Procedure for Preparing Your Technology for International Travel

Effective Date/Issuing Authority

Effective Date: May 1, 2018
Last Review Date: March 29, 2023
Issuing Authority: Office of Information Security

Overview

When preparing to travel internationally, it is essential to take proactive measures to ensure uninterrupted access to Temple resources and to protect sensitive/confidential data from falling into the wrong hands. Consider what would happen if your device was hacked, inspected, confiscated, stolen or lost.

Also, make sure to comply with regulations that cover certain types of research and other sensitive/confidential data. Employees should always start by securing their device(s) using the general security practices described in the guidelines below.

In addition to these technology guidelines, employees should also refer to the following:

Before You Travel

  • Get ready to use Multi-Factor Authentication (MFA) abroad. Visit the Multi-Factor Authentication webpage for tips on how to prepare.
     
  • Contact the Technology Support Center at (215)-204-8000 to verify whether your AccessNet password will expire during your trip. If it is slated to expire, reset the password a few days ahead of your pending travel to ensure that you don’t have authentication issues.
     
  • Set up remoteproxy.temple.edu access so that you can access your desktop office computer before you leave. For instructions, see the Remote Proxy webpage. Test the connection process before leaving. If you need assistance, contact the Technology Support Center prior to departure.
    ​​​​​​​
  • Securely back up data stored on your device(s) or media and make sure to leave your backups in a safe location at home.
    ​​​​​​​
  • Always use screen lockout when not using your device along with a required password or passcode to unlock it.

Traveling to High-Security Risk Countries

 

Please consult with the university Finance office to help determine the risk of traveling to your planned destination.

When arranging travel plans, it is important for Temple University community members to consider the restrictions imposed on U.S.-based cloud service providers regarding embargoed or sanctioned countries and regions. Due to these regulations, certain Temple university applications such as Duo (Multi-Factor Authentication), Canvas and Zoom will not be accessible when traveling to these destinations. Information Technology Services encourages Temple community members to prepare accordingly.

When traveling to a high-risk (embargoed, sanctioned, etc.) country, see the Information Technology Services (ITS) recommendations below:

  • Take loaner equipment. Ask your school, college or unit IT support group for a loaner laptop or other devices. Limit the data on the loaner device to only the essentials. This is especially important if you are visiting a country with encryption import restrictions that prevent you from encrypting data on your device. (See Use Caution When Traveling With Encryption Software.)  Please be aware that certain countries have export control regulations and that an encrypted device may be confiscated upon entering or leaving one of these countries.
     
  • Do not save confidential or sensitive personal information such as Social Security numbers, credit card numbers, or passport information on your devices. Make sure your devices are cleansed of this information.
     
  • Do not take any data protected by federal or state regulations or which might raise proprietary, ethical or privacy concerns.
     
  • Do not use cloud sync applications such as OneDrive sync.
     
  • Check for restrictions. Determine if there are sanctions or local laws that will affect your access to Temple resources.
     
  • Prepare for blocked applications or websites: Be advised that some countries actively block many sites, including Facebook, Google and Zoom among other popular applications. You may run into problems using Temple resources while you are there.
     
  • When connecting to the internet it is best practice to:
    • Assume that any computer network you use is insecure, including those of friends you are staying with, in business centers, at cyber-cafes, or in libraries.
    • Turn off wireless and Bluetooth when you are not using them.
    • Never enter or access sensitive/confidential data.
    • Never accept software updates on hotel internet connections or other public Wi-Fi connections.
    • Be aware that some governments may copy data from your computer, log your internet activity and/or listen to your phone conversations without your knowledge or consent.
       
  • Keep your devices with you and physically secured. Whenever possible, keep your devices close rather than leaving them behind in hotel rooms; if your hotel has a safe, use it.
     
  • Use your web browser's private browsing or incognito features. This will ensure your online activity is not stored locally on your device. Check your browser's Help for instructions (e.g., Google Chrome: Ctl+Shift+N).
     
  • When you are not using your devices, turn them off.
     
  • Do not plug devices into public charging stations. Such stations can transfer malware to your device or download data from it. Instead, use your own charging cable to plug into an electrical outlet.
     
  • Do not accept USB thumb drives or other removable media from any source.
     
  • If an authority from another country wants to confiscate the device, give it to them so as not to put yourself at risk.
    ​​​​​​​
  • If your device is lost, stolen or confiscated, report it as an IT security incident or call the Technology Support Center at 1-215-204-8000.
    • Faculty, staff and researchers traveling abroad are required to immediately report suspected or actual breaches or compromises of confidential or sensitive university data. This includes incidents involving loss, theft, or breach of personally owned devices that store or handle confidential or sensitive data.
    • Contact local authorities or US Embassy to report the loss, theft or confiscation.

When You Get Back

Be aware that criminals may be far more interested in the confidential or sensitive data you have access to than any data you may have carried with you. Without your knowledge, someone may have hacked into your computer or other devices or stolen your password. Upon returning:

  • Reset your device back to factory settings. If you have visited an embargoed or other high-security risk countries, reset the devices you have taken. Your school, college or unit IT support group can assist you with this process.
    ​​​​​​​
  • Change your AccessNet password immediately.