Skip to content
Students working in the security operations center.
Clemson Computing and Information Technology

Cybersecurity

Clemson University’s Office of Information Security is committed to protecting the privacy of its students, alumni, faculty and staff, as well as protecting the confidentiality, integrity and availability of information. To support these goals, the CCIT Office of Information Security promotes awareness through education to assist with understanding, recognizing and implementing security best practices.

 

Report Security Incident
Office of Information Security Logo
Image advertising the free document shred day on Monday November 17th from 10am until 2pm at LIttlejohn.

Document Shred Day

Attendees are limited to three boxes (copy paper box or smaller) or three bags (kitchen trash bag or smaller) per vehicle. There is no need to remove binders, binder clips, paper clips, staples, rubber bands, or CDs/DVDs prior to shredding. Hard drives will not be accepted at this event.

Holding a cell phone in hands

BYOD Policy FAQ

Clemson University has a new Bring Your Own Device (BYOD) Policy. Its purpose is to make sure that your devices meet the minimum requirements before they are granted access to Clemson University IT Resources and Systems. Personally owned computing devices (“personal devices”) include desktop or laptop computers as well as mobile devices, such as cell phones or tablets, that are owned and managed by you, personally. You can visit the BYOD FAQ page for more information.

MORE

Popular Pages

Duo Authentication

Setting up Duo to enable two factor authentication to protect your Clemson users accounts.

IT Policies and Procedures

It is important to be aware of the University's procedures and standards, as well as any policy that is applicable and required in your role(s) at the University.

Data Classification

Clemson University is committed to protecting the privacy of its students, alumni, faculty and staff while protecting the confidentiality, integrity and availability of information important to the University’s mission.

Email Encryption

If you need to email Confidential or Restricted data, your email must be encrypted.

Cybersecurity Alerts

A Security Operations Center intern sitting at an desk with a computer.
Clemson Computing and Information Technology
Clemson Computing and Information Technology | 116 Sigma Dr, Clemson, SC 29634