Privacy Policy
Last Updated: February 13, 2026
1. General Information
Mail P.I. provides AI-powered email threat analysis. When you forward an email to check@mailpi.app, the message is analyzed automatically and a risk report is returned. We are designed with privacy-first principles and minimal data retention.
2. Information We Collect
- Hashed Email Addresses: We store a cryptographic hash of your email address to manage usage limits and subscriptions.
- Email Content (Ephemeral): Forwarded emails are processed in memory for analysis and are not permanently stored.
- Verification Tokens: Temporary verification tokens (1-hour expiry) may be created to confirm email ownership.
- Usage Metadata: Daily scan counters are stored using anonymized hashed identifiers.
- Operational Logs: System-level logs record webhook events and account state decisions. Advanced content logging is disabled by default.
3. How We Use Your Information
- Perform real-time AI phishing and scam detection
- Generate and deliver investigation reports
- Enforce free-tier and subscription limits
- Prevent abuse through email verification
- Improve system reliability using anonymized aggregate metrics
4. Account & Verification Logic
- New senders may be required to verify email ownership.
- Verification tokens automatically expire after 1 hour.
- Free-tier accounts may be limited to daily scan thresholds.
- Business and enterprise tiers may apply domain-level access controls.
- Duplicate submissions are prevented using hashed case identifiers.
5. Data Retention & Deletion
- Email content: Processed ephemerally and not persistently stored.
- Verification tokens: Automatically deleted after expiration.
- Usage counters: Automatically expire after short retention windows.
- Hashed identifiers: Retained only while access remains active.
6. AI & Third-Party Processing
Email content is analyzed using third-party AI model providers solely for real-time threat detection. We do not sell personal information or share identifiable user data.
7. Security
All communication occurs over encrypted TLS connections. Redis storage is access-restricted. Case IDs and account identifiers are cryptographically hashed. Verification tokens expire automatically.
8. Your Rights
- Request deletion of hashed account data
- Request confirmation of stored usage records
- Unsubscribe from promotional emails at any time
- Exercise GDPR/CCPA rights where applicable
9. Changes to This Policy
We may update this Privacy Policy to reflect technical or regulatory changes. Updates will be posted here with a revised "Last Updated" date.
10. Contact Us
Questions or concerns?
Email:
support@mailpi.app