The ethics of voices using AI

Imagine that in 1996, when Tupac Shakur was murdered, someone had predicted that decades later his voice would be resurrected without his consent for a collaboration on a Drake song. Tupac’s heirs threatened a lawsuit for violation of publicity rights. Now I ask you:

Is your voice worth more than a ChatGPT prompt?

This will be a problem we will face in the future, from content created online to companies with their advertising campaigns. Therefore, it is important to have knowledge about the use of voices generated by artificial intelligence (AI).

When law and ethics clash with the future

First, let’s identify the laws and ethics that clash with this new technology, in which it is not correctly stated at the point that even lawyers need a GPS to navigate copyright and civil liability issues.

Ethics

Consent and privacy

(Also known as «Yes, I read it. I accept the terms»)

Those 15 seconds where you accepted an app’s «terms and conditions»… did you know they could include rights to your voice? Many users, by clicking «I Accept» without reading, could be inadvertently giving away rights to their voice. This principle highlights the importance of informed and specific consent for the use of biometric data such as voice.

Transparency

Transparency in the use of AI-generated voices requires more than a simple «contains AI» label. A robust certification system is needed, such as a blockchain, that verifies and classifies synthetic voices. This would allow consumers to easily identify AI-generated content.

 

The legal labyrinth

Copyright

This term refers to the legal rights that creators have over their original works, including literary, dramatic, musical, artistic, and certain other intellectual works. In the context of AI-generated voices, copyright likely relates to the legal ownership and protection of voice recordings, AI-generated voice content, or the algorithms used to create synthetic voices. An example of this problem was Universal Music vs. AI «Ghostwriter» for the song «Heart on My Sleeve» using cloned voices of Drake and The Weeknd.

Your voice = Your digital fingerprint

 

Voice has become a unique «sonic fingerprint,» as identifiable as fingerprints. In the U.S., the law recognizes voice as an integral part of personal identity, protecting it under personality rights. This can create a problem.

 

What could the future be like?

Everything could be recorded on blockchain, so no one can hide the use of that voice cloning in relation to your voice. This can serve as an efficient and transparent verification method, like an ID but in relation to your voice.

There are some companies that are currently creating programs that can detect cloned voices, such as Pex, a company with an AI voice detection product. This facilitates the detection of cloned voice content or false statements.

With these possible solutions, it can be expected that in the future, smart contracts will need to be signed regarding the use of your voice to obtain permissions. This will be followed by a change in the consent requirements for authorizing your voice, such as clarifying the use of your voice.

In summary, there are many possibilities for moderating this technology. Just like the input of ChatGPT, voice can be moderated by detecting it and protecting sectors that are affected by it.

 

Conclusion

Accepting terms

(It’s no longer the «Yes, I accept» of terms and conditions)

First, and don’t worry, I’ll make it easy for you; it’s always advisable to review consents. You should always check what apps will do, even if it’s not just for your voice. This has a quick and easy solution to avoid wasting your time. With AI, I’ll show you:

Whenever you’re provided with a TOS or consent to your data, copy the link or the text itself and put it into your preferred AI for analysis and search. And with this information, ask the AI about the consent and what could conflict with you. For example:

  • By accepting this, how will it affect me over a long period?
  • Are there any cybersecurity issues with these terms?
  • What data of mine is stored when I accept this (including voice)?

Get creative and explore, and try to modify what information you want to provide or if you even want to accept those terms.

Ethical collaboration

Even today, ethical and legal issues must be taken into account. It is recommended to research using the internet or by asking professionals such as programmers, legislators, and ethical experts to gather a conclusion. Again, you can provide a basic conclusion using AI; in this case, I highly recommend using study AIs like Perplexity and searching for online videos.

Blockchain and transparency

Looking towards the future, it can be predicted that there will likely be some verification method like blockchain, as it’s a good method for tracking. It’s recommended to keep this in mind for the future since it makes the operation completely transparent and secure for others. These systems present information on:

  • Who used your voice
  • When they did it
  • For what purpose

Keep this in mind when you engage in voice cloning processes in the future.

Author: Nicholas Norris

Comparte este Post:

Posts Relacionados

Cell Style en Programación

En programación, el término «cell style» o estilo de celda hace referencia al conjunto de propiedades visuales que se aplican a una celda individual dentro de una estructura tabular, como una hoja de cálculo, una tabla HTML o una tabla renderizada mediante frameworks modernos de desarrollo web. Aunque es un

Ver Blog »

¿Qué es CC (Carbon Copy) en programación e informática?

En informática, CC es la abreviatura de Carbon Copy, un término que se originó en el mundo de la correspondencia en papel, cuando se usaban hojas de papel carbón para hacer copias simultáneas de un documento. En el ámbito digital, CC ha sido adoptado principalmente en sistemas de correo electrónico,

Ver Blog »

¿Qué es un «Captured Variable»?

Cuando nos adentramos en el mundo de la programación, uno de los conceptos que más se repite en diversos lenguajes modernos es el de la variable capturada. Esta noción puede parecer abstracta o técnica, pero en realidad es una piedra angular para comprender cómo funcionan las funciones, los closures y

Ver Blog »

¿Qué significa «Capture» en Programación?

El término Capture o captura en programación puede tener varios significados dependiendo del contexto en el que se utilice, pero en general se refiere al acto de «atrapar» o «almacenar» información durante la ejecución de un programa para su posterior uso o análisis. 1. Captura en el contexto de funciones

Ver Blog »

¿Qué es Camel Case?

Camel Case (también conocido como camelCase o dromedary case) es una convención de escritura utilizada principalmente en programación y desarrollo de software para nombrar variables, funciones, métodos, clases y otros identificadores. Esta convención consiste en escribir frases o palabras compuestas sin espacios ni guiones, donde la primera palabra comienza con

Ver Blog »

¿Qué es el «Camel Book»?

El «Camel Book» es el apodo popular para el libro «The C++ Programming Language», escrito por Bjarne Stroustrup, el creador del lenguaje de programación C++. Este libro es considerado la obra canónica y de referencia más importante para el aprendizaje, comprensión y dominio del lenguaje C++. El apodo «Camel Book»

Ver Blog »

Déjanos tus datos, nosotros te llamamos

Déjanos tus datos y 
te enviaremos el link del white paper

Déjanos tus datos y 
te enviaremos el link de la revista

Déjanos tus datos y 
te enviaremos el link del programa