Generative AI tools can be a treat, boosting productivity, creativity and efficiency. But when used carelessly, they can quickly turn into a trick, exposing sensitive data and violating institutional policies. As MSU Denver supports Cybersecurity Awareness Month, Information Technology Services has some advice on avoiding AI nightmares.
Irresponsible use of AI tools can lead to such horrors as:
- Frankenstein’s Data, a monstrous amalgamation created from secretly hoarded information provided by unsuspecting users.
- Zombie Bots, shambling parodies of truth that spread inaccuracies, bias, or outright misinformation.
- Many-Eyed Creeps, secretive peepers that look for confidential or personal information that was given to an untrusted AI algorithm.
- Vengeful Specters that awaken to punish those who have violated FERPA, HIPAA or University policies.
To avoid AI nightmares, keep these tips in mind:
- For University work, only use approved AI-powered tools.
- Microsoft Copilot is the preferred generative AI tool approved for use at MSU Denver.
- Any other AI tool that is intended for use with institutional systems, data or applications must first be reviewed and approved by ITS.
- Scrub your data before providing it to an AI tool, or use dummy data. Never provide AI tools with sensitive data. This includes:
- Personally identifiable information
- Health records
- Financial data
- Student records
- Employment records
- Verify all AI output for accuracy.
- Disclose any AI use in your work.
For more information about the University’s stance on specific generative AI technologies, or if you need guidance on approved AI tools, data handling or data reporting, please visit the official ITS AI webpage. You can also visit the University’s AI for All website for more information about generative AI as a whole, its ethical use and practical applications in higher education.
This article is part of MSU Denver’s Cybersecurity Awareness Month 2025 series. Find previously released tips below:
Oct. 2: Beware bewitched browsers
Oct 8: Doomed devices: Protect your hardware before it haunts you
The University is proud to support this nationwide initiative, co-led by the National Cybersecurity Alliance and the Cybersecurity and Infrastructure Agency (CISA) of the U.S. Department of Homeland Security.