Skip to content

Cybersecurity

Cybersecurity

Clemson University’s Office of Information Security is committed to protecting the confidentiality, integrity, and availability of information for its faculty, staff and students. To support these goals, the CCIT Office of Information Security promotes awareness through education to assist with understanding, recognizing and implementing security best practices.

 

Report Security Incident
Office of Information Security Logo
Hand holding a phone that is displaying text that says - Scam! IRS calling

IRS Scams

Because it is tax season, cybercriminals are increasing their use of Internal Revenue Service (IRS) themed scams. Please be aware that the IRS will never contact taxpayers directly by email, text messages or phone calls. Instead, they will contact you by letter sent through the U.S. Postal Service.

More Information

AI Guidlines

These guidelines provide practical direction for using generative AI safely and responsibly, including guidance that applies to both publicly available AI services and Clemson-approved, contract-protected AI services.

More
graphical technology image with hand holding the letters AI
Holding a cell phone in hands

Bring Your Own Device Policy FAQ

Clemson University has a new Bring Your Own Device (BYOD) Policy. Its purpose is to make sure that your devices meet the minimum requirements before they are granted access to Clemson University IT Resources and Systems. Personally owned computing devices (“personal devices”) include desktop or laptop computers as well as mobile devices, such as cell phones or tablets, that are owned and managed by you, personally. You can visit the BYOD FAQ page for more information.

Bring Your Own Device Policy and FAQs

Popular Pages

Duo Authentication

Setting up Duo to enable two factor authentication to protect your Clemson users accounts.

IT Policies and Procedures

It is important to be aware of the University's procedures and standards, as well as any policy that is applicable and required in your role(s) at the University.

Data Classification

Clemson University is committed to protecting the privacy of its students, faculty and staff while protecting the confidentiality, integrity and availability of information important to the University’s mission.

Quarantined Email

Clemson University's email system will quarantine any suspicious email. Users can release some emails themselves and request the release of high confidence phishing emails by using the Release Quarantined Email Service in the TigerHUB system.

Cybersecurity Alerts

Clemson students working on laptop computers
Clemson Computing and Information Technology
Clemson Computing and Information Technology | 116 Sigma Dr, Clemson, SC 29634