Collection and Use of Personal Information

Collection and Use of Personal Information
We collect the following personal information from you:

1) Contact Information such as name, email address, mailing address, phone number
2) Billing Information such as credit card number, and billing address
3) Unique Identifiers such as user name, account number, password
4) Preferences Information you provide such as product or content interests, or communication or marketing preferences

We also collect the following information from you:

Information about your business such as company name, company size, business type, technology.
As is true of most Web sites, we automatically gather information about your computer such as your IP address, browser type, referring/exit pages, and operating system.

We use this information to:

Fulfill your orderSend you an order confirmation
Respond to customer service requests
Respond to your questions and concerns

Information Obtained from Third Parties

We obtain address information about you from third party sources, such as the US Postal Service, to verify your address so we can properly ship your order to you and to prevent fraud.If you provide us personal information about others, or if others give us your information, we will only use that information for the specific reason for which it was provided to us.

Disclosure to Third Parties

We will share your information with third parties only in the ways that are described in this privacy statement.

We may provide your personal information to companies that provide services to help us with our business activities such as shipping your order or offering customer service. These companies are authorized to use your personal information only as necessary to provide these services to us.

We may disclose your personal information, as required by law, such as to comply with a subpoena, or similar legal process when we believe in good faith that disclosure is necessary to protect our rights, protect your safety or the safety of others, investigate fraud, or respond to a government request, if FiLink Corporation is involved in a merger, acquisition, or sale of all or a portion of its assets, you will be notified via email and/or a prominent notice on our Web site of any change in ownership or uses of your personal information, as well as any choices you may have regarding your personal information, to any other third party with your prior consent to do so.

If you are still looking for more privacy information then you can contact us through the Contact Us tab on this page.

This policy was last updated November 2023.

Tracking Technologies

We or a third party contracted by us may use technologies such as cookies, Web beacons, or scripts to gather information about how you and others interact with our Web site. For example, we will know how many users access a specific areas or features within our site and which links or ads they clicked on. We use this aggregated information to understand and optimize how our site is used, improve our marketing efforts, and provide content and features that are of interest to you.


The security of your personal information is important to us. When you provide sensitive information (such as a credit card number) to us, we encrypt the transmission of that information using secure socket layer technology (SSL).

We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it. No method of transmission over the Internet, or method of electronic storage, is 100% secure. Therefore, we cannot guarantee its absolute security.

If you have any questions about security on our Web site, you can contact us at We will retain your information for as long as your account is active or as needed to provide you services. If you wish to cancel your account or request that we no longer use your information to provide you services contact us at We will retain and use your information as necessary to comply with our legal obligations, resolve disputes, and enforce our agreements.

Other Information

Our Web site includes third party hosted widgets, which are interactive mini-programs that run on our site to provide single-purpose services (e.g. sharing of articles, videos, etc.). Personal information, like your email address, may be collected and cookies may be set so the widget can work properly. The information through the widget is subject to the widget provider's privacy policy.

Correcting and Updating Your Personal Information

To review and update your personal information to ensure it is accurate, contact us at

Notification of Privacy Statement Changes

We may update this privacy statement to reflect changes to our information practices. If we make any material changes we will notify you by email (sent to the e-mail address specified in your account) or by means of a notice on this Site prior to the change becoming effective. We encourage you to periodically review this page for the latest information on our privacy practices.

You can contact us about this privacy statement by writing or email us at the address below:

FiLink Corporation
1173 Concord Rd SE Suite A
Smyrna, GA 30080
United States

Our Service Agreement


This uptime guarantee applies to any client that has exchanged currency for services within the last 30 days and is in good financial standing with EntrustedMail at the time of a service outage.


Network downtime (unavailability) is defined as 100% packet loss from EntrustedMail to its backbone providers. Downtime is measured after client notifies EntrustedMail of a network failure by phoning into EntrustedMail directly and after EntrustedMail administrators have confirmed the outage by a trace-route to the customer's MTA from outside the EntrustedMail network.


Customers may be entitled to credits as calculated below and as measured 24-hours a day in a calendar year, with the maximum credit not to exceed fifty (50) percent of the annual service charge for encrypted e-mail client licenses Fees for Secure E-mail Portals, Setup Services, Custom URLs or any other service item are NOT credited by this Service Level Agreement.

Number of Occurrences: 1-4
Minutes of Continuous Downtime: 60 minutes or more.
Credit: 10% each occurrence

Number of Occurrences: 5 or more
Minutes of Continuous Downtime: 60 minutes or more.
Credit: 50% each occurrence

In order for you to receive a credit on your account, you must request such credit within seven (7) days after you experienced the down time. You must request credit by mailing a request to FiLink Corporation, Attn: Billing, 1173 Concord Rd SE, Smyrna GA. Credits will usually be applied within sixty (60) days of your credit request. Credit to your account shall be your sole and exclusive remedy in the event of an outage.


Customer shall not receive any credits under this SLA in connection with any failure or deficiency of website availability caused by or associated with circumstances beyond Entrustedmails reasonable control, including, without limitation, acts of any governmental body, war, acts of terrorism, insurrection, sabotage, armed conflict, embargo, fire, flood, strike or other labor disturbance, interruption of or delay in transportation, unavailability of or interruption or delay in telecommunications or third party services, virus attacks or hackers, failure of third party software or inability to obtain raw materials, supplies, or power used in or equipment needed for provision of this SLA.Failure of bandwidth providers to the Entrustedmails  Network, unless such failure is caused solely by Entrustedmail. Scheduled maintenance and emergency maintenance and upgrades.DNS issues outside the direct control of Entrustedmails . False SLA breaches reported as a result of outages or errors of any report system. Customer's acts or omissions (or acts or omissions of others engaged or authorized by customer), including, without limitation, custom scripting or coding (e.g., CGI, Perl, HTML, ASP, etc), any negligence, willful misconduct, abuse of the Services in breach of Entrustedmails Client Responsibilities (acceptable use policy) posted on the Entrustedmail's website.E-mail or delivery and transmission not related to a network outage.DNS (Domain Name Server) Propagation.Outages elsewhere on the Internet that hinder access to our network. Entrustedmail will guarantee only those areas considered under the control of Entrustedmail. E-mail sent by non-licensed e-mail addresses is not covered by our SLA. Entrustedmail system of monitoring shall be the exclusive monitoring system used to verify SLA breaches or downtime. No third party monitoring system will be recognized.

2 CLIENT RESPONSIBILITIES (Acceptable use Policy )

Client acknowledges and agrees to be bound by all the terms, conditions, and policies, as set forth herein, including any future amendments. Client acknowledges and agrees that it is responsible for continual compliance of this policy.Client may not send, or attempt to send, unsolicited email messages ("Spam"). Spam violates many federal and state laws and seriously affects the efficiency and of Email Services. Sending Spam can lead to industry blacklisting of mail servers, resulting in interruption and/or termination of E-mail Services.


Send or attempt to send unsolicited bulk or commercial messages ("spam"). This includes, but is not limited to, bulk mailing of commercial advertising, informational announcements, charity requests, petitions for signatures, and political or religious tracts. Such messages may only be sent to those who have explicitly requested it from your domain.Send, or attempt to send, Spam of any kind from third-party networks using a return email address that will cause mail flow through the Entrusted Mail Network, or referencing an email address hosted on the Entrusted Mail Network.Send, or attempt to send, numerous copies of the same or substantially similar message with the intent to disrupt a server or account ("mail bombing").Send, or attempt to send, e-mail messages used to harass or intimidate others. Harassment, whether through language, frequency of messages, or size of messages, is prohibited.Continue to send email to a recipient that has indicated that he/she does not wish to receive it.Take any actions intended to cloak the Client's identity or contact information, including but not limited to intentionally omitting, deleting, forging or misrepresenting message headers or return addresses.Send mail from domains that are not listed in the deployment questionnaire and/or that have not been requested.Send mail by an automated means, such as a computer program, that sends more than 250 messages per a 24 hour period of time. Such delivery methods require a "machine license".In the absence of positive, verifiable proof to the contrary, Entrustedmail considers complaints by recipients of emails to be de-facto proof that the recipient did not subscribe or otherwise request the email(s) about which a complaint was generated.

2.2 SENDING "OPT-IN" BULK EMAIL (Permission based).

Client may not use the EntrustedMail Services to send "Opt-in" Bulk Email. We define "Opt-in" Bulk Email ("Bulk Email") as email messages of similar content that are sent to more than 250 recipients within a relatively short period of time. The term "Opt-in" means that the recipients have signed up to receive the emails voluntarily, and implies that the Bulk Email is not Spam. Entrustedmail has measures in place to prevent Bulk Email from being sent through its servers, and any attempt to do so may result in interruption and/or termination of Client's Email Services. Attempts to circumvent this Bulk Email restriction by breaking up bulk mailings over a period of time or by sending from multiple email accounts will itself be considered a violation of this policy.Additionally, the Client may not send Bulk Email from third-party networks using a return address that is hosted on the Service Provider Network, unless Client takes extreme care to prevent more than 100 bounce emails from arriving to the Service Provider Network as the result of sending Bulk Email from a third-party network.


Client is prohibited from violating, or attempting to violate, the security of the EntrustedMail Network. Entrustedmail  will investigate any alleged violations. Examples of violations of the security of the Entrusted Mail Network include, but are not limited to:accessing data not intended for Client.Logging into a server or account which the Client is not authorized to access. Attempting to probe, scan or test the vulnerability of a system.Breach of security or authentication measures. Attempting to interfere with service to any user, host or network.


Email Services may only be used for lawful purposes. For example, Client may not use the EntrustedMail Network to transmit or distribute content that:violates a trademark, copyright, trade secret or other intellectual property rights of others.violates export control laws or regulations,violates the privacy, publicity or other personal rights of others,impairs the privacy of communications,contains unlawful, defamatory, harassing, or fraudulent content,encourages conduct that would constitute a criminal offense or give rise to civil liability,violates reasonable regulations of Entrustedmail or other service providers,causes technical disturbances to the EntrustedMail Network, its partner networks or the network used by Client to access the Email Services, or violate the policies of such networks, including, but not limited to, intentional introduction of any viruses, Trojan horses, worms, time bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data, or assists, encourages or permits any persons in engaging in any of the activities described in this section.If Client becomes aware of any such activities, Client is obligated to immediately notify Entrustedmail and take all other appropriate actions to cause such activities to cease.


Client is responsible for all content that is transmitted and received though the EntrustedMail Network. Service Provider takes no responsibility for content passing through or stored on the EntrustedMail Network, including but not limited to, viruses, mail floods or other disabling features, or content provided on third party websites that are linked to by content passing through or stored on the EntrustedMail Network.


Entrustedmail reserves the right to suspend or terminate Client's access to Email Services upon notice of a violation of this policy. Indirect or attempted violations of this policy, and actual or attempted violations by a third party on behalf of Client, shall be considered violations of this policy by Client.

Last Updated on 01/03/2018

Fair usage for Email Threat Protection

In an effort to protect the performance and security of our service we may set the following default limits for a Client domain:

Maximum Messages Per Connection: 200 (messages in outbox).
Maximum Recipients Per Message: 500
Maximum Message Size: 52 GB.
Invalid Recipients: 25 Per Hour (number of invalid recipient address processed per hour).
Max Recipients: 10,000 Per Hour (number of total recipients per hour)

In an effort to protect the performance and security of our service we may set the following default limits for each Sender:

Invalid Recipients: 25 Per Hour (number of invalid recipient address processed per hour)
Max Recipients: 250 Per Hour (number of total recipients per hour)

Fair usage for Email Encryption

In an effort to protect the performance and security of our service we may set the following default limits for a Client domain:

Maximum Messages Per Connection: 200 (messages in outbox).
Maximum Recipients Per Message: 500
Maximum Message Size: 52 GB.
Invalid Recipients: 25 Per Hour (number of invalid recipient address processed per hour).
Max Recipients: 10,000 Per Hour (number of total recipients per hour)

In an effort to protect the performance and security of our service we may set the following default limits for each Sender:

Invalid Recipients: 25 Per Hour (number of invalid recipient address processed per hour)
Max Recipients: 250 Per Hour (number of total recipients per hour)

Our Service Agreement for Archiving

Dolor sed viverra ipsum nunc aliquet. Pulvinar etiam non quam lacus suspendisse. Elit ut aliquam purus sit amet. Eu scelerisque felis imperdiet proin fermentum leo vel orci.

Our Service Agreement for Web Protection

Dolor sed viverra ipsum nunc aliquet. Pulvinar etiam non quam lacus suspendisse. Elit ut aliquam purus sit amet. Eu scelerisque felis imperdiet proin fermentum leo vel orci.

Cookie Policy for EntrustedMail

This is the Cookie Policy for EntrustedMail, accessible from

What Are Cookies

As is common practice with almost all professional websites this site uses cookies, which are tiny files that are downloaded to your computer, to improve your experience. This page describes what information they gather, how we use it and why we sometimes need to store these cookies. We will also share how you can prevent these cookies from being stored however this may downgrade or 'break' certain elements of the sites functionality.

How We Use Cookies

We use cookies for a variety of reasons detailed below. Unfortunately in most cases there are no industry standard options for disabling cookies without completely disabling the functionality and features they add to this site. It is recommended that you leave on all cookies if you are not sure whether you need them or not incase they are used to provide a service that you use.

Disabling Cookies

You can prevent the setting of cookies by adjusting the settings on your browser (see your browser Help for how to do this). Be aware that disabling cookies will affect the functionality of this and many other websites that you visit. Disabling cookies will usually result in also disabling certain functionality and features of the this site. Therefore it is recommended that you do not disable cookies.

The Cookies We Set

  • Account related cookies

If you create an account with us then we will use cookies for the management of the signup process and general administration. These cookies will usually be deleted when you log out however in some cases they may remain afterwards to remember your site preferences when logged out.

  • Login related cookies

We use cookies when you are logged in so that we can remember this fact. This prevents you from having to log in every single time you visit a new page. These cookies are typically removed or cleared when you log out to ensure that you can only access restricted features and areas when logged in.

  • Email newsletters related cookies

This site offers newsletter or email subscription services and cookies may be used to remember if you are already registered and whether to show certain notifications which might only be valid to subscribed/unsubscribed users.

  • Surveys related cookies

From time to time we offer user surveys and questionnaires to provide you with interesting insights, helpful tools, or to understand our userbase more accurately. These surveys may use cookies to remember who has already taken part in a survey or to provide you with accurate results after you changep ages.

  • Forms related cookies

When you submit data to through a form such as those found on contact pages or comment forms cookies may be set to remember your user details for future correspondence.

  • Site preferences cookies

In order to provide you with a great experience on this site we provide the functionality to set your preferences for how this site runs when you use it. In order to remember your preferences, we need to set cookies so that this information can be called whenever you interact with a page is affected by your preferences.

Third Party Cookies

In some special cases we also use cookies provided by trusted third parties. The following section details which third party cookies you might encounter through this site.

  • This site uses Google Analytics which is one of the most widespread and trusted analytics solution on the web for helping us to understand how you use the site and ways that we can improve your experience. These cookies may track things such as how long you spend on     the site and the pages that you visit so we can continue to produce engaging content.

For more information on Google Analytics cookies, see the official Google Analytics page.

  • From time to time we test new features and make subtle changes to the way that the site is delivered. When we are still testing new features these cookies may be used to ensure that you receive a consistent experience whilst on the site whilst ensuring we understand     which optimizations our users appreciate the most.
  • We also use social media buttons and/or plugins on this site that allow you to connect with your social network in various ways. For these to work the following social media sites including; Twitter and  Linkedin will set cookies through our site which may be used to enhance  your profile on their site or contribute to the data they hold for various purposes outlined in their respective privacy policies.

More Information

Hopefully that has clarified things for you and as was previously mentioned if there is something that you aren't sure whether you need or not it's usually safer to leave cookies enabled in case it does interact with one of the features you use on our site.

However if you are still looking for more information then you can contact us through the Contact Us tab on this page.

EntrustedMail utilizes enterprise-grade best practices to protect our customers’ data.

Continuous Security Control Monitoring

EntrustedMail uses Drata’s automation platform to continuously monitor 100+ internal security controls across the organization against the highest possible standards. Automated alerts and evidence collection allows EntrustedMail to confidently prove its security and compliance posture any day of the year, while fostering a security-first mindset and culture of compliance across the organization.

Employee Training:

Security is a company-wide endeavor. All employees complete an annual security training program and employ best practices when handling customer data.

Penetration Tests:

EntrustedMail works with industry leading security firms to perform annual network and application layer penetration tests.

Secure Software Development:

EntrustedMail utilizes a variety of manual and automatic data security and vulnerability checks throughout the software development lifecycle.

Data Encryption:

Data is encrypted both in-transit and at rest.

Vulnerability Disclosure Program

If you believe you’ve discovered a bug in EntrustedMail’s security, please Our security team promptly investigates all reported issues.

Get in touch.

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form