Frequently Asked Questions

  • About Spymail
  • About EPS
  • Getting Started

For any other questions, please write to us at info@mailcontrol.net

Spymail are emails containing hidden tracking codes that collect metadata about your email engagement and relay them back to the sender, infringing your privacy.
Spymail can reveal private information about your clients, your employees and your enterprise to the sender. Specifically, it can leak the following data:
  • Employee Data:
    • Physical location of the email recipient
    • IP address of the network
  • Email Engagement:
    • Timestamp of when the email was opened
    • Number of times the email was opened
    • Length of engagement
    • Forwards
  • Fingerprints of Hardware and Software:
    • Operating system version details
    • Browser version details
    • Files the browser can open
  • Email forwards:
    • Email ID of the user(s) to whom the email was forwarded
    • Timestamp of when the email was forwarded
    • Timestamp of when the email was reopened
Spymailers can stalk and/or abduct your employees
With their physical location compromised, your traveling executives are at risk of being abducted, especially when they are in high risk countries. Malicious actors also use the fact that an executive is out of the office to dupe the person’s coworkers into sending corporate files or other sensitive data.

Hackers can penetrate company networks
For example, a hacker who has discovered a vulnerability in a certain device or version of an operating system or web browser could use Spymail to find a company that is susceptible to their attack. Alternatively, a hacker could use Spymail to gather system information about a specific company to figure out the easiest way to break in.

Opposition lawyers can get litigation and negotiation advantage
When someone opens a Spymail, it can be used as evidence in court that they are aware of its content. Further, Attorneys negotiating on a client’s behalf may try to talk down their interest level to better position themselves, but the metadata reported by Spymail can tell otherwise. An offer that has been opened once by one person probably does not have as much interest as one that has been forwarded to and opened by multiple recipients within the same organization.
A Spymail looks like any regular email. This is because the tracking code is usually embedded in a single pixel that could be part of the email formatting, fonts, images, or even attached sound files making it impossible for a user to detect. However, by the time a recipient reads the email, metadata would already have been reported to the sender.
Spymail contain tracking code embedded in a single pixel that could be part of the email formatting, fonts, images, or even attached sound files, making it invisible to users. To load this pixel within an email, email clients must contact the server. This communication tells the tracking software that the email has been opened. It also reveals the recipient’s IP address which tells their location, hardware, and software running on their device.

Each time the pixel loads, it triggers a tracking event. This means that if the recipient opens the email again or forwards it to someone else who opens it, the sender will receive another notification.
In 2017, up to 40% of emails in enterprise inboxes had some tracking code. Marketers, competitors, opposition lawyers and malicious individuals like hackers routinely add tracking code to their emails to glean confidential information about the recipients. Along with several free online tools, some reputed enterprise software for email marketing, project management, and team management also offer features that allow adding tracking codes to emails.
No. The inability to opt out or even see Spymail makes it difficult for recipients to protect themselves from the threat of privacy and information loss.
No. Marketers, competitors, opposition lawyers routinely use Spymail to glean confidential information about individuals and enterprises. Several websites offer free tools for embedding tracking codes in emails, empowering any individual with basic internet literacy to send Spymail. Further, some reputed enterprise software for email marketing, project management, and team management also offer features for tracking email activity.
MailControl’s Enterprise Privacy Shield™ is the only enterprise anti-Spymail solution.
MailControl’s Enterprise Privacy ShieldTM (EPS) is an email security solution that sanitizes all emails in your enterprise inbox, protecting the privacy of your clients, your employees and your systems. Powered by patented technology, it is the only enterprise anti-Spymail solution in the market today.
No. EPS acts as an additional layer of protection and works alongside existing email security systems, without affecting their performance.
MailControl’s proprietary algorithms scan the contents of every incoming and outgoing email, looking for specific tracking heuristics. These algorithms are continually updated to detect new tracking attempts and strategies, thus offering futureproof protection. MailControl’s team of experts reviews each unidentified tracker to determine is use and origin.
No. EPS simply removes tracking codes in emails and retains the full visual and functional experience of the email. As such, it does not archive any emails and does not affect discoverability in any way.
Enterprise clients of EPS receive a real-time confidential dashboard that logs and categorizes all email tracking attempts. Clients can also use this dashboard to check the source of the tracking attempts. All information presented in the dashboard has been previously admissible in court as evidence.
  • Universal Protection: Users are protected across all devices, email apps and web browsers
  • Futureproof Protection: All new tracking tools are disarmed by an additive layer of signatureless protection
  • Enterprise Encryption: All enterprise data is protected by AES-256 encryption and sensitive information is never stored
  • Regulatory Compliance: Outbound emails are also cleansed of tracking codes, ensuring GDPR compliance
  • Security Reporting: Detailed risk reports are generated for your information security teams
  • Optional Whitelisting: Users can whitelist domains from which they are willing to receive tracking code
No. EPS is installed at the email server/client of the enterprise and therefore does not need to be installed at individual end-user devices. Enterprise-wide installation takes less than 30 minutes, without any action required of the end-user.
If your enterprise has installed EPS, no action is required of your employees on their individual systems. However, in case your enterprise does not use EPS, any employee can request a demo with us.
Yes. EPS supports on-cloud integration. Enterprise-wide on-cloud installation takes less than 30 minutes.
Yes. EPS can be installed on-premise.
Yes. EPS integrates with Office 365 versions 2010, 2013 and 2016.
Yes. EPS integrates with Microsoft Exchange.
Yes. EPS integrates with Gmail and other G-suite apps.
EPS uses military-grade AES-256 encryption, which protects all enterprise data without ever storing any sensitive information.

No search result found.