Terms of Service


General provisions

  1. The following Terms and conditions are a model agreement and set out the conditions, principles and manner of providing services by the Service Provider to the User. Acknowledgement and consent to the provisions of the Terms and conditions are required for the provision of the Services.

  2. The Services are provided without any spatial constraints and in accordance with the time constraints indicated in the Price List and/or Application.

  3. The relevant time zone for the Service Provider is CET (Central European Time).

  4. The Terms and conditions are effective from 11.01.2019

  5. The terms used in the Terms and conditions should be understood as follows:

    1. Service provider - Logicaltrust sp. z o.o. sp. k.,

    2. Terms and conditions – this document,

    3. SecurityInside – a computer software available on the Internet at: https://securityinside.com , which requires logging in,

    4. Service – a service provided by electronic means using SecurityInside by the Service Provider to the User in compliance with the law and under the conditions stipulated in the Terms and conditions,

    5. Agreement – an agreement for the provision of a Service (free or a paid), concluded between the User and the Service Provider under the conditions stipulated in the Terms and conditions,

    6. Company – a natural person conducting business activities in their own name or a natural person representing a legal person or an organizational unit without legal personality, who according to the law can conclude an Agreement with the Service Provider,

    7. Private person – a natural person with full legal capacity who has concluded an Agreement that is not related to their business activities or profession (consumer),

    8. Third party – a natural, legal person or organizational unit without legal personality as understood by Polish law other than the User and the Service Provider,

    9. User – a Private Person or Company. The User can also be an employee of the Company.

    10. Account – a collection of data and settings saved in the database of the Service Provider for the User as part of the Services. Access to the Account is available after logging in,

    11. Registration – procedure required for creating an Account in SecurityInside and subsequent use of the Services by the User,

    12. Login – User's telephone number,

    13. Password – a sequence of characters that meet the technical requirements set out by the Service Provider, selected by the User in order to authorize access to the Account and secure it against unauthorized use,

    14. Notifications – notifications sent to the User in an electronic form in accordance with the Privacy Policy,

    15. Privacy Policy – it specifies the way of processing data at SecurityInside, including cookies and Notifications, it constitutes Annex 1 to these Terms and conditions,

    16. Price list – a list of prices for particular Services provided. The price list can be sent on request to an e-mail address. Also, selected packages included in the price list are available at www.securityinside.com.

    17. Materials – copyright works referred to in the Bern Convention protected under the Act of February 4, 1994 on copyright and related rights (Journal of Laws of 2006, No. 90, item 631, as amended) - the Service Provider is entitled to their management and use,

    18. Computer software – protected under Directive 2009/24/EC of the European Parliament and the Council on the legal protection of computer software of April 23, 2009 and in accordance with the provisions of Polish law - the Service Provider is entitled to its management and use,

    19. Digital content – data created and provided in a digital form,

    20. Personal data – data that directly or indirectly allows identification of a natural person,

    21. Force Majeure – accidental or natural occurence beyond the control of the Service Provider (e.g. fire, explosion, power failure, earthquake, flood, cloudburst, riots, actions of the civil or military authorities, war, terrorist attacks (including cyber terrorism), cyber-attacks (e.g. DDOS), actions and/or omissions of ICT network operators, other random events,

    22. ICT system – a set of compatible IT devices and software responsible for processing and storage, as well as data transfer via telecommunications network using the User's end device appropriate for a given type of network,

    23. Electronic provision of services – providing services without the simultaneous presence of both parties (remotely), through data transmission at the request of the User, sent and received by means of electronic processing devices, including digital compression and data storage, which is fully transmitted, received and/or sent via a telecommunications network,

    24. Cookies – small piece of text information sent by a web server and saved by the User's browser,

    25. E-mail address – an active e-mail address,

§ 2

Technical requirements

  1. In order to properly use SecurityInside, it is required to have a device with Internet access and to create an Account.

  2. Support and technical assistance are provided by the Service Provider electronically via the email address: contact@securityinside.com. The mentioned support is provided on the spot from Monday to Friday (with the exception of public holidays in the Republic of Poland as listed at https://pl.wikipedia.org/wiki/Dni_wolne_od_pracy_w_Polsce / https://en.wikipedia.org/wiki/Public_holidays_in_Poland ) between 08.00 and 16.00. In some cases, it might take more than 1 day for the issue to be processed. If you do not receive an answer from us, please contact us again.

  3. The Service Provider does not provide support in terms of any other services than those offered via SecurityInside.

§ 3

Registration and login

  1. Registration with SecurityInside requires sending a notification through the contact form at https://securityinside.com/ or to the email address contact@securityinside.com and following further instructions.

  2. After successful registration, the Service Provider will send information regarding logging in and using SecurityInside. Only after receiving this information the Registration processed is considered completed.

  3. The User is obliged to provide their real e-mail address in terms of factual and legal circumstances, which they have the right to use.

§ 4

Scope and type of Services provided

  1. The Service Provider provides access to materials available at SecurityInside under the conditions stipulated in the Terms and conditions, as well as the Agreement. Available materials include videos, texts and quizzes on cyber security.

  2. Free services include access to the Demo Account: depending on the type of the demo Account, from 1 to 6 full lessons (one lesson contains: 2 tests, 1 text and 1 video).

  3. Paid services are provided according to the Price List and in compliance with the Terms and conditions, as well as the Agreement. They include access to two types of Accounts (user and manager), which in turn give access to the lesson packages purchased, e-mail notifications reminding of upcoming lessons, access to user statistics, and the possibility of creating more user accounts as part of the purchased package.

  4. Disclosing the educational materials (videos, texts and tests) on another e-learning platform in a form agreed with the User is possible under the terms of the Agreement.

§ 5

Duration of the Agreement

  1. Consent of the User to the Terms and conditions is required for the conclusion of the Agreement. The Agreement is concluded for the period of 1 year upon confirmation by the Service Provider.

  2. The Agreement may be concluded in writing.

  3. It is possible to purchase a license for the educational materials without accessing SecurityInside. In such a case, a license agreement has to be drawn up.

  4. The User has no right to withdraw from the Agreement for paid Services, as at the time of purchase they are informed and consent that the Service provided is delivered immediately.

  5. The Service Provider has the right to unilaterally terminate the Agreement and delete the User's Account. A declaration of will shall be sent via the ICT system in the event of a breach of law by the User or/and breach of the Terms and conditions in terms of the User's obligations, in particular if it has occurred repeatedly.

  6. The User has the right to delete their Account at any time if the Service Provider has violated the law and/or the Terms and conditions and/or the terms of the Agreement.

  7. The User is required to send details for the invoice, email address of the training manager and specify intervals between lessons.

  8. In the case of written Agreements, the provisions explicitly set out therein shall apply. The provisions of the Agreement shall have priority over the provisions of the Terms and conditions.

  9. In the case of creating User Accounts for employees, it is assumed that the Agreement is concluded between the Service Provider and the Company that creates Accounts for its employees (the Service Provider creates an Account for the manager who subsequently adds new Users according to the limit of a given purchased package).

§ 6


  1. The Price List specifies the amounts to be paid.

  2. The payments are calculated on a monthly basis until termination of the Agreement.

  3. The Service Provider issues an invoice, which must be paid through a bank transfer within 14 days. In the absence of timely payment, the Service Provider has the right to suspend access to the Account.

  4. Written Agreements may specify other payment conditions.

  5. The User consents to receive invoices and/or other accounting documents from the Service Provider by electronic means.

  6. In the case of creating User Accounts for employees, it is assumed that it is the Company that provides Accounts to its employees, not the employees themselves, that is obliged to make payments.

§ 7

Rights and obligations of the User

  1. The User has the right to:

  1. manage their Account,

  2. use SecurityInside, including its Services in accordance with the Terms and conditions,

  3. send inquiries to the technical support department and/or submit complaints,

  4. terminate the Agreement under the conditions specified in the Terms and conditions.

  1. The User is obliged to:

  1. use the data and/or personal data which they have the full right to use (without violating the rights of third parties),

  2. check in advance whether they meet the technical requirements for using SecurityInside, including its Services,

  3. not to use SecurityInside in a way that interferes with the functioning of the Services and/or in a way that violates the law,

  4. use SecurityInside in accordance with its intended purpose,

  5. update data, including personal data,

  6. not to take any actions that are against the provisions of generally applicable law or principles of good conduct, as well as actions that violate personal rights of other Users, third parties or legitimate interests of the Service Provider or other Users or third parties,

  7. not to access the accounts of other Users that are not managed by the User (e.g. by cracking Passwords),

  8. not to overload the connection and other infrastructure which serve as a basis for providing the Service,

  9. keep their Password strictly confidential,

  10. not to give access to their Account to other Users and third parties,

  11. fulfil their obligations,

  12. not to use automated programs to collect information about SecurityInside or its Services.

  1. It is prohibited to use SecurityInside for the purpose of terrorist, sabotage or other criminal activities as well as to violate the law or commit torts, in particular such as posting materials that insult a person or violate their rights, contain threats, invectives, promote hatred towards people and/or animals or discriminate against them in any way, posting paedophile content, content displaying and/or promoting a crime, desecrating, offensive, violating or likely to violate personal or other legally protected rights, posting content that attacks or degrades a person or/and supports violence or encourages to commit a crime.

  2. The rights and obligations of the User cannot be transferred to other Users and/or third parties, which means that the User cannot transfer/sell/dispose of their Account to another entity. The Service Provider is the sole entity authorized to provide Services to the Users. Companies have the right to create accounts for their employees according to the package selected, as specified in the Price List.

§ 8

Rights and obligations of the Service Provider

  1. The Service Provider shall not interfere in any User Account and data collected within it, except when the User asks for it due to technical problems or when another User or a third party reports a violation.

  2. The Service Provider has the right to:

  1. inform the Users about new SecurityInside functionalities or send important notifications by electronic means,

  2. ask the Users about their general opinion and level of satisfaction regarding using SecurityInside, including its Services and technical support, in the form of questions or short surveys collected via the ICT system,

  3. conduct research on how SecurityInside is used, in particular by collecting anonymous information that enables to improve the functional and technical aspects of the Services (e.g. screen resolution, type of browser used, number of clicks on specific tabs, etc.),

  4. conduct research on how SecurityInside is used by the Users by collecting information about their use of SecurityInside,

  5. change at his own discretion the properties and functionalities of the Services, as long as it does not impair the quality of the Services provided to the User,

  6. delete Accounts in accordance with the Terms and conditions.

  1. The Service Provider is obliged to make every effort in order to ensure the proper delivery of the Services in a continuous and uninterrupted manner.

  2. The Service Provider reserves the right to temporarily make all or part of SecurityInside, including its Services, unavailable for technical reasons, in particular due to maintenance or introducing changes. The Service Provider shall make every effort to minimize the inconvenience to the User.

  3. The Service Provider may take other actions and measures under the conditions specified in the Terms and conditions.

§ 9


  1. The Users are fully liable for their actions related to the use of SecurityInside.

  2. The Service Provider shall make every effort to secure SecurityInside against any undesirable consequences.

  3. The Users should log out when they have finished using SecurityInside.

  4. The Service Provider bears no responsibility for:

  1. incorrect data entered by the User,

  2. lack of or limitations to the Internet access by the User,

  3. limitations and/or incorrect functioning of the User's software or devices that are indispensable for using SecurityInside, including its Services,

  4. any damages incurred or profits lost by the User, which resulted from disclosing the Password to the User's Account due to their fault,

  5. any damages incurred or profits lost by the User, which resulted from any actions or omissions, in particular due to improper use of SecurityInside,

  6. any damages incurred or profits lost by the User who has violated the law or the provisions of the Terms and conditions, and whose Account was blocked or deleted by the Service Provider,

  7. any damages incurred or profits lost by the User, which resulted from any actions or omissions of third parties not bound by the terms of the Agreement, beyond the control of the Service Provider,

  8. any damages incurred or profits lost by the User, which resulted from force majeure,

  9. any damages incurred or profits lost by the User resulting from transferring the User's personal data to entities authorized to process them under the applicable law,

  10. links to third party websites. These websites belong to and are managed by their respective administrators or service providers. The Service Provider is not responsible for the availability and quality of these websites.

  1. The User uses SecurityInside at his own risk and responsibility.

  2. The Service Provider has no control over how the Account is managed by the User and what data, including personal data is added.

  3. In the event an official notice or other reliable information is received about the unlawful nature of the data, including personal data, provided by the User, the Service Provider shall contact the User to clarify the issue and might order deletion of such data and/or block the Account or, ultimately, delete the Account. In case of the latter, the Service Provider shall be guided by the provisions of law and the notice and take down procedures for blocking the reported infringement, which is binding by law.

  4. The User shall bear all responsibility for any damages incurred or profits lost as a result of failure to perform or improper performance of their obligations.

  5. The Service Provider shall be responsible for any damages and lost profits due to his fault resulting from failure to perform or improper performance of the Agreement. The Company agrees not to pursue claims exceeding the value of the payments made.

§ 10


  1. Complaints should be submitted by electronic means to the technical assistance department within 30 days from the date a damage was noticed (e.g. defective operation of the Service). The complaint form should include:

  1. Login,

  2. a description of the irregularity, as detailed as possible (including time and place of occurrence),

  3. indication as to the potential settlement of the complaint,

  4. if the complaint concerns an error in the invoice, the number of the invoice should be provided.

  1. All complaints shall be processed as early as possible, within 14 days.

  2. The day the complaint is received by the Service Provider shall be considered as the day the complaint is lodged.

§ 11

Personal data protection

  1. According to art. 13 of the General Regulation on the Protection of Personal Data of 27 April 2016 (Official Journal EU L 119 of 04.05.2016) I inform that: Data Administrator: The administrator of your personal data is Logicaltrust sp. z o.o. sp. k., with its registered office at ul. Aleksandra Brücknera, 25-43, 51-411 Wrocław, Tax Identification Number (NIP): 8952177980, National Business Registry Number (REGON): 369271084, National Court Register Number (KRS): 0000713515.

  2. Contact with the Data Administrator: You can contact the data administrator via email at: ado@logicaltrust.net or by traditional mail by sending a letter to the administrators registered office address.

  3. Purpose and Legal Basis for Processing Personal Data: Your personal data will be processed by the data administrator for the purpose of responding to your inquiries, executing requested contact, taking actions prior to entering into a contract, performing the contract, establishing business relationships, presenting offers upon potential clients request (based on Art. 6(1)(a), (b), and (f) of the General Data Protection Regulation).

  4. Data Processing Period: Your personal data will be processed for the time necessary to clarify your matter and provide a comprehensive response. They will also be processed for the duration of cooperation and the contract (in this case, the data is processed as client data). In the event of non-cooperation, the data will be promptly deleted unless there is a need for further retention for the purpose of defense and protection against claims. In cases where the processing of personal data is based on voluntarily given consent according to Art. 6(1)(a) of the General Data Protection Regulation, you have the right to withdraw your consent at any time. The withdrawal of consent does not affect the lawfulness of processing based on consent before its withdrawal, in accordance with the applicable law.

  5. Scope of Processed Data: The scope of processed data includes: first name, last name, email, and phone number.

  6. Recipients of Personal Data: In specific situations, your personal data may be disclosed, for example, to fulfill a legal obligation or to exercise legally justified interests pursued by the data administrator or by a third party. The categories of recipients to whom the data administrator may disclose your personal data are entities or authorities authorized by law and service providers processing personal data on behalf of the data administrator based on data processing agreements (e.g., hosting company).

  7. Data Transfers: Your personal data will not be transferred outside the European Economic Area.

  8. Rights and Entitlements: You have the right to request access to your personal data, their correction, deletion, or processing limitations, as well as the right to object to data processing. You also have the right to file a complaint with the President of the Personal Data Protection Office (ul. Stawki 2, 00-193 Warsaw) if you believe that the processing of personal data violates data protection regulations.

  9. Additional Information: Providing data is voluntary, but failure to provide data necessary for correspondence may hinder the execution and maintenance of contact.

§ 12

Intellectual Property Rights

  1. All rights to SecurityInside belong to the Service Provider.

  2. It is prohibited to use SecurityInside, including all the materials in a way that violates the rights of the Service Provider and/or third parties. If a violation of an intellectual property right is noticed, the Service Provider shall take appropriate legal measures against the violator.

  3. The term "SecurityInside" shall identify one of the Service Provider's products that is traded without temporal and spatial restrictions. "SecurityInside" is the trade name of the Service Provider.

  4. It is prohibited to distribute any SecurityInside elements (in particular as screenshots) without a written consent of the Service Provider. It is prohibited to remove, cover, or in any other way prevent the identification of trademarks, copyright notices or other indications regarding intellectual property rights. Copying, distributing and modification of SecurityInside contents, materials and Services, including creating derivative works used without the prior written consent of the Service Provider, is also prohibited.

§ 13

Final Provisions

  1. Before registration, The Service Provider shall provide the Terms and conditions.

  2. The Service Provider reserves the right to amend the Terms and conditions. Each document is marked with a date from which its provisions are effective. The User will be notified of any significant changes in the terms of the Agreement by a message sent to the User's email address by the Service Provider. The User has the right to continue receiving the Service in compliance with the new regulations or ask that the Services be provided until the termination of the Agreement in compliance with the provisions of the Terms and conditions.

  3. The Service Provider only stores them and enables their transmission on the Internet in compliance with the provisions of the Terms and conditions.

  4. If a third party notices a violation of law, they are obliged to contact the technical support department and submit a reliable information or official notice about the unlawful nature of the data, including personal data, provided by the User.

  5. For issues not covered in the Terms and conditions, relevant provisions of Polish law and/or provisions applicable to the place of residence of the consumer shall apply.

  6. In the event of any changes or annulment of the provisions of the Terms and conditions due to final and legally binding court decisions, its other provisions shall remain in force.

  7. The Service Provider declares he is willing to resolve disputes in a conciliatory manner, including using Alternative Dispute Resolution procedures for settling claims.

  8. All disputes between the Service Provider and the Company will be settled by a court competent for the registered office of the Service Provider.

Contact with us.

Thanks for contacting us, we will reply to you as soon as possible!