Security and Compliance

Security and Compliance

At TagoIO, we understand that the foundation of trust with our customers is built on the assurance of information security and adherence to legal standards. Our commitment to data privacy and security is embedded in every part of our business. Our proactive approach to security, compliance policies, and dedication to legal obligations are at the core of our operations, providing you with the confidence that your information is in safe hands.

Learn below about our efforts to protect your and your users' data.

ISO 27001 Certification

As a testament to our dedication to security, TagoIO is proud to be ISO 27001 certified. This internationally recognized standard specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS) within the context of our organization. Our certification reflects our systematic approach to managing sensitive company and customer information, ensuring it remains secure. 

Check our confirmation of certificate here: https://www.iafcertsearch.org/

General Data Protection Regulation (GDPR)

TagoIO is committed to upholding the principles of the GDPR, ensuring that the personal data of our EU customers and users are processed with the utmost care and respect for privacy. We have implemented data protection policies and procedures that align with GDPR requirements, giving our users control over their personal information and fostering transparency in the way that data is handled.

If you wish to know how we process and protect personal data, that is subject to the GDPR and other E.U. laws. You can download our Data Processing Agreement (DPA) here: https://tago.io/dpa

Check our certificate of representation here: https://prighter.com/verify/15173960

TagoIO Security Portal

For a detailed overview of our security practices, you should visit our Security Portal. Here, you will find comprehensive information on the measures we take to safeguard your data, from encryption and access control to security policies and other documents.


    • Related Articles

    • Secrets

      Secrets are encrypted environment variables that can be used to store sensitive information, such as passwords and API keys. You set a key and a value for your secret: the key serves as the name of the secret, while the value contains your sensitive ...
    • Running Analysis as External using Deno

      Analysis enables you to create powerful applications on TagoIO. When creating an Analysis, you can choose between running it at TagoIO or External, which means running it on your own infrastructure. Running Analysis externally with Deno provides ...
    • Image Marker Widget

      The image marker widget allows you to place pins on various images, with the option to customize each pin’s color, value, and icon. This widget also accepts features like metadata and groups, that can be set in your variable data to alter how the ...
    • Network Integration

      Your devices can always connect directly with TagoIO API using HTTPS or MQTT protocol. But, you can also connect them using different protocols to databases and web services by using one of this methods: Create a script that initiate access to ...
    • Actions

      Actions is a very powerful feature that gives you total control over your devices based on events determined by you. With Actions you can: Send an SMS based on certain conditions; Send an Email based on certain conditions; Run scripts using Analysis; ...