Usage Policy

Usage Policy

When executing API requests to TagoIO by posting (data input) or to getting (data output) data, your account may face a limit policy based on the limits defined by you in the My Billing settings.

The limits are based on the number of transactions defined for a period of time (hour or minute). Also, a higher limit is applied to all accounts to prevent attacks to our servers, such as DDOS, while offering a way to limit the usage for your applications.

Check our comprehensive documentation on Rate Limits.
TagoIO limits the access of Account-Token and Device-Token to the transactions limits per hour set in your account.

Other services like data storage, SMS, email, and Analysis are also limited according to your plan settings. Learn more about TagoIO Services.

    • Related Articles

    • Refund Policy

      If you have forgotten to cancel your plan or have decided to cancel it, you may be eligible to receive a refund. TagoIO offers refunds in certain situations. In order to initiate the process, if you are entitled to the refund, follow the steps below: ...
    • API Overview

      It is easy to connect devices, data sources, or third-party APPs to your account using TagoIO Application Programming Interface (API). We have a comprehensive set of APIs that gives you full control to manage your accounts, data, devices, dashboards, ...
    • Services Overview

      TagoIO offers a broad range of services that can be allocated the way your applications needs it to be. By provisioning the services that each Profile will use throughout the month, you will know exactly how much you will be charged. You can ...
    • Data Input Service

      Each time a device sends data to TagoIO, the system will count 1 Data Input Transaction for each variable. These data input transactions are counted against the Profile where your devices are located. You need to estimate the maximum number of ...
    • Secrets

      Secrets are encrypted environment variables that can be used to store sensitive information, such as passwords and API keys. You set a key and a value for your secret: the key serves as the name of the secret, while the value contains your sensitive ...