Skip to content Skip to main navigation Report an accessibility issue

OIT News

The Dangers of Using DeepSeek


DeepSeek logo

Let’s take a moment to address some significant concerns regarding the use of DeepSeek at UT. While it may seem like an interesting and convenient tool, given the information that has been brought forth regarding this service in the last few days there are several dangers associated with its use that we must consider:

  1. Data Privacy Risks: DeepSeek often requires access to sensitive data. The potential for data breaches or unauthorized access to our confidential information is a serious threat. Protecting our data and maintaining trust must be our top priority.
  1. Inaccurate Results: Relying on automated tools like DeepSeek can lead to inaccurate or incomplete results. This could affect our decision-making processes and ultimately harm our business operations.
  1. Lack of Accountability: With automated tools, it’s challenging to pinpoint responsibility for errors or misuse. This lack of accountability can lead to significant issues if something goes wrong. Moreover, DeepSeeks’ terms and conditions regarding intellectual property ownership are ambiguous and conflicting.
  1. Compliance Issues: Depending on the nature of the data and the jurisdictions we operate in, using DeepSeek could result in non-compliance with regulations such as GDPR, CCPA, HIPAA, FERPA, and others. It’s essential to ensure we adhere to all legal requirements.
  1. Unclear Data Ownership: One of the significant concerns with using DeepSeek is the ambiguity surrounding data ownership. It’s often unclear who owns the data processed by the tool—whether it’s our organization, the third-party provider, or the end-users. This lack of clarity can lead to legal disputes and complications, especially when handling sensitive or proprietary information.
  1. Digital Footprints: Using DeepSeek leaves a digital footprint, which can be tracked and analyzed by various entities. This raises concerns about data privacy and security, as unauthorized parties may gain access to our digital trails. It’s essential to be aware of the potential risks associated with leaving digital footprints and to take measures to protect our data.
  1. Considerations When Engaging with Chinese Companies: Engaging with Chinese companies that develop software products can introduce several risks, including intellectual property theft, cybersecurity threats, and compliance with strict data privacy laws. 

Given this long list and the fact that the U.S. government is addressing even more concerns, OIT strongly recommends that DeepSeek be avoided in the classroom and approached with great caution for personal use. DeepSeek is strictly not for use for any business purposes involving University data. Please use the AI tools provided to you by OIT, where we prioritize security, accuracy, and compliance. 

Additional Resouces

Explore the available UT-sanctioned AI tools on the OIT website.

Register for an OIT AI workshop to learn more about UT Verse.

Drop in for weekly conversations about AI in the Student Union, room 229, each Wednesday through April.