Taghash for Outlook
Last updated by the developer on: March 19, 2024
General information
Information provided by Taghash to Microsoft:
Information | Response |
---|---|
App name | Taghash for Outlook |
ID | WA200003358 |
Office 365 clients supported | Outlook 2013 or later on Windows, Outlook 2016 or later on Mac, Outlook on iOS, Outlook on Android, Outlook on the web |
Partner company name | Taghash |
Company's website | https://taghash.io |
App's Terms of Use | https://taghash.io/terms-and-conditions/v1 |
Core functionality of the app | One-stop solution for Venture Capital and the Investment Ecosystem |
Company headquarter location | India |
App info page | https://taghash.io |
What is the hosting environment or service model used to run your app? | Iaas |
Which hosting cloud providers does the app use? | Aws |
Customer support contact. | support@taghash.io |
Questions
Questions or updates to any of the information you see here? Contact us!
How the app handles data
This information has been provided by Taghash about how this app collects and stores organizational data and the control that your organization will have over the data the app collects.
Information | Response |
---|---|
Does the app or underlying infrastructure process any data relating to a Microsoft customer or their device? | Yes |
What data is processed by your app? | User Mail Data, User Profile Data |
Does the app support TLS 1.1 or higher? | Yes |
Does the app or underlying infrastructure store any Microsoft customer data? | Yes |
What data is stored in your databases? | The emails that the user has synced with our platform. The copy of the email content is stored encrypted in our servers and used to provide additional services on the platform. |
If underlying infastructure processes or stores Microsoft customer data, where is this data geographically stored? | United States of America |
Do you have an established data rentention and disposal process? | Yes |
How long is data retained after account termination? | Not retained |
Do you have an established data access management process? | Yes |
Do you transfer customer data or customer content to third parties or sub-processors? | No |
Questions
Questions or updates to any of the information you see here? Contact us!
Information from the Microsoft Cloud App Security catalog appears below.
Information | Response |
---|---|
Do you perform annual penetration testing on the app? | Yes |
Does the app have a documented disaster recovery plan, including a backup and restore strategy? | Yes |
Does your environment use traditional anti-malware protection or application controls? | TraditionalAntiMalware, ApplicationControls |
Do you have an established process for indentifying and risk ranking security vulnerabilities? | Yes |
Do you have a policy that governs your service level agreement (SLA) for applying patches? | Yes |
Do you carry out patch management activities according to your patching policy SLAs? | Yes |
Does your enviroment have any unsupported operating systems or software? | No |
Do you conduct quarterly vulnerability scanning on your app and the infastructure that supports it? | Yes |
Do you have a firewall installed on your external network boundary? | Yes |
Do you have an established change management process used to review and approve change requests before they are deployed to production? | Yes |
Is an additional person reviewing and approving all code change requests submitted to production by the original developer? | Yes |
Do secure coding practices take into account common vulnerability classes such as OWASP Top 10? | Yes |
Multifactor Authentication (MFA) enabled for: | CodeRepositories, DNSManagement, Credential |
Do you have an established process for provisioning, modification, and deletion of employee accounts? | Yes |
Do you have Intrusion Detection and Prevention (IDPS) software deployed at the perimeter of the network boundary supporting your app? | Yes |
Do you have event logging set up on all system components supporting your app? | Yes |
Are all logs reviewed on a regular cadence by human or automated tooling to detect potential security events? | Yes |
When a security event is detected are alerts automatically sent to an employee for triage? | Yes |
Do you have a formal information security risk management process established? | Yes |
Do you have a formal security incident response process documented and established? | Yes |
Do you report app or service data breaches to supervisory authorities and individuals affected by the breach within 72 hours of detection? | Yes |
Questions
Questions or updates to any of the information you see here? Contact us!
Information | Response |
---|---|
Does the app comply with the Health Insurance Portability and Accounting Act (HIPAA)? | N/A |
Does the app comply with Health Information Trust Alliance, Common Security Framework (HITRUST CSF)? | N/A |
Does the app comply with Service Organization Controls (SOC 1)? | N/A |
Does the app comply with Service Organization Controls (SOC 2)? | Yes |
Which SOC 2 certification did you achieve? | type2 |
Most recent SOC2 certification date | 2022-03-31 |
Does the app comply with Service Organization Controls (SOC 3)? | No |
Do you carry out annual PCI DSS assessments against the appand its supporting environment? | N/A |
Is the app International Organization for Standardization (ISO 27001) certified? | No |
Does the app comply with International Organization for Standardization (ISO 27018)? | N/A |
Does the app comply with International Organization for Standardization (ISO 27017)? | No |
Does the app comply with International Organization for Standardization (ISO 27002)? | No |
Is the app Federal Risk and Authorization Management Program (FedRAMP) compliant? | No |
Does the app comply with Family Educational Rights and Privacy Act (FERPA)? | N/A |
Does the app comply with Children's Online Privacy Protection Act (COPPA)? | N/A |
Does the app comply with Sarbanes-Oxley Act (SOX)? | N/A |
Does the app comply with NIST 800-171? | N/A |
Has the app been Cloud Security Alliance (CSA Star) certified? | No |
Questions
Questions or updates to any of the information you see here? Contact us!
Information | Response |
---|---|
Do you have GDPR or other privacy or data protection requirements or obligations (such as CCPA)? | No |
Questions
Questions or updates to any of the information you see here? Contact us!
Information | Response |
---|---|
Does your application integrate with Microsoft identity platform (Microsoft Entra ID) for single-sign on, API access, etc.? | Yes |
Have you reviewed and complied with all applicable best practices outlined in the Microsoft identity platform integration checklist? | Yes |
Does your app use the latest version of MSAL (Microsoft Authentication Library) or Microsoft Identity Web for authentication? | Yes |
Does your app support Conditional Access policies? | No |
Does your app support Continuous Access Evaluation (CAE) | No |
Does your app store any credentials in code? | No |
Apps and add-ins for Microsoft 365 might use additional Microsoft APIs outside of Microsoft Graph. Does your app or add-in use additional Microsoft APIs? | Yes |
Data access using Microsoft Graph
Graph Permission Permission Type Justification Microsoft Entra App ID Mail.ReadWrite application Our users use our application to sync their emails that they receive on Outlook by adding a Category on it. This permission allows us to access the emails that they have given us consent for. It also gives us permission to reply to the emails from the platform interface itself. 96385f4c-79ef-4491-ba41-2ab3760233ca Mail.Send application This is used to send emails on behalf of user when they send emails from the dashboard 96385f4c-79ef-4491-ba41-2ab3760233ca MailboxSettings.ReadWrite application This is used to create and update a category in the user's mailbox. The addition of this category on any email thread is then used as user's consent for our system to access and sync that email thread 96385f4c-79ef-4491-ba41-2ab3760233ca User.Read delegated This is used to obtain basic profile information about the user, like their email address, avatar 96385f4c-79ef-4491-ba41-2ab3760233ca openid delegated This is used to obtain's the email address linked to the user's Microsoft identity, so that we can match it against their email addresses in our records 96385f4c-79ef-4491-ba41-2ab3760233ca profile delegated This is used to obtain basic profile information about the user, like their email address, avatar 96385f4c-79ef-4491-ba41-2ab3760233ca
This application does not have Additional APIs.
Questions
Questions or updates to any of the information you see here? Contact us!