Policies

Stay updated with the latest TrekMail features and changes. Review our policies on acceptable use, privacy, and security.

What you'll learn

  • 1 High-level overview of TrekMail security practices.
  • 2 Rules on spam, abuse, and prohibited content.
  • 3 How data is stored, retained, and deleted.

Your curated guide for this category.

Follow this recommended order to get the most out of this category.

Articles in this category

3 articles
  1. 1
    Platform Security Overview

    High-level overview of TrekMail security practices.

  2. 2
    Acceptable Use Policy (AUP)

    Rules on spam, abuse, and prohibited content.

  3. 3
    Privacy and Data Retention

    How data is stored, retained, and deleted.

We use cookies for essential functionality. No ads, no ad tracking.

Sign in to TrekMail

Access your dashboard, mailboxes and DNS.

or
or

Reset email sent

If an account exists for this email, we've sent password reset instructions.

By continuing, you agree to TrekMail's Terms and Privacy Policy.