Tag-r Security Policies & Terms
1. Agreement to Security Terms
This document (“Policy”) defines the terms between you (“User”) and Tag-r Security Systems (“Company”). By using Tag-r devices or secure platforms, you acknowledge and accept these terms.
Activating a device is considered a digital acknowledgment. Blockchain-based timestamps are maintained for verification and audit purposes.
Tag-r manufactures only air-gapped hardware security devices and does not offer custody, trading, or investment services.
2. Device Features & Specifications
All hardware incorporates state-of-the-art security components:
- CC EAL 6+ certified processors
- FIPS 140-3 Level 4 tamper-resistant hardware
- Quantum-safe encryption protocols
- Optical anti-tampering mechanisms
Firmware is rigorously evaluated through:
- Static and dynamic code reviews
- Side-channel and vulnerability assessments
- Formal cryptography validation
- 72-hour expert-led penetration tests
3. User Responsibilities
Users are expected to:
- Create and securely store recovery seeds
- Physically protect authentication devices
- Install firmware updates promptly
- Maintain accurate custody and transfer records
Recommended practices include:
- Faraday-shielded storage for backups
- Multi-factor authentication
- Distribution of recovery keys across secure locations
- Periodic device integrity checks
4. Liability Limitations
Tag-r liability is limited to defective device replacement. The company is not liable for:
- Loss or theft of cryptocurrency assets
- Transaction errors
- Blockchain forks or protocol updates
- Quantum computing risks
- Phishing or social engineering attacks
Users acknowledge:
- No system guarantees complete security
- Threats evolve continuously
- User errors are the main risk source
- Regulatory requirements may change without notice
5. Data Privacy & Handling
Tag-r enforces strict privacy protocols:
- Zero-knowledge encryption
- Minimal and temporary data retention
- On-device cryptographic processing
- Optional anonymous routing via Tor
Collected data is restricted to:
- Device attestation proofs
- Anonymous telemetry for security monitoring
- Transaction logs for compliance purposes
6. Intellectual Property
All proprietary technologies belong to Tag-r , including:
- Seventeen active patents in security hardware
- Confidential physical security systems
- Exclusive anti-tamper firmware
- Custom secure element designs
Unauthorized actions such as:
- Hardware reverse engineering
- Bypassing security mechanisms
- Firmware or software extraction
may result in legal action.
7. Warranty & Support
Tag-r devices include:
- Two-year limited warranty for defects
- Secure documented replacement procedures
- Forensic evaluation of returned devices
- Chain-of-custody verification
Warranty exclusions:
- Damage from tampering or unauthorized modifications
- Accidental or environmental damage
- Minor cosmetic wear
8. Governing Law & Disputes
This Policy is governed by:
- Texas Uniform Electronic Transactions Act
- Computer Fraud and Abuse Act
- Relevant cryptography export laws
Dispute resolution:
- Binding arbitration in Travis County, Texas
- Strict confidentiality
- Preservation of forensic evidence
9. Policy Termination
The Policy ends when:
- All Tag-r devices are destroyed
- A notarized termination request is submitted
- Official device decommissioning is completed
Post-termination obligations:
- Maintain confidentiality
- Respect liability limitations
- Follow dispute resolution protocols
10. Support & Contact
Questions regarding this Policy:
- Contact via on-chain address: sale@tag-r.org
Emergency support includes:
- 24/7 security hotline
- Remote device zeroization
- Forensic support team
Security Operations HQ
Address:
tag-r Security Complex
1825 Penn Ave #03, Pittsburgh, PA 15221