Terms of Service
Introduction
Welcome to UnoLock
Welcome to UnoLock, your trusted partner in digital asset protection and sensitive data security. UnoLock is a flagship service offered by Techsologic Incorporated with Corporation Number 734340-0 hereby interchangeably referred to as ("Techsologic," "we," "us," "our," or "UnoLock"), a company duly incorporated and operating under the laws of Quebec, Canada and provider of the UnoLock application and services ("UnoLock"). Our mission is to provide you with a secure and reliable digital vault, ensuring the safety and confidentiality of your digital assets, critical data, and sensitive information.
In the context of our Terms of Service and all related documentation or communications, the term "You" refers to any individual, company, or entity that accesses or uses the UnoLock platform, regardless of whether a vault is created or not. This definition not only encompasses all users who interact with the UnoLock services in any capacity, including but not limited to browsing, vault creation, payment, data storage, and utilization of any features or tools offered by the platform, but also extends to individuals designated under the LegacyLink feature as potential successors or inheritors of a user's vault. As you engage with our platform and utilize our services, and in the case of LegacyLink nominees, as you potentially assume control or access to a legacy vault, it is essential to understand that your interaction with UnoLock is governed by these Terms of Service ("Terms"), effective as of the 2nd Day of April 2024, which constitute a legally binding agreement between you (the user or the designated successor/inheritor) and Techsologic Incorporated. These Terms outline the use of the UnoLock services, delineating both your rights and obligations as well as those of Techsologic Incorporated.
By accessing or using the UnoLock platform, you affirmatively accept these Terms in their entirety. If, for any reason, you disagree with any part of these Terms, you are advised not to proceed with the use of our services. It is important to review these Terms periodically, as we reserve the right to amend them at any time. Your continued use of UnoLock after any such changes take effect will signify your acceptance of the revised Terms.
Our registration and operational base in Quebec, Canada, underscores our commitment to upholding the stringent privacy laws and regulations governing digital data security in the country. This legal framework ensures that we adhere to the highest standards of operation, providing our users with a service that is not only effective but also compliant with the prevailing legal requirements.
By engaging with the UnoLock platform, you agree to these Terms of Service, alongside our other policies listed on the UnoLock website including our Privacy Policy, GDPR Policy, Cookie Policy, Acceptable Use Policy, Refund/Cancellation Policy, Data Retention Policy, Security Policy, Fair Use Policy, and Disclosure Policy, which collectively outline the legal agreement between you and Techsologic Incorporated and hereby referred to collectively as UnoLock's Policies. These documents are vital in understanding your rights and responsibilities as a user of UnoLock. Should you find any aspect of these Terms not to your agreement, the recourse is to refrain from using our services. Conversely, your continued use of UnoLock signifies your acceptance of these Terms, as may be revised from time to time, affirming your commitment to safeguarding your digital assets with one of the most secure storage solutions available today.
Acceptance of Terms and Legal Compliance
By engaging with and utilizing the services offered by UnoLock, you, the user, hereby acknowledge and unequivocally agree to adhere to the Terms of Service and UnoLock's Policies as set forth by Techsologic Incorporated. This agreement delineates the framework of your legal relationship with us concerning your use of the UnoLock platform and the services we provide.
It is imperative that you thoroughly review these Terms and UnoLock's Policies prior to utilizing our services. Your access to and use of UnoLock signifies a conscious acceptance of these legal documents and an agreement to abide by their stipulations. Should you find any clause or provision within these Terms to be disagreeable or not in alignment with your expectations, it is your responsibility to cease the use of UnoLock forthwith.
Moreover, your continued patronage and utilization of the UnoLock services following any modifications, revisions, or updates to these Terms will be interpreted as your tacit acceptance of such changes. It is therefore suggested that you periodically revisit these Terms to ensure you remain informed of any alterations that may affect your use of UnoLock.
This agreement extends to compliance with Canadian law, under which Techsologic Incorporated operates, as well as the applicable international laws and regulations governing digital data security and privacy. By agreeing to these Terms, you affirm your commitment to adhere not only to the specific regulations of your jurisdiction but also to the broader principles of data protection and privacy upheld by UnoLock globally.
Your agreement to these Terms constitutes a binding legal contract between you and Techsologic Incorporated, underpinning your use of the UnoLock services. It is constructed to ensure mutual understanding, respect, and adherence to the legal and ethical standards that govern our operations and your interactions with our platform. Your acknowledgment and acceptance of these Terms, therefore, are crucial to the establishment of a secure, lawful, and respectful environment for all users of UnoLock.
Comprehensive Overview of Features and Understanding Your Responsibilities
Features and Services Provided by UnoLock
UnoLock, an initiative of Techsologic Incorporated, is dedicated to offering a robust suite of digital security features within a comprehensive Data Self-Governance framework. This framework empowers users to manage their digital assets securely and independently. The following delineates the array of features available through UnoLock, each designed to fortify your digital security posture:
- Biometric and FIDO2 Access: Provides sophisticated methods for user authentication, ensuring secure and user-friendly access to digital vaults.
- Global Redundancy: Implements data replication across multiple secure global locations, safeguarding against data loss due to local failures.
- Local File Encryption: Utilizes state-of-the-art encryption protocols to secure files on user devices prior to their storage or transmission.
- LockOutGuard: A preventive mechanism against permanent account lockout, ensuring uninterrupted access to user data.
- LegacyLink: Facilitates the assignment of digital heirs, ensuring a secure and seamless transition of digital assets in accordance with user directives.
- DuressDecoy with Plausible Deniability: Allows the creation of decoy vaults, enhancing user security in potentially coercive situations.
- TimeLock Restricted Access: Enables the application of time-based access restrictions, further bolstering user-defined security measures.
- LifeTimeSafe: Offers long-term digital asset preservation, ensuring legacy continuity for future generations.
- Multi-Device Access: Provides the convenience of accessing digital vaults from multiple devices, enhancing user accessibility and flexibility.
- Advanced Encryption Protocols: Employs cutting-edge encryption technologies to defend against unauthorized data access.
- Data Integrity and Anti-Corruption Measures: Guarantees the accuracy and consistency of user data, protecting against potential corruption.
- Secure Data Deletion with Plausible Deniability: Enables users to securely erase data beyond recovery while maintaining the option to present alternative data scenarios.
- Payment Anonymity: Assures anonymity in financial transactions with UnoLock, preventing any traceability back to the user’s vault or identity.
User Responsibility within the Data Self-Governance Framework
Techsologic Incorporated, through UnoLock, provides users with the tools necessary for effective Data Self-Governance. However, it is paramount for users to understand that the ultimate responsibility for the use, configuration, understanding, and implications of these tools lies solely with them. The efficacy of UnoLock’s security features is contingent upon the informed and judicious application by users. This includes but is not limited to:
- Comprehension of each feature’s functionality and its impact on digital security.
- Adequate configuration of security settings in accordance with personal or organizational security needs.
- Regular monitoring and adjustment of settings to adapt to evolving security landscapes or personal circumstances.
Users must recognize that while UnoLock provides the scaffolding for digital security, the integrity of their digital self-governance relies on their active engagement and responsible management of the provided tools. This involves a commitment to understanding the breadth of features offered by UnoLock, maintaining vigilance over personal security practices, and adapting to the dynamic nature of digital threats.
User Responsibilities within the UnoLock Platform
Techsologic Incorporated provides the UnoLock platform as a comprehensive suite of tools designed for the secure management of digital assets, embodying the principle of Data Self-Governance. While we ensure the availability of advanced security features, the effectiveness of these tools and the security of your data ultimately depend on your responsible usage and management. Below are detailed responsibilities that you, as the end user, must uphold to ensure the integrity and security of your digital assets:
Secure Management of Access Credentials
- Personal Security Measures: You are responsible for creating strong, unique passwords and keeping your access credentials confidential. This includes any recovery keys or biometric data used for accessing your UnoLock vault.
- Credential Storage: Safely storing your access credentials, avoiding common pitfalls like writing them down in easily accessible places or sharing them through insecure channels.
Configuration and Use of Security Features
- Feature Configuration: You must carefully configure UnoLock’s security features according to your personal or organizational security requirements. This involves understanding the functionality and implications of each feature, such as Biometric and FIDO2 Access, Global Redundancy, DuressDecoy, and more.
- Ongoing Maintenance: Regularly reviewing and updating your security settings to respond to new threats or changes in your security needs. This includes updating your recovery options and ensuring that features like LegacyLink and LockOutGuard are appropriately set up.
Data Backup and Recovery
- Backup Obligations: While UnoLock provides robust security measures, it's imperative to maintain external backups of your critical data. This ensures data recovery in the event of unforeseen circumstances, such as device loss or failure.
- Understanding Recovery Processes: Familiarizing yourself with UnoLock's recovery processes and ensuring you have access to necessary recovery information or devices.
Compliance with Laws and Regulations
- Legal Compliance: Ensuring that your use of UnoLock complies with all applicable local, national, and international laws and regulations. This includes data protection laws, copyright laws, and any other relevant legal frameworks.
- Responsible Use: Using UnoLock in a manner that does not infringe upon the rights of others or propagate illegal activities. This encompasses not using UnoLock for storing or transmitting illicit material.
Engagement with Security Updates and Communications
- Staying Informed: Actively engaging with updates, security advisories, and other communications from Techsologic Incorporated regarding UnoLock. This may involve applying recommended updates, changing settings in response to new threats, or adapting usage practices based on provided guidance.
Acknowledgment of Risks
- Risk Awareness: Acknowledging that, despite the high level of security provided by UnoLock, no system can guarantee absolute security. Understanding the potential risks associated with digital asset storage and taking proactive steps to mitigate those risks.
In essence, while UnoLock provides a robust framework for Data Self-Governance, the safeguarding of your digital assets requires your active, informed, and responsible participation. Your adherence to these responsibilities is crucial in maintaining the security and integrity of your data within the UnoLock ecosystem.
Usage of CybVault (DPW) Digital Paper Wallet
Overview of (DPW):
CybVault (DPW), or CybVault Digital Paper Wallet, is a feature provided by UnoLock, designed for the secure generation and storage of Bitcoin keypairs. This feature enables users to create a digital representation of a traditional paper wallet, which includes both public and private cryptographic keys necessary for Bitcoin transactions. CybVault (DPW) offers users the choice to securely store their Bitcoin keys within the digital vault of UnoLock or to print them out for offline storage.
Acknowledgment of Cryptographic Wallet Risks:
Users must acknowledge the inherent risks associated with the use and management of cryptographic wallets. While UnoLock provides tools to secure and manage these wallets, the nature of Bitcoin and other cryptocurrencies means they are susceptible to volatile market changes, potential regulatory impacts, and security threats from cyberattacks. Users are responsible for understanding these risks and taking appropriate security measures, including keeping their private keys secure and confidential.
Disclaimer and Limitation of Liability:
Techsologic Incorporated is not responsible for any losses incurred due to the use of CybVault (DPW) as follows:
- Export of Funds: Once funds or keys are exported from (DPW), management and security of these funds are solely the user's responsibility. Techsologic Incorporated bears no responsibility for any subsequent loss, theft, or unauthorized access.
- Key Management: Users are solely responsible for the safekeeping of their Bitcoin keys generated by (DPW). Loss or theft of private keys can result in irreversible financial losses.
- Third-Party Risks: Users should be aware of and manage risks related to the use of third-party software or services when managing or transacting with the exported keys or wallets.
- Regulatory Compliance: Users are solely responsible for ensuring that their use of CybVault (DPW) complies with all applicable laws and regulations, including those governing cryptocurrencies.
User Responsibilities:
- Secure Storage: If opting to print Bitcoin keys, users must take utmost care to secure the physical copies of their wallets, similar to how they would secure cash or other valuable documents.
- Regular Audits and Updates: Users should regularly review and update their security practices related to CybVault (DPW) to address new security threats and ensure that their wallet remains secure.
- Educational Commitment: Users should educate themselves on the functionalities and risks of using digital and paper wallets for cryptocurrencies to effectively manage their digital assets.
Engagement with Security Updates and Communications:
Techsologic Incorporated will provide updates and security advisories concerning CybVault (DPW) through official channels. Users must stay engaged with these communications to remain informed about new features, security updates, or potential vulnerabilities and respond appropriately to maintain the security of their digital assets.
Acknowledgment of Risks:
By using (DPW), users acknowledge that while significant measures are in place to secure digital assets, absolute security cannot be guaranteed. The risks associated with digital and paper wallets, including potential technical failures, cyber threats, or market volatility, require active user management and personal responsibility.
Data Security and Encryption at UnoLock
At Techsologic Incorporated, the foundation of our UnoLock platform is built upon an unwavering commitment to safeguarding your digital assets. Recognizing the paramount importance of data security in today's digital age, we employ a comprehensive array of advanced encryption technologies and adhere to industry-leading security practices to ensure the protection of your information.
Advanced Encryption Technologies
- End-to-End Encryption: UnoLock utilizes AES-256-GCM encryption, a gold standard in the industry, ensuring that your data is encrypted from the moment it leaves your device until it reaches our servers—and remains encrypted while stored.
- Secure Transmission Protocols: All data transmission to and from our servers is secured using TLS 1.3, the latest version of the Transport Layer Security protocol, protecting against eavesdropping and tampering.
- Biometric and FIDO2 Standards: For access control, UnoLock supports modern authentication methods, including biometric verification and FIDO2 standards, offering a seamless yet secure access experience.
Adherence to Industry Standards and Best Practices
- Regular Security Audits: Our systems undergo regular security audits. These audits help identify potential vulnerabilities and ensure our defenses are robust against evolving threats.
- Continuous Monitoring: We implement continuous monitoring of our infrastructure to detect and respond to security threats in real-time, minimizing the potential impact of any unauthorized access attempts.
- Data Integrity Checks: To prevent data corruption and ensure the integrity of your information, UnoLock incorporates strict data integrity checks and validation processes.
- Global Redundancy: Your data is replicated across multiple geographically dispersed data centers, ensuring availability and resilience against localized outages or disasters.
User Acknowledgment of Risks
While we strive to implement the best-known technologies and follow industry best practices for securing your data, it's crucial to understand that no digital platform, including UnoLock, can offer absolute security guarantees. The digital landscape is continuously evolving, with new threats emerging regularly. Therefore, by utilizing the UnoLock platform, you acknowledge the inherent risks associated with storing data online.
You agree that Techsologic Incorporated, despite our comprehensive security measures, cannot be held liable for any security breaches that may occur due to factors beyond our reasonable control. These include but are not limited to, sophisticated cyber attacks that exploit unforeseen vulnerabilities, user errors leading to unauthorized access, and systemic failures of the internet infrastructure.
Your Role in Securing Your Data
It's important to emphasize that the security of your digital assets on UnoLock also depends on your actions. Practicing good digital hygiene, such as using strong, unique passwords, enabling two-factor authentication, and being cautious of phishing scams, plays a crucial role in the overall security of your data.
In conclusion, Techsologic Incorporated's UnoLock platform represents a commitment to providing you with a secure environment for managing your digital assets. By employing cutting-edge encryption technologies and adhering to stringent security protocols, we aim to offer a robust defense against the myriad threats in the digital world. However, we also rely on you, our users, to be partners in this effort, recognizing the shared responsibility in maintaining the security and integrity of your data.
Reliance on Third-Party Systems and Technologies
At UnoLock, provided by Techsologic Incorporated, we are committed to delivering a secure, reliable platform for digital asset storage by utilizing state-of-the-art technologies and industry best practices. A critical component of our infrastructure involves the integration and reliance on third-party systems and technologies, which are selected based on their reputation for security, reliability, and adherence to the highest standards of digital safety.
Third-Party Systems: Selection and Integration
- Best-in-Class Technologies: We carefully select third-party technologies that are recognized as best-in-class within the cybersecurity and data storage industries. This selection is based on thorough research, performance evaluations, and security assessments to ensure that we incorporate robust, reliable components into our platform.
- Industry Standards Compliance: The third-party systems we utilize comply with industry standards and regulations, ensuring that they meet the rigorous requirements necessary for safeguarding sensitive digital assets. These standards include but are not limited to, ISO/IEC 27001, SOC 2 Type II, and GDPR.
Evolution of Technology: Risks and Responsiveness
- Evolving Threat Landscape: We acknowledge that the landscape of digital security is in constant flux, with new threats emerging and existing technologies being challenged. Despite the proven track record of the third-party technologies we employ, there exists the possibility that vulnerabilities may be discovered or that these systems might be compromised.
- Vulnerability Response and Patch Management: In response to the dynamic nature of cybersecurity threats, we maintain a proactive stance on vulnerability management. Our team closely monitors security advisories and collaborates with our third-party providers to apply patches and updates as they become available, aiming to mitigate potential vulnerabilities swiftly.
- Continuous Assessment: Our commitment to security entails ongoing assessment of the third-party systems integrated within UnoLock. This continuous evaluation ensures that we remain aligned with the evolving standards of technological excellence and security.
Shared Responsibility and User Awareness
- User Partnership in Security: While we strive to secure the UnoLock platform through meticulous selection of third-party technologies and vigilant security practices, we also emphasize the importance of user awareness and caution. Users are encouraged to stay informed about the security measures in place and to adopt safe practices in managing their digital assets.
- Transparency and Communication: Techsologic Incorporated is dedicated to transparency regarding the use of third-party systems within UnoLock. Should any significant vulnerabilities or incidents involving these systems arise, we commit to promptly communicating with our users about the nature of the issue and the steps being taken to address it.
In conclusion, the reliance on third-party systems and technologies is a fundamental aspect of providing our UnoLock service, enabling us to offer advanced features and security measures. However, we recognize the inherent challenges posed by the ever-evolving technology landscape. As such, Techsologic Incorporated pledges to remain vigilant, responsive, and transparent, ensuring that we continue to uphold the highest standards of security and reliability for our users in the face of changing threats and technological advancements.
Intellectual Property and Use of UnoLock App
Ownership Statement
Techsologic Incorporated, the provider of the UnoLock app and platform, hereby declares that all aspects of the UnoLock application, including its source code, the content of its GitHub repository, all related files, documentation, interfaces, graphics, design, and any digital assets created, maintained, or otherwise provided by Techsologic Incorporated, remain the exclusive property of Techsologic Incorporated. This encompasses all intellectual property rights, copyright, trademarks, patents, and any other proprietary rights associated with the UnoLock app and its contents.
Usage Rights
While Techsologic Incorporated grants users a license to access and use the UnoLock app for securing their digital assets, sensitive data, and critical information in accordance with these Terms of Service, it is imperative to understand that this license is non-exclusive, non-transferable, and subject to the limitations and obligations set forth in these Terms. The license is provided solely for the user’s personal or business use to employ the tools and features of UnoLock for the intended purpose of digital security and data self-governance.
Restrictions
Users of the UnoLock app are expressly prohibited from:
- Copying, modifying, distributing, selling, or leasing any part of the UnoLock app or included content.
- Attempting to extract the source code of the app or reverse-engineer any part of the app, except where explicitly permitted by applicable law notwithstanding this limitation.
- Using the app, its content, or any associated intellectual property for any illegal, unauthorized, or unethical purpose.
GitHub Repository and Open Source Components
Techsologic Incorporated may make parts of the UnoLock app’s source code available in a GitHub repository for transparency, community engagement, and to facilitate user verification of the app’s security measures. Access to this repository is provided under specific terms that allow viewing, downloading, and collaborating under the confines of open-source licenses and contributions guidelines established by Techsologic Incorporated. Participation in or use of the GitHub repository does not grant any additional rights or ownership over the software or intellectual property beyond those specified in this statement.
Intellectual Property Claims
Techsologic Incorporated respects the intellectual property rights of others and expects users of the UnoLock app to do the same. Any use of third-party intellectual property within the UnoLock app, including open-source software components, is duly licensed or utilized in accordance with applicable intellectual property laws and open-source licenses.
Acknowledgment and Agreement
By accessing and using the UnoLock app, users acknowledge and agree to respect the intellectual property rights of Techsologic Incorporated. Users understand that any unauthorized use of the UnoLock app, its source code, or other related intellectual property may result in termination of their access to the app and potential legal action by Techsologic Incorporated to protect its rights.
In conclusion, the UnoLock app and all associated intellectual property are the property of Techsologic Incorporated. The access and use of the UnoLock app are provided to users under a specific set of terms that ensure respect for and protection of Techsologic Incorporated’s intellectual property rights while enabling users to securely manage their digital assets.
Jurisdiction and Governing Law
Techsologic Incorporated, the entity behind UnoLock, is proud to offer a platform that empowers individuals and organizations with state-of-the-art tools for managing and securing their digital assets. As part of our commitment to providing a reliable and trustworthy service, it is important to clarify the legal framework that governs our relationship with users.
Governing Law
The use of the UnoLock platform, including all transactions, services, and interactions, is governed by the laws of Canada, with a specific emphasis on the legal statutes and regulations enforced within the province of Quebec. These laws provide a foundation for the operation of UnoLock and define the legal environment within which our services are offered.
Jurisdiction
In the event of any legal disputes or issues arising from the use of UnoLock, or in connection with the Terms of Service outlined herein, such matters shall be subject to the jurisdiction of the courts located within Quebec, Canada. This jurisdictional choice ensures that any legal proceedings or dispute resolutions will be conducted under the legal system of Quebec, offering clarity and consistency in legal interpretations and enforcement.
Legal Venue
The designation of Quebec as the venue for resolving disputes underscores our connection to and compliance with Canadian law, and it reflects our dedication to operating within the legal frameworks established by our home jurisdiction. Users of the UnoLock platform agree to submit to the jurisdiction of Quebec courts for the purpose of litigating any such disputes.
Commitment to Legal Compliance
Techsologic Incorporated is committed to adhering to the highest standards of legal compliance and ethical operation. By choosing Quebec, Canada, as our governing jurisdiction, we aim to ensure that our users have a clear understanding of the legal context of our services and feel secure in the knowledge that their interactions with UnoLock are backed by the robust legal protections offered by Canadian law.
Binding Agreement
By accessing or using the UnoLock platform, you acknowledge that you have read, understood, and agreed to be bound by these Terms of Service, including the stipulations regarding jurisdiction and governing law. This agreement forms the basis of the legal relationship between you and Techsologic Incorporated, and it is crucial that you fully comprehend the implications of these terms as they pertain to your use of UnoLock.
In summary, the legal relationship between users and Techsologic Incorporated, facilitated through the UnoLock platform, is governed by the laws of Canada and specifically the province of Quebec. We uphold this jurisdictional and legal framework to ensure a transparent, secure, and legally sound environment for all our users, thereby fostering trust and reliability in our digital asset management services.
Modifications to Terms of Service
Revision and Update Policy
Techsologic Incorporated, the proprietor of UnoLock, acknowledges the dynamic nature of digital security services, legal landscapes, and operational requirements. In recognition of this ever-evolving environment, we reserve the unequivocal right to modify, amend, or update these Terms of Service ("Terms") at our discretion. Such modifications may be necessitated by a range of factors, including but not limited to enhancements to our services, changes in legal or regulatory obligations, advancements in technology, or alterations in operational practices.
Notification of Changes
We are committed to transparency and the principle of informed consent. Consequently, whenever there are changes to these Terms that materially affect your rights or obligations, we will make reasonable efforts to notify you. This notification may come through various channels, including but not limited to direct emails to registered users, announcements on our platform, or other communication methods deemed appropriate under the circumstances.
It is important to note that the nature and timing of these notifications may be influenced by the scope and urgency of the changes, as well as by applicable legal requirements. Some changes may be immediate due to legal mandates or critical security concerns, whereas others may allow for a grace period during which users can review and consider the implications of the amendments.
User Responsibility and Acceptance
As a user of the UnoLock platform, it is your responsibility to stay informed about the current Terms of Service governing your use of our services. We encourage regular review of the Terms to ensure understanding and compliance. Following the announcement of any modifications, your continued access to and use of UnoLock will be considered as your unequivocal acceptance of the revised Terms. This continued use after changes have been made constitutes your agreement to be bound by the Terms as updated.
Should you find any of the modifications to the Terms unacceptable, you are afforded the choice to discontinue your use of the UnoLock services. Discontinuation of use is your sole remedy in the event of disagreement with the updated Terms.
Archiving and Accessibility
For the sake of transparency and historical reference, previous versions of these Terms may be archived and made accessible for review. This ensures that users can understand the evolution of our policies and the rationale behind the changes.
User Engagement and Feedback
We value our user community and invite feedback regarding any modifications to these Terms. Your insights and opinions are critical to our continuous improvement and our commitment to serving your digital security needs effectively.
In summary, the process of modifying the Terms of Service is a reflection of Techsologic Incorporated’s commitment to adaptability, legal compliance, and user engagement. By notifying users of changes and requiring continued use as a form of acceptance, we aim to maintain a transparent, fair, and dynamic operational environment that serves the best interests of our users and the broader digital community.