Security and Compliance

Security and Compliance

At TagoIO, we understand that the foundation of trust with our customers is built on the assurance of information security and adherence to legal standards. Our commitment to data privacy and security is embedded in every part of our business. Our proactive approach to security, compliance policies, and dedication to legal obligations are at the core of our operations, providing you with the confidence that your information is in safe hands.

Learn below about our efforts to protect your and your users' data.

ISO 27001 Certification

As a testament to our dedication to security, TagoIO is proud to be ISO 27001 certified. This internationally recognized standard specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS) within the context of our organization. Our certification reflects our systematic approach to managing sensitive company and customer information, ensuring it remains secure. 

Check our confirmation of certificate here: https://www.iafcertsearch.org/

General Data Protection Regulation (GDPR)

TagoIO is committed to upholding the principles of the GDPR, ensuring that the personal data of our EU customers and users are processed with the utmost care and respect for privacy. We have implemented data protection policies and procedures that align with GDPR requirements, giving our users control over their personal information and fostering transparency in the way that data is handled.

If you wish to know how we process and protect personal data, that is subject to the GDPR and other E.U. laws. You can download our Data Processing Agreement (DPA) here: https://tago.io/dpa

Check our certificate of representation here: https://prighter.com/verify/15173960

TagoIO Security Portal

For a detailed overview of our security practices, you should visit our Security Portal. Here, you will find comprehensive information on the measures we take to safeguard your data, from encryption and access control to security policies and other documents.


    • Related Articles

    • Two-factor Authentication (2FA)

      Two-factor authentication (2FA) adds an additional layer of security to your account by requiring more than just a password to sign in. It requires and provides another form of authentication that only you know or have access to. This form of ...
    • MQTT

      MQTT stands for MQ Telemetry Transport; it's an extremely simple and lightweight publish-subscribe messaging protocol. It was designed for constrained devices and low-bandwidth, high-latency or unreliable networks. TagoIO has its own MQTT broker, ...
    • API Overview

      It is easy to connect devices, data sources, or third-party APPs to your account using TagoIO Application Programming Interface (API). We have a comprehensive set of APIs that gives you full control to manage your accounts, data, devices, dashboards, ...
    • Common Billing issues

      Why was a charge declined? Declines can happen for a variety of reasons that are determined by the cardholder's bank. Each bank has a system that takes into account various signals, such as the cardholder's spending habits, account balance, and card ...
    • Secrets

      Secrets are encrypted environment variables that can be used to store sensitive information, such as passwords and API keys. You set a key and a value for your secret: the key serves as the name of the secret, while the value contains your sensitive ...