Acceptable Use Policy
Last updated · April 25, 2026 · v1.0
CloneOS gives creators tools that can do real damage in bad hands — voice and image cloning, AI writing at scale, live streaming, mass messaging. This document spells out what you may and may not do with them. Breaking these rules can get your account suspended or terminated, and in serious cases can result in legal referral. Read it.
01Guiding principle
CloneOS gives creators powerful tools — voice cloning, image cloning, AI writing at scale, live streaming, community DMs. Powerful tools are also abuseable. This Acceptable Use Policy (“AUP”) sets out the lines we will not let you cross. It is incorporated into the Terms of Service and applies to your use of every part of the Service: tools, content, community, messaging, live sessions, APIs, and any future features.
Two rules cover most of it: be the person you say you are, and treat other people the way you would want a stranger with your tools to treat you. Everything below follows from those.
02No deepfakes of people who have not consented
You may create voice and image clones of yourself, with your own documented consent, for your own creative or business purposes. You may not:
- Create voice or image clones of any other person without their explicit, verifiable, informed consent.
- Use generated voice, image, or video to impersonate a real person — politician, celebrity, ex-partner, colleague, anyone — without their consent and a clear disclosure that the content is synthetic.
- Use generated content to put words, opinions, or actions in a real person’s mouth, especially in contexts that could mislead viewers (news-style framing, “leaked” framing, fake testimonials).
- Generate sexual or sexually-suggestive content depicting any identifiable real person, even with their alleged consent if we cannot verify it.
When you train a voice or image clone, you confirm that the source samples are of yourself. We may verify (e.g., a live consent recording or a comparison against your account profile). Falsifying this is a material breach.
03No illegal content
You may not use the Service to create, store, transmit, or distribute content that is illegal in your jurisdiction or in the United States. That includes, without limitation:
- Child sexual abuse material (“CSAM”), including simulated, drawn, generated, or otherwise rendered. Zero tolerance. We report CSAM to the National Center for Missing and Exploited Children (NCMEC) as required by law.
- Content that incites or threatens violence against a person or an identifiable group.
- Content that violates export controls or sanctions law.
- Content that infringes copyright, trademark, right of publicity, or other intellectual property rights of a third party.
- Content that violates privacy laws (e.g., publication of another person’s private information without authority).
04No fraud, scams, or get-rich-quick schemes
You may not use CloneOS to plan, execute, or distribute fraud. Examples we will act on immediately:
- Investment, crypto, or forex schemes that promise unrealistic or guaranteed returns.
- “Health miracle” offers that promise specific cures without scientific or regulatory backing.
- Pyramid or chain schemes, recruitment-driven income claims, or multi-level marketing pitches that obscure income reality.
- Fake testimonials, fabricated reviews, or testimonials attributed to people who did not give them.
- Phishing pages, credential harvesters, or content used to facilitate identity theft.
- Counterfeit-product promotion or unauthorized resale of licensed brands.
Selling legitimate coaching, courses, or services is fine. Promising a specific dollar outcome without a basis is not. If you are unsure, write to legal@cloneos.com before launching.
05No spam, mass-messaging abuse, or platform manipulation
The voice and image clones, the content tools, and the API make it trivial to flood platforms with content. Don’t.
- No unsolicited mass DMs or comments on third-party platforms, even if generated with your own clone.
- No content farms designed solely to game ranking algorithms.
- No coordinated inauthentic behavior — buying or running networks of accounts to inflate reach or revenue.
- No CAN-SPAM, CASL, or PECR violations in email and SMS sent using CloneOS-generated content.
Distribution platforms have their own rules; using CloneOS doesn’t exempt you from theirs. If your distribution platform suspends your account for AI-driven spam, that is on you.
06No harassment, doxxing, or threats
Inside the CloneOS community, in DMs, in live sessions, or in content you publish using CloneOS, you may not:
- Engage in targeted harassment of any individual.
- Publish another person’s home address, phone number, workplace, or other identifying information without their consent.
- Use slurs or hateful language directed at people based on race, ethnicity, religion, national origin, gender, sexual orientation, gender identity, disability, or age.
- Threaten violence, harm, or non-consensual sexual conduct against any person.
- Contact a person who has blocked you using a different account.
07No malware, phishing, or exploitation
You may not use the Service to host, transmit, or distribute malware, ransomware, viruses, phishing pages, exploit code, credential stealers, or other harmful software. You may not attempt to compromise our infrastructure or any other user’s account, data, or device. Security research conducted under our responsible disclosure policy is welcomed at security@cloneos.com.
08No infringement of intellectual property or personality rights
You are responsible for ensuring that your inputs and your generated outputs do not infringe a third party’s intellectual property or personality rights:
- Do not upload copyrighted training data you do not have rights to (full books, paid courses, scraped paywalled articles).
- Do not generate content that closely imitates a known brand’s trademark, trade dress, or registered character in a way that would confuse consumers.
- Do not generate likenesses of celebrities or public figures for commercial use; right of publicity protects them.
- Respect Creative Commons attribution requirements when you use CC-licensed material.
We respond to valid DMCA notices and process them per 17 U.S.C. § 512. Notices to dmca@cloneos.com.
09No circumvention of rate limits or scraping
The Service has rate limits to keep it stable and affordable. Don’t try to bypass them with multiple accounts, rotating IPs, headless browsers, or automation that mimics human use. Don’t scrape the Service, the community, or other members’ profiles. Don’t attempt to crawl behind authentication. Programmatic access is for the API; if you need higher limits, email support@cloneos.com.
10Voice clones are yours and only yours
The voice clone you train on CloneOS must be of your own voice, using audio you recorded or have written authority to use. We may require a live consent recording at training time.
If you are a business cloning a host’s voice (e.g., a podcaster who records their show on CloneOS for production), the host must have an account, consent through that account, and authorize the cloning under that account’s settings. We do not support “clone someone else’s voice on their behalf” from a single seat.
You may not transfer trained voice clones between accounts and you may not use the API to generate voice content for accounts you do not control.
11Image clones are your likeness and only your likeness
The image clone you train must be of your own face and body, using photos that show you. Group photos are fine for variety provided you are the central subject; do not train a LoRA on a friend, family member, or stranger without their explicit consent via their own account.
Even with consent, do not generate non-consensual intimate imagery, do not generate a person in compromising situations they did not authorize, and do not generate images of children. The minimum age for an image-clone subject is 18.
12Reporting violations
If you see a violation, report it. The fastest channels:
- In-product: three-dot menu on a post, comment, or DM → Report.
- Email: abuse@cloneos.com — include the URL, the username, and a short description of the issue.
- Urgent: imminent harm, CSAM, or coordinated attack — email security@cloneos.com with the subject line “URGENT”.
We try to respond within one business day, faster for urgent reports.
13Enforcement and consequences
When we receive a credible report or detect a violation, we investigate. Depending on severity and history, we may:
- Send a warning with a description of the issue.
- Remove the offending content.
- Temporarily suspend the account, the community privileges, or the AI tools.
- Permanently terminate the account.
- Refer the matter to law enforcement where required by law.
- Refuse service to the account holder going forward.
For non-egregious violations we will normally give an opportunity to cure. For egregious violations — CSAM, coordinated fraud, deepfake abuse, threats — we act immediately and without notice.
You can appeal an enforcement decision by replying to the enforcement email. Appeals are reviewed by a different staff member than the one who made the original decision.
14Changes to this policy
We may update this AUP from time to time as new abuse patterns emerge or as the law evolves. The current version will always live at /legal/aup with a Last Updated date. For changes that materially expand the list of prohibited uses, we will give 30 days’ notice via email and an in-app banner before the new policy takes effect.