Data Policy
Understand how YAMM handles your data: what is stored, how it's processed, and how to manage your data access and deletion requests.
[DATA ACCESS] What permissions are needed to use YAMM?
Suppose your organization enforced strict security rules to protect your data or your customers’ data. In that case, you want to ensure that you are compliant with the level of expectations from your client/company when using YAMM. This article explains what permissions are needed and why.
[DATA ACCESS] Why share your Google Sheets with Edit access?
When you contact our YAMM Support team for a question or to report an issue, we may ask you to share your Google Sheets with Edit access. This article explains why we need it to troubleshoot your issue.
[DATA PROCESSING] How are your bulk emails sent with YAMM?
In this article, you will learn how your bulk emails are processed and sent with Yet Another Mail Merge.
[DATA STORAGE] What data is stored by YAMM and how is it used?
Read this article to know what data is stored by Yet Another Mail Merge, how it is stored and used.
[DATA STORAGE] How does YAMM email tracking work?
Read this article to know how YAMM tracking works and how we anonymize your recipients' data before we process it to provide the tracking metrics for you. Towards helping you with compliance, we provide a choice of setting your email tracking off.
[DATA DELETION] How to have your data deleted from YAMM?
This article explains how you can have your data deleted from YAMM’s database. As a YAMM user, you may request us to remove your data either under your GDPR Right to be forgotten (also called as Right to Erasure) or because you no longer want to use YAMM.
Does a domain-wide installation of YAMM by a Google Workspace admin put the users/company data at risk?
Read this article to know how safe is your users’ and company data during the installation of YAMM for your domain.
How to report a Security Vulnerability?
You found a security vulnerability in one of the Talarian products, and you want to report it to us. This article explains you our policy in this respect and what is the procedure to report a security vulnerability you discovered in YAMM.