Content Policy

This Content Policy outlines acceptable and prohibited uses of 2speech. By using 2speech, you agree to comply with this policy. 2speech reserves the right to determine whether any use of the Services violates these terms.

1. Illegal or Harmful Activities

  • Using the Services in any way that violates applicable laws or regulations (local, national, or international).
  • Promoting, facilitating, or engaging in illegal activities, including but not limited to drug trafficking, terrorism, or organized crime.

2. Harm to Individuals or Groups

  • Exploiting, harming, or attempting to harm minors in any form.
  • Harassing, threatening, defaming, or stalking individuals.
  • Creating or distributing deepfake content or misinformation intended to cause panic, confusion, or reputational damage.

3. Unauthorized Voice Use & Privacy

  • Generating or sharing personally identifiable information (PII) without proper authorization.
  • Impersonating public figures, private individuals, or organizations in a misleading or deceptive way.

4. Discrimination & Hate Speech

  • Producing content that promotes violence, hatred, or discrimination based on race, religion, gender, sexual orientation, disability, or other protected characteristics.

5. Fraud and Deception

  • Using AI-generated voices for scams, phishing, voice fraud ("vishing"), or financial deception.
  • Attempting to bypass or manipulate voice-based security or authentication systems.

6. Sensitive and Restricted Content

  • Generating sexually explicit, pornographic, or non-consensual content (NSFW).
  • Creating excessively violent, abusive, or disturbing content.

7. High-Risk & Regulated Use Cases

  • Political Use: Creating content for political campaigns, lobbying, or impersonating officials to influence public opinion or elections.
  • Professional Advice: Providing medical, legal, or financial advice without qualified human oversight.
  • Critical Systems: Using the Services in emergency response, law enforcement, or real-time public safety systems.

8. System Integrity and Abuse

  • Attempting to reverse engineer models, scrape data, or exploit system vulnerabilities.
  • Bypassing usage limits, safeguards, or security mechanisms.

Enforcement

We use a combination of automated systems and manual review processes to monitor compliance. Violations of this policy may result in:

  • Immediate removal of content
  • Temporary suspension or permanent account termination
  • Reporting to relevant authorities where required by law

Final Note

Users are fully responsible for the content they create using 2speech. 2speech is designed as a creative tool, and we expect all users to use it responsibly, ethically, and in compliance with applicable laws.