Topics Map > Client Services

Cyber Security - During International Travel

This document is intended to be used as a guide for UWL faculty, staff, and students who are traveling to countries where there are concerns about keeping personal and university data protected. It contains links to both campus and external resources as well as a list of services that UWL can provide. It includes advice compiled from several sources (see Related Documents and Websites at the bottom of this page). 

Updated on 5/20/25 - This is working document and guidelines may change.

There may be Universities of Wisconsin System restrictions for international logins, at UW-La Crosse please contact the Eagle Help Desk. Safety information provided courtesy of the University of Wisconsin–Madison International Safety & Security Office and Information Technology. 

Getting Prepared

  • Do you work with international collaborators, share/transport information, supplies, research materials or equipment with international individuals or organizations? If yes, complete the Export Controls Screening Survey well in advance of your travel. Doing so enables the UWL Export Controls Officer and other offices to assess related export controls risks and requirements, conduct further screening, and provide guidance to ensure compliance with federal regulations. Some restrictions may apply to activities performed in specified countries due to their designation as an embargoed or restricted country by the US government. A list of embargoed and restricted countries can be found on UW-Madison Export Control site. For additional information, see the UWL Export Controls Overview & FAQs KB article. 
  • Generate backup passcodes for future use: Generate a back-up or temporary MFA code so you do not need your MFA device to connect to the network. Multi-factor authentication is an added layer of security to protect you while traveling and using available wireless networks.  
  • Reserve a loaner device: Consider taking a loaner device instead of your personal equipment. This will limit the amount of data at risk should your laptop or phone be lost, stolen or searched.
  • Prepare your laptop/tablet for travel: If you cannot take a loaner device, sanitize your device by backing up your data and removing any data not needed during your travels. Be sure to empty your Trash/Recycle Bin and enable screen lock/timeout functions before travel. Also, make note of your laptop’s serial number. 
  • Minimize the data you take with you: Minimize data transported or accessed while abroad. Particularly identify and safeguard data subject to regulations and laws, which include: 
    • International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR) 
    • Controlled Unclassified Information (CUI) 
    • Personally identifiable Information (PII) 
    • Protected health information (HIPAA) 
    • Student information (FERPA) 
    • Sensitive financial information
  • Evaluate the sensitivity of the data you might take: in many countries/cultures, there is no expectation of privacy. Backup all information you take and leave the backup at work or home. Remove all external storage media (CDs, Flash Drives, etc...) from the computer before you travel. 
  • Use the UWL VPN (virtual private network) while abroad: A VPN is An encrypted connection that secures data transmission between a user's device and a network, often used to protect sensitive information and mask the user's IP address. See VPN - Install and Connect

  • Review university and personal passwords: Do not use the same login credentials for university and personal business. Make any necessary password changes warranted by this review, particularly for systems you will be accessing while abroad. 

  • Layover Countries: If you will have a layover in a country, make sure you consider it for all items on this list. 
  • Contact your mobile phone service provider: Ask what they recommend for international cellular servce while traveling. Consider leaving your normally used devices at home and traveling with a clean unlocked device that does not have sensitive information or personal account information on it. You can also consider purchasing an inexpensive local “burner” phone on arrival (often available for purchase on arrival at an international airport). Device theft is a growing problem in many locations around the world, so avoid traveling with a device you cannot afford to lose. 

  • Update your operating system and apps/ software: This includes antivirus protection, make sure you are running the most secure versions available. Contact the Eagle Help Desk

  • Log out of browsers and apps, remove any saved login credentials, and clear your browser history. This will help prevent anyone from accessing your accounts or information without your knowledge. Also, delete apps you no longer use. 

  • Clear your devices of any content that may be considered illegal or questionable in other countries.  

  • Do not put devices in checked baggage. Checked baggage can be lost, stolen or tampered with. 

  • Avoid plugging your phone into charger kiosks.  There may be a malicious computer on the other end of that innocent-looking wire. 

  • Sign out of installed applications: on your mobile device and computer while not in use. 

  • Enable multi-factor authentication for cloud services: such as Gmail/Yahoo mail, O365, Facebook, Instagram, Twitter, LinkedIn, Amazon, etc. 

During Your Stay

  • Have no expectation of privacy: Eavesdropping is routine in some countries. Limit electronic and face-to-face discussion of sensitive information. If possible, wait to discuss sensitive matters upon return or using a known secure mechanism. Surveillance can occur through talk, text or application-based communications. In some countries, law enforcement may be able to seize or search your devices arbitrarily without any expectation or pretense of due process, device return or compensation. Travelers should avoid keeping sensitive or contentious information on their phone, computer or tablet that you would not want host-country authorities to see.  
  • Treat electronic devices as compromised: Do not use computers or faxes at foreign hotels or business centers for sensitive matters. Do not charge your devices by connecting them to charging stations, computers, televisions, DVRs, etc. Do not allow foreign storage devices e.g. USB, CDs, etc. to be connected to your computer or phone. Do not download new apps or allow your operating system or existing apps or programs to update. Do not click on links in messages or use links to move from internet site to site. We do understand that some of this may not be feasible. In China you may be required to use local application-based e-payments or local applications for public transit or other public messaging. It is always best to have a borrowed device to install this software on.  

  • Keep electronic devices in your physical possession: Do not leave these devices unattended. For example, do not leave them in your hotel room, in hotel safes, in your checked baggage, or do not ask someone to watch for you.  

  • Disable devices network capabilities when not in use: Turn off Bluetooth and Wi-Fi capability on your device when not in use, especially auto-join Wi-Fi.  Shut off the auto-join Wi-Fi function. Consider turning off your cellular phone when it is not in use and particularly if you have a data plan enabled. Using Airplane Mode on your device will simplify the activation or deactivation of wireless capabilities.   

  • Avoid accessing systems with sensitive or restricted information from abroad: This is particularly advisable in countries where there is no expectation of privacy.  See the Department of State Travel Advisory and the OSAC Country Security Report for country specific issues. In general, when accessing University systems minimize the length of time and amount of information accessed. 

  • Use VPN whenever possible: Anytime your laptop, tablet, or mobile device is used to connect to network resources, be sure the VPN (GlobalProtect) is connected unless you are in a country that doesn’t allow encryption.  Note that come countries disallow the use of VPNs. 

  • Report loss or theft of information or electronic devices: If you experience or suspect the theft of data or any of your electronic devices, report it to helpdesk@uwlax.edu. 

  • Do not plug in untrusted accessories: Accessories that come from questionable or unknown sources can be infected with malware intended to steal your information.Avoid plugging in any untrusted accessories (flash drive, charging cable/station/port, SD card, power stick, etc.) to your device. Try to bring all necessary accessories with you, but if you must purchase something abroad, make sure it is from a reputable source.  

  • Never log into anything when using public computers:They may be loaded with keyloggers and malware. If you use a device belonging to other travelers, colleagues, or friends, do not log in to email or sensitive accounts.  

  • Wait to post about your trip on social media until you return home. 

CHINA: A SPECIAL TRAVEL SITUATION  

Travelers to the People's Republic of China have experienced various issues, including the following:  

  • Access to services we take for granted, like Gmail and other Google apps, Wikipedia, and Yahoo Mail, are often blocked or filtered. 

  • The government may monitor Skype connections. 

  • Individuals using VPNs reported that they are often cut off for hours. 

  • Hotel staff and government officials can access hotel room safes, so don't expect that a computer or mobile device in a hotel safe will be secure.  

  • Always keep your mobile devices and laptop with you. 

Upon Your Return

  • Clean and/or rebuild all electronic devices: When you return, do not connect to any campus networks.  Run full antivirus scans on your devices.

  • Change passwords: Consider changing passwords for all systems you accessed while traveling. 

  • Delete unneeded apps: If you downloaded any apps specifically for your trip and no longer need them, be sure to delete them and the associated data. 

  • Check your statements:  If you use a credit (Pcard), or debit card while traveling, check your monthly statements for any discrepancies for at least one year after you return. 

Services for UWL Faculty & Staff

Provide a loaner laptop: It is recommended that you do not take your university computer outside of the United States. We also recommend you do not take any personal devices, like cell phones or laptops, to another country. ITS loaner laptops can be checked out for use internationally. These are available on a first come, first served basis. 

  • ITS will prepare a laptop for you and ensure you have the software you need while traveling. Please give 14 days notice for this service. 

  • ITS will create a temporary local user on the laptop, so you will not need to use your own credentials while logging in. 

Prepare your work laptop: 

  • If you must take your work laptop, we will check your computer to provide the best security during your travel. 

  • This may include updating your computer's operating system and applications, turning on system security settings, or other actions to improve its ability to defend against malware. 

Transfer data and clean laptop upon return: Some countries may attempt to install unwanted programs or software (aka, malware) on your device, just by connecting it to a network in that country. Therefore, please do not connect your loaner device to the internet once you have returned to the United States. Make sure to transfer any necessary data from the laptop to an external drive and run an Antivirus scan on the drive prior to connecting it to another device. 

If you have any questions or if you would like to discuss arrangements for your upcoming trip, please contact helpdesk@uwlax.edu 



Keywords:
Travel, International, Cyber, Security, Cybersecurity 
Doc ID:
150944
Owned by:
Travis S. in UW-La Crosse
Created:
2025-05-19
Updated:
2025-05-21
Sites:
UW-La Crosse