Terms of Service

Tag-r Security Policies & Terms

1. Agreement to Security Terms

This document (“Policy”) defines the terms between you (“User”) and Tag-r Security Systems (“Company”). By using Tag-r devices or secure platforms, you acknowledge and accept these terms.

Activating a device is considered a digital acknowledgment. Blockchain-based timestamps are maintained for verification and audit purposes.

Tag-r manufactures only air-gapped hardware security devices and does not offer custody, trading, or investment services.

2. Device Features & Specifications

All hardware incorporates state-of-the-art security components:

  • CC EAL 6+ certified processors
  • FIPS 140-3 Level 4 tamper-resistant hardware
  • Quantum-safe encryption protocols
  • Optical anti-tampering mechanisms

Firmware is rigorously evaluated through:

  • Static and dynamic code reviews
  • Side-channel and vulnerability assessments
  • Formal cryptography validation
  • 72-hour expert-led penetration tests

3. User Responsibilities

Users are expected to:

  • Create and securely store recovery seeds
  • Physically protect authentication devices
  • Install firmware updates promptly
  • Maintain accurate custody and transfer records

Recommended practices include:

  • Faraday-shielded storage for backups
  • Multi-factor authentication
  • Distribution of recovery keys across secure locations
  • Periodic device integrity checks

4. Liability Limitations

Tag-r liability is limited to defective device replacement. The company is not liable for:

  • Loss or theft of cryptocurrency assets
  • Transaction errors
  • Blockchain forks or protocol updates
  • Quantum computing risks
  • Phishing or social engineering attacks

Users acknowledge:

  • No system guarantees complete security
  • Threats evolve continuously
  • User errors are the main risk source
  • Regulatory requirements may change without notice

5. Data Privacy & Handling

Tag-r enforces strict privacy protocols:

  • Zero-knowledge encryption
  • Minimal and temporary data retention
  • On-device cryptographic processing
  • Optional anonymous routing via Tor

Collected data is restricted to:

  • Device attestation proofs
  • Anonymous telemetry for security monitoring
  • Transaction logs for compliance purposes

6. Intellectual Property

All proprietary technologies belong to Tag-r , including:

  • Seventeen active patents in security hardware
  • Confidential physical security systems
  • Exclusive anti-tamper firmware
  • Custom secure element designs

Unauthorized actions such as:

  • Hardware reverse engineering
  • Bypassing security mechanisms
  • Firmware or software extraction

may result in legal action.

7. Warranty & Support

Tag-r devices include:

  • Two-year limited warranty for defects
  • Secure documented replacement procedures
  • Forensic evaluation of returned devices
  • Chain-of-custody verification

Warranty exclusions:

  • Damage from tampering or unauthorized modifications
  • Accidental or environmental damage
  • Minor cosmetic wear

8. Governing Law & Disputes

This Policy is governed by:

  • Texas Uniform Electronic Transactions Act
  • Computer Fraud and Abuse Act
  • Relevant cryptography export laws

Dispute resolution:

  • Binding arbitration in Travis County, Texas
  • Strict confidentiality
  • Preservation of forensic evidence

9. Policy Termination

The Policy ends when:

  • All Tag-r devices are destroyed
  • A notarized termination request is submitted
  • Official device decommissioning is completed

Post-termination obligations:

  • Maintain confidentiality
  • Respect liability limitations
  • Follow dispute resolution protocols

10. Support & Contact

Questions regarding this Policy:

  • Contact via on-chain address: sale@tag-r.org

Emergency support includes:

  • 24/7 security hotline
  • Remote device zeroization
  • Forensic support team

Security Operations HQ

Address:
tag-r Security Complex
1825 Penn Ave #03, Pittsburgh, PA 15221