Legal
Mutual Non-Disclosure Agreement
Effective date: 1 March 2025 — Governing law: Spain
See also: Terms & Conditions · Privacy Policy
This Mutual NDA is legally binding on all LogicLot Users. It comes into effect automatically upon account creation and applies to all interactions, proposals, and project data exchanged through the Platform. No separate signature is required.
1. Parties & Automatic Binding
This Mutual Non-Disclosure Agreement (“NDA” or “Agreement”) is entered into automatically and without need of a separate signature between:
- LogicLot Ltd (“Platform Operator”); and
- Each registered User of the LogicLot platform, whether a Business or Expert/Specialist (“User” or “Receiving Party” or “Disclosing Party” as applicable).
By creating an account on LogicLot, you unconditionally and irrevocably enter into this Agreement. This NDA is incorporated by reference into the Terms & Conditions and forms part of the complete legal agreement governing your use of the Platform.
This Agreement operates mutually between all Users of the Platform who interact with one another through a Discovery Scan, Custom Project, Solution purchase, Order, or any other Platform-mediated interaction.
2. Definitions
- “Confidential Information” means any information disclosed by one party (“Disclosing Party”) to another party (“Receiving Party”) in connection with the Platform or any Platform-mediated engagement — whether disclosed in writing, orally, digitally, visually, or by any other means — that is designated as confidential or that a reasonable person would understand to be confidential given the nature of the information and the circumstances of its disclosure. Confidential Information is not limited to information submitted through Platform interfaces and expressly includes information disclosed during live calls, screen-sharing sessions, and video demonstrations arranged in connection with the Platform.
Without limitation, Confidential Information includes:
- Business workflows, operational processes, standard operating procedures, data structures, and internal systems;
- Customer lists, client data, revenue figures, margins, pricing, and commercial metrics;
- Technical architectures, automation logic, integration specifications, and software stack details;
- Responses submitted through any Platform intake form or questionnaire, including but not limited to: Discovery Scan intake fields (business model, team size, primary time drain, monthly volume, communication tools, tech stack, business description, growth goals), Custom Project brief fields, and any onboarding or profiling questionnaire;
- Expert proposals, automation strategies, implementation blueprints, scoping documents, methodology descriptions, pricing structures, and technical approaches submitted in response to any job posting or Discovery Scan;
- Solution blueprints, source documentation, workflow diagrams, and implementation details;
- Information disclosed during discovery calls, demo sessions, screen-sharing sessions, video calls, or any other live or recorded consultation arranged through or in connection with the Platform, regardless of whether that session occurs on the Platform or via a third-party tool (e.g., Zoom, Google Meet, Calendly);
- System access credentials, API keys, access tokens, passwords, OAuth authorisations, webhook secrets, and any similar authentication material shared during or for the purpose of an implementation engagement;
- Database schemas, data models, table structures, and sample or production data provided to facilitate implementation;
- Third-party tool configurations, account settings, automation workspace contents, and integration logic;
- Any other business information marked as confidential or that a reasonable person would treat as proprietary.
Confidential Information does not include information that:
- (a) is or becomes publicly available through no fault of the Receiving Party;
- (b) the Receiving Party can demonstrate was known to them prior to disclosure, free of any confidentiality obligation;
- (c) is independently developed by the Receiving Party without use of or reference to the Disclosing Party's Confidential Information;
- (d) is received from a third party with no confidentiality restriction and under no duty of confidence;
- (e) is required to be disclosed by applicable law, court order, or regulatory authority — provided the Receiving Party gives the Disclosing Party prompt prior written notice (where legally permissible) to allow the Disclosing Party to seek a protective order.
3. Obligations of the Receiving Party
Each Receiving Party agrees to:
- Keep strictly confidential all Confidential Information received through the Platform and not disclose it to any third party without prior written consent from the Disclosing Party and LogicLot.
- Use Confidential Information solely for the purpose of evaluating, negotiating, or performing the specific Platform-mediated engagement for which it was shared. Any other use is strictly prohibited.
- Not reproduce, copy, distribute, or reverse-engineer any Confidential Information beyond what is strictly necessary for the permitted purpose.
- Apply at least the same level of care to protect Confidential Information as it applies to its own most sensitive proprietary information, and in any event no less than reasonable care.
- Not use Confidential Information to compete with the Disclosing Party, directly or indirectly, or to develop competing products, services, or workflows that are substantially based on the Disclosing Party's Confidential Information.
- Immediately notify LogicLot and the Disclosing Party upon becoming aware of any actual or suspected unauthorised disclosure or misuse of Confidential Information.
4. Specific Protections for Expert Proposals
The following specific rules apply to Confidential Information disclosed through Discovery Scans and Custom Projects:
- Expert proposals, automation strategies, implementation blueprints, and scoping documents submitted through the Platform are the Confidential Information of the submitting Expert.
- Businesses are strictly prohibited from using, replicating, implementing, sharing with their own technical team, or commissioning the implementation of any Expert proposal without completing a paid engagement through LogicLot with that Expert.
- A Business may not use proposal content received from Expert A to negotiate with, instruct, or improve the brief offered to Expert B, or any third party outside the Platform.
- This protection applies regardless of whether the Business proceeds with the project, and survives the expiry or termination of the Business's account.
- Breach of this clause entitles the Expert and LogicLot to claim damages including the full commercial value of the improperly used proposal and any resulting implementation. LogicLot may also pursue a claim in its own right for circumvention fees as set out in the Terms & Conditions.
5. Specific Protections for Business Information
The following specific rules apply to Business information shared through Discovery Scans, Custom Projects, and Orders:
- All business data, workflow descriptions, tooling details, team structures, and operational information shared by a Business through any job posting, conversation, or order on the Platform is the Confidential Information of that Business.
- Experts are strictly prohibited from: sharing Business information with any third party; using Business information to develop solutions for competing businesses; incorporating Business-specific logic into publicly listed Solutions without explicit written consent from the Business; or retaining Business data beyond the period necessary to deliver the contracted work.
- Experts must delete or securely destroy Business Confidential Information upon project completion or upon request, unless retention is required by law.
6. Discovery Calls, Demo Sessions & Off-Platform Communications
The confidentiality obligations of this Agreement apply in full to any information disclosed during live or recorded sessions arranged in connection with a Platform engagement, including but not limited to:
- Demo sessions booked and paid through the Platform (including screen-sharing demonstrations of an Expert's solution or approach);
- Discovery calls between a Business and one or more Experts conducted prior to, during, or following a Discovery Scan or Custom Project;
- Video or voice consultations conducted via third-party tools (Zoom, Google Meet, Microsoft Teams, or similar) where the meeting was initiated, referenced, or booked through the Platform;
- Screen-sharing sessions during which a Business shares internal systems, tools, dashboards, or workflows with an Expert for the purpose of scoping or delivering an automation project.
The fact that such sessions occur outside the Platform's messaging interface does not remove them from the scope of this Agreement. Any information disclosed in connection with a Platform-mediated relationship — regardless of the channel through which it is communicated — is Confidential Information subject to the full obligations of this NDA.
Specific rules for demo and discovery sessions:
- Experts may not record, screenshot, or transcribe any session without the explicit prior consent of the Business.
- Businesses may not record sessions, retain notes, or share session content with third parties without the Expert's explicit consent.
- Neither party may use information disclosed in a session to brief, instruct, or negotiate with any third party outside the Platform.
- If a session reveals trade secrets, source code, customer data, or credentials, those materials are subject to the heightened protections in Sections 5 and 7 of this Agreement in addition to the general confidentiality obligations.
7. Implementation Phase — System Access, Credentials & Data
During the implementation phase of a project — whether arising from a Solution purchase, Custom Project award, or any other paid Order — a Business may be required to share sensitive access credentials, system integrations, and internal data with an Expert to enable delivery of the contracted automation work. The following rules apply without exception:
Expert obligations regarding system access:
- All access credentials, API keys, OAuth tokens, webhook secrets, passwords, and authentication material shared by a Business are Confidential Information of the highest sensitivity. The Expert must treat them with the strictest level of protection and must not store, copy, or share them beyond what is strictly necessary to perform the contracted work.
- The Expert must access the Business's systems, accounts, and tools only for the specific and limited purpose of performing the contracted implementation. Any access beyond that scope — including but not limited to reading, exporting, or copying data unrelated to the automation project — constitutes a material breach of this Agreement.
- Upon project completion, or immediately upon request by the Business or LogicLot, the Expert must permanently delete or destroy all access credentials, stored data, API keys, and copies of any system configuration shared by the Business. The Expert must confirm in writing (through the Platform) that destruction is complete.
- The Expert must not share system access with subcontractors, assistants, or any third party without the explicit prior written consent of the Business, recorded through the Platform.
- The Expert must immediately notify the Business and LogicLot if any access credentials are compromised, exposed, or accessed by an unauthorised party.
Business obligations regarding data provided for implementation:
- The Business must not share live production credentials without first assessing the risk. Where possible, sandbox, staging, or read-only credentials should be used.
- Business Confidential Information (data schemas, production data, customer records) provided to an Expert is subject to the obligations in Section 5 of this Agreement and must not be used for any purpose beyond the contracted scope.
Breach of this section — including unauthorised retention of credentials, unauthorised data access, or failure to confirm destruction of access materials — constitutes wilful breach of this NDA and entitles the Business and LogicLot to the full remedies set out in Section 10 of this Agreement, including the fixed €5,000 per-incident penalty and immediate account termination.
8. LogicLot's Rights of Access
Notwithstanding the above, LogicLot retains the right to access, process, store, and use all Confidential Information exchanged through the Platform for the following purposes:
- Dispute resolution and investigation;
- Fraud detection, anti-circumvention enforcement, and platform security;
- Compliance with applicable law, regulatory requests, or court orders;
- Quality assurance and platform improvement (in anonymised form where possible);
- Enforcement of these Terms and the Mutual NDA.
LogicLot's access does not constitute a breach of this Agreement. By using the Platform, all Users consent to this access. LogicLot will not voluntarily disclose User Confidential Information to third parties except as described in the Privacy Policy.
9. Duration & Survival
This Agreement takes effect upon account creation and remains in full force for the duration of your use of the Platform. Upon account termination, the confidentiality obligations in Sections 3, 4, 5, 6, 7, and 10 survive indefinitely with respect to:
- Trade secrets (which remain protected for as long as they qualify as trade secrets under applicable law);
- Business workflows, customer data, and proprietary methodologies;
- Expert automation architectures, pricing models, and solution designs.
For all other categories of Confidential Information, obligations survive account termination for a period of 5 years.
10. Consequences of Breach
Breach of this NDA is a material breach of the Platform Terms & Conditions and may result in:
- Immediate account suspension or permanent termination without refund;
- Withholding of all pending payments;
- Civil proceedings for damages, including loss of profits, unjust enrichment, and reputational harm;
- Injunctive relief (courts may grant an injunction to prevent further breach without requiring proof of actual damage);
- A fixed breach penalty of €5,000 per incident for wilful or repeated violations, as a genuine pre-estimate of harm to the Disclosing Party and the Platform, without prejudice to any other remedy.
Both parties acknowledge that a breach of this NDA may cause irreparable harm for which monetary damages alone are an inadequate remedy. Accordingly, both parties consent to the granting of equitable relief (including injunction) without the requirement to post bond or prove actual damages.
11. No Licence or Transfer of Rights
Nothing in this Agreement grants the Receiving Party any licence, title, or ownership rights in the Disclosing Party's Confidential Information. Disclosure of Confidential Information does not grant any rights to use, reproduce, or commercialise that information beyond the specific permitted purpose.
12. No Warranty on Confidential Information
Confidential Information is provided “as is”. The Disclosing Party makes no representations or warranties — express or implied — as to the accuracy, completeness, fitness for purpose, or non-infringement of any Confidential Information. The Receiving Party relies on it at their own risk.
13. Governing Law & Jurisdiction
This Agreement is governed by the laws of Spain. Any dispute arising out of or in connection with this Agreement shall be submitted exclusively to the courts of Spain, except where mandatory local law requires otherwise.
14. Contact
To report a suspected NDA breach or for enquiries regarding this Agreement, contact: contact@logiclot.io