Topics Map > Client Services

Cyber Security - During International Travel

This document is intended to be used as a guide for UWL faculty, staff, and students who are traveling to countries where there are concerns about keeping personal and university data protected. It contains links to both campus and external resources as well as a list of services that UWL can provide. It includes advice compiled from several sources (see Related Documents and Websites at the bottom of this page). 

Note: This is a working document last updated May 20, 2025 — guidelines may change.

There may be University of Wisconsin System restrictions for international logins. At UW-La Crosse, contact the Eagle Help Desk with questions. Safety information provided courtesy of the University of Wisconsin–Madison International Safety & Security Office and Information Technology.

Getting Prepared

  • Do you perform any research in your role at UW-La Crosse? If yes, contact the Office of Research & Sponsored Programs (opens in new tab) well in advance of international travel to ensure compliance with research regulations and policies. Refer to the ORSP international research & collaborations webpage (opens in new tab) for guidance. You may also need to seek additional approvals from your international collaborator's institutions and/or governments.
  • Do you work with international collaborators, or share or transport information, supplies, research materials, or equipment with international individuals or organizations? If yes, complete the Export Controls Screening Survey (opens in new tab) well in advance of your travel. Doing so enables the UWL Export Controls Officer and other offices to assess export controls risks, conduct further screening, and provide guidance on federal regulations. Some restrictions may apply to activities in embargoed or restricted countries. A list of embargoed and restricted countries can be found on the UW-Madison Export Control site (opens in new tab). For additional information, see the UWL Export Controls Overview & FAQs (opens in new tab).
  • Generate backup passcodes for future use: Generate a backup or temporary MFA code so you do not need your MFA device to connect to the network. Multi-factor authentication adds an extra layer of security while traveling and using available wireless networks.
  • Reserve a loaner device: Consider taking a loaner device instead of your personal equipment. This limits the amount of data at risk if your laptop or phone is lost, stolen, or searched.
  • Prepare your laptop or tablet for travel: If you cannot take a loaner device, sanitize your device by backing up your data and removing anything not needed during your travels. Empty your Trash/Recycle Bin, enable screen lock and timeout functions, and make note of your laptop's serial number.
  • Minimize the data you take with you: Minimize data transported or accessed while abroad. Particularly identify and safeguard data subject to regulations and laws, including:
    • International Traffic in Arms Regulations (ITAR) or Export Administration Regulations (EAR)
    • Controlled Unclassified Information (CUI)
    • Personally Identifiable Information (PII)
    • Protected health information (HIPAA)
    • Student information (FERPA)
    • Sensitive financial information
  • Evaluate the sensitivity of the data you might take: In many countries and cultures, there is no expectation of privacy. Back up all information you take and leave the backup at work or home. Remove all external storage media (CDs, flash drives, etc.) from the computer before you travel.
  • Use the UWL VPN (virtual private network) while abroad: A VPN is an encrypted connection that secures data transmission between your device and a network, used to protect sensitive information and mask your IP address. See VPN — Install and Connect (opens in new tab).
  • Review university and personal passwords: Do not use the same login credentials for university and personal accounts. Make any necessary password changes before traveling, particularly for systems you will access while abroad.
  • Layover countries: If you have a layover in a country, apply all items on this list to that country as well.
  • Familiarize yourself with local laws and security: Is the country you are traveling to on the sanctioned or embargoed country list (opens in new tab)?
  • Contact your mobile phone service provider: Ask what they recommend for international cellular service while traveling. Consider leaving your normally used devices at home and traveling with a clean unlocked device without sensitive or personal account information. You can also purchase an inexpensive local "burner" phone on arrival at an international airport. Device theft is a growing problem worldwide — avoid traveling with a device you cannot afford to lose.
  • Update your operating system and apps and software: This includes antivirus protection — make sure you are running the most secure versions available. Contact the Eagle Help Desk for assistance.
  • Log out of browsers and apps, remove any saved login credentials, and clear your browser history. This helps prevent anyone from accessing your accounts or information without your knowledge. Also delete apps you no longer use.
  • Clear your devices of any content that may be considered illegal or questionable in other countries.
  • Check the State Department's website: Note any travel alerts (opens in new tab) concerning the specific countries you plan to visit (including any tech restrictions) and review guidance on travel to high-risk areas (opens in new tab). The State Department also provides information for U.S. students traveling abroad (opens in new tab), as does the FBI (PDF) (opens in new tab).
  • Do not put devices in checked baggage. Checked baggage can be lost, stolen, or tampered with.
  • Avoid plugging your phone into charger kiosks. There may be a malicious computer on the other end of that innocent-looking wire.
  • Sign out of installed applications on your mobile device and computer while not in use.
  • Enable multi-factor authentication for cloud services such as Gmail, Yahoo Mail, Microsoft 365, Facebook, Instagram, LinkedIn, Amazon, and others.

During Your Stay

  • Have no expectation of privacy: Eavesdropping is routine in some countries. Limit electronic and face-to-face discussion of sensitive information. If possible, wait to discuss sensitive matters upon return or using a known secure mechanism. Surveillance can occur through talk, text, or application-based communications. In some countries, law enforcement may seize or search your devices without due process, device return, or compensation. Avoid keeping sensitive or contentious information on your phone, computer, or tablet that you would not want host-country authorities to see.
  • Treat electronic devices as compromised: Do not use computers or faxes at foreign hotels or business centers for sensitive matters. Do not charge your devices using charging stations, computers, televisions, or DVRs. Do not allow foreign storage devices (USB drives, CDs, etc.) to be connected to your computer or phone. Do not download new apps or allow your operating system or existing apps to update. Do not click on links in messages or use links to navigate between internet sites. We understand some of this may not be feasible — in China, for example, you may be required to use local app-based e-payments or transit apps. It is always best to use a borrowed device to install such software.
  • Keep electronic devices in your physical possession: Do not leave devices unattended. Do not leave them in your hotel room, in hotel safes, in checked baggage, or with someone else to watch.
  • Disable network capabilities when not in use: Turn off Bluetooth and Wi-Fi when not in use, especially auto-join Wi-Fi. Consider turning off your cellular phone when not in use, particularly if you have a data plan enabled. Using Airplane Mode simplifies activating or deactivating wireless capabilities.
  • Avoid accessing systems with sensitive or restricted information from abroad: This is particularly advisable in countries with no expectation of privacy. See the Department of State Travel Advisory (opens in new tab) and the OSAC Country Security Report (opens in new tab) for country-specific issues. When accessing university systems, minimize the length of time and amount of information accessed.
  • Use VPN whenever possible: Anytime your laptop, tablet, or mobile device connects to network resources, ensure the VPN (GlobalProtect) is connected — unless you are in a country that does not allow encryption. Note that some countries disallow the use of VPNs.
  • Report loss or theft of information or electronic devices: If you experience or suspect theft of data or any electronic device, report it to helpdesk@uwlax.edu.
  • Do not plug in untrusted accessories: Accessories from questionable or unknown sources can be infected with malware intended to steal your information. Avoid plugging in any untrusted accessories (flash drive, charging cable, charging station, SD card, power stick, etc.) to your device. Bring all necessary accessories with you — if you must purchase something abroad, make sure it is from a reputable source.
  • Never log into anything when using public computers: They may be loaded with keyloggers and malware. If you use a device belonging to other travelers, colleagues, or friends, do not log in to email or sensitive accounts.
  • Wait to post about your trip on social media until you return home.

China: A Special Travel Situation

Travelers to the People's Republic of China have experienced the following issues:

  • Access to services such as Gmail and other Google apps, Wikipedia, and Yahoo Mail are often blocked or filtered.
  • The government may monitor Skype connections.
  • Individuals using VPNs report they are often cut off for hours.
  • Hotel staff and government officials can access hotel room safes — do not expect a computer or mobile device stored in a hotel safe to be secure.
  • Always keep your mobile devices and laptop with you.

Upon Your Return

  • Clean and/or rebuild all electronic devices: When you return, do not connect to any campus networks. Run full antivirus scans on your devices.
  • Change passwords: Consider changing passwords for all systems you accessed while traveling.
  • Delete unneeded apps: If you downloaded apps specifically for your trip and no longer need them, delete them and the associated data.
  • Check your statements: If you used a credit card (PCard) or debit card while traveling, check your monthly statements for any discrepancies for at least one year after you return.

Services for UWL Faculty and Staff

Loaner Laptop

It is recommended that you do not take your university computer outside of the United States, and that you avoid taking personal devices such as cell phones or laptops to another country. ITS loaner laptops can be checked out for international use on a first come, first served basis.

  • ITS will prepare the laptop and ensure you have the software you need while traveling. Please provide 14 days notice for this service.
  • ITS will create a temporary local user account on the laptop so you do not need to use your own credentials to log in.

Prepare Your Work Laptop

If you must take your work laptop, ITS will check your computer to provide the best security during your travel. This may include updating your operating system and applications, enabling system security settings, or other actions to improve its ability to defend against malware.

Transfer Data and Clean Laptop Upon Return

Some countries may attempt to install malware on your device simply by connecting it to a local network. Do not connect your loaner device to the internet once you have returned to the United States. Transfer any necessary data from the laptop to an external drive and run an antivirus scan on the drive before connecting it to another device.

If you have any questions or would like to discuss arrangements for your upcoming trip, contact helpdesk@uwlax.edu.



Keywords:
international travel, cybersecurity, VPN, GlobalProtect, data protection, loaner laptop, export controls, ITAR, FERPA, HIPAA, PII, MFA, Okta, China, embargoed countries, State Department, STEP, OSAC, malware, charger kiosk, public computer, antivirus, password, security 
Doc ID:
150944
Owned by:
Travis S. in UW-La Crosse
Created:
2025-05-19
Updated:
2026-03-05
Sites:
UW-La Crosse