The Bring Your Own Device (BYOD) policy was approved on September 25, 2024, and the policy strengthens the security of Clemson University’s data in a landscape where cybersecurity threats have increased globally.
For some faculty, staff and students, this policy does not have a noticeable effect on daily routines or interactions with Clemson resources because security requirements may already be met. For those who bring their personal devices to campus or use their personal devices (including laptops, desktops, or mobile phones) to access Clemson’s IT resources from non-campus locations, there may be some critical steps to follow to ensure compliance with the new policy.
How does the BYOD policy impact users?
The BYOD policy reminds users that their personal devices must meet minimum security requirements to gain access to Clemson’s information systems to help safeguard Clemson resources. BYOD also reminds faculty, staff and students that they are not permitted to download classified or protected information on personal devices, and doing so could violate laws and other policies.
Clemson University will not have access to a user’s personal information on personal devices. The BYOD policy’s processes involve checking the device’s security settings to ensure the requirements for accessing Clemson’s IT resources are met. Once checked, access will be permitted if the device meets the requirements. Access will not be granted if the device fails the security settings check.
What are the requirements for policy compliance?
The Office of Information Security created a FAQ webpage to help address common questions about the policy. Access the page for more detailed information. Generally,
- For university-sanctioned devices, users ensure that all security and software updates are made on time and follow the proper guidelines while interacting with sensitive information. University-sanctioned devices must be managed. To verify this, contact the CCIT Consultant for your area.
- For personal devices, users should ensure their system(s) meet the operating system requirements, have enabled the proper passcodes or password protections and comply with two-factor authentication. Users must not download any Clemson University business data to their personal devices. Personal devices may only be used to view Clemson University business data.
Compliance with this new policy helps keep Clemson University’s IT resources and systems more secure. Contact the IT Support Center at ithelp@clemson.edu or call (864) 656-3494 for more information.