Privacy policy

Hardware-Centric Privacy Commitment

1. Total Control Over Your Data

Tag-r applies the same privacy-first principles from our hardware wallets to data handling. We collect only what is strictly necessary, allowing you to maintain full control of your personal information.

Information We Collect:

  • Order Details: Contact and shipping info required for delivery
  • Payment Information: Transaction verification data needed to process purchases
  • Support Data: Minimal information to provide firmware updates and technical support
  • Operational Insights: Anonymous metrics to improve device performance

Information We Never Access:

  • Private keys or recovery phrases
  • Wallet addresses or transaction history
  • Account balances or portfolio data
  • Financial information beyond necessary payment details

2. Minimizing Data for Maximum Security

Our security philosophy prioritizes collecting the least data required rather than monitoring extensively, ensuring your privacy is safeguarded by design.

Data Handling Practices:

  • Encrypted online forms for all user input
  • Secure communication channels for support inquiries
  • Privacy-focused session management

Protection Measures:

  • IP anonymization for all analytics
  • End-to-end encryption for transmissions
  • Regular security audits and updates

Trusted Partners:

  • Third-party vendors vetted for strict privacy compliance
  • Mandatory encryption standards for all data exchange
  • Continuous oversight of partner security practices

3. Purpose-Limited Data Usage

All collected data serves clear and specific functions aimed at enhancing your experience with Tag-r devices.

Operational Uses:

  • Order processing and delivery coordination
  • Device registration and personalized support
  • Notifications for critical firmware updates
  • Distribution of security alerts

Security Uses:

  • Detection and prevention of fraudulent activity
  • Device authentication and validation
  • Monitoring and improving service quality

Development Uses:

  • Enhancement of features based on user requirements
  • Quality assurance and performance testing
  • Optimization for better user experience

4. Controlled Data Sharing

Data is only shared with essential partners required to provide services, with strict transparency and oversight.

Service Partners:

  • Payment processors for secure transactions
  • Logistics providers for reliable delivery
  • Cloud infrastructure providers for secure storage

Transparency Commitment:

  • Clear disclosure of all data-sharing activities
  • Regular policy reviews and updates
  • Prompt notifications for major changes

5. Enterprise-Level Security Measures

Data security follows the same rigorous standards applied to our hardware products.

Encryption:

  • SSL/TLS encryption for data in transit
  • Encryption for all stored customer data
  • Secure credential and access management

Access Control:

  • Role-based permissions
  • Multi-factor authentication for staff
  • Regular review of access privileges

Physical Security:

  • Biometric access to data centers
  • Environmental and intrusion monitoring
  • Continuous surveillance of physical facilities

6. Privacy-First Analytics

Analytics are implemented with privacy in mind to improve services without compromising user confidentiality.

Responsible Tracking:

  • Session cookies for essential functionality only
  • First-party analytics without cross-site tracking
  • No behavioral profiling or advertising

Privacy Features:

  • Local storage of user preferences
  • Anonymous usage statistics
  • User-configurable privacy settings

User Control:

  • Manage cookie preferences easily
  • Opt-out options for analytics
  • Access and request data modifications

7. Purposeful Data Retention

Retention policies balance operational needs with your privacy rights.

Retention Periods:

  • Order records: 7 years for compliance
  • Support correspondence: 3 years
  • Device data: duration of active service

Secure Deletion:

  • Certified digital erasure
  • Destruction of physical media
  • Verification of complete removal

User Rights:

  • Full access and portability of data
  • Right to deletion
  • Simple account closure procedures

Privacy & Security Office

Headquarters:
Tag-r Security Vault
1825 Penn Ave #03, Pittsburgh, PA 15221

Privacy Assistance:
Identity verification is required for all privacy-related requests to protect your information