Responsible Use Policy
Guidelines for authorized and ethical use of Email Pen Test
Authorized Testing Only
Use a mailbox you control. Unauthorized testing is prohibited and may result in legal action.
Authorized Use
Email Pen Test is an email security testing tool designed for authorized security testing only. You must:
- Use a mailbox that you own or have explicit permission to test
- Only test mailboxes within your organization or that you control
- Comply with your organization's security testing policies
- Use the results for legitimate security improvement purposes
Prohibited Uses
Do NOT use this email security testing tool to:
- Test mailboxes you don't own or have permission to test
- Harass or spam others
- Attempt to bypass security controls for malicious purposes
- Use test results to craft phishing attacks
- Violate any laws or regulations
Defensive-Only Approach
This email security testing tool follows a defensive-only philosophy:
- We do NOT provide instructions for crafting phishing lures
- We do NOT teach evasion techniques
- We do NOT help bypass security defenses
- All test emails are safe and clearly marked
- Results are designed to improve your security posture, not exploit it
- Test cases simulate real-world attack patterns (social engineering, QR code phishing, link wrapping, etc.) to help you identify security gaps
Test Emails
All test emails sent by this email security testing tool:
- Contain no malware or malicious payloads
- Do not attempt credential harvesting
- Are clearly marked as test emails
- Include a footer stating "This is a test"
- Use subject lines prefixed with "[EPT_XX]" where XX is a unique identifier
- Cover 20 test cases across social engineering, content analysis, attachment policy, and header analysis
Important: While our test emails are safe, always exercise caution with emails from unknown senders and never click links or open attachments unless you're certain they're legitimate.
Violations
Violations of this policy may result in:
- Immediate termination of access
- Reporting to relevant authorities if illegal activity is suspected
- Legal action if applicable
Questions or Violations?
If you have questions about responsible use or need to report a violation, please contact us.