  {"id":691,"date":"2020-06-04T13:50:25","date_gmt":"2020-06-04T23:50:25","guid":{"rendered":"https:\/\/www.hawaii.edu\/testinfosec\/?page_id=691"},"modified":"2021-11-15T11:58:40","modified_gmt":"2021-11-15T21:58:40","slug":"international-travel","status":"publish","type":"page","link":"https:\/\/www.hawaii.edu\/infosec\/international-travel\/","title":{"rendered":"International Travel"},"content":{"rendered":"<h2><i class=\"fa fa-1x fa-suitcase\" aria-hidden=\"true\"><\/i> Before You Go<\/h2>\n<h3>Restrictions on Encryption<\/h3>\n<p>Keep in mind that encryption is heavily controlled or restricted in many countries.  If you bring devices containing encrypted data or encryption software to certain countries, you could risk imprisonment or the confiscation of your devices. If you are not able to meet the import or export requirements, you should remove the encryption software and encrypted data from your devices, as to not risk violating compliance requirements in these countries.<\/p>\n<h4><i class=\"fa fa-1x fa-exclamation-triangle\" aria-hidden=\"true\"><\/i> Encryption cautions:<\/h4>\n<ul>\n<li>Review your destination country&#8217;s specific policies on encryption before traveling with an encrypted device.<\/li>\n<li>Back up your data before you encrypt it. Remember your encryption key\/password. If you lose it, all of your data may be lost.<\/li>\n<li>Encryption is not necessarily a guarantee of security. With time, someone in possession of your device may eventually break the encryption.<\/li>\n<li>International travelers can be required to decrypt devices and files at border crossings, including when leaving or re-entering the USA. The best advice is to not carry information (encrypted or not) that would be a problem for others to obtain or access.<\/li>\n<\/ul>\n<h3>Security Tips<\/h3>\n<ul>\n<li>Secure your accounts and devices with strong passwords, multi-factor authentication, and lock screens whenever possible. Never store passwords or sign-on sequences on any device or in its case.<\/li>\n<li>Download current, up-to-date antivirus, spyware protection, security patches, and a personal firewall. Make sure your software is up-to-date before your trip.<\/li>\n<li>In case your device becomes lost or stolen, enable device finder\/tracking software, (\u201cFind My Phone\u201d) so you are able to locate it. Turn on remote wipe abilities and familiarize yourself on how to do this in case you need to.<\/li>\n<li>Turn off printer-sharing and file-sharing applications. Disable Bluetooth, Wi-Fi, and near field communication (NFC) when you are not using them.<\/li>\n<p><!--More specific tips--> <\/p>\n<li>Only bring the devices and information you absolutely need &#8211; traveling lightly will decrease chances of anything being lost or stolen.<\/li>\n<li>Consider downsizing. For example, if you are giving a presentation during your trip, consider storing the presentation materials on a memory stick\/USB instead of a laptop. If you use your own USB in a foreign computer, assume you\u2019ve been compromised and have your device cleaned as soon as you can.<\/li>\n<li>If possible, use a temporary loaner device designated just for traveling, such as an inexpensive laptop or a prepaid cell phone.<\/li>\n<li>Avoid taking your work or personal devices with you on your trips, but if you must, be sure to encrypt (if feasible) or remove sensitive information.<\/li>\n<li>Back up any important data on your devices on an external drive that you leave at home in a safe place.<\/li>\n<li>Refrain from posting photos or status updates about your travel plans and arrangements until you are back home. This could inadvertently let people know that you aren&#8217;t at home.<\/li>\n<p><!--Kinda cybersecurity related--> <\/p>\n<li>Determine if you need country specific plug adapters or converters for your devices.<\/li>\n<li>Review your cell phone coverage and international data plan options.<\/li>\n<\/ul>\n<p><!--verify your vpn remote access is working. be aware though that some countries block vpn.--><\/p>\n<h2><i class=\"fa fa-1x fa-plane\" aria-hidden=\"true\"><\/i> While You Are Traveling<\/h2>\n<p>If your device or information is stolen, report it immediately to the appropriate authorities, such as the local US embassy or consulate.<\/p>\n<h3>Wi-Fi<\/h3>\n<ul>\n<li>Avoid Wi-Fi networks if possible; certain countries have legal environments and policies that permit them to record anything and everything, from cellular calls to internet traffic.<\/li>\n<li>Before you connect to any public wireless hotspot, confirm the name of the network and login procedures with appropriate staff to ensure that the network is legitimate.<\/li>\n<li>Avoid sensitive activities (e.g. shopping, banking) that require passwords or credit cards, especially on public Wi-Fi. Your personal hotspot is usually a safer alternative to free Wi-Fi.<\/li>\n<li>Only use sites that begin with &#8220;https:\/\/&#8221; and have a lock icon in the web address or status bar, which means the site is verified and encrypted.<\/li>\n<li>Never use your browser&#8217;s auto-login (&#8220;remember me&#8221;) or username and password auto-fill features.<\/li>\n<li>After each session, always clear your browser: delete the browser history, caches, cookies, URL, passwords, and temporary internet files.<\/li>\n<li>Beware of phishing: Do not open emails, attachments, or click links from unknown sources. Be extremely cautious about abnormal requests, links, and files in emails from people you know. Report suspicious emails to the appropriate authorities. To learn more, read our <a href=\"\/infosec\/phishing\/\">article on phishing<\/a> and <a href=\"\/infosec\/spearphishing\/\">article on spearphishing<\/a>.<\/li>\n<li>Do not download any files, software, or data unless you absolutely must.<\/li>\n<li>Terminate connections when you\u2019re not using them.<\/li>\n<\/ul>\n<p><!--If you need to access important data at home, cloud services such ... may help.--> <\/p>\n<h3>Physical Security<\/h3>\n<ul>\n<li>Always keep your devices with you \u2014 never leave equipment or devices unattended.<\/li>\n<ul>\n<li>Carry them on your person or keep them within your sight. Avoid storing devices underneath your seat or in the front pocket of your seat. Devices can easily become lost or stolen, especially if you step away or fall asleep.<\/li>\n<li>Avoid transporting devices in checked baggage \u2014 checked baggage can be lost, stolen, or stolen from.<\/li>\n<\/ul>\n<li>Do not use storage devices (e.g. USB, disks) given to you \u2013 they may be compromised.<\/li>\n<li>Shield passwords from view. Try not to display passwords or other sensitive information in plaintext while you are using your device.<\/li>\n<li>Be aware of shoulder surfers looking at your screen, especially in public areas. Consider using a polarizing screen filter.<\/li>\n<li>Disable location tracking services such as GPS and geotagging when you\u2019re not actively using them. These services can inadvertently allow someone to see where you are\u2014and where you aren\u2019t\u2014 at any given time.<\/li>\n<li>Consider only using cash during your trip. This way, you are less at risk of a malicious person obtaining your credit card information.<\/li>\n<\/ul>\n<p><!-- Recently, researchers at DEF CON (a hacking conference) demonstrated that public charging stations, such as those typically found in airports or other public places, are vulnerable to attack. Hackers could potentially plant a USB cable that captures information about anything plugged into it. While this method of attack doesn\u2019t appear to be rampant, it is less risky if you have your own source of power to recharge your devices. --> <\/p>\n<h2><i class=\"fa fa-1x fa-home\" aria-hidden=\"true\"><\/i> When You Return<\/h2>\n<ul>\n<li>Review banking and credit card statements for suspicious or unauthorized transactions.<\/li>\n<li>Change any passwords that you used during your vacation.<\/li>\n<li>Run full antivirus scans on your devices.<\/li>\n<li>Remove any apps you downloaded during your trip that you no longer need.<\/li>\n<\/ul>\n<h2><i class=\"fa fa-1x fa-globe\" aria-hidden=\"true\"><\/i> Related Âé¶¹´«Ã½Policy<\/h2>\n<p>Please read the <a href=\"https:\/\/www.hawaii.edu\/offices\/risk-management\/international-travel\/\">Office of Risk Management guidelines <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>.<\/p>\n<p>According to <a href=\"http:\/\/www.hawaii.edu\/policy\/index.php?action=viewPolicy&amp;policySection=ap&amp;policyChapter=8&amp;policyNumber=851&amp;menuView=open\">AP 8.851 &#8211; Employee Out-of-State and Intra-State Travel <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>, individuals traveling to sanctioned countries must coordinate their travel and activities with the <a href=\"https:\/\/researchcompliance.hawaii.edu\/programs\/export-controls\/\">Âé¶¹´«Ã½Office of Export Controls (&#8220;Âé¶¹´«Ã½OEC&#8221;) <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>. Refer to the <a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/Pages\/default.aspx\">Office of Foreign Assets Controls Sanctions Programs and Country Information <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a> for list of current sanctioned countries.<\/p>\n<p>Be aware of export policies including <a href=\"https:\/\/www.hawaii.edu\/policy\/?action=viewPolicy&amp;policySection=Ep&amp;policyChapter=12&amp;policyNumber=218\">EP 12.218 &#8211; Compliance with United States Export Control Laws and Regulations <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a>.<\/p>\n<h2><i class=\"fa fa-1x fa-book\" aria-hidden=\"true\"><\/i> Additional Resources<\/h2>\n<p>Review the US Department of State Traveler&#8217;s Checklist at <a href=\"http:\/\/travel.state.gov\/content\/passports\/en\/go\/checklist.html\">http:\/\/travel.state.gov\/content\/passports\/en\/go\/checklist.html <i class=\"fa fa-external-link\" aria-hidden=\"true\"><\/i><\/a> including the detailed country information search tool at the bottom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before You Go Restrictions on Encryption Keep in mind that encryption is heavily controlled or restricted in many countries. If you bring devices containing encrypted data or encryption software to certain countries, you could risk imprisonment or the confiscation of &hellip; <\/p>\n","protected":false},"author":86,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-onecolumn.php","meta":{"footnotes":""},"class_list":["post-691","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/comments?post=691"}],"version-history":[{"count":19,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/691\/revisions"}],"predecessor-version":[{"id":1595,"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/pages\/691\/revisions\/1595"}],"wp:attachment":[{"href":"https:\/\/www.hawaii.edu\/infosec\/wp-json\/wp\/v2\/media?parent=691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}