Depending on the application a system account may actually require an email, but it can be a bogus one to avoid the unique email constraint.