Skip to content

Data & Analytics

Clemson University Regulations

Use of IT Resources: Employees


The purpose of this policy is to protect the Information Technology resources and the data that is contained in or manipulated by those IT resources as used in the daily employment duties of the university employee. The shift of computing resources from a centralized data center to the desktop has resulted in a corresponding shift of some of the responsibility for maintaining and safeguarding those resources to the individual employee. The equipment, software and data used by each employee are expensive and vital assets of Clemson University that it is the duty of every employee to protect. In addition, Federal and State statutes protect the privacy of much of the information available on University computer systems.

Learn more about employees’ use of IT resources.

Use of IT Resources: Students


Clemson University is dedicated to providing a safe, reliable and robust information technology infrastructure for faculty, staff and students. In doing so, there are some general expectations of acceptable use of the computing systems located or connected to Clemson University to ensure that the computing systems maintain their highest level of efficiency and reliability. Many university functions rely heavily on the accessibility of computing systems and the university must take every reasonable action to protect them.

Learn more about students’ use of IT resources.

Records Management Policy and Retention Schedules


Clemson University is required by state law to make, preserve and safeguard records (regardless of media) that document University functions, policies, and procedures in order to protect the legal and financial rights of the University and the State of South Carolina. As a state agency, all records created or received by Clemson University offices are considered public records and should be maintained and disposed of according to the Public Records Act of 1973 (amended in 1990) as it is stated in the Code of Laws of South Carolina.

Learn more about the Records Management Policy and Retention Schedules.

IT Vendor Management Policy


  1. To protect Clemson University’s interests, property, and data.
  2. To manage the responsibilities and liabilities of the acquisition of IT solutions with consideration for a myriad of potential factors including state procurement requirements, data governance, export control, compatibility, accessibility and support. 
  3. To ensure overall compatibility with current CU IT systems (infrastructure, data security, identity management, etc.), reduce duplication, and minimize financial investment.

Learn more about the IT Vendor Management Policy.

IT Security Data Classifications


Clemson University is committed to protecting the privacy of its students, alumni, faculty, and staff while protecting the confidentiality, integrity, and availability of information important to the University’s mission. To meet that commitment, the University has developed this policy which will be used to categorize University information and determine what security controls are required for related systems and applications.

Learn more about IT Security Data Classifications. 

Data Management Planning (Template)


Data Management Plans (DMPs) are a tool for understanding data requirements, managing risk, maximizing the value of your data, and understanding how your data relates to other systems at Clemson University. They will be used to phase out the existing system of Memoranda of Understanding for Data Flow. A DMP may be required as part of the IT Vendor Management assessment.

Use the Data Management Planning Template.

Memorandum of Understanding for Data Flow (deprecated)


Create, view, and, if you are an administrator, to manage Memorandums of Understanding (MOUs) for the use of data elements such as XID, address, and birth date.

Learn more about MOUs.

Data Use Agreements


A DUA is an agreement used when there is exchange of research data between organizations. The DUA will govern the terms and conditions associated with the pertinent data involved in the matter. Due to the increasing concern relating to data and data security, it is crucial to establish effective provisions in order to avoid any conflict or misunderstanding.

Learn more about Data Use Agreements.

Intellectual Property Policy


Clemson University is a land-grant university and embraces the land-grant mission of research, teaching and public service. The University encourages research and scholarship and recognizes that inventions, discoveries, and creative works may arise from the scholarly activities of the University. Clemson promotes the use of such intellectual property for the public good and encourages development and commercialization of inventions, discoveries, and creative works through patenting or copyrighting.

Learn more about the Intellectual Property Policy.

Merchant Card Services Policies


Clemson University accepts credit/debit cards for payment on a department-by-department basis in accordance with state guidelines and the payment card industry standards (PCI compliance). Departments must receive prior approval from Cash and Treasury Services to receive payments by credit/debit cards. Failure to follow university policies or a lapse in identity security may result in the suspension or revocation of the right to accept credit/debit cards payments.

Learn more about Merchant Card Services Policies

Qualtrics Terms of Use


Establish acceptable use for Qualtrics Survey Software.

Learn more about Qualtrics Terms of Use