Temp Mail Gen Logo

TEMP.MAIL.GEN

Free disposable inbox on @ghostinbox.email — privacy & testing. Operated by Artics Inc.

Acceptable Use Policy

Last updated: May 2026

GhostInbox (also referred to as Temp Mail Gen) is a public temporary email service. By using the site, you agree to this Acceptable Use Policy in addition to our Terms of Service.

1. Permitted use

Typical permitted uses include reducing spam to your real inbox, one-time sign-ups, QA and developer testing, and other lawful, honest purposes where a short-lived address is appropriate.

2. Prohibited conduct and content

You must not use GhostInbox, or encourage others to use it, for any of the following (non-exhaustive list):

Temporary inboxes are public by design (anyone who knows or guesses an address may send mail to it). Do not use GhostInbox for secrets, credentials, or sensitive personal data you cannot afford to lose.

3. Data retention

Addresses and received messages are short-lived. They may be deleted automatically after a limited period (for example, roughly one hour from creation, subject to configuration and operational factors). This limits how long any problematic content could remain on our systems, but it also means we cannot promise long-term preservation of messages for you or for third parties.

4. Abuse and enforcement

We may block, rate-limit, remove data, or refuse service when we reasonably believe this policy or our Terms have been violated, or when necessary to protect users, the public, or our infrastructure.

5. How to report abuse

If you believe someone is using GhostInbox in violation of this policy, email webmaster@artics.io with a subject line that clearly indicates an abuse report. We aim to read these messages promptly. You may also use our Contact Us form and choose the abuse-related reason so your message is routed correctly.

Please include, where possible: the full temporary address involved, the sender or subject line, approximate date and time (with timezone), URLs or screenshots, and a short factual description of the issue. Do not send malware as attachments.

6. What we do when we receive a report

Our team reviews credible reports and may take action such as deleting the affected mailbox contents, blocking abusive senders or patterns, or escalating to infrastructure or law enforcement partners when the law requires it. We do not promise a specific response time.

Logs and preservation: We do not publicly document internal logging practices in detail. We retain or preserve information only as needed for security, abuse handling, and legal compliance, and only as advised by counsel when preservation may be required for legal process.

7. No legal advice

This policy is not legal advice. If you need guidance on your obligations, consult a qualified lawyer in your jurisdiction.

8. Contact

General inquiries and abuse reports: webmaster@artics.io.