Atlassian uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. Accept all cookies to indicate that you agree to our use of cookies on your device. Atlassian cookies and tracking notice, (opens new window)
U of T Information Security
Information Security Handbook

Information Security Handbook
Results will update as you type.
  • Getting started
  • Strategies
  • How-tos
    • Back up data
    • Baselines and configurations
    • Classify data
    • Computing or storage environment for research
    • Cyber security alerts and advisories
    • Data collection and survey management
    • Data integrity
    • Delete or destroy data and devices
    • Encrypt data and devices
    • Passwords, passphrases and passkeys
    • Physically secure data and devices
    • Remote interviews
    • Report a security event or incident
    • Safe web browsing
    • Security awareness training
    • Send, share or transfer data
    • Synchronize system's time with a U of T time server
    • Travel or work remotely
    • Updates and patching
    • Virtual private networks (VPN)
    • Virus and malware protection

    You‘re viewing this with anonymous access, so some content might be blocked.
    /
    Travel or work remotely
    Updated Apr 28

      Travel or work remotely

      Purpose

      As you travel or work remotely, you will encounter untrusted or public infrastructure, as well as an increased risk of loss or theft, so it is important to prepare for these additional risks to ensure that your data confidential, intact, and available when you need it.  


      Audience

      faculty researchers Admin staff IT staff students


      On this page

      • 1 Initial considerations
        • 1.1 Travelling with data.
        • 1.2 Foreign data security restrictions.
      • 2 What can I do?
        • 2.1 Consult University best practices prior to travelling.
          • 2.1.1 Practical resources
        • 2.2 Consult additional guidance documents.
          • 2.2.1 Canadian Centre for Cyber Security
          • 2.2.2 Office of the Privacy Commissioner of Canada
          • 2.2.3 Universities Canada
          • 2.2.4 Australian Cyber Security Centre

      Initial considerations

      Be aware of jurisdictional and legal borders.

      Travelling with data.

      • Determine whether your data is subject to export controls or if you can travel with it.

        • Export Controls & Controlled Goods Program

      Foreign data security restrictions.

      • Determine if there are restrictions regarding data security, including, but not limited to, the use of encryption or virtual private networks (VPNs).

        • Security Considerations for International Travel with Mobile Devices


      What can I do?

      If you believe a security incident occurs whether in the office, while working remotely, or while travelling, report it.

      Report a security event or incidentPreview

      Consult University best practices prior to travelling.

      • Safeguarding your data while travelling - Information Security at University of Toronto

      Practical resources

      • Devices and software are up to date.

        • Updates and patchingPreview

        • Virus and malware protectionPreview

      • Devices and external storage are encrypted.

        • Encrypt data and devicesPreview

      • Physically secure your devices.

        • Physically secure data and devicesPreview

      • Back up your data.

        • Back up dataPreview

      • Securely delete unnecessary data prior to travel.

        • Delete or destroy data and devicesPreview

      • Use a Virtual Private Network (VPN), where legal and accessible.

        • Virtual private networks (VPN)Preview

      • Follow password best practices.

        • Passwords, passphrases and passkeysPreview

      • Practice safe web browsing.

        • Safe web browsingPreview

      • Be aware of cyber security alerts and advisories.

        • Cyber security alerts and advisoriesPreview

      • Report suspected security incidents, including if devices are searched by border officials.

        • Report a security event or incidentPreview

      Consult additional guidance documents.

      Canadian Centre for Cyber Security

      • Mobile device guidance for high profile travellers (ITSAP.00.088) - Canadian Centre for Cyber Security

      Office of the Privacy Commissioner of Canada

      • Your privacy at airports and borders

      Universities Canada

      • Travel security guide for university researchers and staff (univcan.ca)

      Australian Cyber Security Centre

      • Travelling with mobile devices | Cyber.gov.au


      Search

      How do I...


      Additional help

      General

      Contact us | Information Security (IS)Preview

      Contact us | Information Technology (IT)Preview

      Researchers

      Research Information Security - Information Security at University of Toronto


      Related articles

      • Page:
        Report a security event or incident
      • Page:
        Virtual private networks (VPN)
      • Page:
        Cyber security alerts and advisories
      • Page:
        Send, share or transfer data
      • Page:
        Encrypt data and devices

       

       

       

      {"serverDuration": 53, "requestCorrelationId": "eba0f7f772934be4b9132ef8949b50ab"}