Skip to content
Customer Support

Support for your sovereign workflow.

Get practical help, policy references, and direct support channels. All links point to official InfoPeak resources.

How support works

Support at InfoPeak is structured around official channels and documented processes. This keeps technical guidance consistent and auditable.

For product setup and account questions, use standard support. For vulnerability reporting, use the dedicated security channel.

Scope by channel

  • General support: setup, account and product guidance.
  • Security reports: vulnerability disclosure and incident-related communication.
  • Policy references: privacy, terms, and data portability documentation.

Reference resources

Google Play account deletion

Account deletion for InfoPeak Mail

If you use the InfoPeak Mail app and want your account and associated data deleted, send a request to support@infopeak.io.

How to request deletion

  1. Send an email from your registered account email address to support@infopeak.io.
  2. Use subject: Account Deletion Request - InfoPeak Mail.
  3. Include your InfoPeak account email and confirmation that you want permanent deletion.

What will be deleted

  • Account profile data (for example name and login identifiers).
  • Mail data and associated mailbox content stored by InfoPeak.
  • Contacts, calendar records, and other account-linked service data.

Retention period and exceptions

  • Deletion requests are processed within 30 days.
  • Security and abuse-prevention logs may be retained for up to 30 days.
  • Limited data may be retained longer where required by applicable law (for example accounting and legal obligations).

Common support questions

Where should I start if I need setup help?
Start with Connect. It contains the official setup path for WebDAV access and device onboarding.
How do I report a security issue?
Use security@infopeak.io for vulnerability reports and follow the Security Policy process.
How fast does InfoPeak respond?
For general support, we aim to respond within 48 hours. Security reports follow the timeline described in the Security Policy.