Policies
Stay updated with the latest TrekMail features and changes. Review our policies on acceptable use, privacy, and security.
What you'll learn
- 1 High-level overview of TrekMail security practices.
- 2 Rules on spam, abuse, and prohibited content.
- 3 How data is stored, retained, and deleted.
Your curated guide for this category.
Follow this recommended order to get the most out of this category.
Articles in this category
3 articles-
1Platform Security Overview
High-level overview of TrekMail security practices.
-
2Acceptable Use Policy (AUP)
Rules on spam, abuse, and prohibited content.
-
3Privacy and Data Retention
How data is stored, retained, and deleted.