Cybersecurity
Clemson University’s Office of Information Security is committed to protecting the confidentiality, integrity, and availability of information for its faculty, staff and students. To support these goals, the CCIT Office of Information Security promotes awareness through education to assist with understanding, recognizing and implementing security best practices.
Report Security Incident


IRS Scams
Because it is tax season, cybercriminals are increasing their use of Internal Revenue Service (IRS) themed scams. Please be aware that the IRS will never contact taxpayers directly by email, text messages or phone calls. Instead, they will contact you by letter sent through the U.S. Postal Service.
More InformationAI Guidlines
These guidelines provide practical direction for using generative AI safely and responsibly, including guidance that applies to both publicly available AI services and Clemson-approved, contract-protected AI services.
More

Bring Your Own Device Policy FAQ
Clemson University has a new Bring Your Own Device (BYOD) Policy. Its purpose is to make sure that your devices meet the minimum requirements before they are granted access to Clemson University IT Resources and Systems. Personally owned computing devices (“personal devices”) include desktop or laptop computers as well as mobile devices, such as cell phones or tablets, that are owned and managed by you, personally. You can visit the BYOD FAQ page for more information.
Bring Your Own Device Policy and FAQsPopular Pages
Duo Authentication
Setting up Duo to enable two factor authentication to protect your Clemson users accounts.
IT Policies and Procedures
It is important to be aware of the University's procedures and standards, as well as any policy that is applicable and required in your role(s) at the University.
Data Classification
Clemson University is committed to protecting the privacy of its students, faculty and staff while protecting the confidentiality, integrity and availability of information important to the University’s mission.
Quarantined Email
Clemson University's email system will quarantine any suspicious email. Users can release some emails themselves and request the release of high confidence phishing emails by using the Release Quarantined Email Service in the TigerHUB system.
Cybersecurity Alerts
