Overview
As a researcher, international travel can be essential for collaboration, conferences, and fieldwork. However, venturing abroad also presents unique cybersecurity and export control challenges. The information below equips you with the knowledge and resources to navigate these complexities and ensure a secure and compliant trip.
Before you Travel
Step1
Assess Export Control Risks
- Consult UCSF Export Control to determine if your research, data, or planned activities involve export-controlled technologies or information. This includes:
- ITAR (International Traffic in Arms Regulations) for defense-related items.
- EAR (Export Administration Regulations) for dual-use items with civilian and military applications.
- If applicable, obtain the necessary export licenses or authorizations before departure.
Step2
Secure Your Devices
- Minimize sensitive data: Remove any confidential research data, intellectual property, or restricted information from devices you bring.
- Update and encrypt: Ensure your devices are running the latest security patches and use strong encryption software to protect sensitive data.
- Consider using a travel device: Utilize a dedicated laptop or mobile device for your trip that doesn't contain sensitive information.
Step3
Research Destination Laws and Regulations
- Familiarize yourself with the cybersecurity laws and regulations of your destination country.
- Be aware of potential restrictions on data storage, encryption, and internet access.
While Traveling
Step1
Be Wary of Public Wi-Fi
- Avoid accessing sensitive information or conducting research activities on public Wi-Fi networks.
- Utilize a Virtual Private Network (VPN) to encrypt your internet connection and protect your data.
Step2
Be Mindful of Physical Security
- Keep your devices with you at all times and avoid leaving them unattended in public places.
- Be cautious of physical theft and implement strong password protection on your devices.
Step3
Practice Smart Online Habits
- Avoid using public computers or unsecured networks for sensitive activities.
- Be cautious of opening attachments or clicking on links from unknown senders.
- Beware of phishing scams that attempt to steal your credentials or personal information.
Step4
Be Mindful of What You Share
- Exercise discretion when discussing research details or sensitive information in public settings.
- Avoid sharing export-controlled information without proper authorization.
Step5
Back Up Your Data:
- Regularly back up your important data to a secure cloud storage service or external drive.
- Consider leaving a copy of your backup data at home in case of device loss or theft.
Upon Return
Step1
Scan and Report
- Scan your devices for malware: Conduct a thorough scan of your devices for any potential malware or security threats acquired during your travels.
- Report any security incidents: Inform UCSF IT Security external site (opens in a new window) or UCSF Export Control of any suspicious activity or security breaches encountered while abroad.