Hero Image
Hero Image
Hero Image
Hero Image

Terms of Service

(Phish Report Button)

Updated: July 30, 2025

1. Use of the App

The App is intended for enterprise use by authorized users of Microsoft Outlook. Its primary function is to allow users to report suspicious emails (e.g., phishing) to their security team or IT department.

You agree to:

  • Use the App only for lawful purposes;

  • Not reverse-engineer, modify, or create derivative works of the App;

  • Not use the App to send spam or false reports.

2. Data Collection & Privacy

Use of the App is subject to our Privacy Policy, which explains what data we collect and how we use it. By using the App, you consent to the collection and use of information as described there.

3. Availability and Support

We aim to maintain availability of the App but do not guarantee uptime or uninterrupted service. Support is available at https://extrian.com/contact or via email at support@extrian.com.

4. Intellectual Property

All rights, title, and interest in the App, including all intellectual property rights, are owned by Extrian. You are granted a non-exclusive, non-transferable, revocable license to use the App within your organization.

5. Termination

We reserve the right to suspend or terminate your access to the App at any time, particularly if you breach these Terms.

6. Disclaimer of Warranties

The App is provided "as is" without warranty of any kind. Extrian disclaims all warranties, express or implied, including any warranties of merchantability, fitness for a particular purpose, or non-infringement.

7. Limitation of Liability

To the maximum extent permitted by law, Extrian shall not be liable for any indirect, incidental, special, or consequential damages arising out of your use of the App.

8. Modifications

We may update these Terms from time to time. Continued use of the App after any changes constitutes acceptance of the revised Terms. The latest version will always be available at: https://extrian.com/tos-phish-report

9. Governing Law

These Terms are governed by the laws of the State of California, excluding its conflict of law principles.

10. Contact Us

If you have any questions about these Terms, please contact: legal@extrian.com

Secure Your Data by Shrinking the Blast Radius

Take control of sensitive, forgotten files before attackers find them.

Secure Your Data by Shrinking the Blast Radius

Take control of sensitive, forgotten files before attackers find them.

Secure Your Data by Shrinking the Blast Radius

Take control of sensitive, forgotten files before attackers find them.

Secure Your Data by Shrinking the Blast Radius

Take control of sensitive, forgotten files before attackers find them.

Secure Your Business with Smarter Defense

Stay Ahead of Phishing Threats

Get the latest cybersecurity insights, phishing trends, and Extrian updates—subscribe now!

Extrian © 2025. Built to Outsmart Threats.

Secure Your Business with Smarter Defense

Stay Ahead of Phishing Threats

Get the latest cybersecurity insights, phishing trends, and Extrian updates—subscribe now!

Extrian © 2025. Built to Outsmart Threats.

Secure Your Business with Smarter Defense

Stay Ahead of Phishing Threats

Get the latest cybersecurity insights, phishing trends, and Extrian updates—subscribe now!

Extrian © 2025. Built to Outsmart Threats.

Secure Your Business with Smarter Defense

Stay Ahead of Phishing Threats

Get the latest cybersecurity insights, phishing trends, and Extrian updates—subscribe now!

Extrian © 2025. Built to Outsmart Threats.