Hardware-Centric Privacy Commitment
1. Total Control Over Your Data
Tag-r applies the same privacy-first principles from our hardware wallets to data handling. We collect only what is strictly necessary, allowing you to maintain full control of your personal information.
Information We Collect:
- Order Details: Contact and shipping info required for delivery
- Payment Information: Transaction verification data needed to process purchases
- Support Data: Minimal information to provide firmware updates and technical support
- Operational Insights: Anonymous metrics to improve device performance
Information We Never Access:
- Private keys or recovery phrases
- Wallet addresses or transaction history
- Account balances or portfolio data
- Financial information beyond necessary payment details
2. Minimizing Data for Maximum Security
Our security philosophy prioritizes collecting the least data required rather than monitoring extensively, ensuring your privacy is safeguarded by design.
Data Handling Practices:
- Encrypted online forms for all user input
- Secure communication channels for support inquiries
- Privacy-focused session management
Protection Measures:
- IP anonymization for all analytics
- End-to-end encryption for transmissions
- Regular security audits and updates
Trusted Partners:
- Third-party vendors vetted for strict privacy compliance
- Mandatory encryption standards for all data exchange
- Continuous oversight of partner security practices
3. Purpose-Limited Data Usage
All collected data serves clear and specific functions aimed at enhancing your experience with Tag-r devices.
Operational Uses:
- Order processing and delivery coordination
- Device registration and personalized support
- Notifications for critical firmware updates
- Distribution of security alerts
Security Uses:
- Detection and prevention of fraudulent activity
- Device authentication and validation
- Monitoring and improving service quality
Development Uses:
- Enhancement of features based on user requirements
- Quality assurance and performance testing
- Optimization for better user experience
4. Controlled Data Sharing
Data is only shared with essential partners required to provide services, with strict transparency and oversight.
Service Partners:
- Payment processors for secure transactions
- Logistics providers for reliable delivery
- Cloud infrastructure providers for secure storage
Transparency Commitment:
- Clear disclosure of all data-sharing activities
- Regular policy reviews and updates
- Prompt notifications for major changes
5. Enterprise-Level Security Measures
Data security follows the same rigorous standards applied to our hardware products.
Encryption:
- SSL/TLS encryption for data in transit
- Encryption for all stored customer data
- Secure credential and access management
Access Control:
- Role-based permissions
- Multi-factor authentication for staff
- Regular review of access privileges
Physical Security:
- Biometric access to data centers
- Environmental and intrusion monitoring
- Continuous surveillance of physical facilities
6. Privacy-First Analytics
Analytics are implemented with privacy in mind to improve services without compromising user confidentiality.
Responsible Tracking:
- Session cookies for essential functionality only
- First-party analytics without cross-site tracking
- No behavioral profiling or advertising
Privacy Features:
- Local storage of user preferences
- Anonymous usage statistics
- User-configurable privacy settings
User Control:
- Manage cookie preferences easily
- Opt-out options for analytics
- Access and request data modifications
7. Purposeful Data Retention
Retention policies balance operational needs with your privacy rights.
Retention Periods:
- Order records: 7 years for compliance
- Support correspondence: 3 years
- Device data: duration of active service
Secure Deletion:
- Certified digital erasure
- Destruction of physical media
- Verification of complete removal
User Rights:
- Full access and portability of data
- Right to deletion
- Simple account closure procedures
Privacy & Security Office
Headquarters:
Tag-r Security Vault
1825 Penn Ave #03, Pittsburgh, PA 15221
Privacy Assistance:
Identity verification is required for all privacy-related requests to protect your information