Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Purpose

As you travel or work remotely, you will encounter untrusted or public infrastructure, as well as an increased risk of loss or theft, so it is important to prepare for these additional risks to ensure that your data confidential, intact, and available when you need it.  


Audience

Status
titlefaculty
Status
colourBlue
titleresearchers
Status
colourRed
titleAdmin staff
Status
colourPurple
titleIT staff
Status
colourGreen
titlestudents


On this page

Expand
titleExpand to view table of contents.
Table of Contents
minLevel1
maxLevel4
outlinefalse
styledefault
excludePurpose|Audience|On this page|Search|Additional help|Related articles
typelist
printablefalse

Initial considerations

Note

Be aware of jurisdictional and legal borders.

Travelling with data.

Foreign data security restrictions.


What can I do?

Note

If you believe a security incident occurs whether in the office, while working remotely, or while travelling, report it.

Report a security event or incident

Consult the safeguarding your data while travelling tip sheet.

Before you travel

  1. Make sure the software on all your travel devices is up to date. Updates to your computer software and mobile device applications will work to fix known security gaps. Ensure that your virus and malware protection is up-to-date as well.

  2. Empty the devices you will take with you. You should not travel with confidential data on your mobile phone and computer. Create temporary online data stores with only the data you need for the trip.

  3. Use a “burner” device. Burners are inexpensive devices that can be used on a temporary basis when travelling. If you choose to bring your own personal devices, back up your information with a cloud service or a secure device you leave at home.

  4. Before you depart, turn off “remember me” and wipe stored passwords from all travel device applications and browsers. Change your existing device and online account passwords to temporary travel passwords. To keep secure records of your new passwords, use a password manager such as 1Password or Bitwarden.

  5. If you need to bring a portable hard drive or USB drive with you, ensure the devices are trusted and encrypted. Never use an unfamiliar or untrusted device for this purpose.

  6. Make sure all devices and accounts are protected by strong passwords. Where possible, set up multi-factor authentication (also known as MFA, 2FA, two-factor authentication and two-step authentication). This will ensure that the only person with access to your accounts is you.

    1. Passwords, passphrases and passkeys

  7. Ensure you have the departmental authorization to take data off-site. Always check with your departmental contact first.

As you travel

  1. Keep your devices with you at all times. Pay extra attention at airport screening and other security checkpoints, and never leave your belongings unattended at conferences.

  2. Turn off auto-connect for Bluetooth and Wi-Fi. This will prevent your devices from connecting to unsecured and potentially malicious wireless networks.

  3. Avoid using untrusted wireless networks such as those at hotels, airports and coffee shops to conduct University-related business.

  4. Use a virtual private network (VPN) such as UTORvpn before connecting to any University or personal online service. Check with your department when creating your travel security plan as not all VPNs will work in all countries.

  5. When travelling, access your confidential files via O365’s M365’s web interface. The system is designed to maintain the University’s data security.

  6. Do not use unfamiliar devices. Avoid publicly accessible computers, and do not plug in unknown and untrusted devices such as USB drives and power chargers.

  7. In case of loss, make sure you know how to remotely wipe your personal devices. Travel with a copy of your cellular provider’s toll-free phone number so you can quickly have service suspended or blocked. You can also set your mobile lock screen to a photo of your emergency contact information to facilitate retrieval in the case of a lost device.

  8. Practice the same caution you would at home. Do not download or click links from untrusted sources, and delete emails that seem suspicious.

  9. When you return, use a trusted device to change all the passwords you used while travelling.

Consult the Remote Security Matters site.

Consult additional guidance documents.

Canadian Centre for Cyber Security

Universities Canada

Australian Cyber Security Centre


Page Properties
hiddentrue

Name

Role

Date

Michael Laurentius

Author

Approver (Manager)

Reviewer

Live Search
spaceKeyISH
sizelarge
additionalpage excerpt
placeholderHow do I...


Additional help

General

https://handbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/Contact+us#Information-Security-(IS)

https://handbook.security.utoronto.ca/wiki/spaces/ISH/pages/4948958/Contact+us#Information-Technology-(IT)

Researchers

https://security.utoronto.ca/services/research-information-security-program/


Filter by label (Content by label)
showLabelsfalse
max10
maxCheckboxfalse
showSpacefalse
reversefalse
excerptTypesimple
cqllabel in ( "transit" , "travel" , "remote" , "encrypt" ) and title !~ "travel"