time Email
  • Zix Encryption Deployment Form

  • Required Required

  • Required Required

  • DNS Access Note: Please note that the customer will need access to their DNS Host (i.e. Godaddy, Domain.com, BlueHost, Host Gator), control panel so that the SPF and DKIM records, for each domain enabled for encryption, can be edited or added.


    Please confirm that this has been acknowledged.

  • OUR ACCEPTABLE USE POLICY

    Client acknowledges and agrees to be bound by all the terms, conditions, and policies, as set forth herein, including any future amendments. Client acknowledges and agrees that it is responsible for continual compliance of this policy.

    Client may not send, or attempt to send, unsolicited email messages ("Spam"). Spam violates many federal and state laws and seriously affects the efficiency and of Email Services. Sending Spam can lead to industry blacklisting of mail servers, resulting in interruption and/or termination of E-mail Services.

    1.1 SPECIFICALLY, CLIENT AGREES NOT TO:

    • Send or attempt to send unsolicited bulk or commercial messages ("spam"). This includes, but is not limited to, bulk mailing of commercial advertising, informational announcements, charity requests, petitions for signatures, and political or religious tracts. Such messages may only be sent to those who have explicitly requested it from your domain.
    • Send, or attempt to send, Spam of any kind from third-party networks using a return email address that will cause mail flow through the our Service, or referencing an email address hosted on the our Service;
    • Send, or attempt to send, numerous copies of the same or substantially similar message with the intent to disrupt a server or account ("mail bombing").
    • Send, or attempt to send, e-mail messages used to harass or intimidate others. Harassment, whether through language, frequency of messages, or size of messages, is prohibited.
    • Continue to send email to a recipient that has indicated that he/she does not wish to receive it.
    • Take any actions intended to cloak the Client's identity or contact information, including but not limited to intentionally omitting, deleting, forging or misrepresenting message headers or return addresses.
    • Send mail from domains that are not listed in the deployment questionnaire and/or that have not been requested.

    In the absence of positive, verifiable proof to the contrary, we will consider complaints by recipients of emails to be de-facto proof that the recipient did not subscribe or otherwise request the email(s) about which a complaint was generated.

    1.2 SENDING "OPT-IN" BULK EMAIL (Permission based).

    Client may not use our Service to send "Opt-in" Bulk Email. We define "Opt-in" Bulk Email ("Bulk Email") as email messages of similar content that are sent to more than 250 recipients within a relatively short period of time. The term "Opt-in" means that the recipients have signed up to receive the emails voluntarily, and implies that the Bulk Email is not Spam. We have measures in place to prevent Bulk Email from being sent through its servers, and any attempt to do so may result in interruption and/or termination of Client's Email Services. Attempts to circumvent this Bulk Email restriction by breaking up bulk mailings over a period of time or by sending from multiple email accounts will itself be considered a violation of this policy.

    Additionally, the Client may not send Bulk Email from third-party networks using a return address that is hosted on our Service, unless Client takes extreme care to prevent more than 100 bounce emails from arriving to the Service Provider Network as the result of sending Bulk Email from a third-party network.

    1.3 SECURITY

    Client is prohibited from violating, or attempting to violate, the security of the our Service. We will investigate any alleged violations. Examples of violations of the security of the our Service include, but are not limited to:

    • accessing data not intended for Client,
    • logging into a server or account which the Client is not authorized to access,
    • attempting to probe, scan or test the vulnerability of a system,
    • breach of security or authentication measures,
    • attempting to interfere with service to any user, host or network.

    1.4 ILLEGAL USE

    Email Services may only be used for lawful purposes. For example, Client may not use our Service to transmit or distribute content that:

    • violates a trademark, copyright, trade secret or other intellectual property rights of others,
    • violates export control laws or regulations,
    • violates the privacy, publicity or other personal rights of others,
    • impairs the privacy of communications,
    • contains unlawful, defamatory, harassing, or fraudulent content,
    • encourages conduct that would constitute a criminal offense or give rise to civil liability,
    • violates reasonable regulations of other service providers,
    • causes technical disturbances to our Service, its partner networks or the network used by Client to access the Email Services, or violate the policies of such networks, including, but not limited to, intentional introduction of any viruses, Trojan horses, worms, time bombs, cancel bots or other computer programming routines that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system or data, or
    • assists, encourages or permits any persons in engaging in any of the activities described in this section.

    If Client becomes aware of any such activities, Client is obligated to immediately notify us and take all other appropriate actions to cause such activities to cease.

    1.5 CONTENT

    Client is responsible for all content that is transmitted and received through our Service. Service Provider takes no responsibility for content passing through or stored on our Service, including but not limited to, viruses, mail floods or other disabling features, or content provided on third party websites that are linked to by content passing through or stored on the our Service.

    2.0 POLICY VIOLATION

    We reserve the right to suspend or terminate Client's access to Email Services upon notice of a violation of this policy. Indirect or attempted violations of this policy, and actual or attempted violations by a third party on behalf of Client, shall be considered violations of this policy by Client.

    3.0 Thresholds

    In an effort to protect the performance and security of our service we may set the following default limits for a Client domain:

    1. Maximum Messages Per Connection: 200 (messages in outbox)
    2. Maximum Recipients Per Message: 250
    3. Maximum Secure Message Size: 30MB
    4. Invalid Recipients: 100 Per Hour (number of invalid recipient address processed per hour)
    5. Max Recipients: 1000 Per Hour (number of total recipients per hour)

    In an effort to protect the performance and security of our service we may set the following default limits for each Sender:

    1. Invalid Recipients: 25 Per Hour (number of invalid recipient address processed per hour)
    2. Max Recipients: 625 Per Hour (number of total recipients per hour)

    I accept the Terms and Conditions.

  • Trials will be automatically suspended at the end of day 30 if not converted.

  • Please enter an identifier for this client. The identifier can be in the form of the client name or a reference number.

  • Please enter an identifier for this client. The identifier can be in the form of the client name or a reference number.

  • Please enter the domain in the format of domain.com

  • 1/4