Modulate Code of Conduct
Last updated: April 3, 2026
V.1.4 [260323]
Prohibited Customer Uses and Behaviors
1. Unauthorized Recording and Privacy Violations
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Analyzing recordings made without proper legal notice given and consent obtained from all legally required parties
- Analyzing private conversations obtained through hacking, theft, or unauthorized access
Examples:
- Illegally using hidden recording devices to capture conversations for analysis
- Processing audio files stolen from someone's device or account
- Analyzing conversations recorded in private spaces without acquiring legally mandated consent
2. Exploitation of Minors
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using the platform to identify, locate, or gather information about minors without having obtained clear legal rights to do so
- Processing content that could facilitate child exploitation or abuse
Examples:
- Analyzing school recordings to identify individual children
- Attempting to identify vulnerable children based on public audio sessions
- Any attempt to use voice analysis to contact or locate children
3. Discrimination, Hate and Bias-Based Harm
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis to discriminate based on protected characteristics under applicable anti-discrimination laws
- Making employment decisions based solely on voice analysis results
- Denying services or opportunities based on accent, speech patterns, or vocal characteristics, except where vocal performance is a bona fide occupational qualification or essential function of the position or service
- Profiling individuals for discriminatory purposes
Examples:
- Rejecting job candidates based on accent analysis
- Using voice analysis to determine race, ethnicity, or national origin for discriminatory purposes
- Offering inferior service or support to an individual based on assumptions about their capabilities based on speech patterns
Permitted Uses (not discrimination):
- Voice acting or narration positions where specific vocal characteristics are required for the role
- Language interpretation or translation services where accent clarity affects job performance
- Customer service roles where comprehensibility in a specific language is essential to the function
4. Unauthorized Law Enforcement and Legal Misuse
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using the platform for vigilante justice or unauthorized investigations
- Creating false evidence or manipulating analysis results
- Bypassing legal requirements for surveillance or investigation
Examples:
- Claiming voice analysis results as official forensic evidence without proper credentials
- Civilians using the platform to investigate neighbors or community members
- Creating fake analysis reports for legal proceedings
5. Commercial and Financial Fraud
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis for identity theft or impersonation
- Analyzing voices to bypass security systems
- Gathering information for financial fraud or scams
- Using voice patterns to bypass medical privacy protections
- Using the platform to verify identities for fraudulent purposes
Examples:
- Analyzing bank customer service calls to steal account information
- Using voice analysis to impersonate someone in financial transactions
- Processing recordings to gather insider trading information
- Analyzing voices to bypass voice authentication systems
6. Interpersonal and Domestic Abuse
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using the platform as a tool for domestic surveillance or control
- Analyzing an acquaintance’s conversations without consent
- Gathering evidence to threaten, blackmail, or coerce intimate partners
Examples:
- Secretly analyzing an associate's phone calls to track their activities
- Monitoring family members' conversations for controlling purposes
- Creating detailed reports on a partner's daily activities through voice analysis
7. Workplace Abuse and Violation
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Analyzing employee conversations beyond legitimate business purposes
- Using voice analysis for predicting an individual’s membership in a protected class, especially in the context of hiring or firing decisions
- Violating employee privacy rights through unauthorized voice monitoring
Examples:
- Using voice analysis to identify union organizing activities
- Monitoring bathroom or break room conversations without clear business purpose and employee knowledge and consent
- Making personnel decisions based on personal conversation analysis
8. Medical and Health Privacy Violations
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Analyzing voices to diagnose medical conditions without proper credentials
- Using voice analysis to determine health information for discriminatory purposes
- Using voice analysis to process protected health information without proper authorization, or to make health-related determinations for discriminatory purposes in violation of applicable disability discrimination laws
- Making medical claims about individuals based on voice analysis
Examples:
- Claiming to diagnose mental health conditions through voice analysis
- Using voice patterns to determine pregnancy, illness, or disability status
- Analyzing therapy session recordings without proper authorization
- Making insurance decisions based on voice health analysis
9. Government Surveillance and Authoritarian Use
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using the platform for mass surveillance programs
- Analyzing citizen communications to suppress dissent or free speech
- Bypassing legal surveillance oversight and warrant requirements
- Targeting surveillance toward specific demographic, economic, or social groups without particularized suspicion or individualized justification for each targeted individual, where such targeting is conducted for reasons related to group membership rather than individual conduct
Examples:
- Government agencies analyzing protest recordings to identify participants en masse
- Using the platform to monitor political opposition or activists
- Analyzing citizen phone calls without proper legal authorization
- Creating databases of citizen information for surveillance purposes
- Targeting surveillance at homeless populations, low-income communities, or marginalized groups without individualized probable cause
10. Anonymity Violation and Deanonymization
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Attempting to identify private details regarding the identity of anonymous or pseudonymous individuals without legal authorization or court order
- Using voice analysis to unmask whistleblowers, sources, or protected persons
Examples:
- Analyzing anonymous tips to identify the tipster
- Using voice analysis to unmask anonymous online content creators
- Analyzing anonymous support group recordings to identify participants
- Using voice analysis to identify anonymous political speech or commentary
Limited Exception: Deanonymization is permitted only when (a) you have a court order, subpoena, or other legal process specifically authorizing identification of the individual; or (b) you have credible, documented evidence of imminent threat to life or safety and you are coordinating with law enforcement in response to that threat.
11. Behavioral Manipulation and Psychological Exploitation
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis results to target individuals for exploitative commercial purposes based on behavioral signals that suggest emotional distress, cognitive impairment, or diminished decision-making capacity
- Using emotional or behavioral indicators derived from voice analysis to target marketing of high-risk financial products (including payday loans, high-interest credit, and predatory lending products), gambling services, addictive substances, or other potentially harmful goods or services
- Manipulating individuals based on voice analysis suggesting emotional vulnerability
Examples:
- Targeting gambling advertisements to individuals whose voice patterns suggest agitation, stress, or compulsive behavior
- Using voice analysis to identify individuals in apparent emotional distress and immediately marketing high-interest loans or debt consolidation services
- Targeting addiction treatment upsells to individuals based on voice pattern analysis suggesting substance use
- Using voice analysis to time persuasive sales calls to coincide with detected emotional states
12. Journalistic Source Protection Violations
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis to identify confidential sources
- Analyzing journalist communications to reveal protected information
- Bypassing press shield laws through voice identification
- Threatening freedom of the press through source identification
Examples:
- Analyzing leaked audio to identify government whistleblowers
- Using voice analysis to identify anonymous sources in news stories
- Analyzing journalist phone calls to reveal confidential sources
13. Religious and Ideological Persecution
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis to persecute religious minorities
- Analyzing religious gatherings or ceremonies without authorization
- Using voice patterns to discriminate based on religious beliefs
Examples:
- Analyzing mosque, church, or temple recordings to identify attendees
- Using voice analysis to identify religious minorities for persecution
- Profiling individuals based on religious speech patterns or terminology
14. Immigration and Refugee Exploitation
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis to identify undocumented individuals without legal basis
- Illegally analyzing protected refugee or asylum seeker communications
- Using accent analysis to profile targets for immigration enforcement
- Violating protections for vulnerable migrant populations
Examples:
- Secretly analyzing community center recordings to identify undocumented immigrants
- Covertly analyzing sanctuary space communications
- Using accent detection to select targets for immigration raids or enforcement
15. Corporate Espionage and Trade Secret Theft
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis for unauthorized corporate intelligence gathering
- Analyzing competitor communications without authorization
- Stealing trade secrets through voice surveillance
- Using voice analysis for insider trading or market manipulation
Examples:
- Analyzing competitor conference calls for proprietary information
- Using voice analysis to identify insider trading communications
16. Healthcare Fraud or Malpractice
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Making unauthorized medical determinations (including for the purposes of insurance adjustments) based on voice analysis
- Mistreating patients, including promotion of a particular drug or care plan, based solely on results of voice analysis
Examples:
- Using voice analysis to fake medical consultations or diagnoses
- Analyzing patient-doctor communications for insurance claim manipulation
- Using voice patterns as sole or unwarranted evidence of medical risks relevant to insurance adjustment or claims
17. Election Interference and Democratic Process Violation
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis to interfere with free and fair elections or voting
- Analyzing voter communications for manipulation or suppression
- Using voice patterns to identify and target political opponents
- Violating election privacy and ballot secrecy
Examples:
- Analyzing polling place conversations to identify voter choices
- Using voice analysis to suppress specific demographic voting groups
- Analyzing political campaign communications without authorization
- Using voice patterns to intimidate or influence voters
18. Human Trafficking and Exploitation Detection Misuse
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice analysis results to exploit rather than help trafficking victims
- Analyzing communications to facilitate rather than prevent trafficking
- Using voice patterns to identify vulnerable individuals for exploitation
- Violating victim protection protocols through unauthorized analysis
Examples:
- Using voice analysis to identify potential trafficking victims for exploitation
- Bypassing victim protection services through voice identification
19. Artificial Intelligence and Deepfake Creation
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Using voice data processed through the Platform to train voice cloning, voice synthesis, or deepfake generation systems without both (a) Modulate's prior written consent and (b) lawful authorization to use the underlying voice data for such purposes
- Using voice patterns to create technology intended to impersonate individuals without their consent
- Facilitating identity theft through voice replication
Examples:
- Using voice analysis to train voice cloning systems without permission
- Creating voice replicas for fraud or impersonation purposes
- Analyzing voices to improve unauthorized AI voice generation
- Extracting voiceprints or voice characteristics from Platform analysis for use in generative AI models
Note: This prohibition does not restrict Modulate’s own use of data for model training as described in the Velma API Terms of Service Section IV.A (Model Improvement Program). This prohibition applies to customer use of Platform data and outputs for training customer or third-party AI systems.
20. Advertising Targeting and Consumer Privacy Violations
You, the customer, are PROHIBITED from using Modulate’s technology for…
- Analyzing conversations for advertising purposes without disclosure
- Using voice intelligence for behavioral advertising without user knowledge
- Creating detailed behavioral profiles to coerce someone towards harm
Examples:
- Using voice patterns from smart home devices for advertising without consent
- Analyzing emotional states in voice recordings to time persuasive advertisements
- Building advertising databases from voice recordings without user awareness or consent