Cybersecurity

Overview

As a researcher, international travel can be essential for collaboration, conferences, and fieldwork. However, venturing abroad also presents unique cybersecurity and export control challenges. The information below equips you with the knowledge and resources to navigate these complexities and ensure a secure and compliant trip. 

Before you Travel

Step1

Assess Export Control Risks

  • Consult UCSF Export Control to determine if your research, data, or planned activities involve export-controlled technologies or information. This includes:
    • ITAR (International Traffic in Arms Regulations) for defense-related items.
    • EAR (Export Administration Regulations) for dual-use items with civilian and military applications. 
  • If applicable, obtain the necessary export licenses or authorizations before departure. 

Step2

Secure Your Devices

  • Minimize sensitive data: Remove any confidential research data, intellectual property, or restricted information from devices you bring. 
  • Update and encrypt: Ensure your devices are running the latest security patches and use strong encryption software to protect sensitive data. 
  • Consider using a travel device: Utilize a dedicated laptop or mobile device for your trip that doesn't contain sensitive information. 

Step3

Research Destination Laws and Regulations

  • Familiarize yourself with the cybersecurity laws and regulations of your destination country. 
  • Be aware of potential restrictions on data storage, encryption, and internet access.

While Traveling

Step1

Be Wary of Public Wi-Fi

  • Avoid accessing sensitive information or conducting research activities on public Wi-Fi networks. 
  • Utilize a Virtual Private Network (VPN) to encrypt your internet connection and protect your data.

Step2

Be Mindful of Physical Security

  • Keep your devices with you at all times and avoid leaving them unattended in public places. 
  • Be cautious of physical theft and implement strong password protection on your devices.

Step3

Practice Smart Online Habits

  • Avoid using public computers or unsecured networks for sensitive activities. 
  • Be cautious of opening attachments or clicking on links from unknown senders.
  • Beware of phishing scams that attempt to steal your credentials or personal information. 

Step4

Be Mindful of What You Share

  • Exercise discretion when discussing research details or sensitive information in public settings. 
  • Avoid sharing export-controlled information without proper authorization. 

Step5

Back Up Your Data:

  • Regularly back up your important data to a secure cloud storage service or external drive. 
  • Consider leaving a copy of your backup data at home in case of device loss or theft. 

Upon Return

Step1

Scan and Report

  • Scan your devices for malware: Conduct a thorough scan of your devices for any potential malware or security threats acquired during your travels. 
  • Report any security incidents: Inform UCSF IT Security external site (opens in a new window) or UCSF Export Control of any suspicious activity or security breaches encountered while abroad.