Artificial Intelligence at EKU

General Guidance for the EKU Community

This page provides general institutional guidance. It does not replace EKU regulations, contract terms, data governance requirements, course syllabi, or guidance from University Counsel, IT Security, Procurement, Student Conduct and Community Standards, or OAISIS. 

Before You Use AI


Artificial Intelligence tools can increase efficiency, support analysis, and streamline everyday work. They also introduce data privacy and security considerations.

Information entered into an AI tool may be stored or reused outside the University’s control. Treat anything you submit as potentially public unless institutional safeguards explicitly apply.

Before using any AI tool for university work:

  • Confirm whether the tool is covered by an EKU enterprise contract.
  • Do not enter Personally Identifiable Information (PII), FERPA-protected data, confidential information, financial data, or proprietary research unless explicitly permitted under approved contract terms.
  • Examples include, but are not limited to:
  • Student information, including student ID numbers and grades,
  • Account numbers, credit card data, payroll details, or other sensitive financial records,
  • Employee name and social security number
  • Employee’s health information

Personally Identifiable Information or sensitive information including, but not limited to, social security numbers, EKU identification numbers, student grade information, sensitive reports, medical records, military records, student disciplinary records, personnel records, and counseling and disability records.

An individual’s first name or first initial and last name; personal mark; or unique biometric or genetic print or image, in combination with one (1) or more of the following data elements:

  • An account number, credit card number, or debit card number that, in
    combination with any required security code, access code, or password, would permit access to an account
  • A social security number
  • A taxpayer identification number that incorporates a social security number
  • A driver’s license number
  • A State identification card number
  • A passport number or other identification number issued by the United States government
  • Individually identifiable health information as defined in 45 C.F.R sec. 160.103,except for education records covered by the Family Educational Rights and Privacy Act, as amended, 20 U.S.C. sec. 1232g (KRS 61.931 (6) (a-f))

Working Safely with AI


Before entering information into any AI system, reduce risk using one or more of the following approaches:

Anonymization
Remove direct identifiers and replace them with neutral placeholders.
Example: Student_A01 instead of a real name.

Randomization
Alter or shuffle data elements to preserve trends without exposing individuals.

Synthetic Data
Generate artificial datasets for demonstrations, analysis, or workflow testing when real data is not required.

Public-Only Inputs
Limit prompts to information already intended for public dissemination.

When in doubt, do not upload it.

University-Contracted AI Tools


EKU maintains enterprise agreements for selected platforms that include AI functionality. These platforms have undergone security, privacy, and contract review. Contracted access does not mean all data may be entered. Users must continue to follow all institutional data protection requirements, including EKU policy, contract terms, data classification rules, and applicable law. 

Current university-contracted AI tools available through EKU-supported accounts include:

When using contracted tools:

  • Log in with your EKU credentials before entering information.
  • In Microsoft 365 Copilot:
  • Access via https://copilot.cloud.microsoft/
  • Confirm you are signed in with your EKU email address by hovering over your profile picture.
  • Before entering a prompt, verify that the green shield icon appears in the upper-right corner.
  • If you do not see your EKU account or the shield icon, do not enter information.

In Google Gemini:

  • Access via https://gemini.google.com/
  • Confirm your EKU email address appears in the upper-right corner.
  • Before entering a prompt, verify that a shield icon appears in the chat box.
  • If you do not see your EKU account or the shield icon, do not enter information.
  • To access NotebookLM, select the gear icon in Gemini.

Tools NOT Covered by University Contract


AI tools that are not covered by an EKU contract have not undergone EKU’s security, privacy, and contract review and may not provide institutional safeguards for university data, confidential information, or protected information. These tools may only be used with information that is public, generic, or fully de-identified. Appropriate uses may include:

  • Revising a generic email after removing names, roles, departments, dates, and identifying context
  • Revising generic assignment prompts after removing instructor name, course name, course number, section, department, student information, and institution-specific context
  • Asking general background questions using only public or generic information, without including non-public EKU data, student data, employee data, unpublished research, or confidential information.
  • Brainstorming lesson plans, activities, or examples without using student information, protected course materials, copyrighted materials, unpublished research, or institution-specific data
  • Brainstorming classroom activities using only public or generic information, without including student information, non-public EKU data, copyrighted materials, proprietary information, unpublished research, or protected course materials. 
  • Generating fictional examples, scenarios, or practice prompts that do not include real students, employees, patients, clients, research participants, institutional incidents, or confidential university information

They may not be used to process, transmit, or store University data, including confidential, proprietary, FERPA-protected, or Personally Identifiable Information.

Removing a student’s name does not automatically make student work safe to upload. Student writing may contain personal information, class-specific context, protected educational information, or student intellectual property.

If you are unsure whether something counts as University data, assume it does and do not enter it into a non-contracted AI tool.

Prohibited Tool


The following tool is not permitted for institutional use due to unresolved security concerns: DeepSeek

AI Guidance for Teaching and Learning


For guidance on AI in teaching, learning, assessment, syllabus implementation, student AI literacy, and academic-policy interpretation, contact the Office of Artificial Intelligence Strategies, Innovation, and Success (OAISIS).

OAISIS coordinates Eastern Kentucky University’s work at the intersection of artificial intelligence, teaching and learning, academic policy, and institutional strategy. The office helps EKU faculty, staff, students, and academic units make responsible, effective, and policy-aligned decisions about AI use.  

OAISIS supports:

  • Strategic coordination for responsible AI use in teaching and learning
  • Academic policy interpretation related to AI use
  • Syllabus implementation and classroom guidance
  • AI-aware, AI-embracing, and AI-resilient teaching and assessment
  • Faculty and staff capacity building
  • Student AI literacy and preparation

For academic policy guidance, consult Academic Regulation 4.1.4ACR, Course Syllabi [link?], and Academic Regulation 4.1.3ACR, Academic Integrity [link?]. 4.1.4ACR requires every EKU course syllabus to address AI use. 4.1.3ACR explains how AI-related concerns are handled within EKU’s academic integrity framework.

For consultations, instructional resources, programming, or support with responsible AI use in teaching, learning, assessment, student AI literacy, or academic work, contact OAISIS.

Requesting Institutional Review of an AI Tool


If you would like the University to adopt or formally support an AI tool, submit it for review through Procurement and IT Security. [link]

Institutional approval requires contract, privacy, and security evaluation prior to adoption.

Student Guidance


Before Using AI Tools for Coursework


Students should follow the AI expectations listed in each course syllabus and ask their instructor when expectations are unclear. AI tools may support learning, studying, brainstorming, drafting, feedback, and organization, but students remain responsible for the accuracy, quality, and integrity of the work they submit.

Students should not upload course materials, instructor-created materials, student work, research data, copyrighted materials, publisher content, proprietary information, or another student’s work unless they have permission and the tool is approved for that use.

Students should verify important AI-generated information, keep track of how they used AI, and be prepared to explain or disclose their AI use when required by the course or assignment.

EKU AI Expectations and Tool Access


  • EKU students have institutional access to Microsoft Copilot and Google Gemini when logged in with EKU credentials.
  • Students should consult each course syllabus for the AI use statement that applies to that course and its assignments.
  • If an EKU student is unsure about AI usage for any part of the course, they will need to contact the instructor for that course directly before using AI.
  • Instructors should clearly communicate course-level and assignment-level expectations for AI use.
  • Some instructors may use Turnitin or other approved review tools for similarity checking and AI detection as part of course assessment. Instructors should explain when student work may be submitted to the tool, how results will be interpreted, and how any concerns will be handled under EKU’s Academic Integrity process. Similarity scores and AI detection results should be treated as possible signals, not as sole or automatic evidence of misconduct.

Accessing EKU-Supported Tools


EKU-supported access to Copilot and Gemini provides stronger institutional data protections than personal or public accounts, but students must still follow course expectations, data protection rules, and tool-specific guidance.  EKU Students can log into Copilot or Gemini using their EKU credentials (Email Login):

  • In Microsoft 365 Copilot:
  • Access via https://copilot.cloud.microsoft/
  • Confirm you are signed in with your EKU email address by hovering over your profile picture.
  • Before entering a prompt, verify that the green shield icon appears in the upper-right corner.
  • If you do not see your EKU account or the shield icon, do not enter information.
  • In Google Gemini:
  • Access via https://gemini.google.com/
  • Confirm your EKU email address appears in the upper-right corner.
  • Before entering a prompt, verify that a shield icon appears in the chat box.
  • If you do not see your EKU account or the shield icon, do not enter information.
  • To access NotebookLM, select the gear icon in Gemini.
  • In NotebookLM (Google):
  • Access via: notebooklm.google.com
  • Look for the green shield icon in the upper-right corner.
  • Hover over your profile picture to confirm you are signed in with your EKU email address.

Where to Go for Help


NeedContact
Tool access, login issues, enterprise systemsIT
Security, privacy, PII, data protectionIT
Contracts, purchasing, vendor reviewProcurement
Classroom use, syllabus statements, assignment design, AI literacyOAISIS
Academic integrity processStudent Conduct and Community Standards
Legal interpretationUniversity Counsel