Terms
Terms of Service
OTPmail provides short-lived email inboxes for legitimate testing, privacy, and spam reduction. These terms keep the service useful for real users while setting clear boundaries against abuse.
Last updated: May 8, 2026
Permitted Uses
- QA, software testing, staging, demos, and CI automation for systems you own or are authorized to test.
- Protecting your personal inbox from spam in low-risk contexts where disposable email is allowed.
- App and website development where a temporary inbox helps validate email delivery and rendering.
- Short-lived privacy use that does not violate law, third-party terms, or security controls.
Prohibited Uses
- Fraud, scams, phishing, malware, spam, harassment, or unlawful activity.
- Bypassing KYC, age gates, identity checks, account security, bans, sanctions controls, or anti-abuse systems.
- Account farming, credential abuse, fake engagement, reselling or renting verified accounts, or creating accounts for others without authorization.
- Using OTPmail with banks, government services, crypto platforms, healthcare, insurance, or other high-risk services unless you are expressly authorized to test them.
- Collecting, storing, or processing personal data through OTPmail in a way that violates applicable law.
Retention and Availability
Inboxes auto-delete 10 minutes after creation and can be extended once for another 10 minutes. Messages are short-lived and are not an archive.
We may delete inboxes, disable domains, throttle requests, or block traffic earlier when needed for abuse prevention, security, reliability, or legal compliance.
Enforcement
We may investigate reports, block patterns, disable domains, preserve relevant records, and cooperate with service providers or lawful requests when abuse is reported or detected.
You are responsible for using OTPmail only where temporary email is permitted and for complying with any third-party rules that apply to your use.
Contact
Report abuse to [email protected] or through the abuse page. Include the OTPmail address or domain, timestamps, affected service, and evidence so we can act quickly.