Clemson University’s Office of Information Security is committed to protecting the privacy of its students, alumni, faculty and staff, as well as protecting the confidentiality, integrity and availability of information. To support these goals, the CCIT Office of Information Security promotes awareness through education to assist with understanding, recognizing and implementing security best practices.
Report Security Incident


BYOD Policy FAQ
Clemson University has a new Bring Your Own Device (BYOD) Policy. Its purpose is to make sure that your devices meet the minimum requirements before they are granted access to Clemson University IT Resources and Systems. Personally owned computing devices (“personal devices”) include desktop or laptop computers as well as mobile devices, such as cell phones or tablets, that are owned and managed by you, personally. You can visit the BYOD FAQ page for more information.
MORE
Report Phishing button changes
Clemson University faculty, staff and students using Microsoft Outlook for email can now use the generic Report button to report phishing or junk emails. Reporting an email through this method will still send your email to the Clemson Security Operations Center (CSOC) for review and investigation. The Security Shield Report button has been removed from Outlook to help streamline this process. But if you need to provide additional information beyond just reporting an email, use the Report Phishing Service through the TigerHub system. Please contact the CCIT Support Center if you have any questions.
Popular Pages
Duo Authentication
Setting up Duo to enable two factor authentication to protect your Clemson users accounts.
IT Policies and Procedures
It is important to be aware of the University's procedures and standards, as well as any policy that is applicable and required in your role(s) at the University.
Data Classification
Clemson University is committed to protecting the privacy of its students, alumni, faculty and staff while protecting the confidentiality, integrity and availability of information important to the University’s mission.
Email Encryption
If you need to email Confidential or Restricted data, your email must be encrypted.
Cybersecurity Alerts
