At TagoIO, we understand that the foundation of trust with our customers is built on the assurance of information security and adherence to legal standards. Our commitment to data privacy and security is embedded in every part of our business. Our proactive approach to security, compliance policies, and dedication to legal obligations are at the core of our operations, providing you with the confidence that your information is in safe hands.
Learn below about our efforts to protect your and your users' data.
ISO 27001 Certification
As a testament to our dedication to security, TagoIO is proud to be ISO 27001 certified. This internationally recognized standard specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS) within the context of our organization. Our certification reflects our systematic approach to managing sensitive company and customer information, ensuring it remains secure.
General Data Protection Regulation (GDPR)
TagoIO is committed to upholding the principles of the GDPR, ensuring that the personal data of our EU customers and users are processed with the utmost care and respect for privacy. We have implemented data protection policies and procedures that align with GDPR requirements, giving our users control over their personal information and fostering transparency in the way that data is handled.
If you wish to know how we process and protect personal data, that is subject to the GDPR and other E.U. laws. You can download our Data Processing Agreement (DPA) here: https://tago.io/dpa
TagoIO Security Portal
For a detailed overview of our security practices, you should visit our Security Portal. Here, you will find comprehensive information on the measures we take to safeguard your data, from encryption and access control to security policies and other documents.
Related Articles
Secrets
Secrets are encrypted environment variables that can be used to store sensitive information, such as passwords and API keys. You set a key and a value for your secret: the key serves as the name of the secret, while the value contains your sensitive ...
Network Integration
Your devices can always connect directly with TagoIO API using HTTPS or MQTT protocol. But, you can also connect them using different protocols to databases and web services by using one of this methods: Create a script that initiate access to ...
Defining Actions
Actions are initiated based on specific conditions and can execute a variety of tasks. The first step in configuring an Action is to specify the desired action. Below are the different types of actions available: Push Notification to myself This ...
Device data management
The device page provides tools for visualizing, filtering, editing, importing and exporting variables, facilitating the management of data received by your device. You can access these tools by navigating to the Device module, selecting a device, and ...
Custom Widget
Custom Widgets are very versatile, allowing you to build whatever you need to suit your application’s needs. The widget can be built with plain web technologies like HTML, CSS, and JavaScript, but keep in mind that at least some JavaScript is needed ...