Clemson University’s Office of Information Security is committed to protecting the privacy of its students, alumni, faculty and staff, as well as protecting the confidentiality, integrity and availability of information. To support these goals, the CCIT Office of Information Security promotes awareness through education to assist with understanding, recognizing and implementing security best practices.
Report Security Incident


Document Shred Day
Attendees are limited to three boxes (copy paper box or smaller) or three bags (kitchen trash bag or smaller) per vehicle. There is no need to remove binders, binder clips, paper clips, staples, rubber bands, or CDs/DVDs prior to shredding. Hard drives will not be accepted at this event.

BYOD Policy FAQ
Clemson University has a new Bring Your Own Device (BYOD) Policy. Its purpose is to make sure that your devices meet the minimum requirements before they are granted access to Clemson University IT Resources and Systems. Personally owned computing devices (“personal devices”) include desktop or laptop computers as well as mobile devices, such as cell phones or tablets, that are owned and managed by you, personally. You can visit the BYOD FAQ page for more information.
MOREPopular Pages
Duo Authentication
Setting up Duo to enable two factor authentication to protect your Clemson users accounts.
IT Policies and Procedures
It is important to be aware of the University's procedures and standards, as well as any policy that is applicable and required in your role(s) at the University.
Data Classification
Clemson University is committed to protecting the privacy of its students, alumni, faculty and staff while protecting the confidentiality, integrity and availability of information important to the University’s mission.
Email Encryption
If you need to email Confidential or Restricted data, your email must be encrypted.
Cybersecurity Alerts
