CRITICAL REQUIREMENT
BINDING POLICY: This page outlines the academic honor policies that are legally binding for this course. All violations will be strictly enforced without exception.

Table of Contents

 

Official Policies & Authority

OFFICIAL REFERENCE
Refer to Georgia Tech’s Office of Student Integrity and the Academic Honor Code for complete institutional policies.

 

Detection & Monitoring Systems

Monitoring Measures:

  • Automated plagiarism detection across assignments
  • Cross-semester comparison of submissions
  • Invisible watermark embedding in projects
  • Monitoring of Ed Discussion activity
  • Pattern analysis for unusual similarities

Detection Techniques:

  • Plagiarism system checks for text and code
  • Watermark validation
  • Ed Discussion activity cross-referenced with submissions
  • External sources reviewed

 

Violation Consequences

STRICT ENFORCEMENT POLICY
Academic misconduct leads to immediate consequences. There are no warnings or appeals.

Misconduct Occurrence Consequence
First Violation Zero on the entire assignment
Second Violation F in the course
Third or More Referral to the Office of Student Integrity

Drop Policy:
Students accused of academic misconduct cannot withdraw from the course until resolution. This includes:

  • Continuation of all coursework
  • Automatic re-enrollment if withdrawn
  • No makeups or extensions during the process

 

Prohibited Activities

Use of AI Tools

Use of AI (e.g., ChatGPT, Copilot, Claude, Gemini, etc.) in any form is strictly prohibited.

Violations include:

  • Generating or debugging code or text
  • Using AI for brainstorming or writing
  • Submitting AI-influenced work

Examples of Prohibited Tools:

  • ChatGPT (all versions)
  • Microsoft Copilot
  • Claude
  • Bard / Gemini (Google AI)
  • LLaMA
  • Any other generative AI or machine learning tool

Code Copying

You may not copy code from any source — internet, textbooks, peers, or former students.

Requirements:

  • All work must be original
  • No copying from Stack Overflow, GitHub, etc.
  • No reuse of previous course materials

Code Sharing

Do not share your code — with classmates, online platforms, or anyone else.

Strict Ban Includes:

  • Sharing during or after the semester
  • Posting to forums (e.g., GitHub, Discord)
  • Showing code in tutoring or study groups

Consequences May Include:

  • Transcript changes after graduation
  • Retroactive OSI referral years later

Outside Help

All work must be completed individually.

Not Allowed:

  • Tutors (paid or unpaid)
  • Family, friends, or partners
  • Study groups for graded work
  • Online help communities (Reddit, Discord, etc.)

Shared Consequences:
If you post or use shared answers, both parties receive a zero and are subject to full penalties.

Text & Document Violations

Plagiarism applies to both code and written work.

Detection Measures:

  • Database comparisons for documents
  • Cross-term and writing-style analysis
  • Watermarks to detect reused or copied content

 

Communication & Collaboration Policy

Official Channel

All communication must occur on Ed Discussion.

Permitted Discussions:

  • General concepts or theories
  • Tool setup help
  • Sharing official documentation

Prohibited Communications:

  • Solution sharing in any form
  • Implementation walkthroughs
  • Code reviews or pseudocode sharing
  • Hints leading to full solutions

Monitoring:

  • All Ed posts are reviewed for violations
  • Pattern analysis used for unusual similarities
  • No use of Discord, Slack, or external chats

 

Submission Integrity

Monitoring Systems:

  • Plagiarism detection
  • Watermark tracking
  • Cross-semester and cross-student comparisons
  • External source validation

Watermark System:

  • Unique term-specific watermarks
  • Automatic detection of reused submissions
  • Flagging of mismatched term watermarks

Retaking the Course:

  • You may reuse your own past work if noted
  • Must include statement: “Resubmitting my own prior work”
  • Work must align with current semester specifications

 

Enforcement Procedures

Violation Investigation:

  1. Suspicious work is flagged
  2. Instructional staff investigates
  3. Evidence is compiled
  4. Student is notified
  5. GT hearing process follows

Consequence Implementation:

  • Immediate assignment zero
  • OSI referral if confirmed
  • Post-course violations may result in transcript changes

 

Help & Resources

Acceptable Support:

  • Ed Discussion (concept-only questions)
  • Course materials
  • Tool documentation and manuals
  • Tutorials not related to assignments

Reporting Issues:

 

Quick Reference Guide

Absolute Prohibitions:

  • No AI tools
  • No code sharing or copying
  • No outside help
  • No solution sharing
  • No plagiarism of any kind

Required Actions:

  • Do all work independently
  • Use Ed Discussion for questions
  • Submit original, term-appropriate work
  • Adhere to communication policies
  • Report issues through official channels

Emergency Contact: