{"id":6776,"date":"2025-09-06T15:04:51","date_gmt":"2025-09-06T22:04:51","guid":{"rendered":"https:\/\/www.hmc.edu\/cis\/?page_id=6776"},"modified":"2025-10-15T17:24:30","modified_gmt":"2025-10-16T00:24:30","slug":"ai-guidelines","status":"publish","type":"page","link":"https:\/\/www.hmc.edu\/cis\/ai-at-hmc\/ai-guidelines\/","title":{"rendered":"Using AI with HMC data"},"content":{"rendered":"\n<p>The following guidelines are offered to the HMC community to help with decisions about what AI can be used with what data.<br><\/p>\n\n\n\n<div class=\"wp-block-mudd2021-wrapper auto-accordion\">\n<h2 class=\"wp-block-heading\">Step 1. Understand data classification.<\/h2>\n\n\n\n<p><strong>&#8220;P3 and P4 data can only be used in systems that are approved by the college.<\/strong>&#8220;<\/p>\n\n\n\n<p>Data classification is the process of classifying data according to levels of confidentiality and the protection that it requires.\u00a0 The <a href=\"https:\/\/docs.google.com\/document\/d\/e\/2PACX-1vSjoqKkWM3JhUi4Zf8kJ9vj8bnkZvgpx_JEC24sN6SUv6zg0RuFU4jMv9MvtlunCHueWjgM7oVeX1TU\/pub\">HMC Data Classification Standard<\/a> breaks college data down into \u201cP\u201d (for \u201cprotection\u201d) levels based on the consequences to the college of unauthorized access or modification of that data.\u00a0 <br><br>There are four protection levels specified in the standard, from \u201cP4 &#8211; High\u201d down to \u201cP1 &#8211; Public\u201d. \u00a0 The protection levels are heavily driven by the potential consequences to the college of unauthorized disclosure or modification. \u00a0 The higher the protection number, the more serious the consequences and the more stringent the protections.\u00a0 For example, P4 includes Social Security Numbers, P3 covers personnel records, P2 non public emails that don\u2019t contain P3 or P4, and P1 is essentially \u201cpublic\u201d.\u00a0<br><br>There are more details about the data classification standard in the <a href=\"https:\/\/www.hmc.edu\/cis\/questions-and-answers\/\">Questions and Answers section<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 2. Understand which AI is approved for which data.<\/h2>\n\n\n\n<p><strong>&#8220;Only Google Workspace for Education, Microsoft 365 for Education and Workday can be used on P3 and P4 data.&#8221;<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1jGe4JPK-3l0AtPEOaVE85wF8137w0_ypGo2btWR2bUc\/edit?usp=sharing\">Table explaining the relationship between AI tools and HMC data protection levels.<\/a> (Requires HMC Credentials)<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 3. Understand the approval process.<\/h2>\n\n\n\n<p><strong>&#8220;Make sure you know whether the AI you\u2019re interested in is on the college approved list or not.&nbsp; If it is not, you cannot use it with P4 and P3 data but you can still use it with P2 data and  P1 data.&nbsp;&#8220;<\/strong><\/p>\n\n\n\n<p>The college has an approval process for software purchases that includes contract review, cyber-security assessment, risk management and accessibility review.&nbsp; When any given academic or administrative department is interested in purchasing a software application, several other departments\/offices at the college carry out a review. The offices that perform this review work include the Office of Financial Affairs, Computing and Information Services, Risk Management and Legal Affairs, and Communications and Marketing.<\/p>\n\n\n\n<p>The following are our current AI requirements for systems that may be used on P3 and P4 data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A formal contract between the software vendor and the college must be signed by an authorized signer and in accordance to <a href=\"https:\/\/drive.google.com\/file\/d\/14ZAPiZpE77KHXlW0ULc7HU9_6stzU8fC\/view\">HMC\u2019s contract procedures<\/a>.<\/li>\n\n\n\n<li>The vendor must not use HMC data to train its AI models.<\/li>\n\n\n\n<li>The vendor&#8217;s employees must not review HMC data.<\/li>\n\n\n\n<li>HMC must control whether data leaves the college &#8220;tenant&#8221;.<\/li>\n\n\n\n<li>The vendor\u2019s service must meet the college\u2019s privacy, security and compliance requirements.<\/li>\n\n\n\n<li>The vendor must agree to promptly destroy the tenant data at the end of the contract.<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The following guidelines are offered to the HMC community to help with decisions about what AI can be used with [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":0,"parent":6763,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-6776","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/pages\/6776","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/comments?post=6776"}],"version-history":[{"count":30,"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/pages\/6776\/revisions"}],"predecessor-version":[{"id":7055,"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/pages\/6776\/revisions\/7055"}],"up":[{"embeddable":true,"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/pages\/6763"}],"wp:attachment":[{"href":"https:\/\/www.hmc.edu\/cis\/wp-json\/wp\/v2\/media?parent=6776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}