SOC 2 Compliance
This ensures that from June 2021, Tagger is SOC 2 Type II "certified". SOC 2 compliance demonstrates that Tagger securely manages your data to protect the interests of your organization and the privacy of its clients according to five trust service principles: security, availability, processing integrity, confidentiality, and privacy.
Physical and environmental security
Tagger using highly secure Equinix Metal infrastructure and facilities. Equinix Metal cloud computing services are compliant with multiple security and privacy standards, e.g. ISO 27001, ISO 22301, NIST 800-53, SOC 2 Type II and PCI DSS. Equinix uses advanced security equipment, techniques, and procedures to control and monitor access data centers. Typical security controls are security checkpoints that include 24/7 manned security stations, mantraps, and biometric readers.
The power systems include full UPS systems with N+1 redundancy levels or greater and backup generator systems in the event of a local utility failure. In case of a power outage, batteries turn on immediately, followed by the generators, which can power the entire data center. To keep equipment operating, each data center houses a multicomponent temperature control system running 24/7.
We strive to achieve integrated information security management system by:
- Following good practices to protect the organization’s information assets from information security threats.
- Aligning information security management with the organization’s strategic risk management context.
- Setting information security objectives and establishing a direction and principles for action.
Data Scraping Compliance
Disaster Recovery & Business Continuity
Data at rest and in transit security
All data at rest and in transit are encrypted. To secure transfer data, we’re using HTTPS, TLS, SSH, and VPN. All our data at rest is encrypted at the server level and the level of end devices.
We’re taking our legal obligations and documentation very seriously. Below you can find various policies that describe intended terms of usage of our systems.