post-updates serves as legal consent, protecting Techsologic from disputes over revised terms.

1.5 Compliance with Applicable Laws

By using the Services, you agree to comply with all applicable local, national, and international laws, including but not limited to Canadian laws governing data protection (e.g., Personal Information Protection and Electronic Documents Act, PIPEDA), copyright, cryptocurrency transactions, and anti-money laundering, as well as laws in your jurisdiction. You represent and warrant that your use of the Services will not violate any legal or regulatory obligations, including those related to data privacy (e.g., GDPR, HIPAA), intellectual property, or prohibited activities. If any provision of these Terms conflicts with your local laws, you must refrain from using the Services.

This subsection mandates user compliance with laws, shielding Techsologic from liability for user violations and ensuring regulatory alignment.

1.6 Legal Capacity and Authority

You represent that you have the legal capacity to enter into these Terms and that your use of the Services is authorized. If you are using the Services on behalf of an entity (e.g., a corporation or organization), you warrant that you have the authority to bind that entity to these Terms. You further represent that you are not prohibited from using the Services under any applicable law, regulation, or governmental restriction, including Canadian or international sanctions. Techsologic reserves the right to verify your eligibility and terminate access if you lack legal capacity or authority.

This subsection confirms user eligibility and authority, protecting Techsologic from unauthorized or fraudulent use.

1.7 Contractual Framework

These Terms, together with the UnoLock Policies, establish a contractual framework designed to ensure a secure, lawful, and respectful environment for all users. You acknowledge that your rights and obligations under this agreement are reciprocal with those of Techsologic, and that adherence to these Terms is essential to maintaining the integrity and security of the Services. Breach of these Terms may result in suspension or termination of your access, as outlined in Section 11 (Termination), and potential legal action to protect Techsologic’s interests.

This subsection reinforces the contractual nature of the Terms, emphasizing mutual obligations and consequences for non-compliance.

Eligibility

2.1 Age Requirement

To access or use the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), you must be at least 18 years of age or the age of majority in your jurisdiction, whichever is greater. If you are under the age of majority, you are prohibited from using the Services, and any attempt to access or use the Services will be considered a violation of these Terms of Service (“Terms”). Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”), headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada, reserves the right to request proof of age to verify compliance with this requirement.

This subsection establishes a clear age threshold, protecting Techsologic from legal risks associated with underage users.

2.2 Legal Capacity

You represent and warrant that you have the legal capacity to enter into these Terms and to use the Services in accordance with all applicable laws and regulations. If you lack such capacity (e.g., due to mental incapacity or legal restrictions), you must not access or use the Services. Techsologic may, at its sole discretion, terminate access for any user found to lack legal capacity, without notice or liability, as outlined in Section 11 (Termination).

This subsection ensures users have the legal ability to form a binding contract, reducing Techsologic’s exposure to invalid agreements.

2.3 No Legal Prohibitions

You must not be prohibited from using the Services under any applicable law, regulation, or governmental authority, including but not limited to Canadian laws, international sanctions, or restrictions imposed by your jurisdiction. You represent that you are not subject to any legal or regulatory restrictions that would prevent you from accessing or using the Services, such as court orders, data protection violations, or criminal convictions related to cyber activities. Techsologic may suspend or terminate access if it determines, in its sole discretion, that your use violates such prohibitions.

This subsection shields Techsologic from liability for users accessing the Services in violation of legal restrictions.

2.4 Sanctioned Jurisdictions

You must not be located in, or be a resident or national of, any jurisdiction subject to Canadian or international sanctions, export controls, or trade embargoes that restrict access to the Services, including but not limited to jurisdictions designated by the Government of Canada, the United States Office of Foreign Assets Control (OFAC), or the European Union. You represent and warrant that your use of the Services complies with all applicable sanctions and export control laws. Techsologic reserves the right to block access from sanctioned jurisdictions and report any violations to relevant authorities, as required by law.

This subsection protects Techsologic from regulatory risks associated with sanctioned regions, ensuring compliance with international trade laws.

2.5 Entity Representation

If you are accessing or using the Services on behalf of an entity (e.g., a corporation, partnership, or organization), you represent and warrant that you have the full authority to bind that entity to these Terms. You must provide accurate information about the entity and your role when registering or using the Services on its behalf. Techsologic may request documentation to verify your authority and may terminate access if such authority is not substantiated, without liability.

This subsection ensures that entity users are properly authorized, mitigating risks of unauthorized or fraudulent use.

2.6 Verification and Compliance

Techsologic reserves the right, but is not obligated, to verify your eligibility to use the Services, including your age, legal capacity, compliance with sanctions, or authority to represent an entity. You agree to provide accurate and truthful information if requested, and failure to comply may result in immediate suspension or termination of your access, as described in Section 11 (Termination). Techsologic is not liable for any damages arising from your failure to meet eligibility requirements or provide accurate information.

This subsection grants Techsologic flexibility to enforce eligibility while limiting liability for user misrepresentations.

2.7 User Acknowledgment

By accessing or using the Services, you acknowledge that meeting the eligibility requirements is a condition of your use and that any misrepresentation or violation of these requirements constitutes a breach of these Terms. You further acknowledge that Techsologic’s zero-knowledge architecture does not collect personal identifiable information (PII), as described in Section 8 (Privacy and Anonymity), but eligibility violations may still result in access restrictions to protect the integrity of the Services and comply with legal obligations.

This subsection reinforces user responsibility for eligibility compliance, aligning with UnoLock’s privacy-first model while protecting Techsologic’s interests.

Services Overview

3.1 Platform Description

UnoLock, provided by Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), is a zero-knowledge, stateless, post-quantum secure platform designed to enable users to store, manage, and protect digital assets, including but not limited to passwords, cryptocurrency seed phrases, keys, documents, and communications. The Services encompass all features, applications, websites, and related offerings (collectively, the “Services”) accessible through the UnoLock platform, subject to these Terms of Service (“Terms”). Techsologic delivers the Services with a commitment to user privacy, anonymity, and data sovereignty, utilizing advanced encryption and security protocols.

This subsection introduces the UnoLock platform, defining the scope of Services and reinforcing Techsologic’s privacy-first mission.

3.2 Service Tiers

The Services are offered through four distinct tiers, Free, Inheritance, Sovereign, and HighRisk, each tailored to meet varying user needs, from anonymous seed storage to high-risk threat response. Each tier provides specific storage capacities, access limits, and features, as detailed in Section 3.3 (Pricing Tiers). Users may select a tier based on their security requirements and upgrade or downgrade in accordance with Section 3.5 (Payment and Billing). Techsologic reserves the right to modify tier offerings, subject to notice as described in Section 14 (Modifications to Terms).

This subsection outlines the tiered structure, setting expectations for service availability and flexibility.

3.3 Pricing Tiers

The following pricing tiers define the cost, features, and intended use cases for each level of Service, effective as of June 21, 2025. All prices are in U.S. dollars unless otherwise specified.

  • Free Tier ($0/month):
  • Features: 1MB vault storage (non-expandable), biometric/FIDO2 access, zero-knowledge encryption, post-quantum protection (ML-KEM-1024, ML-DSA Dilithium), local file encryption (AES-256-GCM), LockOutGuard, Safe2Safe messaging (reply-only), single-region redundancy, 1 device key (fixed).
  • Ideal For: Anonymous storage of cryptocurrency seed phrases, emergency codes, or secure note-taking.
  • Limitations: No storage expansion or inheritance features.
  • Inheritance Tier ($3/month or $36/year, 0% annual discount):
  • Features: All Free tier features, LegacyLink inheritance system, 1GB base storage (expandable at $1/GB/month), up to 10 device keys, single-region redundancy, Safe2Safe messaging (reply-only).
  • Ideal For: Estate planners, families, or individuals seeking long-term digital succession.
  • Limitations: Limited to single-region redundancy; no two-way messaging.
  • Sovereign Tier ($8/month or $86.40/year, 10% annual discount):
  • Features: All Inheritance tier features, Safe2Safe messaging (two-way), 5GB base storage (expandable at $1/GB/month), up to 10 device keys, multi-region redundancy, Spaces (compartmentalized vaults), CybVault Digital Paper Wallet (DPW) for cryptocurrency key generation, DuressDecoy access.
  • Ideal For: Cryptocurrency professionals, developers, or private teams requiring advanced privacy and coercion resistance.
  • Limitations: No irreversible data wipe feature.
  • HighRisk Tier ($14/month or $151.20/year, 10% annual discount):
  • Features: All Sovereign tier features, LifeSafe Plausible Deniability (Safeword Wipe), 5GB base storage (expandable at $1/GB/month), up to 10 device keys, multi-region redundancy.
  • Ideal For: Journalists, activists, or executives in high-risk environments needing irreversible data protection.
  • Limitations: Safeword Wipe is permanent and unrecoverable.

Techsologic may adjust pricing or tier features with notice, as per Section 14. Users are responsible for selecting a tier that aligns with their needs and understanding its limitations.

This subsection details each tier’s pricing, features, and use cases, ensuring transparency and protecting Techsologic from disputes over service expectations.

3.4 Key Features

The Services include the following core features, available across tiers as specified in Section 3.3, designed to enhance security, privacy, and functionality:

  • End-to-End Encryption: AES-256-GCM encryption ensures data is encrypted client-side, inaccessible to Techsologic or third parties.
  • Post-Quantum Cryptography: ML-KEM-1024 and ML-DSA Dilithium protect against quantum computing threats.
  • Absolute Anonymity: No personal identifiable information (PII) or metadata is collected, as detailed in Section 9 (Privacy and Anonymity).
  • CybVault Digital Paper Wallet (DPW): Generates and stores offline cryptocurrency keys for Bitcoin, Ethereum, Solana, and other supported currencies (Sovereign and HighRisk tiers).
  • LegacyLink: Facilitates secure digital inheritance with customizable inactivity triggers (Inheritance, Sovereign, HighRisk tiers).
  • LockOutGuard: Prevents permanent lockouts using QR code or passphrase recovery (all tiers).
  • DuressDecoy: Reveals a decoy vault under coercion (Sovereign and HighRisk tiers).
  • LifeSafe (Plausible Deniability): Irreversibly wipes vaults with a safeword (HighRisk tier only).
  • Safe2Safe Messaging: Enables encrypted, anonymous communication between vaults (reply-only for Free and Inheritance; two-way for Sovereign and HighRisk).
  • Eyes-Only Encryption: Allows non-users to send encrypted messages to UnoLock vaults (all tiers).
  • LifetimeSafe: Prepaid 10-year vault extensions for long-term security (Inheritance, Sovereign, HighRisk tiers).
  • Pin Code Authentication: Randomized keypad input to prevent keylogger attacks (all tiers).
  • Global Redundancy: Multi-region data replication for resilience (Sovereign and HighRisk tiers; single-region for Free and Inheritance).
  • TimeLock: Restricts vault access to specific time windows (all tiers).
  • Spaces: Isolated compartments within vaults for granular access control (Sovereign and HighRisk tiers).
  • Payment Anonymity: Bitcoin, Stripe and PayPal payments with no linkage to vault contents (all tiers).

Techsologic reserves the right to modify or discontinue features, subject to notice as per Section 14. Users are responsible for understanding feature functionality and limitations, as outlined in Section 5 (User Responsibilities).

This subsection lists core features, clarifying their availability and reinforcing Techsologic’s right to modify offerings.

3.5 Payment and Billing

The Services are provided subject to the following payment and billing terms, ensuring flexibility and privacy:

  • Payment Methods: Payments are accepted via credit card (processed through Stripe and PayPal) or Bitcoin, ensuring anonymity. Bitcoin payments use one-time session keys, PayPal and Stripe payments are isolated from vault data, as described in Section 9 (Privacy and Anonymity).
  • Billing Options: Users may choose monthly subscriptions or annual prepayments, with a 10% discount applied to annual plans for Sovereign ($86.40/year) and HighRisk ($151.20/year) tiers. The Inheritance tier offers no annual discount ($36/year).
  • Storage Expansion: Paid tiers (Inheritance, Sovereign, HighRisk) allow additional storage at $1/GB/month, billed in real-time based on compressed, encrypted data usage.
  • Device Key Expansion: Paid tiers support up to 10 device keys; additional keys beyond tier limits may incur fees in future updates.
  • Upgrades: Tier upgrades are immediate, with prorated adjustments applied to the next billing cycle or prepaid balance.
  • Downgrades: Downgrades require creating a new vault to maintain zero-knowledge guarantees. Unused balances are returned as promotional credits applicable to future upgrades.
  • Prepaid Credits: Bitcoin users may preload credits, consumed based on tier, time, and storage overages. If credits are depleted, vaults revert to the Free tier without data loss, subject to Section 3.6 (Unpaid Subscriptions and Vault Expiry).
  • Billing Isolation: Billing data is fully separated from vault contents, ensuring Techsologic’s zero-knowledge architecture. Users are responsible for maintaining active payment methods to avoid service interruptions.
  • Taxes and Fees: Prices exclude applicable taxes, duties, or fees, which may be added based on your jurisdiction. Users are responsible for all such charges.

Billing disputes must be reported within 30 days to support@unolock.com. Techsologic’s Refund/Cancellation Policy, available at https://www.unolock.com/policies.html, governs refunds and cancellations.

This subsection details payment and billing processes, ensuring transparency, privacy, and flexibility while protecting Techsologic from financial disputes.

3.6 Unpaid Subscriptions and Vault Expiry

Techsologic implements the following policies for unpaid subscriptions, non-payment, and vault inactivity to ensure service continuity and data management:

  • Free Tier Vault Expiry: Free tier vaults that remain inactive for two (2) years, defined as no user access or activity (e.g., login, data modification, or messaging), will be permanently deleted without recourse. Due to the anonymous nature of Free tier accounts, as per Section 9 (Privacy and Anonymity), Techsologic will not provide notice or recovery options for deleted vaults. You are responsible for maintaining activity or backing up critical data externally, as per Section 5.3 (Data Management).
  • Paid Tier Payment Failure: For paid tiers (Inheritance, Sovereign, HighRisk), if payment fails (e.g., expired credit card, insufficient Bitcoin credits), Techsologic will attempt to process payment for seven (7) days and notify you via email (if provided) or the support portal at https://www.unolock.com/support.html. During this period, your vault will remain accessible. If payment remains outstanding, access will be suspended, and data will be retained for six (6) months from the initial payment failure date, allowing you to settle balances and restore access. After six months, unpaid vaults will be permanently deleted without recovery options, in accordance with the Data Retention Policy at https://www.unolock.com/policies.html. Techsologic is not liable for data loss due to non-payment, as per Section 10 (Limitations of Liability).
  • Subscription Expiry: If a paid subscription expires (e.g., annual plan not renewed), your vault will revert to the Free tier if eligible (e.g., within 1MB storage limit), subject to Free tier limitations, including the two-year inactivity deletion policy. If ineligible for the Free tier (e.g., exceeding 1MB), the vault will be suspended, and data will be retained for six months per the paid tier policy, after which it will be deleted if unpaid.
  • User Responsibilities: You are responsible for maintaining valid payment methods, monitoring billing notifications, and settling outstanding balances to prevent suspension or deletion. Techsologic’s zero-knowledge architecture prevents us from accessing or recovering deleted data, as per Section 9 (Privacy and Anonymity). You must ensure external backups are maintained to mitigate data loss risks, as per Section 5.3 (Data Management).
  • Notifications: Techsologic will attempt to notify paid tier users of payment failures or impending deletions via email or the support portal, but you acknowledge that our anonymous model may limit direct contact. You must monitor the support portal for updates, as per Section 5.7 (Engagement with Updates and Communications).

Data deletion under this subsection complies with the Data Retention Policy. Techsologic is not liable for any damages arising from vault deletion due to inactivity or non-payment.

This subsection ensures clarity on unpaid subscriptions and vault expiry, providing reasonable retention periods while protecting Techsologic from liability for data loss.

3.7 Service Availability and Limitations

Techsologic strives to provide continuous access to the Services but does not guarantee uninterrupted or error-free operation. The Services are provided “as is” and “as available,” as detailed in Section 10 (Limitations of Liability). Availability may be affected by maintenance, upgrades, cyberattacks, payment failures, or other factors beyond Techsologic’s control. Users acknowledge that certain features (e.g., LifeSafe, DuressDecoy) carry inherent risks, such as permanent data loss, and agree to use them responsibly, as outlined in Section 5 (User Responsibilities). Techsologic is not liable for any damages arising from service interruptions, feature limitations, or data loss due to non-payment or inactivity, as per Section 3.6 (Unpaid Subscriptions and Vault Expiry).

This subsection sets realistic expectations for service availability, limiting Techsologic’s liability for disruptions or user errors.

3.8 User Acknowledgment

By using the Services, you acknowledge that you have reviewed the tier descriptions, features, billing terms, and vault expiry policies and selected a tier that meets your needs. You understand that Techsologic operates a zero-knowledge platform, meaning we cannot access or recover your data, including in cases of forgotten credentials, LifeSafe activation, or vault deletion due to inactivity or non-payment. You agree to comply with all terms governing the Services, including payment obligations and feature usage, and accept responsibility for any risks associated with your use, as detailed in Sections 5 (User Responsibilities), 9 (Privacy and Anonymity), and 10 (Limitations of Liability).

This subsection reinforces user responsibility for informed use, aligning with UnoLock’s zero-knowledge model and protecting Techsologic from disputes.

User Responsibilities

4.1 Account Security

As a user of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), provided by Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), you are solely responsible for maintaining the security of your account and access credentials. This includes:

  • Credentials Protection: Creating strong, unique passwords, PINs, recovery keys, and biometric data (e.g., fingerprint or facial recognition) and keeping them confidential. You must not share credentials with third parties or store them in insecure locations (e.g., unencrypted files or physical notes).
  • Device Security: Ensuring all devices used to access the Services are secure, free from malware, and updated with the latest security patches. You are responsible for any unauthorized access resulting from compromised devices.
  • Session Management: Logging out of the Services after use, especially on shared or public devices, to prevent unauthorized access.

Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) is not liable for any damages or losses arising from your failure to secure your account or credentials, as described in Section 9 (Limitations of Liability).

This subsection assigns responsibility for account security to users, protecting Techsologic from liability for user negligence.

4.2 Recovery Setup and Lockout Prevention

You are responsible for configuring and maintaining recovery mechanisms, such as LockOutGuard and LegacyLink, to prevent permanent lockouts or ensure secure succession of your vault. This includes:

  • LockOutGuard Configuration: Setting up QR code or passphrase recovery options to regain access in case of lost credentials or device failure. You must store recovery information securely and offline.
  • LegacyLink Setup: Designating successors and setting inactivity triggers for digital inheritance, ensuring clear instructions for vault access post-inactivity.
  • Regular Verification: Periodically testing recovery mechanisms to confirm their functionality and updating them as needed (e.g., after device changes).

Techsologic cannot recover your vault or data if you lose access due to forgotten credentials or misconfigured recovery settings, given our zero-knowledge architecture, as outlined in Section 8 (Privacy and Anonymity).

This subsection ensures users proactively manage recovery options, limiting Techsologic’s liability for access issues.

4.3 Data Management

You are solely responsible for the management, integrity, and legality of data stored or transmitted through the Services. Your responsibilities include:

  • External Backups: Maintaining independent, secure backups of critical data outside the UnoLock platform. Techsologic cannot recover data lost due to user actions, such as LifeSafe activation or vault deletion, or due to forgotten credentials.
  • Content Compliance: Ensuring all data stored or transmitted complies with applicable laws and does not infringe on third-party rights (e.g., intellectual property, privacy). Prohibited content includes, but is not limited to, illegal materials, malware, or content violating the Acceptable Use Policy at https://www.unolock.com/policies.html.
  • Usage Monitoring: Regularly reviewing vault storage, access logs, and settings to ensure alignment with your security needs and to prevent unauthorized use or overages.

Techsologic reserves the right to suspend or terminate access for users storing or transmitting prohibited content, as per Section 11 (Termination).

This subsection assigns data management duties to users, protecting Techsologic from liability for illegal or lost data.

4.4 Cryptocurrency Wallet (CybVault DPW)

If you use the CybVault Digital Paper Wallet (DPW) feature (available in Sovereign and HighRisk tiers), you are solely responsible for managing cryptocurrency keys and associated risks. Your responsibilities include:

  • Key Security: Safeguarding private keys and seed phrases generated by CybVault DPW, whether stored digitally in your vault or exported offline (e.g., printed QR codes). Loss or theft of keys may result in irreversible asset loss, for which Techsologic is not liable.
  • Export Risks: Assuming full responsibility for the security and management of keys or funds once exported from CybVault DPW. Techsologic has no control over external wallets or transactions.
  • Regulatory Compliance: Ensuring your use of CybVault DPW complies with all applicable cryptocurrency laws in your jurisdiction, including tax, anti-money laundering, and securities regulations.
  • Risk Acknowledgment: Understanding the inherent risks of cryptocurrencies, including market volatility, regulatory changes, and cybersecurity threats (e.g., phishing, hacking).

Techsologic disclaims all liability for losses related to CybVault DPW usage, as detailed in Section 9 (Limitations of Liability).

This subsection clarifies user obligations for cryptocurrency management, shielding Techsologic from financial or regulatory risks.

4.5 Compliance with Laws

You agree to use the Services in full compliance with all applicable local, national, and international laws, including but not limited to:

  • Data Protection Laws: Canadian Personal Information Protection and Electronic Documents Act (PIPEDA), General Data Protection Regulation (GDPR), and Health Insurance Portability and Accountability Act (HIPAA), where applicable.
  • Intellectual Property Laws: Copyright, trademark, and patent laws protecting third-party rights.
  • Financial Regulations: Anti-money laundering, cryptocurrency, and tax laws in your jurisdiction.
  • Prohibited Activities: Laws prohibiting illegal activities, such as trafficking, fraud, or terrorism financing.

You represent and warrant that your use of the Services will not facilitate or involve illegal activities. Techsologic may report suspected violations to authorities and terminate access, as per Section 11 (Termination).

This subsection mandates legal compliance, protecting Techsologic from liability for user violations.

4.6 Feature Configuration and Risk Awareness

You are responsible for understanding and configuring Service features to align with your threat model and security needs. This includes:

  • Feature Comprehension: Familiarizing yourself with the functionality and risks of features such as DuressDecoy, LifeSafe, TimeLock, Spaces, and Safe2Safe Messaging, as described in Section 3 (Services Overview).
  • LifeSafe Risks: Acknowledging that LifeSafe’s Safeword Wipe (HighRisk tier) is irreversible, permanently deleting vault data without recovery, even by Techsologic.
  • DuressDecoy Setup: Configuring decoy vaults appropriately to ensure effectiveness under coercion (Sovereign and HighRisk tiers).
  • TimeLock and Spaces: Setting access restrictions and compartmentalization to prevent unauthorized access or data exposure.
  • Safe2Safe Messaging: Ensuring secure communication practices, including verifying recipient identities and managing storage costs for attachments.

You assume all risks associated with feature use or misconfiguration, and Techsologic is not liable for resulting damages, as per Section 9 (Limitations of Liability).

This subsection ensures users configure features responsibly, limiting Techsologic’s liability for misuse or errors.

4.7 Engagement with Updates and Communications

You are responsible for staying informed about updates, security advisories, and communications from Techsologic regarding the Services. Your obligations include:

  • Monitoring Updates: Regularly checking official channels, such as https://www.unolock.com/support.html or emails from support@unolock.com, for updates to the Services, Terms, or Policies.
  • Applying Recommendations: Implementing recommended security practices, such as updating devices or adjusting feature settings, in response to advisories.
  • Reporting Issues: Promptly reporting suspected security vulnerabilities or unauthorized access to https://www.unolock.com/support.html to protect the Services and other users.

Failure to engage with updates or report issues may increase your risk exposure, for which Techsologic is not liable.

This subsection encourages proactive user engagement, reducing Techsologic’s responsibility for user inaction.

4.8 User Acknowledgment

By using the Services, you acknowledge that you are solely responsible for the secure and lawful use of the UnoLock platform within Techsologic’s Data Self-Governance framework. You understand that Techsologic’s zero-knowledge architecture prevents us from accessing or recovering your data, placing full responsibility on you for account security, data management, and feature usage. You accept the inherent risks of digital asset storage and agree to comply with all obligations outlined in these Terms, including those related to legal compliance and risk management, as detailed in Sections 9 (Limitations of Liability) and 11 (Termination).

This subsection reinforces user accountability, aligning with UnoLock’s privacy model and protecting Techsologic from disputes.

Data Security and Encryption

5.1 Commitment to Security

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), is committed to safeguarding your data through state-of-the-art security measures. UnoLock’s zero-knowledge, stateless architecture ensures that your digital assets, including passwords, cryptocurrency keys, documents, and communications, are protected with industry-leading encryption and privacy protocols. This section outlines the technical measures employed to secure your data, subject to these Terms of Service (“Terms”).

This subsection establishes Techsologic’s commitment to security, reinforcing UnoLock’s privacy-first model and setting the context for technical details.

5.2 Client-Side Encryption

All data stored or transmitted through the Services is encrypted on your device using AES-256-GCM (Advanced Encryption Standard with Galois/Counter Mode) before it leaves your device. This client-side encryption ensures that Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) and third parties, including service providers, cannot access your plaintext data. Encryption keys are generated and managed exclusively on your device, and Techsologic has no access to these keys, maintaining a zero-knowledge architecture. You are responsible for safeguarding your encryption keys, as loss may result in permanent data inaccessibility, as described in Section 4 (User Responsibilities).

This subsection details client-side encryption, emphasizing the zero-knowledge model and user responsibility for key management.

5.3 Post-Quantum Cryptography

To protect against future quantum computing threats, UnoLock employs post-quantum cryptographic algorithms, including ML-KEM-1024 for key encapsulation and ML-DSA Dilithium for digital signatures. These algorithms safeguard data encryption, key exchange, and authentication processes, ensuring long-term security against quantum attacks, such as those leveraging Shor’s or Grover’s algorithms. Post-quantum cryptography is applied across all tiers of the Services, providing robust protection for your digital assets.

This subsection highlights UnoLock’s future-proof security, protecting Techsologic by demonstrating advanced safeguards.

5.4 Secure Data Transmission

Data transmitted between your device and UnoLock’s servers is protected using Transport Layer Security (TLS) 1.3, the latest industry-standard protocol, with no fallback to outdated ciphers. TLS 1.3 ensures confidentiality, integrity, and authenticity of data in transit, preventing interception or tampering by unauthorized parties, including man-in-the-middle attacks. All transmissions use post-quantum session keys derived via ML-KEM-1024, enhancing security against both classical and quantum threats.

This subsection outlines secure transmission protocols, reinforcing Techsologic’s commitment to data protection.

5.5 Storage Security

Data stored on UnoLock’s servers is encrypted at rest using a dual-layer approach:

  • Client-Side Encryption: Your data remains encrypted with AES-256-GCM, as applied on your device, ensuring Techsologic cannot access it.
  • Server-Side Encryption: Amazon Web Services (AWS) S3, used for storage, applies an additional layer of AES-256 encryption at rest, managed by AWS, providing redundant protection.

This dual-layer encryption ensures data security even in the unlikely event of a server breach. Techsologic’s zero-knowledge architecture means we cannot decrypt your data, and you are responsible for maintaining access to your decryption keys.

This subsection details storage security, emphasizing dual encryption and user key responsibility.

5.6 Global Redundancy

To ensure data availability and resilience, UnoLock employs global redundancy for certain tiers (Sovereign and HighRisk), replicating encrypted data across multiple AWS S3 regions. Free and Inheritance tiers use single-region redundancy. All replicated data remains encrypted with AES-256-GCM, and redundancy does not compromise UnoLock’s zero-knowledge model. Global redundancy protects against localized outages, natural disasters, or infrastructure failures, but Techsologic is not liable for interruptions beyond our control, as per Section 9 (Limitations of Liability).

This subsection explains data replication, balancing availability with liability limitations.

5.7 Security Audits and Monitoring

Techsologic conducts regular, independent security audits of the Services to identify and mitigate potential vulnerabilities. Our infrastructure is subject to continuous monitoring for suspicious activity, enabling real-time detection and response to threats. Security practices comply with industry standards, including ISO/IEC 27001 and SOC 2 Type II, ensuring robust protection. Users are encouraged to report vulnerabilities via https://www.unolock.com/support.html, as outlined in Section 4 (User Responsibilities).

This subsection demonstrates Techsologic’s proactive security measures, enhancing trust and compliance.

5.8 User Acknowledgment of Risks

Despite Techsologic’s advanced security measures, you acknowledge that no digital platform, including UnoLock, can guarantee absolute security against all threats. Risks include, but are not limited to, sophisticated cyberattacks (e.g., zero-day exploits), user errors (e.g., credential compromise), or systemic failures of internet infrastructure. You agree that Techsologic is not liable for any data breaches, losses, or damages arising from factors beyond our reasonable control, as detailed in Section 9 (Limitations of Liability). You are responsible for adopting safe practices, such as using secure devices and maintaining backups, as per Section 4 (User Responsibilities).

This subsection limits Techsologic’s liability by acknowledging inherent digital risks and reinforcing user duties.

5.9 Shared Security Responsibility

Data security is a shared responsibility between Techsologic and you. While we provide robust encryption, redundancy, and monitoring, you must:

  • Use strong, unique credentials and secure devices.
  • Configure features like LockOutGuard and LifeSafe appropriately.
  • Maintain external backups of critical data.
  • Report security concerns promptly to https://www.unolock.com/support.html.

Techsologic’s zero-knowledge architecture means we cannot access or recover your data, placing significant responsibility on you to manage your security practices effectively. Failure to do so may result in data loss or unauthorized access, for which Techsologic is not liable.

This subsection emphasizes shared responsibility, protecting Techsologic from user negligence claims.

5.10 Compliance with Privacy Regulations

UnoLock’s security measures are designed to comply with applicable privacy regulations, including:

  • PIPEDA: Canada’s Personal Information Protection and Electronic Documents Act, ensuring data protection and user rights.
  • GDPR: General Data Protection Regulation, supporting data minimization and secure processing for EU users.
  • HIPAA: Health Insurance Portability and Accountability Act, enabling secure storage of protected health information for applicable users.

Our Privacy Policy and GDPR Compliance Policy, available at https://www.unolock.com/policies.html, provide details. You agree to use the Services in compliance with these regulations, as outlined in Section 4 (User Responsibilities).

This subsection aligns security practices with regulatory requirements, reducing Techsologic’s compliance risks.

Intellectual Property

6.1 Ownership of Services

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), retains exclusive ownership of all intellectual property rights in the Services. This includes, but is not limited to, the UnoLock application, source code, documentation, user interfaces, graphics, designs, logos, trademarks, patents, copyrights, and any other proprietary materials created, maintained, or provided by Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”). All such materials are protected under Canadian and international intellectual property laws.

This subsection establishes Techsologic’s sole ownership of the Services’ intellectual property, protecting against unauthorized use or claims.

6.2 License Grant to Users

Techsologic grants you, as a user of the Services, a limited, non-exclusive, non-transferable, non-sublicensable, revocable license to access and use the Services solely for personal or business purposes, in accordance with these Terms of Service (“Terms”). This license permits you to utilize the features and functionalities of the Services, such as storing data, generating cryptocurrency keys, or sending encrypted messages, as described in Section 3 (Services Overview). The license does not confer any ownership rights or permit you to:

  • Copy, modify, distribute, sell, lease, or create derivative works of any part of the Services.
  • Reverse-engineer, decompile, or extract the source code of the Services, except as expressly permitted by applicable law.
  • Use the Services for any unauthorized, illegal, or unethical purpose, as prohibited by Section 4 (User Responsibilities).

Techsologic may revoke this license at its sole discretion for violations of these Terms, as outlined in Section 11 (Termination).

This subsection defines the scope of the user license, limiting Techsologic’s liability and protecting against misuse.

6.3 GitHub Repository and Open-Source Components

Techsologic may, at its discretion, make portions of the UnoLock source code available through a GitHub repository or similar platform to promote transparency, community engagement, or security verification. Any such access is governed by specific open-source licenses (e.g., MIT, Apache) and contribution guidelines published at https://www.unolock.com/client.html. Access to or use of the repository does not grant additional ownership, modification, or distribution rights beyond those specified in the applicable license. Contributions to the repository, if permitted, become the property of Techsologic or are licensed to Techsologic under terms specified in the contribution agreement. Techsologic reserves the right to modify or discontinue repository access without notice.

This subsection clarifies rights and limitations for open-source components, protecting Techsologic’s IP while supporting transparency.

6.4 Third-Party Intellectual Property

Techsologic respects the intellectual property rights of third parties and incorporates third-party software, libraries, or components (e.g., open-source software, AWS SDKs) into the Services only under valid licenses compliant with applicable laws. All third-party components are used in accordance with their respective license terms, available upon request via support@unolock.com. You agree not to use the Services in a manner that infringes or violates any third-party intellectual property rights, including copyrights, trademarks, or patents, as prohibited by Section 4 (User Responsibilities). Techsologic is not liable for any third-party IP disputes arising from your use of the Services.

This subsection ensures compliance with third-party IP licenses, shielding Techsologic from related disputes.

6.5 User Content Ownership and License

You retain ownership of all data, files, or content you store or transmit through the Services (“User Content”), subject to the terms herein. By using the Services, you grant Techsologic a limited, worldwide, non-exclusive, royalty-free license to process, encrypt, store, transmit, and replicate your User Content solely as necessary to provide the Services (e.g., for encryption, redundancy, or messaging). This license terminates upon deletion of your User Content or termination of your account, except as required to comply with legal obligations or as specified in the Data Retention Policy at https://www.unolock.com/policies.html. You represent and warrant that:

  • You have all necessary rights to store, transmit, or share your User Content through the Services.
  • Your User Content does not infringe on any third-party rights, including intellectual property or privacy rights.
  • Your User Content complies with all applicable laws and the Acceptable Use Policy.

Techsologic is not liable for any losses, damages, or claims arising from your User Content, as detailed in Section 9 (Limitations of Liability).

This subsection clarifies ownership and licensing of User Content, protecting Techsologic from IP or legal disputes.

6.6 Intellectual Property Enforcement

Techsologic reserves the right to take appropriate action to protect its intellectual property, including but not limited to issuing cease-and-desist notices, pursuing legal remedies, or terminating access to the Services for users who infringe on Techsologic’s rights or those of third parties. If you believe your intellectual property rights have been violated through the Services, you may submit a notice to support@unolock.com, including:

  • A description of the allegedly infringed material and its location.
  • Your contact information and a statement of good faith belief that the use is unauthorized.
  • A signature (electronic or physical) affirming the accuracy of the notice.

Techsologic will respond to valid notices in accordance with applicable laws, such as Canada’s Copyright Act or the U.S. Digital Millennium Copyright Act (DMCA), where relevant. Techsologic is not liable for any actions taken or not taken in response to infringement notices.

This subsection establishes Techsologic’s enforcement rights and process for IP disputes, minimizing liability and ensuring compliance.

6.7 User Acknowledgment

By accessing or using the Services, you acknowledge and agree to respect Techsologic’s intellectual property rights and those of third parties. You understand that unauthorized use of the Services, including copying, modifying, or distributing any part of the Services or User Content in violation of these Terms, may result in termination of your access, as per Section 11 (Termination), and potential legal action by Techsologic or affected third parties. You further acknowledge that Techsologic’s zero-knowledge architecture, as described in Section 8 (Privacy and Anonymity), limits our ability to monitor User Content for IP violations, placing responsibility on you to ensure compliance, as per Section 4 (User Responsibilities).

This subsection reinforces user accountability for IP compliance, aligning with UnoLock’s privacy model and protecting Techsologic.

Third-Party Systems

7.1 Use of Third-Party Systems

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), relies on third-party systems and technologies to deliver certain functionalities, such as cloud storage (e.g., Amazon Web Services S3) and payment processing (e.g., Stripe, PayPal, Bitcoin blockchain). These systems are integral to providing secure, scalable, and reliable Services, as described in Section 3 (Services Overview). Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) ensures that all third-party systems are used in compliance with these Terms of Service (“Terms”) and applicable laws.

This subsection establishes the role of third-party systems in the Services, setting the context for their use and Techsologic’s oversight.

7.2 Selection Criteria for Third-Party Systems

Techsologic selects third-party systems based on their reputation for security, reliability, and compliance with industry standards. Selection criteria include:

  • Security Standards: Systems must adhere to recognized standards, such as ISO/IEC 27001, SOC 2 Type II, and, where applicable, GDPR or HIPAA requirements, ensuring robust protection for user data.
  • Reliability: Providers are chosen for their proven track record of uptime and performance to minimize service disruptions.
  • Compliance: Systems must comply with Canadian laws (e.g., Personal Information Protection and Electronic Documents Act, PIPEDA) and international regulations governing data security and privacy.

Examples include AWS S3 for encrypted storage and Stripe and PayPal for payment processing, both selected for their industry-leading security and compliance frameworks. Techsologic reserves the right to change third-party providers without notice, provided such changes maintain or enhance service quality and security.

This subsection outlines the rigorous selection process, reinforcing Techsologic’s commitment to quality and compliance.

7.3 Risks of Third-Party Systems

You acknowledge that, despite Techsologic’s careful selection and management, third-party systems may be subject to risks beyond our reasonable control, including but not limited to:

  • Vulnerabilities: Undiscovered security flaws or zero-day exploits that could compromise system integrity.
  • Service Interruptions: Downtime, outages, or performance issues caused by third-party infrastructure failures.
  • Data Breaches: Unauthorized access to third-party systems that, while not affecting UnoLock’s encrypted data, could disrupt service availability.

Techsologic is not liable for any losses, damages, or interruptions arising from third-party system failures, as detailed in Section 9 (Limitations of Liability). UnoLock’s zero-knowledge architecture ensures that your data remains encrypted and inaccessible to third parties, as described in Section 5 (Data Security and Encryption).

This subsection limits Techsologic’s liability for third-party risks while emphasizing data protection.

7.4 Mitigation and Response

Techsologic proactively mitigates risks associated with third-party systems through:

  • Continuous Monitoring: Regular monitoring of third-party systems for security advisories, performance issues, or vulnerabilities.
  • Patch Management: Prompt application of updates, patches, or configurations provided by third-party vendors to address known issues.
  • Contractual Safeguards: Agreements with third-party providers that mandate compliance with security standards, incident reporting, and data protection obligations.
  • Incident Response: Established protocols to respond to third-party incidents, including notifying users of significant disruptions or breaches via https://www.unolock.com/support.html, as feasible.

While Techsologic takes reasonable steps to ensure third-party reliability, you acknowledge that no system is immune to all risks, and you assume responsibility for maintaining backups and secure practices, as per Section 4 (User Responsibilities).

This subsection details Techsologic’s risk mitigation efforts, balancing accountability with liability limitations.

7.5 Transparency and Communication

Techsologic is committed to transparency regarding the use of third-party systems. In the event of a significant issue affecting a third-party system (e.g., a security breach or prolonged outage), Techsologic will:

  • Notify users via email, platform announcements, or the support portal at https://www.unolock.com/support.html, where feasible.
  • Provide details on the nature of the issue, its impact on the Services, and steps being taken to address it.
  • Update users on resolution progress, as applicable, without compromising security or operational integrity.

Due to UnoLock’s zero-knowledge architecture, third-party incidents do not compromise the confidentiality of your encrypted data, as outlined in Section 5 (Data Security and Encryption). Techsologic is not liable for delays or omissions in communication caused by third-party constraints or legal obligations.

This subsection ensures transparency, reinforcing user trust while limiting liability for communication delays.

7.6 User Responsibilities

You play a critical role in maintaining the security of the Services when using third-party systems integrated with UnoLock. Your responsibilities include:

  • Secure Practices: Using secure devices and networks when accessing the Services to minimize risks of third-party vulnerabilities, as per Section 4 (User Responsibilities).
  • Staying Informed: Monitoring communications from Techsologic regarding third-party system updates or issues, available at https://www.unolock.com/support.html.
  • Compliance: Ensuring your use of the Services, including interactions with third-party systems (e.g., Bitcoin payments), complies with applicable laws, such as anti-money laundering regulations.

Failure to adhere to these responsibilities may increase your risk exposure, for which Techsologic is not liable, as per Section 9 (Limitations of Liability).

This subsection assigns user duties for secure use, protecting Techsologic from liability for user errors.

7.7 User Acknowledgment

By using the Services, you acknowledge that Techsologic relies on third-party systems to deliver certain functionalities and that these systems carry inherent risks. You agree that:

  • Techsologic’s selection and management of third-party systems are performed with due care, but we cannot guarantee their absolute security or reliability.
  • UnoLock’s zero-knowledge architecture ensures your data remains encrypted and inaccessible to third parties, even in the event of a breach.
  • You are responsible for mitigating risks through secure practices and maintaining external backups, as outlined in Section 4 (User Responsibilities).

Techsologic is not liable for any losses, damages, or interruptions caused by third-party systems, as detailed in Section 9 (Limitations of Liability).

This subsection reinforces user acknowledgment of risks, aligning with UnoLock’s privacy model and protecting Techsologic.

Privacy and Anonymity

8.1 Commitment to Privacy

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), is committed to protecting your privacy through a zero-knowledge, stateless architecture. UnoLock is designed to ensure absolute anonymity, preventing Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) or any third party from accessing your data or linking your identity to your use of the Services. This section outlines our privacy practices, governed by these Terms of Service (“Terms”) and the Privacy Policy at https://www.unolock.com/policies.html.

This subsection establishes Techsologic’s privacy-first commitment, setting the context for UnoLock’s anonymity model.

8.2 Zero-Knowledge Architecture

UnoLock operates on a zero-knowledge architecture, meaning your data, including vault contents, encryption keys, and communications, is encrypted client-side using AES-256-GCM, as described in Section 5 (Data Security and Encryption). Techsologic has no access to your plaintext data or decryption keys, which are managed exclusively on your device. This ensures that:

  • Your vault contents (e.g., passwords, cryptocurrency keys, documents) are inaccessible to Techsologic, our employees, or third parties.
  • No personal identifiable information (PII) is required to use the Services, except as needed for payment processing (isolated from vault data).
  • Techsologic cannot recover or access your data in the event of lost credentials or LifeSafe activation, as per Section 4 (User Responsibilities).

You are solely responsible for safeguarding your encryption keys and recovery mechanisms, as loss may result in permanent data inaccessibility.

This subsection details the zero-knowledge model, protecting Techsologic by emphasizing user responsibility for data access.

8.3 No PII Collection

Techsologic does not collect, store, or process personal identifiable information (PII), such as names, email addresses, phone numbers, or IP addresses, unless explicitly required for payment processing or legal compliance, as outlined in subsections 8.4 and 8.6. Key practices include:

  • Anonymous Registration: No PII is required to create or access a vault; authentication relies on biometric, FIDO2, or PIN-based methods.
  • No Metadata Tracking: UnoLock does not collect metadata linking your identity to vault activities, ensuring anonymity during storage, messaging, or feature use.
  • Secure Identifiers: User interactions are managed through secure, random identifiers (e.g., vault IDs, session keys), preventing correlation with real-world identities.

Any incidental PII provided voluntarily (e.g., in support inquiries) is handled in accordance with our Privacy Policy and deleted promptly unless required for legal purposes.

This subsection reinforces UnoLock’s anonymity, limiting Techsologic’s liability for data exposure.

8.4 Payment Anonymity

To maintain financial privacy, Techsologic ensures that payment transactions for the Services are processed anonymously or with minimal PII, as follows:

  • Bitcoin Payments: Bitcoin transactions use one-time session keys, ensuring no linkage between payments and your vault or identity. No PII is collected, and transactions are verified via the Bitcoin blockchain, as described in Section 3 (Services Overview).
  • Stripe and PayPal Payments: Credit card payments via Stripe and PayPal are processed with isolated billing data, separate from vault contents. Stripe and PayPal may collect PII (e.g., cardholder name) as required by financial regulations, but this data is not shared with Techsologic’s vault infrastructure.
  • Prepaid Credits: Bitcoin users may preload credits, consumed anonymously without tying to user identity.

You are responsible for ensuring payment methods comply with applicable laws, as per Section 4 (User Responsibilities). Techsologic’s Privacy Policy details payment data handling.

This subsection ensures payment privacy, protecting Techsologic from financial data liability.

8.5 Minimal Logging Practices

Techsologic maintains minimal server logs solely for debugging and operational purposes, containing no PII or metadata that could identify you or link to your vault activities. Logging practices include:

  • Log Content: Logs capture non-identifiable technical data, such as error codes or system performance metrics, without user-specific information.
  • Retention Period: Logs are automatically purged every 72 hours to minimize data retention risks.
  • No Activity Tracking: No logs are kept of user actions, such as vault access, messaging, or feature usage, preserving anonymity.

In the event of a legal request for logs, Techsologic can only provide non-identifiable data, as our zero-knowledge architecture prevents access to user-specific information. You acknowledge that minimal logging supports service reliability but does not compromise your privacy, as per Section 5 (Data Security and Encryption).

This subsection outlines logging practices, reinforcing anonymity and limiting Techsologic’s legal exposure.

8.6 Compliance with Privacy Regulations

Techsologic’s privacy practices comply with applicable regulations, ensuring robust protection and user rights:

  • PIPEDA: Canada’s Personal Information Protection and Electronic Documents Act governs any incidental PII handling, ensuring transparency and security.
  • GDPR: For EU users, UnoLock supports data minimization, user rights (e.g., access, deletion), and secure processing, as detailed in the GDPR Compliance Policy at https://www.unolock.com/policies.html.
  • HIPAA: For users storing protected health information, UnoLock’s encryption and anonymity features enable compliance with HIPAA security requirements.
  • Other Jurisdictions: Techsologic adheres to equivalent privacy laws in other jurisdictions, where applicable.

You agree to use the Services in compliance with these regulations, as outlined in Section 4 (User Responsibilities). Techsologic is not liable for your failure to comply with privacy laws.

This subsection aligns with regulatory requirements, reducing Techsologic’s compliance risks.

8.7 User Consent to Data Processing

By using the Services, you consent to the processing of your data as described in these Terms and the Privacy Policy, including:

  • Client-side encryption and storage of your data, inaccessible to Techsologic.
  • Transmission of encrypted data via secure channels (TLS 1.3) to AWS S3 for storage.
  • Minimal, anonymized logging for operational purposes.
  • Isolated payment data handling by Stripe, PayPal or Bitcoin blockchain, as applicable.

You acknowledge that Techsologic’s zero-knowledge architecture limits our ability to process or access your data beyond what is necessary to provide the Services. You may withdraw consent by ceasing use of the Services and deleting your vault, subject to the Data Retention Policy.

This subsection secures user consent for data processing, protecting Techsologic from privacy disputes.

8.8 User Responsibilities for Privacy

You are responsible for maintaining your privacy and anonymity when using the Services, including:

  • Secure Practices: Using secure devices, networks, and credentials to prevent unauthorized access, as per Section 4 (User Responsibilities).
  • No Voluntary Disclosure: Avoiding sharing PII or sensitive information in unencrypted communications (e.g., support inquiries) unless necessary.
  • Feature Configuration: Configuring features like Safe2Safe Messaging or Eyes-Only Encryption to ensure secure, anonymous interactions.

Techsologic is not liable for privacy breaches resulting from your actions, such as sharing credentials or using insecure devices, as detailed in Section 9 (Limitations of Liability).

This subsection assigns privacy duties to users, shielding Techsologic from user-induced risks.

8.9 User Acknowledgment

By accessing or using the Services, you acknowledge that:

  • UnoLock’s zero-knowledge architecture ensures your data and identity remain private and inaccessible to Techsologic or third parties.
  • No PII is collected unless required for payments or legal compliance, and such data is isolated from vault contents.
  • You are responsible for maintaining your anonymity and complying with privacy laws, as per Section 4 (User Responsibilities).
  • Techsologic cannot access or disclose your data in response to legal requests, except for minimal, anonymized logs, due to our privacy-first design.

Techsologic is not liable for any privacy-related losses or damages arising from your use of the Services, as outlined in Section 9 (Limitations of Liability).

This subsection reinforces user understanding of privacy practices, protecting Techsologic from liability.

Limitations of Liability

9.1 General Disclaimer

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), shall not be liable for any direct, indirect, incidental, special, consequential, or punitive damages arising out of or related to your use of the Services, to the maximum extent permitted by applicable law. This includes, but is not limited to, damages for loss of data, financial losses, business interruption, or loss of profits, whether based on contract, tort, negligence, or any other legal theory, even if Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) has been advised of the possibility of such damages. This section applies to all users, including those designated as LegacyLink nominees, as defined in these Terms of Service (“Terms”).

This subsection establishes a broad liability disclaimer, protecting Techsologic from a wide range of potential claims.

9.2 Data Loss and Service Interruptions

You acknowledge that, despite Techsologic’s robust security measures, as outlined in Section 5 (Data Security and Encryption), data loss or service interruptions may occur due to factors such as user errors (e.g., forgotten credentials, LifeSafe activation), cyberattacks, third-party system failures, or other unforeseen events. Techsologic is not liable for any damages resulting from:

  • Loss of access to your vault due to forgotten credentials or misconfigured recovery mechanisms (e.g., LockOutGuard).
  • Permanent data deletion caused by user-initiated actions, such as the LifeSafe Plausible Deniability feature (HighRisk tier).
  • Service disruptions caused by maintenance, upgrades, or external factors beyond Techsologic’s reasonable control.

You are responsible for maintaining external backups of critical data, as per Section 4 (User Responsibilities), to mitigate the risk of data loss.

This subsection limits liability for data loss and interruptions, emphasizing user responsibility for backups.

9.3 Cryptocurrency Risks (CybVault DPW)

If you use the CybVault Digital Paper Wallet (DPW) feature (available in Sovereign and HighRisk tiers), you acknowledge the inherent risks associated with cryptocurrencies, including market volatility, regulatory changes, and cybersecurity threats (e.g., phishing, hacking). Techsologic is not liable for any losses or damages arising from:

  • Loss or theft of private keys or seed phrases generated by CybVault DPW, whether stored in your vault or exported.
  • Financial losses due to market fluctuations or unauthorized transactions after keys are exported from the Services.
  • Regulatory actions affecting your ability to access or use cryptocurrency assets.

You are solely responsible for securing your keys and complying with applicable laws, as outlined in Section 4 (User Responsibilities). Techsologic does not manage or facilitate cryptocurrency transactions, limiting our liability to key generation and storage functions.

This subsection disclaims liability for cryptocurrency-related losses, protecting Techsologic from volatile market or user error claims.

9.4 Third-Party System Failures

As described in Section 7 (Third-Party Systems), the Services rely on third-party providers (e.g., AWS S3 for storage, Stripe or PayPal for payments) to deliver certain functionalities. Techsologic is not liable for any damages or losses caused by:

  • Security breaches, vulnerabilities, or outages in third-party systems.
  • Failures of the Bitcoin blockchain or other cryptocurrency networks used for payments or CybVault DPW.
  • Any disruptions or data exposure resulting from third-party actions beyond Techsologic’s reasonable control.

UnoLock’s zero-knowledge architecture ensures your data remains encrypted and inaccessible to third parties, as per Section 5 (Data Security and Encryption), but you acknowledge that third-party failures may impact service availability.

This subsection limits liability for third-party issues, reinforcing Techsologic’s zero-knowledge protections.

9.5 Force Majeure

Techsologic shall not be liable for any failure to perform or delays in providing the Services due to events beyond our reasonable control, including but not limited to:

  • Natural disasters (e.g., earthquakes, floods).
  • Acts of government, war, terrorism, or civil unrest.
  • Internet or infrastructure failures (e.g., power outages, network disruptions).
  • Cyberattacks or security incidents not attributable to Techsologic’s negligence.

In such events, Techsologic will take reasonable steps to restore service but is not obligated to provide compensation or remedies for resulting damages or interruptions.

This subsection protects Techsologic from liability for uncontrollable events, ensuring operational flexibility.

9.6 “As Is” Service Provision

The Services are provided “as is” and “as available,” without warranties of any kind, express or implied, including but not limited to warranties of merchantability, fitness for a particular purpose, or non-infringement. Techsologic does not guarantee:

  • Uninterrupted, error-free, or secure access to the Services.
  • The accuracy, reliability, or completeness of any feature, including CybVault DPW, LegacyLink, or LifeSafe.
  • The suitability of the Services for your specific needs or threat model.

You use the Services at your own risk, and Techsologic is not liable for any damages arising from reliance on the Services, as detailed in Section 4 (User Responsibilities).

This subsection establishes the “as is” nature of the Services, limiting warranty-related liability.

9.7 Limitation of Liability Amount

In jurisdictions where the exclusion of certain liabilities is not permitted, Techsologic’s aggregate liability for any claims arising from or related to the Services shall be limited to the greater of:

  • The total amount you paid to Techsologic for the Services in the twelve (12) months preceding the claim.
  • One hundred U.S. dollars ($100.00).

This limitation applies to all claims, whether based on contract, tort, statute, or other legal grounds, and includes any damages awarded, except where prohibited by law. You acknowledge that this limitation is a fundamental part of the agreement between you and Techsologic.

This subsection caps liability in restrictive jurisdictions, protecting Techsologic’s financial exposure.

9.8 User Acknowledgment

By using the Services, you acknowledge and agree that:

  • Techsologic’s zero-knowledge architecture, as described in Section 8 (Privacy and Anonymity), limits our ability to access or recover your data, increasing your responsibility for secure use.
  • The inherent risks of digital storage, cryptocurrency management, and online services may result in losses for which Techsologic is not liable.
  • You have reviewed and accepted the limitations of liability outlined in this section as a condition of using the Services.

Techsologic’s liability limitations are designed to protect both parties while ensuring the Services remain viable and secure, as per Section 4 (User Responsibilities).

This subsection reinforces user acceptance of liability limits, aligning with UnoLock’s model and protecting Techsologic.

Indemnification

10.1 General Indemnification Obligation

By accessing or using the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), provided by Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), you agree to indemnify, defend, and hold harmless Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”), its affiliates, officers, directors, employees, agents, and successors (collectively, the “Indemnified Parties”) from and against any and all claims, liabilities, damages, losses, costs, or expenses, including reasonable attorneys’ fees, arising out of or related to your use of the Services in violation of these Terms of Service (“Terms”). This obligation applies to all users, including those designated as LegacyLink nominees, as defined in Section 3 (Services Overview).

This subsection establishes the user’s broad indemnification duty, protecting Techsologic from claims due to user misconduct.

10.2 Indemnification for Violations of Terms

You shall indemnify the Indemnified Parties for any claims or damages resulting from your breach of these Terms or the UnoLock Policies, available at https://www.unolock.com/policies.html. Such violations include, but are not limited to:

  • Unauthorized access or use of the Services, including sharing credentials or bypassing security measures, as prohibited by Section 4 (User Responsibilities).
  • Failure to comply with applicable laws, such as data protection (e.g., GDPR, HIPAA), intellectual property, or cryptocurrency regulations, as outlined in Section 4.5 (Compliance with Laws).
  • Misuse of features, such as LifeSafe, DuressDecoy, or CybVault Digital Paper Wallet (DPW), resulting in legal or financial consequences.

Techsologic reserves the right to seek indemnification for any resulting losses, including legal costs, to the fullest extent permitted by law.

This subsection specifies indemnification for Terms violations, shielding Techsologic from user non-compliance.

10.3 Indemnification for Third-Party Claims

You agree to indemnify the Indemnified Parties for any claims, demands, or actions brought by third parties arising from your use of the Services, including:

  • Content Infringement: Claims that your User Content (e.g., data, files, or messages stored or transmitted via the Services) infringes on third-party intellectual property rights, such as copyrights, trademarks, or patents, as per Section 6 (Intellectual Property).
  • Privacy Violations: Claims resulting from your improper handling of personal data or sensitive information, including sharing unencrypted data or violating privacy laws.
  • Unauthorized Actions: Claims stemming from your unauthorized access, use, or distribution of the Services or User Content, including actions by individuals you authorize (e.g., LegacyLink nominees).

You are responsible for ensuring your User Content and actions comply with applicable laws and third-party rights, as outlined in Section 4 (User Responsibilities).

This subsection protects Techsologic from third-party claims caused by user actions, emphasizing compliance.

10.4 Indemnification for Feature Misuse

You shall indemnify the Indemnified Parties for any claims or damages arising from your misuse or misconfiguration of Service features, including but not limited to:

  • LifeSafe Activation: Permanent data deletion via the LifeSafe Plausible Deniability feature (HighRisk tier), resulting in disputes with third parties or loss of shared assets.
  • DuressDecoy Misuse: Improper configuration of DuressDecoy (Sovereign and HighRisk tiers), leading to unintended data exposure or legal claims.
  • LegacyLink Disputes: Claims from designated successors or third parties due to misconfigured or contested LegacyLink inheritance settings.

You acknowledge that feature misuse, particularly irreversible actions like LifeSafe, is your sole responsibility, as per Section 4.6 (Feature Configuration and Risk Awareness).

This subsection limits Techsologic’s liability for feature-related disputes, reinforcing user responsibility.

10.5 Procedure for Indemnification

In the event of a claim requiring indemnification under this section, Techsologic will:

  • Notify You: Provide prompt written notice of the claim via email or the support portal at https://www.unolock.com/support.html, unless prohibited by law.
  • Allow Defense: Permit you to assume control of the defense and settlement of the claim, provided you act promptly and in good faith.
  • Reserve Rights: Retain the right, at our discretion, to participate in the defense with counsel of our choice at our expense.

You agree to cooperate fully with Techsologic, provide necessary information, and not settle any claim without Techsologic’s prior written consent, which shall not be unreasonably withheld. Failure to comply may relieve Techsologic of its indemnification obligations to the extent prejudiced by such failure.

This subsection outlines the indemnification process, ensuring clarity and protecting Techsologic’s interests.

10.6 Costs and Expenses

Your indemnification obligation includes all reasonable costs and expenses incurred by the Indemnified Parties, including:

  • Legal fees and court costs associated with defending or settling claims.
  • Damages or penalties awarded against Techsologic due to your actions.
  • Administrative or operational costs directly resulting from your breach or misuse of the Services.

You agree to reimburse Techsologic promptly upon demand for such costs, subject to applicable law. Techsologic is not liable for any costs or expenses you incur in defending claims without our prior consent.

This subsection clarifies the scope of indemnifiable costs, protecting Techsologic financially.

10.7 User Acknowledgment

By using the Services, you acknowledge and agree that:

  • You are responsible for your actions and their consequences, including any claims or damages arising from your use of the Services, as per Section 4 (User Responsibilities).
  • Techsologic’s zero-knowledge architecture, as described in Section 8 (Privacy and Anonymity), limits our ability to monitor or prevent your violations, placing full responsibility on you.
  • Indemnification is a condition of using the Services, and failure to comply may result in termination of your access, as outlined in Section 11 (Termination).

Techsologic’s right to indemnification is designed to protect our operations and ensure a secure environment for all users.

This subsection reinforces user accountability, aligning with UnoLock’s model and protecting Techsologic from liability.

Indemnification of Directors and Employees

11.1 Purpose of Indemnification

Techs Inc. (Corporation Number 734339-7, headquartered at 150 Elgin Street, 10th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), seeks to protect its directors, officers, and employees (collectively, “Covered Persons”) from personal liability arising from their good-faith performance of duties in connection with the Services. This section establishes your obligation, as a user of the Services, to indemnify and hold harmless Covered Persons from claims, liabilities, or damages resulting from your use of the Services, in accordance with these Terms of Service (“Terms”). This obligation applies to all users, including those designated as LegacyLink nominees, as defined in Section 3 (Services Overview).

This subsection outlines the purpose of indemnifying Techs’s directors and employees, setting a protective framework.

11.2 Scope of Indemnification

You agree to indemnify, defend, and hold harmless each Covered Person from and against any and all claims, demands, actions, suits, liabilities, damages, losses, costs, or expenses, including reasonable attorneys’ fees and court costs (collectively, “Claims”), arising out of or related to:

  • Your use of the Services, including any actions taken through your account, whether authorized or unauthorized, if resulting from your failure to secure credentials, as per Section 4 (User Responsibilities).
  • Your breach of these Terms or the Techs Policies, available at https://www.unolock.com/policies.html, including violations of applicable laws or third-party rights.
  • Your User Content, as defined in Section 6 (Storage), including any content stored, transmitted, or shared via the Services that infringes on intellectual property, privacy, or other rights of third parties.
  • Disputes or actions involving third parties you authorize, including LegacyLink nominees, arising from your configuration or use of the Services.

This indemnification obligation survives the termination of your use of the Services or these Terms.

This subsection defines the broad scope of indemnification, protecting Covered Persons from user-related Claims.

11.3 Exclusions from Indemnification

Your indemnification obligation does not apply to Claims arising solely from:

  • Gross negligence or willful misconduct by a Covered Person, as determined by a court of competent jurisdiction in Ontario, Canada.
  • Actions taken by a Covered Person outside the scope of their authorized duties for Techs, provided such actions are not related to your use of the Services.
  • Techs’s failure to comply with its own obligations under these Terms, such as security measures outlined in Section 5 (Data Security and Encryption), to the extent such failure directly causes the Claim.

In such cases, Techs may assume liability, subject to applicable law and Section 10 (Limitations of Liability). You remain responsible for Claims arising from your actions or breaches, as described herein.

This subsection clarifies exclusions, balancing protection for Covered Persons with accountability for Techs’s conduct.

11.4 Specific Claims Covered

Without limiting the generality of Subsection 11.2, you shall indemnify Covered Persons for Claims arising from:

  • Legal Violations: Your failure to comply with applicable laws, including data protection (e.g., PIPEDA, GDPR, HIPAA), intellectual property, or cryptocurrency regulations, as per Section 4.5 (Compliance with Laws), resulting in legal actions against Covered Persons.
  • Feature Misuse: Improper use or misconfiguration of features, such as LifeSafe (HighRisk tier), DuressDecoy, or CybVault Digital Paper Wallet (DPW), leading to disputes, data loss, or third-party claims, as per Section 4.6 (Feature Interactions).
  • Third-Party Disputes: Actions by third parties, such as intellectual property infringement claims related to your User Content or disputes involving LegacyLink nominees due to your inheritance settings.
  • Unauthorized Access: Claims resulting from unauthorized access to your account due to your failure to secure credentials or devices, as per Section 4.1 (Account Security).

Techs reserves the right to seek indemnification for any costs incurred by Covered Persons due to such Claims.

This subsection specifies key claim types, reinforcing protection for Covered Persons from user actions.

11.5 Indemnification Procedure

In the event of a Claim requiring indemnification under this section, Techs will:

  • Notify You: Provide prompt written notice of the Claim to you via email or the support portal at https://www.unolock.com/support.html, unless prohibited by law or impractical due to your anonymity, as per Section 8 (Privacy and Anonymity).
  • Permit Defense: Allow you to assume control of the defense and settlement of the Claim at your expense, provided you notify Techs in writing within ten (10) days of notice and act in good faith.
  • Participate in Defense: Reserve the right to participate in the defense with counsel of Techs’s choice at our expense, without limiting your indemnification obligations.

You agree to:

  • Cooperate fully with Techs, providing all relevant information and assistance.
  • Not settle any Claim without Techs’s prior written consent, which shall not be unreasonably withheld.
  • Reimburse Techs promptly for any costs incurred in connection with the Claim upon demand.

Failure to comply with these obligations may relieve Techs of its indemnification rights to the extent prejudiced by such failure.

This subsection establishes a clear process for handling Claims, ensuring Techs’s control and minimizing disputes.

11.6 Costs and Expenses

Your indemnification obligation includes all reasonable costs and expenses incurred by Covered Persons in connection with a Claim, including but not limited to:

  • Legal fees, court costs, and expenses associated with defending or settling the Claim.
  • Damages, penalties, or judgments awarded against a Covered Person due to your actions or breaches.
  • Administrative or operational costs directly resulting from the Claim, such as investigation or mitigation efforts.

You agree to pay or reimburse such costs promptly upon Techs’s written demand, subject to applicable law. Techs is not liable for any costs you incur without our prior written consent.

This subsection clarifies the financial scope of indemnification, protecting Covered Persons from uncompensated losses.

11.7 Techs’s Right to Seek Redress

If you fail to fulfill your indemnification obligations under this section, Techs reserves the right to:

  • Pursue legal action against you to recover costs, damages, or expenses incurred by Covered Persons.
  • Suspend or terminate your access to the Services, as per Section 12 (Termination), without prejudice to other remedies.
  • Offset any amounts owed against promotional credits, prepaid balances, or other funds held on your behalf, subject to applicable law.

Techs’s exercise of these rights does not waive our ability to seek additional remedies under these Terms or applicable law.

This subsection ensures Techs’s ability to enforce indemnification, protecting Covered Persons financially and operationally.

11.8 User Acknowledgment

By using the Services, you acknowledge and agree that:

  • Your use of the Services, including User Content and feature configurations, may result in Claims against Covered Persons for which you are solely responsible.
  • Techs’s zero-knowledge architecture, as described in Section 8 (Privacy and Anonymity), limits our ability to monitor or prevent your actions, placing full responsibility on you for compliance, as per Section 4 (User Responsibilities).
  • Indemnifying Covered Persons is a fundamental condition of using the Services, designed to protect Techs’s operations and ensure a secure environment for all users.

Failure to comply with this section may result in legal and financial consequences, including termination of your access, as per Section 12 (Termination).

This subsection reinforces user accountability, aligning with UnoLock’s model and protecting Techs.

Termination

12.1 User-Initiated Termination

As a user of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), provided by Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), you may terminate your use of the Services at any time by deleting your vault or ceasing access to the platform. To delete your vault, follow the instructions provided in the user interface or contact support at support@unolock.com. Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) will not retain your data beyond the retention period specified in the Data Retention Policy, available at https://www.unolock.com/policies.html, unless required by law. No refunds or credits will be issued for prepaid plans or unused services unless explicitly stated in the Refund/Cancellation Policy at https://www.unolock.com/policies.html.

This subsection grants users the right to terminate, clarifying data retention and refund policies to limit Techsologic’s liability.

12.2 Techsologic-Initiated Termination

Techsologic reserves the right to suspend or terminate your access to the Services, with or without notice, at our sole discretion, under the following circumstances:

  • Violation of Terms: Your breach of these Terms of Service (“Terms”) or any Techsologic Policies, including but not limited to the Acceptable Use Policy or Privacy Policy, as per Section 4 (User Responsibilities).
  • Security Risks: Actions that pose a security threat to the Services, other users, or Techsologic’s infrastructure, such as unauthorized access attempts or malware distribution.
  • Illegal Activities: Use of the Services for illegal purposes, including but not limited to storing or transmitting prohibited content, violating data protection laws (e.g., GDPR, HIPAA), or engaging in fraudulent activities, as per Section 4.5 (Compliance with Laws).
  • Non-Payment: Failure to maintain active payment methods or settle outstanding fees for paid tiers, as outlined in Section 3.5 (Payment and Billing).
  • Legal Obligations: Compliance with court orders, governmental requests, or applicable laws requiring termination of your access.

Techsologic may, where feasible, provide notice of suspension or termination via email or the support portal at https://www.unolock.com/support.html, but is not obligated to do so if immediate action is required to protect the Services or comply with legal requirements.

This subsection establishes Techsologic’s termination rights, protecting operational and legal interests.

12.3 Effects of Termination

Upon termination, whether initiated by you or Techsologic, the following apply:

  • Access Revocation: Your access to the Services, including your vault and associated features, will be revoked immediately, subject to any legal retention obligations.
  • Data Deletion: Your data will be deleted in accordance with the Data Retention Policy, unless required to be retained by law (e.g., for regulatory compliance). Techsologic’s zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), prevents us from accessing or recovering your data post-deletion.
  • No Refunds: No refunds or credits will be issued for prepaid plans, unused services, or promotional credits, except as specified in the Refund/Cancellation Policy.
  • Surviving Obligations: Certain provisions of these Terms, including Sections 6 (Storage), 8 (Privacy and Anonymity), 9 (Limitations of Liability), 10 (Indemnification), and 11 (Indemnification of Directors and Employees), will survive termination to enforce ongoing rights and obligations.

You are responsible for backing up your data prior to termination, as per Section 4.3 (Data Management), as Techsologic cannot provide access to deleted vaults.

This subsection clarifies the consequences of termination, limiting Techsologic’s liability and reinforcing user responsibilities.

12.4 Suspension of Services

Techsologic may suspend your access to the Services, with or without notice, as an alternative to termination, under the circumstances outlined in Subsection 12.2. During suspension:

  • You will be unable to access your vault or use the Services, but your data will be retained in accordance with the Data Retention Policy.
  • You may be required to remedy the issue (e.g., settle unpaid fees, remove prohibited content) to restore access, at Techsologic’s discretion.
  • Continued failure to address the cause of suspension may result in permanent termination, as per Subsection 12.2.

Techsologic is not liable for any damages or losses resulting from suspension, including loss of access to your data, as detailed in Section 9 (Limitations of Liability).

This subsection provides flexibility for suspension, protecting Techsologic from immediate termination disputes.

12.5 Termination for Service Discontinuation

Techsologic reserves the right to discontinue the Services, in whole or in part, at any time, with at least thirty (30) days’ notice to users via email, platform announcements, or the support portal at https://www.unolock.com/support.html, unless immediate discontinuation is required by law or unforeseen circumstances. In such cases:

  • You will be provided an opportunity to export your data, where feasible, prior to discontinuation, subject to the zero-knowledge limitations in Section 8 (Privacy and Anonymity).
  • Prepaid fees for unused services may be refunded, at Techsologic’s discretion, as per the Refund/Cancellation Policy.
  • Techsologic is not liable for any damages or losses resulting from service discontinuation, as per Section 9 (Limitations of Liability).

This subsection protects Techsologic’s right to discontinue services, ensuring notice and limiting liability.

12.6 User Obligations Post-Termination

Upon termination, you agree to:

  • Cease all use of the Services and remove any Techsologic-owned materials (e.g., software, documentation) from your devices, as per Section 6 (Storage).
  • Settle any outstanding fees or obligations, including those related to indemnification under Sections 10 (Indemnification) and 11 (Indemnification of Directors and Employees).
  • Refrain from attempting to access the Services or your vault without authorization, which may result in legal action.

Failure to comply with post-termination obligations may result in legal or financial consequences, at Techsologic’s discretion.

This subsection clarifies user duties after termination, protecting Techsologic from unauthorized access or disputes.

12.7 User Acknowledgment

By using the Services, you acknowledge and agree that:

  • Techsologic may suspend or terminate your access for the reasons outlined in this section, with or without notice, to protect the Services, users, or legal interests.
  • Termination may result in permanent loss of access to your data, given Techsologic’s zero-knowledge architecture, and you are responsible for maintaining backups, as per Section 4 (User Responsibilities).
  • Techsologic’s termination rights are essential to maintaining a secure and compliant platform, and you accept the limitations of liability associated with termination, as per Section 9 (Limitations of Liability).

This acknowledgment reinforces the mutual understanding of termination rights and responsibilities.

This subsection ensures user acceptance of termination terms, aligning with Techsologic’s operational needs and protecting against disputes.

Modifications to Terms

13.1 Right to Modify Terms

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), reserves the right to modify, amend, or update these Terms of Service (“Terms”) at its sole discretion, at any time, to reflect changes in the Services, legal or regulatory requirements, operational needs, or industry practices. Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) may also modify the associated policies, including the Privacy Policy, GDPR Compliance Policy, and others (collectively, “Techsologic Policies”), available at https://www.unolock.com/policies.html, under the same conditions. Modifications are effective as specified in Subsection 13.3.

This subsection establishes Techsologic’s right to modify the Terms and Policies, providing flexibility while setting the context for user obligations.

13.2 Notification of Modifications

Techsologic will provide notice of material modifications to the Terms or Techsologic Policies that affect your rights or obligations, where feasible, at least thirty (30) days prior to their effective date. Notification methods include:

  • Email: Sending an email to the address associated with your account, if provided for payment or support purposes.
  • Platform Announcements: Posting updates on the UnoLock platform or support portal at https://www.unolock.com/support.html.
  • Other Channels: Additional methods, such as social media posts or in-app notifications, at Techsologic’s discretion.

Non-material changes (e.g., typographical corrections, formatting updates) or changes required by law (e.g., immediate compliance with regulatory mandates) may be implemented without prior notice. You acknowledge that Techsologic’s zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), limits our ability to directly notify anonymous users, and you are responsible for monitoring updates, as outlined in Subsection 13.4.

This subsection ensures transparency in notifying users of changes, balancing practicality with Techsologic’s privacy model.

13.3 Effective Date of Modifications

Modifications to the Terms or Techsologic Policies become effective on the date specified in the notification, or, if no date is specified, thirty (30) days after the notice is posted or sent. For changes implemented without prior notice (e.g., due to legal requirements or urgent security needs), modifications are effective immediately upon posting at https://www.unolock.com/policies.html. Your continued use of the Services after the effective date constitutes your acceptance of the modified Terms or Policies, as described in Subsection 13.5.

This subsection clarifies when modifications take effect, protecting Techsologic from disputes over timing.

13.4 User Responsibility to Review Updates

You are responsible for regularly reviewing the Terms and Techsologic Policies to stay informed of any modifications. Updated versions will be posted at https://www.unolock.com/policies.html for the Policies, with the “Last Updated” date clearly indicated. Failure to review updates does not exempt you from compliance, and you acknowledge that Techsologic’s notification efforts are sufficient, given the anonymous nature of the Services, as per Section 8 (Privacy and Anonymity).

This subsection assigns users the duty to stay informed, reducing Techsologic’s liability for user oversight.

13.5 Acceptance of Modified Terms

Your continued access or use of the Services after the effective date of any modifications to the Terms or Techsologic Policies constitutes your unequivocal acceptance of the revised documents. If you disagree with any modified provisions, your sole remedy is to terminate your use of the Services, as outlined in Section 12.1 (User-Initiated Termination). Techsologic is not liable for any damages or losses resulting from your continued use of the Services under modified Terms, as per Section 9 (Limitations of Liability).

This subsection ensures that ongoing use signifies consent, protecting Techsologic from challenges to revised Terms.

13.6 Impact on Existing Obligations

Modifications to the Terms or Techsologic Policies do not retroactively alter your obligations or rights for actions taken prior to the effective date, except as required by law. For example, breaches of the Terms occurring before a modification will be governed by the version in effect at the time of the breach. However, new features, services, or legal requirements introduced through modifications may impose additional obligations for continued use, as communicated in the notification.

This subsection clarifies the temporal scope of modifications, ensuring fairness and legal compliance.

13.7 User Feedback on Modifications

Techsologic welcomes user feedback on proposed modifications to the Terms or Policies. You may submit comments or concerns within fifteen (15) days of receiving notice, via support@unolock.com or the support portal at https://www.unolock.com/support.html. While Techsologic will consider feedback in good faith, we are not obligated to incorporate suggestions or delay implementation of modifications. Feedback does not alter your obligation to accept modified Terms through continued use or terminate your access.

This subsection encourages user engagement while preserving Techsologic’s authority to implement changes.

13.8 User Acknowledgment

By using the Services, you acknowledge and agree that:

  • Techsologic may modify the Terms or Techsologic Policies at any time, with or without notice, as necessary to maintain a secure, compliant, and effective platform.
  • You are responsible for reviewing updates and ensuring compliance, given the anonymous nature of the Services.
  • Continued use after modifications constitutes acceptance, and termination is your sole remedy for disagreement, as per Section 12 (Termination).

Techsologic’s modification rights are essential to adapting to evolving legal, technical, and operational landscapes, ensuring the Services remain viable and secure.

This subsection reinforces user understanding of modification rights, protecting Techsologic from disputes.

Governing Law and Jurisdiction

14.1 Governing Law

These Terms of Service (“Terms”) and your use of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), provided by Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), are governed exclusively by the laws of the Province of Ontario, Canada, and the federal laws of Canada applicable therein, without regard to conflict of law principles. This applies to all legal matters arising from or related to the Services, including contract interpretation, enforcement, and any disputes, regardless of your location or jurisdiction. Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) operates under Canadian law to ensure a consistent legal framework for all users, including those designated as LegacyLink nominees, as defined in Section 3 (Services Overview).

This subsection establishes Ontario, Canada, as the governing law, providing legal certainty and protecting Techsologic from jurisdictional conflicts.

14.2 Exclusive Jurisdiction

Any disputes, claims, or legal proceedings arising out of or relating to these Terms or your use of the Services shall be resolved exclusively in the provincial or federal courts located in Ottawa, Ontario, Canada. You irrevocably consent to the exclusive jurisdiction and venue of these courts for all such matters, waiving any objections based on inconvenient forum, improper venue, or lack of personal jurisdiction. This applies to all users, including individuals, entities, or LegacyLink nominees, regardless of their location or applicable local laws.

This subsection designates Ottawa courts as the exclusive venue, minimizing Techsologic’s exposure to foreign jurisdictions.

14.3 Compliance with Local Laws

While the Terms are governed by Ontario law, you are responsible for ensuring that your use of the Services complies with all applicable laws in your jurisdiction, including but not limited to data protection laws (e.g., GDPR, HIPAA), intellectual property laws, and cryptocurrency regulations, as outlined in Section 4.5 (Compliance with Laws). If any provision of these Terms conflicts with your local laws, you must refrain from using the Services. Techsologic is not liable for any legal violations or consequences arising from your failure to comply with local laws, as detailed in Section 9 (Limitations of Liability).

This subsection ensures user compliance with local laws, protecting Techsologic from liability for user violations.

14.4 Waiver of Class Actions

You agree to waive any right to participate in a class action, class arbitration, or representative action against Techsologic or its affiliates in connection with the Services. All disputes shall be resolved on an individual basis in the courts of Ottawa, Ontario, Canada, as specified in Subsection 14.2. This waiver does not affect your rights to pursue individual claims but prohibits collective or consolidated actions, reducing the risk of large-scale litigation against Techsologic.

This subsection protects Techsologic from costly class action lawsuits, ensuring individual dispute resolution.

14.5 Legal Compliance Commitment

Techsologic is committed to operating the Services in compliance with Canadian laws, including the Personal Information Protection and Electronic Documents Act (PIPEDA), and, where applicable, international regulations such as the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA). Our Privacy Policy and GDPR Compliance Policy, available at https://www.unolock.com/policies.html, detail our compliance practices. You acknowledge that Techsologic’s adherence to Canadian law provides a robust legal framework for the Services, and you agree to align your use with these standards, as per Section 4 (User Responsibilities).

This subsection reinforces Techsologic’s regulatory compliance, fostering trust and limiting liability.

14.6 User Acknowledgment

By accessing or using the Services, you acknowledge and agree that:

  • These Terms and your use of the Services are governed exclusively by the laws of Ontario, Canada, and disputes will be resolved in Ottawa courts.
  • You are responsible for complying with your local laws, and any conflict with these Terms requires you to cease using the Services.
  • You waive any right to pursue class actions or collective proceedings against Techsologic, ensuring individual dispute resolution.

This acknowledgment is a condition of using the Services, designed to maintain a consistent and secure legal environment, as detailed in Section 9 (Limitations of Liability).

This subsection ensures user acceptance of jurisdictional terms, protecting Techsologic from legal challenges.

Dispute Resolution

15.1 Commitment to Informal Resolution

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), is committed to resolving disputes with users, including those designated as LegacyLink nominees, in a fair and efficient manner. Before initiating formal legal proceedings, you agree to attempt to resolve any dispute, claim, or controversy arising out of or relating to these Terms of Service (“Terms”) or the Services through informal negotiation with Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”). You may contact us at support@unolock.com or via the support portal at https://www.unolock.com/support.html to initiate informal resolution. This process aims to minimize costs and delays for both parties.

This subsection establishes a commitment to informal resolution, reducing litigation risks and fostering user trust.

15.2 Informal Resolution Process

To pursue informal resolution, you must:

  • Submit a Notice: Provide written notice of the dispute to Techsologic within thirty (30) days of the issue arising, including a detailed description of the dispute, relevant evidence, and your requested resolution. Notices should be sent to support@unolock.com or Techsologic Incorporated, 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada.
  • Engage in Good Faith: Participate in good-faith negotiations for a period of thirty (30) days from the date Techsologic acknowledges receipt of your notice.
  • Provide Information: Supply any additional information or documentation requested by Techsologic to facilitate resolution.

Techsologic will respond within ten (10) business days of receiving your notice and work with you to resolve the dispute. If the dispute remains unresolved after thirty (30) days, either party may pursue formal proceedings, as outlined in Subsection 15.3. Techsologic’s zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), may limit our ability to access relevant data, and you acknowledge that you bear the burden of providing evidence to support your claim.

This subsection outlines a clear process for informal resolution, protecting Techsologic from premature litigation.

15.3 Formal Proceedings

If a dispute cannot be resolved informally within the thirty (30)-day period specified in Subsection 15.2, either party may initiate formal legal proceedings exclusively in the provincial or federal courts located in Ottawa, Ontario, Canada, as per Section 14.2 (Exclusive Jurisdiction). You agree that:

  • All formal proceedings will be governed by the laws of Ontario, Canada, as outlined in Section 14.1 (Governing Law).
  • You waive any right to pursue disputes in any other jurisdiction or venue.
  • You bear the burden of proving your claims, given Techsologic’s inability to access your data due to our zero-knowledge architecture, as per Section 8 (Privacy and Anonymity).

Techsologic is not liable for any costs, damages, or expenses you incur in pursuing formal proceedings, as detailed in Section 9 (Limitations of Liability).

This subsection directs unresolved disputes to Ottawa courts, reinforcing jurisdictional protections.

15.4 Arbitration Option (Where Applicable)

In jurisdictions where arbitration is permitted and mutually agreed upon, Techsologic may, at its sole discretion, offer to resolve disputes through binding arbitration as an alternative to court proceedings. If arbitration is pursued:

  • Arbitration Agreement: Both parties must agree in writing to arbitrate, specifying the rules (e.g., Canadian Arbitration Association rules) and location (Ottawa, Ontario, Canada).
  • Binding Nature: Arbitration decisions will be final and binding, with limited grounds for appeal, as permitted by law.
  • Costs: Each party will bear its own costs, unless otherwise agreed or mandated by applicable arbitration rules.

Arbitration does not waive your obligation to attempt informal resolution first, as per Subsection 15.2. This option is unavailable in jurisdictions where arbitration conflicts with mandatory legal processes or consumer protection laws.

This subsection provides a flexible arbitration option, reducing litigation risks where feasible.

15.5 No Class or Representative Actions

You agree to resolve all disputes with Techsologic on an individual basis and waive any right to participate in class actions, class arbitrations, or representative actions in connection with the Services. This includes claims brought by you or on behalf of others, such as LegacyLink nominees, as defined in Section 3 (Services Overview). Disputes must be resolved through individual proceedings in the courts of Ottawa, Ontario, Canada, or, if agreed, through arbitration, as per Subsections 15.3 and 15.4. This waiver is designed to protect Techsologic from large-scale litigation and ensure efficient dispute resolution.

This subsection prohibits class actions, minimizing Techsologic’s exposure to collective lawsuits.

15.6 User Responsibilities

You are responsible for complying with the dispute resolution process outlined in this section, including:

  • Timely Notification: Submitting dispute notices within thirty (30) days of the issue arising, as per Subsection 15.2.
  • Good-Faith Participation: Engaging in informal negotiations in good faith before escalating to formal proceedings.
  • Compliance with Jurisdiction: Adhering to the exclusive jurisdiction of Ottawa, Ontario, Canada, for formal proceedings, as per Section 14 (Governing Law and Jurisdiction).

Failure to comply with these responsibilities may limit your ability to pursue claims against Techsologic and does not relieve you of your obligations under these Terms, including indemnification under Sections 10 and 11.

This subsection assigns user duties in dispute resolution, protecting Techsologic from non-compliant claims.

15.7 User Acknowledgment

By accessing or using the Services, you acknowledge and agree that:

  • You will attempt informal resolution before pursuing formal proceedings, as a condition of using the Services.
  • All disputes will be resolved exclusively in Ottawa, Ontario, Canada, on an individual basis, with no class or representative actions permitted.
  • Techsologic’s zero-knowledge architecture limits our ability to provide data in disputes, placing the burden of proof on you, as per Section 8 (Privacy and Anonymity).
  • Techsologic is not liable for costs or damages arising from disputes, as per Section 9 (Limitations of Liability).

This acknowledgment ensures a fair and efficient dispute resolution process, protecting both parties and maintaining the integrity of the Services.

This subsection reinforces user acceptance of dispute resolution terms, protecting Techsologic from disputes.

Compliance with Privacy Regulations

16.1 Commitment to Regulatory Compliance

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), is committed to complying with applicable privacy regulations to ensure the protection of user data and rights. Our zero-knowledge, stateless architecture, as described in Section 8 (Privacy and Anonymity), aligns with stringent Canadian and international privacy laws, including the Personal Information Protection and Electronic Documents Act (PIPEDA), General Data Protection Regulation (GDPR), and Health Insurance Portability and Accountability Act (HIPAA), where applicable. Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) maintains this compliance to foster trust and safeguard the Services for all users, including those designated as LegacyLink nominees, as defined in Section 3 (Services Overview).

This subsection establishes Techsologic’s commitment to privacy compliance, setting the context for regulatory adherence.

16.2 Compliance with PIPEDA

As a Canadian corporation, Techsologic adheres to the Personal Information Protection and Electronic Documents Act (PIPEDA), which governs the collection, use, and disclosure of personal information in commercial activities. Given UnoLock’s zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), Techsologic collects no personal identifiable information (PII) unless required for payment processing or legal obligations (e.g., billing data via Stripe or PayPal). Any incidental PII is:

  • Handled in accordance with PIPEDA principles, ensuring transparency, consent, and security.
  • Isolated from vault contents and encrypted, as per Section 5 (Data Security and Encryption).
  • Retained only as long as necessary, per the Data Retention Policy at https://www.unolock.com/policies.html.

You are responsible for ensuring your use of the Services complies with PIPEDA, where applicable, as outlined in Section 4.5 (Compliance with Laws).

This subsection ensures PIPEDA compliance, protecting Techsologic from regulatory risks in Canada.

16.3 Compliance with GDPR

For users in the European Union or those subject to the General Data Protection Regulation (GDPR), Techsologic supports GDPR requirements, including data minimization, user rights (e.g., access, deletion, portability), and secure processing. Key GDPR-compliant practices include:

  • Data Minimization: No PII is collected unless strictly necessary, and vault data is encrypted client-side, inaccessible to Techsologic, as per Section 8.3 (No PII Collection).
  • User Rights: You may exercise GDPR rights (e.g., data deletion) by deleting your vault, as per Section 12.1 (User-Initiated Termination), or contacting support@unolock.com. Due to our zero-knowledge architecture, data access or portability requests may be limited to user-managed data.
  • Security Measures: AES-256-GCM encryption, TLS 1.3 transmission, and post-quantum cryptography ensure GDPR-compliant data protection, as per Section 5 (Data Security and Encryption).

The GDPR Compliance Policy at https://www.unolock.com/policies.html provides details. You are responsible for ensuring your use of the Services complies with GDPR, as per Section 4.5 (Compliance with Laws).

This subsection aligns with GDPR, minimizing Techsologic’s liability for EU user compliance.

16.4 Compliance with HIPAA

For users storing protected health information (PHI) through the Services, UnoLock’s security features, including AES-256-GCM encryption, post-quantum cryptography, and zero-knowledge architecture, support compliance with the Health Insurance Portability and Accountability Act (HIPAA). Techsologic implements:

  • Safeguards: Technical and physical safeguards, such as client-side encryption and secure transmission, to protect PHI, as per Section 5 (Data Security and Encryption).
  • No Access: Techsologic cannot access PHI due to our zero-knowledge design, ensuring confidentiality.
  • Business Associate Agreement: Where required, Techsologic may enter into a HIPAA-compliant Business Associate Agreement (BAA) upon request via support@unolock.com.

You are responsible for configuring the Services to meet HIPAA requirements (e.g., secure vault settings) and ensuring compliance with HIPAA regulations, as per Section 4 (User Responsibilities). Techsologic is not liable for your failure to comply with HIPAA.

This subsection supports HIPAA compliance, protecting Techsologic from health data-related risks.

16.5 Compliance with Other Privacy Laws

Techsologic complies with other applicable privacy laws in jurisdictions where the Services are offered, to the extent they do not conflict with Canadian law, as per Section 14.1 (Governing Law). This includes, but is not limited to, the California Consumer Privacy Act (CCPA), where applicable, and equivalent regulations in other regions. Our Privacy Policy at https://www.unolock.com/policies.html outlines our practices for global compliance. You are responsible for ensuring your use of the Services complies with all relevant privacy laws in your jurisdiction, as per Section 4.5 (Compliance with Laws).

This subsection extends compliance to other jurisdictions, minimizing Techsologic’s global regulatory risks.

16.6 User Responsibilities for Compliance

You are solely responsible for using the Services in a manner that complies with all applicable privacy regulations, including:

  • Lawful Use: Ensuring your data storage, transmission, or sharing (e.g., via Safe2Safe Messaging or Eyes-Only Encryption) complies with PIPEDA, GDPR, HIPAA, or other relevant laws.
  • Feature Configuration: Configuring features like LifeSafe, DuressDecoy, or LegacyLink to align with privacy requirements, as per Section 4.6 (Feature Configuration and Risk Awareness).
  • Data Management: Maintaining secure practices and backups to prevent unauthorized access or data breaches, as per Section 4.3 (Data Management).

Techsologic is not liable for any violations, fines, or damages resulting from your failure to comply with privacy laws, as detailed in Section 9 (Limitations of Liability).

This subsection assigns compliance duties to users, protecting Techsologic from user violations.

16.7 Reporting Privacy Concerns

If you believe Techsologic’s practices violate applicable privacy regulations, you may report concerns to support@unolock.com or via the support portal at https://www.unolock.com/support.html. Techsologic will investigate and respond to valid concerns within thirty (30) days, in accordance with our Privacy Policy. For security-related privacy issues, use the designated channel at https://www.unolock.com/support.html. Due to our zero-knowledge architecture, we may require you to provide evidence to support your concern, as we cannot access your data.

This subsection provides a process for privacy concerns, ensuring transparency and compliance.

16.8 User Acknowledgment

By using the Services, you acknowledge and agree that:

  • Techsologic complies with PIPEDA, GDPR, HIPAA, and other applicable privacy laws through its zero-knowledge architecture and security measures.
  • You are responsible for ensuring your use of the Services complies with all relevant privacy regulations, as per Section 4 (User Responsibilities).
  • Techsologic’s inability to access your data, as per Section 8 (Privacy and Anonymity), limits our ability to assist with compliance violations you may commit.
  • Techsologic is not liable for any privacy-related losses or damages arising from your actions, as per Section 9 (Limitations of Liability).

This acknowledgment ensures a compliant and secure environment for all users.

This subsection reinforces user responsibility for compliance, protecting Techsologic from liability.

Miscellaneous

17.1 Entire Agreement

These Terms of Service (“Terms”), together with the Techsologic Policies, including the Privacy Policy, GDPR Compliance Policy, Cookie Policy, Acceptable Use Policy, Refund/Cancellation Policy, Data Retention Policy, Security Policy, Fair Use Policy, and Disclosure Policy, available at https://www.unolock.com/policies.html, constitute the entire agreement between you and Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada) regarding your use of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”). This agreement supersedes any prior or contemporaneous agreements, communications, or understandings, whether written or oral, between you and Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) related to the Services. Any conflicting terms in other documents or communications are void unless expressly incorporated by reference in these Terms.

This subsection establishes the Terms and Policies as the complete agreement, protecting Techsologic from conflicting claims.

17.2 Severability

If any provision of these Terms or the Techsologic Policies is found to be invalid, illegal, or unenforceable by a court of competent jurisdiction in Ottawa, Ontario, Canada, as per Section 14.2 (Exclusive Jurisdiction), that provision shall be modified to the minimum extent necessary to make it enforceable, while preserving its intent. If modification is not possible, the provision shall be severed, and the remaining provisions of these Terms and Policies shall remain in full force and effect. This severability ensures that the enforceability of the Terms is not compromised by the invalidity of a single provision.

This subsection ensures the Terms remain effective despite invalid provisions, protecting Techsologic’s legal framework.

17.3 No Waiver

The failure or delay by Techsologic to enforce any provision of these Terms or the Techsologic Policies does not constitute a waiver of that provision or any other provision. No waiver by Techsologic shall be effective unless expressly stated in writing and signed by an authorized representative of Techsologic. Any waiver granted applies only to the specific instance and does not affect Techsologic’s right to enforce the same or other provisions in the future.

This subsection preserves Techsologic’s enforcement rights, preventing implied waivers from weakening the Terms.

17.4 Assignment

You may not assign, transfer, or delegate your rights or obligations under these Terms, in whole or in part, without Techsologic’s prior written consent, which may be withheld at our sole discretion. Any attempted assignment or transfer without consent is void. Techsologic may assign or transfer its rights or obligations under these Terms without your consent, including in connection with a merger, acquisition, or sale of assets, provided such assignment does not materially diminish your rights under the Terms. This section applies to all users, including LegacyLink nominees, as defined in Section 3 (Services Overview).

This subsection restricts user assignments while allowing Techsologic flexibility, protecting business interests.

17.5 Notices

All notices required or permitted under these Terms shall be delivered as follows:

  • To Techsologic: Notices must be sent in writing to Techsologic Incorporated, 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada, or via email to support@unolock.com. Notices are deemed received upon confirmation of delivery (for mail) or acknowledgment by Techsologic (for email).
  • To You: Techsologic may deliver notices via email (if provided), the support portal at https://www.unolock.com/support.html, platform announcements, or other reasonable methods. Given UnoLock’s zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), notices to anonymous users may be posted publicly on the platform. Notices are deemed received upon posting or sending, regardless of actual receipt.

You are responsible for providing accurate contact information and monitoring the support portal for notices, as per Section 4 (User Responsibilities).

This subsection establishes clear notice procedures, accommodating anonymity while ensuring communication.

17.6 Force Majeure

Techsologic shall not be liable for any delay or failure to perform its obligations under these Terms due to events beyond our reasonable control, including but not limited to natural disasters, acts of government, war, terrorism, civil unrest, internet or infrastructure failures, or cyberattacks, as detailed in Section 9.5 (Force Majeure). In such events, Techsologic will take reasonable steps to mitigate impacts and notify users via https://www.unolock.com/support.html, where feasible, but is not obligated to provide compensation or remedies for resulting disruptions.

This subsection reiterates force majeure protections, ensuring operational flexibility and limiting liability.

17.7 No Third-Party Beneficiaries

These Terms are solely for the benefit of you and Techsologic, and no third party shall have any rights or benefits under these Terms, except as expressly provided (e.g., LegacyLink nominees, as per Section 3, or Indemnified Parties, as per Sections 10 and 11). This does not affect Techsologic’s right to enforce indemnification or other obligations against you for third-party claims, as outlined in Sections 10 (Indemnification) and 11 (Indemnification of Directors and Employees).

This subsection limits third-party rights, protecting Techsologic from unintended obligations.

17.8 User Acknowledgment

By accessing or using the Services, you acknowledge and agree that:

  • These Terms and Techsologic Policies constitute the entire agreement between you and Techsologic, superseding prior agreements.
  • Invalid provisions will be modified or severed without affecting the remaining Terms, as per Subsection 17.2.
  • Techsologic’s failure to enforce provisions does not waive our rights, and assignments require our consent.
  • Notices and force majeure provisions are designed to maintain a secure and compliant platform, and you are responsible for monitoring updates, as per Section 4 (User Responsibilities).

This acknowledgment ensures a clear understanding of miscellaneous provisions, protecting Techsologic from disputes.

Techsologic Policies

18.1 Incorporation of Techsologic Policies

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), incorporates the following policies (collectively, “Techsologic Policies”) into these Terms of Service (“Terms”) by reference:

  • Privacy Policy
  • GDPR Compliance Policy
  • Cookie Policy
  • Acceptable Use Policy
  • Refund/Cancellation Policy
  • Data Retention Policy
  • Security Policy
  • Fair Use Policy
  • Disclosure Policy

These policies, available at https://www.unolock.com/policies.html, form an integral part of your agreement with Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”) and govern your use of the Services. By accessing or using the Services, you agree to comply with all Techsologic Policies, as applicable to you, including those designated as LegacyLink nominees, as defined in Section 3 (Services Overview).

This subsection incorporates the Techsologic Policies into the Terms, ensuring their enforceability.

18.2 Purpose of Techsologic Policies

The Techsologic Policies are designed to:

  • Protect Privacy: Ensure user anonymity and data security through zero-knowledge practices, as detailed in the Privacy Policy and GDPR Compliance Policy.
  • Define Usage Standards: Set clear expectations for lawful and ethical use of the Services, as outlined in the Acceptable Use Policy and Fair Use Policy.
  • Clarify Operational Terms: Provide transparency on refunds, data retention, and security measures, as per the Refund/Cancellation Policy, Data Retention Policy, and Security Policy.
  • Ensure Compliance: Align with Canadian and international regulations, such as PIPEDA, GDPR, and HIPAA, as described in Section 16 (Compliance with Privacy Regulations).

The Policies complement these Terms to create a secure, compliant, and user-centric environment for the Services.

This subsection explains the purpose of the Policies, fostering transparency and user understanding.

18.3 Accessibility of Policies

Techsologic makes all Techsologic Policies accessible to users at https://www.unolock.com/policies.html, with updates posted promptly and marked with a “Last Updated” date. You are responsible for reviewing the Policies before using the Services and periodically thereafter, as they may be modified in accordance with Section 13 (Modifications to Terms). Techsologic may notify users of material policy changes via email, the support portal at https://www.unolock.com/support.html, or platform announcements, but you acknowledge that our zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), limits direct notification for anonymous users.

This subsection ensures policy accessibility, assigning review responsibility to users.

18.4 User Compliance with Policies

You agree to comply with all Techsologic Policies as a condition of using the Services. Key obligations include:

  • Privacy Policy: Adhering to practices that protect your anonymity and data, such as using secure devices and credentials, as per Section 4 (User Responsibilities).
  • Acceptable Use Policy: Using the Services lawfully and ethically, avoiding prohibited activities like storing illegal content or engaging in fraud, as per Section 4.5 (Compliance with Laws).
  • Refund/Cancellation Policy: Understanding refund eligibility and cancellation terms for paid tiers, as per Section 3.5 (Payment and Billing).
  • Data Retention Policy: Acknowledging data deletion timelines post-termination, as per Section 12.3 (Effects of Termination).

Failure to comply with any Policy may result in suspension or termination of your access, as per Section 12 (Termination), and potential indemnification obligations, as per Sections 10 (Indemnification) and 11 (Indemnification of Directors and Employees).

This subsection mandates user compliance, protecting Techsologic from policy violations.

18.5 Enforcement of Policies

Techsologic reserves the right to enforce the Techsologic Policies at its sole discretion, including:

  • Monitoring Compliance: Investigating suspected violations, subject to our zero-knowledge limitations, as per Section 8 (Privacy and Anonymity).
  • Taking Action: Suspending or terminating access for non-compliance, as per Section 12 (Termination).
  • Seeking Redress: Pursuing indemnification or legal remedies for damages caused by policy violations, as per Sections 10 and 11.

Users may report policy violations to support@unolock.com or https://www.unolock.com/support.html for security-related issues. Techsologic will respond to valid reports in accordance with the applicable Policy, but is not liable for actions taken or not taken, as per Section 9 (Limitations of Liability).

This subsection establishes Techsologic’s enforcement rights, ensuring policy adherence.

18.6 Modifications to Policies

Techsologic may modify the Techsologic Policies at any time, in accordance with Section 13 (Modifications to Terms). Material changes will be notified via email, the support portal at https://www.unolock.com/support.html, or platform announcements, where feasible. Your continued use of the Services after the effective date of modified Policies constitutes your acceptance, and your sole remedy for disagreement is to terminate your use, as per Section 12.1 (User-Initiated Termination). You are responsible for reviewing updated Policies to ensure compliance.

This subsection aligns policy modifications with the Terms, protecting Techsologic from disputes.

18.7 User Acknowledgment

By accessing or using the Services, you acknowledge and agree that:

  • The Techsologic Policies are incorporated into these Terms and are binding on you as a condition of use.
  • You are responsible for reviewing and complying with all Policies, as per Section 4 (User Responsibilities).
  • Techsologic’s zero-knowledge architecture limits our ability to monitor compliance, placing responsibility on you to adhere to the Policies.
  • Non-compliance may result in termination, indemnification, or other consequences, as per Sections 9, 10, 11, and 12.

This acknowledgment ensures a compliant and secure environment for all users, protecting Techsologic’s operations.

This subsection reinforces user responsibility, aligning with the zero-knowledge model and protecting Techsologic.

Conclusion and Contact Information

19.1 Purpose of the Terms of Service

Techsologic Incorporated (Corporation Number 734340-0, headquartered at 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada), provider of the UnoLock platform, including all services, features, applications, and websites (collectively, the “Services”), has established these Terms of Service (“Terms”) to govern your use of the Services and to create a secure, compliant, and privacy-focused environment. The Terms, together with the Techsologic Policies, as defined in Section 18 (Techsologic Policies), form a legally binding agreement between you and Techsologic Incorporated (“Techsologic,” “we,” “us,” or “our”), ensuring clarity on your rights, obligations, and protections as a user, including those designated as LegacyLink nominees, as per Section 3 (Services Overview). This agreement is designed to safeguard your data through our zero-knowledge, post-quantum secure architecture while protecting Techsologic’s operations.

This subsection reaffirms the purpose of the ToS, reinforcing its legal binding nature and privacy focus.

19.2 Reaffirmation of User Agreement

By accessing or using the Services, you reaffirm your agreement to be bound by these Terms and the Techsologic Policies, available at https://www.unolock.com/policies.html, in their entirety. You acknowledge that:

  • Your use of the Services is voluntary and at your own risk, as per Section 9 (Limitations of Liability).
  • You are responsible for complying with all applicable laws and configuring the Services to meet your needs, as per Section 4 (User Responsibilities).
  • Techsologic’s zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), ensures your data remains inaccessible to us, placing responsibility on you for data security and recovery.
  • Disputes will be resolved under Ontario law in Ottawa courts, as per Section 14 (Governing Law and Jurisdiction) and Section 15 (Dispute Resolution).

If you disagree with any provision of the Terms or Policies, you must immediately cease using the Services, as per Section 12.1 (User-Initiated Termination).

This subsection reinforces user consent and key obligations, protecting Techsologic from disputes.

19.3 Comprehensive Contact Information

Techsologic provides multiple channels for you to contact us regarding the Terms, Services, or any concerns. All communications should be directed to:

  • Mail: Techsologic Incorporated, 150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada
  • Email: support@unolock.com for general inquiries, disputes, or policy-related questions
  • Security Reports: https://www.unolock.com/support.html for reporting security vulnerabilities or privacy concerns
  • Support Portal: https://www.unolock.com/support.html for platform-related assistance or notices

Techsologic will respond to inquiries within ten (10) business days, where feasible, in accordance with our support policies. Due to our zero-knowledge architecture, as per Section 8 (Privacy and Anonymity), we may require you to provide evidence for certain requests (e.g., privacy concerns), as we cannot access your data. Notices to Techsologic must comply with Section 17.5 (Notices).

This subsection provides clear contact channels, ensuring accessibility while accommodating anonymity.

19.4 Social Media and Public Presence

Techsologic maintains an active presence on various platforms to engage with users and provide updates about the Services.

These platforms are for informational purposes and do not replace official communication channels for legal or support matters, as specified in Subsection 19.3. Techsologic is not liable for information shared on third-party platforms, as per Section 9 (Limitations of Liability).

This subsection clarifies the role of social media, protecting Techsologic from third-party platform liabilities.

19.5 Final Acknowledgment

By continuing to use the Services, you acknowledge and agree that:

  • You have read, understood, and accepted these Terms and the Techsologic Policies in their entirety, as a condition of using the Services.
  • The Terms govern all aspects of your relationship with Techsologic, including privacy, security, disputes, and termination, as detailed in Sections 1–18.
  • You are responsible for maintaining the security and compliance of your use, as per Section 4 (User Responsibilities), and Techsologic’s zero-knowledge architecture limits our ability to intervene, as per Section 8 (Privacy and Anonymity).
  • Techsologic is committed to providing a secure, anonymous platform under Canadian law, as per Section 14 (Governing Law and Jurisdiction), and you agree to resolve disputes accordingly, as per Section 15 (Dispute Resolution).

This final acknowledgment reaffirms your commitment to a secure and compliant use of the Services, ensuring mutual understanding and protecting Techsologic’s interests.

This subsection provides a conclusive reaffirmation, reinforcing the ToS’s enforceability.


Contact Information
For questions or notices regarding these Terms, contact:
Techsologic Incorporated (http://techsologic.com)
150 Elgin Street, 8th Floor, Ottawa, ON K2P 1L4, Canada
Email: support@unolock.com
Security Reports: https://www.unolock.com/support.html