{"id":9206,"date":"2021-11-11T15:59:30","date_gmt":"2021-11-11T20:59:30","guid":{"rendered":"https:\/\/www.bates.edu\/ils\/?page_id=9206"},"modified":"2025-04-08T08:36:09","modified_gmt":"2025-04-08T12:36:09","slug":"data-security-and-technology-protection-for-international-travel","status":"publish","type":"page","link":"https:\/\/www.bates.edu\/ils\/policies\/access-use\/data-security-and-technology-protection-for-international-travel\/","title":{"rendered":"Data Security and Technology Protection for International Travel"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">For members of the campus community, a trip to a foreign country presents unique data security challenges. The nature of international travel requires you to use your technology (laptop, tablet, or smartphone) in various unfamiliar places that may expose Bates\u2019 data and devices to malicious people and software. Following are a <\/span><span style=\"font-weight: 400;\">series of steps that you should take throughout your trip (before, during, and after) to safeguard your technology.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In addition to voluntary cybersecurity and technology protections,<\/span><span style=\"font-weight: 400;\"> international travelers need to consider US export control laws and import restrictions imposed by the destination countries. Bates\u2019 Dean of Faculty Office has a <\/span><a href=\"https:\/\/www.bates.edu\/dof\/grant-management\/export-control\/\"><span style=\"font-weight: 400;\">website<\/span><\/a><span style=\"font-weight: 400;\"> dedicated to export control that provides specific steps Faculty need to take prior to travel. <\/span><span style=\"font-weight: 400;\">US <\/span><span style=\"font-weight: 400;\">Export control laws are federal regulations that control the conditions under which certain information, technologies, and commodities can be transmitted overseas to anyone, including U.S. citizens, or to a foreign national on U.S. soil. Failure to comply with these laws can result in significant fines to you as an individual. Routine educational and research activities at Bates are generally exempt from export controls. If you have any questions about US Export control laws, please contact the Director of Sponsored Programs and Research Compliance at <\/span><a href=\"mailto:sparc@bates.edu\"><span style=\"font-weight: 400;\">sparc@bates.edu<\/span><\/a><span style=\"font-weight: 400;\">.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">If you have any questions about securing your data on your trip, please contact the Director of Information Security, Privacy, and Compliance at <\/span><a href=\"mailto:infosec@bates.edu\"><span style=\"font-weight: 400;\">infosec@bates.edu<\/span><\/a><span style=\"font-weight: 400;\">.&nbsp;<\/span><\/p>\n\n\n\n<p><b>BEFORE YOUR TRIP<\/b><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Identify if the place you will be traveling to is defined as a \u201chigh risk\u201d country by the <\/span><a href=\"https:\/\/travel.state.gov\/content\/passports\/en\/alertswarnings.html\"><span style=\"font-weight: 400;\">U.S. Department of State<\/span><span style=\"font-weight: 400;\"> as they issue <\/span><\/a><span style=\"font-weight: 400;\">current travel advisories and alerts that may affect your travel. The State Department establishes risk indicators based upon crime, terrorism, civil unrest, health, natural disaster, etc. While not specific to data security the State Department <\/span><span style=\"font-weight: 400;\">describes the risks and provides clear actions we should take to help ensure our safety. Follow the State Department&#8217;s recommendation for whichever country you intend to visit.&nbsp;<\/span>\n<ol class=\"wp-block-list\">\n<li><b>Beginning May 5, 2022<\/b><span style=\"font-weight: 400;\"> &#8211; If you are visiting any of the following countries\/regions please contact the Support Desk so you can have your Duo account put into bypass mode &#8211; this will allow you to access Bates resources without needing to use Duo\u2019s Two-Factor Authentication.<\/span>\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Cuba<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">North Korea<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Iran<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Sudan<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Syria<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Crimea region<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Sevastopol region<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Donetsk region<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Luhansk region<\/span> <\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">The following nations restrict the import of encrypted devices and do not recognize a &#8220;personal use exemption&#8221;.<\/span> <span style=\"font-weight: 400;\">A group of nations negotiated a set of rules attempting to facilitate traveling with encryption software known as the &#8220;Wassenaar Arrangement.&#8221;&nbsp; One of its provisions allows a traveler to freely enter a <\/span><a href=\"https:\/\/www.wassenaar.org\/participating-states\/\"><span style=\"font-weight: 400;\">participating country<\/span><\/a><span style=\"font-weight: 400;\"> with an encrypted device under a &#8220;personal use exemption&#8221; as long as the traveler does not create, enhance, share, sell or otherwise distribute the <\/span><span style=\"font-weight: 400;\">encryption technology while visiting.<\/span><span style=\"font-weight: 400;\"> In general, low-risk countries, e.g., the EU, Australia, and Canada are safe. If traveling to one of the following countries, it is best to leave your laptop home and consult with the <\/span><a href=\"https:\/\/bates.teamdynamix.com\/TDClient\/75\/Portal\/Home\/\"><span style=\"font-weight: 400;\">Bates IT Service Desk<\/span><\/a><span style=\"font-weight: 400;\"> to borrow a loaner laptop for your trip.&nbsp;<\/span><\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><span style=\"font-weight: 400;\">Belarus<\/span><\/td><td><span style=\"font-weight: 400;\">Hungary<\/span><\/td><td><span style=\"font-weight: 400;\">Morocco<\/span><\/td><td><span style=\"font-weight: 400;\">Sudan<\/span><\/td><\/tr><tr><td><span style=\"font-weight: 400;\">Burma (Myanmar)<\/span><\/td><td><span style=\"font-weight: 400;\">Iran<\/span><\/td><td><span style=\"font-weight: 400;\">North Korea<\/span><\/td><td><span style=\"font-weight: 400;\">Syria<\/span><\/td><\/tr><tr><td><span style=\"font-weight: 400;\">China<\/span><\/td><td><span style=\"font-weight: 400;\">Kazakhstan<\/span><\/td><td><span style=\"font-weight: 400;\">Russia<\/span><\/td><td><span style=\"font-weight: 400;\">Ukraine<\/span><\/td><\/tr><tr><td><span style=\"font-weight: 400;\">Cuba<\/span><\/td><td><span style=\"font-weight: 400;\">Moldova<\/span><\/td><td><span style=\"font-weight: 400;\">Saudi Arabia<\/span><\/td><td>&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Regardless of where you are going abroad, be sure your Bates laptop is configured with Bates\u2019 VPN software. Using the VPN will allow you to access campus resources (e.g., campus network drives, Banner). Consult with <\/span><a href=\"https:\/\/bates.teamdynamix.com\/TDClient\/75\/Portal\/Home\/\"><span style=\"font-weight: 400;\">Bates IT Service Desk<\/span><\/a><span style=\"font-weight: 400;\"> for assistance.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Backup your data.&nbsp; Whether you are traveling with a loaner computer, your regular computer, tablet, or smartphone, you should always backup your data. Consider moving your documents pertaining to Bates to a College-provided folder (i.e., Google Drive) that you can access remotely instead of carrying these files on your local device(s).&nbsp;<\/span><\/li>\n<\/ol>\n\n\n\n<p><b>DURING YOUR TRIP<\/b><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Do NOT leave your device unattended, especially in your checked bag on your flight. If you ever leave your computer, make sure to turn it off completely instead of just hibernating it or putting it to sleep. When the computer is off, it is fully encrypted.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Connect only to known wifi networks. Anyone can create a network and give the network a legitimate-sounding name, hoping to lure unsuspecting travelers to connect while capturing personal information transmitted through the network. This is especially prevalent at public cafes, hotel lobbies, and airports.&nbsp; When connecting to a network, find out the correct network name from the staff at the business and connect to it.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Use EDUROAM where available. It provides easy, secure connectivity from thousands of hotspots across more than 100 countries. Eduroam (education roaming) is the secure, worldwide roaming access service developed for the international research and education community. Eduroam allows students, researchers, and staff from participating institutions to obtain Internet connectivity across campus and when visiting other participating institutions.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Turn off your wifi when not in use. Attackers can easily spoof Wifi network names to connect to devices within range for eavesdropping. To help you avoid accidentally connecting your device to rogue wifi networks at a later time, once you are finished using the network, turn off wifi on your device.<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">Do NOT enter your credentials into public computers. Public computers such as hotel business center workstations and internet cafe computers are often poorly managed and provide minimal security protection for their users.&nbsp;<\/span><\/li>\n\n\n\n<li><span style=\"font-weight: 400;\">US Customs and Border Protection may request that you be subject to an inspection of your electronic devices for a variety of reasons. Please review their <a href=\"https:\/\/www.cbp.gov\/sites\/default\/files\/assets\/documents\/2023-Oct\/Border%20Search%20of%20Electronic%20Devices%20Tearsheet.pdf\">Quick Reference<\/a> to familiarize yourself with the process.&nbsp;<\/span><\/li>\n<\/ol>\n\n\n\n<p><b>UPON YOUR RETURN HOME<\/b><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><span style=\"font-weight: 400;\">Upon returning home and returning your loaner device, change any passwords you used while you were traveling. Use a trusted computer, whether it\u2019s your own or one provided by the IT support staff, to reset credentials that were used during the trip. For example, if you use your Bates credentials during the trip, go to the <\/span><a href=\"https:\/\/bates.teamdynamix.com\/TDClient\/75\/Portal\/Home\/\"><span style=\"font-weight: 400;\">Bates IT Service Desk website <\/span><\/a><span style=\"font-weight: 400;\">to reset your Bates password.<\/span><\/li>\n<\/ul>\n\n\n\n<p><a href=\"https:\/\/www.bates.edu\/ils\/files\/2025\/04\/Technology-Protection-for-International-Travel-2025.pdf\" data-type=\"link\" data-id=\"https:\/\/www.bates.edu\/ils\/files\/2025\/04\/Technology-Protection-for-International-Travel-2025.pdf\">PDF Version<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p><sup>Data Security and Technology Protection for International Travel, <\/sup><sup>Version 1.2, Updated: April 8, 2025, <\/sup><sup>Effective: November 11, 2021<\/sup><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For members of the campus community, a trip to a foreign country&hellip;<\/p>\n","protected":false},"author":126,"featured_media":0,"parent":211,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_hide_ai_chatbot":false,"_ai_chatbot_style":"","associated_faculty":[],"_Page_Specific_Css":"","_bates_restrict_mod":false,"_dimp_site_id":"","_dimp_override_contact":false,"_table_of_contents_display":false,"_table_of_contents_location":"","_table_of_contents_disableSticky":false,"_is_featured":false,"footnotes":"","_bates_seo_meta_description":"","_bates_seo_block_robots":false,"_bates_seo_sharing_image_id":0,"_bates_seo_sharing_image_twitter_id":0,"_bates_seo_share_title":"","_bates_seo_canonical_overwrite":"","_bates_seo_twitter_template":""},"class_list":["post-9206","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/pages\/9206","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/comments?post=9206"}],"version-history":[{"count":6,"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/pages\/9206\/revisions"}],"predecessor-version":[{"id":9578,"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/pages\/9206\/revisions\/9578"}],"up":[{"embeddable":true,"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/pages\/211"}],"wp:attachment":[{"href":"https:\/\/www.bates.edu\/ils\/wp-json\/wp\/v2\/media?parent=9206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}