Acceptable Use Policy
Last Updated: March 18, 2026
This guide explains how to use Phantom Mail responsibly. We're here to protect your privacy, not police your usage. However, we need to maintain a safe and functional service for everyone.
1. Overview
Phantom Mail provides temporary and permanent disposable email addresses to protect your privacy. We support privacy and anonymity as core values. However, you are responsible for how you use our service. We ask that you use it ethically and legally.
🤝 Our Approach:
We don't monitor what you do with our service, and we can't report your activities to anyone. Your privacy is protected by design. That said, you alone are responsible for your actions and compliance with laws in your jurisdiction.
✅ Great Uses
- Privacy Protection: Sign up for services without exposing your real email
- Testing & Development: Test applications, webhooks, or email functionality
- Avoiding Spam: Protect your primary inbox from unwanted emails
- Anonymous Communication: Receive emails without revealing your identity
- One-Time Signups: Create accounts for services you may not use long-term
- Trial Accounts: Sign up for free trials or limited-time offers
- Developer API: Integrate temporary email generation into your applications
⚠️ Please Don't Do This
While we respect your privacy and don't monitor your usage, we ask that you avoid activities that could harm others or the service itself. You're responsible for your actions:
Illegal Activity
- Criminal Conduct: Using the Service for any illegal activity, including but not limited to:
- Terrorism or violent extremism
- Drug trafficking or illegal substance distribution
- Human trafficking or exploitation
- Child abuse or exploitation (CSAM)
- Money laundering or financial crimes
- Copyright infringement or piracy
- Identity theft or impersonation
Fraud & Scams
- Phishing: Creating fake emails or websites to steal credentials or personal information
- Financial Fraud: Using temporary emails to commit credit card fraud, payment fraud, or chargebacks
- Account Fraud: Creating multiple fraudulent accounts to exploit promotions, referral bonuses, or free trials
- KYC Bypass for Fraud: Using temporary emails to bypass Know Your Customer (KYC) verification for illegal or fraudulent purposes (e.g., opening bank accounts for money laundering)
- Social Engineering: Manipulating individuals or organizations through deceptive emails
Spam & Abuse
- Spam Campaigns: Sending unsolicited bulk emails, mass marketing, or spam
- Email Bombing: Flooding email addresses or services with excessive messages
- Harassment: Using the Service to harass, threaten, stalk, or abuse individuals
- Hate Speech: Sending messages containing hate speech, discrimination, or incitement to violence
Service Abuse
- Resource Abuse: Overloading or disrupting the Service infrastructure
- API Abuse: Exceeding rate limits, scraping, or reverse-engineering the API
- Automation Abuse: Using bots, scripts, or automation to generate excessive emails or accounts
- Security Attacks: Attempting to hack, compromise, or exploit vulnerabilities in the Service
- DDoS Attacks: Launching distributed denial-of-service attacks from or against the Service
Malware & Viruses
- Malware Distribution: Sending, receiving, or distributing malicious software, viruses, ransomware, or trojans
- Botnets: Using the Service as part of a botnet or command-and-control infrastructure
2. Legitimate vs. Fraudulent Use
✅ Legitimate KYC Bypass Examples:
- Using temporary emails to protect privacy when signing up for newsletters or non-financial services
- Testing account registration flows in your own applications
- Avoiding spam from low-trust websites
🚫 Fraudulent KYC Bypass Examples:
- Bypassing bank KYC to open fraudulent accounts for money laundering
- Creating fake identities on cryptocurrency exchanges to commit fraud
- Evading sanctions or legal restrictions through fake accounts
- Creating multiple accounts on financial platforms to exploit bonuses or manipulate markets
3. Developer API Acceptable Use
If you use the Developer API, you must:
- Respect rate limits: 100 requests/day (free) or 10,000 requests/day (Premium)
- Not use the API for prohibited activities listed above
- Keep your API key secure and confidential
- Not resell or redistribute API access without permission
- Not use the API to build competing services that abuse or circumvent our platform
4. User Responsibility
You are responsible for your use of the Service. Here's what that means:
- You decide how to use our service and what it's used for
- We can't see what you're doing, so we can't advise you on legality or compliance
- It's your responsibility to ensure your usage complies with laws in your jurisdiction
- Any consequences of your usage are your responsibility, not ours
⚠️ Important: We provide the tools for privacy. You choose how to use them. Make wise choices that respect others and follow your local laws.
5. Reporting Abuse
If you notice someone abusing the service in ways that harm others, feel free to let us know:
We appreciate your help in keeping the service running smoothly for everyone.
6. Changes to This Policy
We may update this Acceptable Use Policy at any time. Changes will be posted on this page with an updated "Last Updated" date. Continued use of the Service after changes constitutes acceptance of the updated policy.
7. Contact Us
If you have questions about this Acceptable Use Policy, contact us:
Thank you for using Phantom Mail responsibly. We trust you to make good choices with the privacy tools we provide.
← Back to Home