Patiala, India

Thapar Institute of Engineering & Technology

Thapar Institute of Engineering & Technology has 5 source-backed AI policy claims from 3 official source attributions. Review state: agent reviewed; 5 reviewed claims. Last checked May 20, 2026.

Thapar Institute of Engineering & Technology AI policy short answer

v1 public contract

Thapar Institute of Engineering & Technology has 5 source-backed AI policy claims from 3 official source attributions, including 5 reviewed claims. The record review state is agent reviewed; original-language evidence snippets, source URLs, confidence, and public JSON are preserved for citation. Last checked May 20, 2026. Discovery context: Thapar Institute of Engineering & Technology is listed as QS 2026 rank 771-780.

Citation-ready summary

As of this public record, University AI Policy Tracker lists Thapar Institute of Engineering & Technology as an agent-reviewed AI policy record last checked on May 20, 2026 and last changed on May 20, 2026. The record contains 5 source-backed claims, including 5 reviewed claims, from 3 official source attributions. Original-language evidence snippets and source URLs remain canonical, with public JSON available at https://eduaipolicy.org/api/public/v1/universities/thapar-institute-of-engineering-and-technology.json. The entity-level confidence is 93%. This tracker is not legal advice, not academic integrity advice, and not an official university statement unless the linked source is the university's own official page.

Policy signals in this record

  • Evidence includes Security review claims.
  • Evidence includes Teaching claims.
  • Evidence includes Academic integrity claims.
  • No specific AI service name is highlighted by the current public claim text.
  • Privacy, sensitive-data, or security language appears in the public claim text.
Policy statusReviewed evidence-backed recordReview: Agent reviewedEvidence-backed claims5Reviewed5Candidate0Official sources3

This reference record summarizes visible public data only. Official sources and original-language evidence remain canonical; confidence is separate from review state.

This page is not legal advice, not academic integrity advice, and not an official university statement unless a linked source is the university's own official page.

Policy profile

Deterministic source-backed dimensions derived from this record's public claims.

Coverage score85/100Coverage labelbroad public coverageReview: Machine candidateAnalysis confidence77%

Policy profile rows are machine-candidate derived metadata. They are not final policy conclusions; inspect the linked claim evidence before reuse.

Analysis page-quality metadata is available at /api/public/v1/analysis/page-quality.json.

AI disclosure

No source-backed public claim about AI disclosure or acknowledgement is present in this profile.

The current public tracker record does not contain claim evidence about disclosing, acknowledging, citing, or declaring AI use.

Not MentionedMachine candidateConfidence0%Evidence0Sources0

Named AI services

No source-backed public claim naming a specific AI service is present in this profile.

The current public tracker record does not contain claim evidence naming a specific AI service.

Not MentionedMachine candidateConfidence0%Evidence0Sources0

Research guidance

No source-backed public claim about research AI use is present in this profile.

The current public tracker record does not contain claim evidence about research use, publication ethics, research data, grants, or human-subjects compliance.

Not MentionedMachine candidateConfidence0%Evidence0Sources0

Coverage score measures breadth of public, source-backed coverage only. It is not a policy quality, strictness, legal adequacy, safety, or compliance score.

Evidence-backed claims

5 reviewed evidence-backed public claim

Security Review

TIET's IT Policy & Guidelines state that authorized users may use only authorized IT resources, are accountable for assigned resources, should not enable unauthorized network access, and must not attempt to access restricted systems without authorization.

Review: Agent reviewedConfidence93%

Normalized value: authorized_it_resource_access_rules

Original evidence

Evidence 1
An authorized user may use only the IT resources he/she has authorization. No user should use another individual's account, or attempt to capture or guess other users' passwords. ... No user must attempt to access restricted portions of the network, an operating system, security software or other administrative applications without appropriate authorization by the system owner or administrator.

Security Review

TIET's IT Policy & Guidelines apply to all users of TIET IT resources and establish institute-wide responsibilities for protecting the confidentiality, integrity, and availability of information assets.

Review: Agent reviewedConfidence92%

Normalized value: it_policy_applies_all_users_cia

Original evidence

Evidence 1
This policy applies to all individuals/ users/ entities, as defined in Section 2, who use the IT Resources of TIET. ... This policy establishes Institute-wide strategies and responsibilities for protecting the Confidentiality, Integrity, and Availability of the information assets that are accessed, created, managed, and/or controlled by the Institute.

Teaching

Thapar's B.E. CSE scheme includes an Ethics and Risk Mitigation in AI course covering responsible AI principles, data privacy and governance, AI governance frameworks, and AI policy case-resolution exercises.

Review: Agent reviewedConfidence91%

Normalized value: ai_ethics_risk_course

Original evidence

Evidence 1
UCS421: ETHICS AND RISK MITIGATION IN AI ... Course Objectives: Empowering engineers to navigate ethical and societal implications of AI in safety-critical domains. ... AI Policy & Case Resolution Real-world simulations will challenge participants to create AI policies for smart plant operations, addressing ethical dilemmas and practical constraints.

Teaching

Thapar's B.E. CSE scheme includes a Generative AI course focused on large language models, hands-on generative tasks, tools for text, image, video, audio and code generation, and prompt engineering.

Review: Agent reviewedConfidence90%

Normalized value: generative_ai_course

Original evidence

Evidence 1
UCS748: GENERATIVE AI ... Course Objectives: This course introduces students to the field of generative artificial intelligence with a focus on Large Language Models (LLMs). Students will learn the theoretical foundations behind LLMs and gain hands-on experience in training and fine- tuning these models for various generative tasks such as text generation, image generation, and more.

Academic Integrity

TIET's Service Regulations describe a faculty recruitment and promotion policy that aims to foster a culture of academic integrity, professional growth, accountability, and inclusivity.

Review: Agent reviewedConfidence86%

Normalized value: faculty_policy_academic_integrity

Original evidence

Evidence 1
Faculty members constitute the core intellectual and academic capital of the Institute. The quality, integrity, and commitment of faculty directly influence the academic standards, research outcomes, institutional reputation, and societal impact of TIET. ... The policy aims to foster a culture of academic integrity, professional growth, accountability, and inclusivity.

Candidate claims

0 machine or needs-review claim

Candidate claims are not final policy conclusions. They preserve source URL, source snapshot hash, evidence, confidence, and review state so the record can be audited before review.

Official sources

3 source attribution

Change log

Source-check timeline and diff-style claim/evidence preview.

View the public change record for this university, including source snapshot hashes, claim review states, and a diff-style preview of current source-backed evidence.

Last checkedMay 20, 2026Last changedMay 20, 2026Open change log

Corrections and missing evidence

Corrections create review tasks and do not directly change this public record.

If an official source is missing, stale, moved, blocked, or incorrectly summarized, submit a source URL, policy change report, or institution correction for review. Corrections must preserve source URLs, source language, original evidence, review state, and audit history.

Back to universities