Control #

F

1

.

1

Restrict outputs that enable deception or impersonation

Apply filters or classifiers to block outputs that support impersonation, covert influence, or other deceptive use cases—including false identity, trust manipulation, and hidden persuasion.

Evidence

We'll list specific evidence that demonstrates compliance with this control. Typically, this is screenshots, proof of a legal or operational policy, or product demonstrations.

Recommended actions

We'll recommend specific practices and actions for complying with this control.

Provide feedback on this control