Skip to content

Controller's Office

Red Flags Rule and Gramm-Leach-Bliley Programs

Clemson University has a written identity theft prevention program designed to detect warnings signs (or "red flags") of identity theft in day-to-day operations. In addition, the University has implemented safeguards to ensure the security and confidentiality of certain non-public customer information. The Gramm-Leach-Bliley Act protects certain private information identifiable to individuals that is obtained when the University offers or delivers a financial product or service to them. Learn more information about the University's Cybersecurity policies.

The purpose of the Red Flags Program is to identify, detect and appropriately respond to red flags that may indicate suspected or real incidents of identity theft upon the University, its employees, its students, its constituents and its customers, and to ensure the compliance with the Federal Trade Commission’s Red Flags Rule regulations. The requirements of this program apply to Clemson University, to the employees and the third parties with whom Clemson contracts to perform certain functions on its behalf for covered accounts, such as student payment plans, federal loan programs and background checks for employment.

Identity theft is defined as fraud committed or attempted using the identifying information of another person without authority. Identifying information is any name or number that may be used, alone or in conjunction with any other information, to identify a specific person, including, but not limited to:

  • Name
  • Address
  • Telephone number
  • Social security number
  • Date of birth
  • Government-issued driver’s license or identification number
  • Alien registration number
  • Government passport number
  • Individual identification number
  • Bank or other financial account routing code

Please familiarize yourself with this program further by taking the Red Flags Rules training, reading Clemson’s Red Flags Rule Program and reviewing the examples of Red Flag indicators below. If you determine that a Red Flag has been found, follow the steps outlined in Responding to Red Flags PDF below.

For more information, contact: