{"id":4639,"date":"2023-08-31T12:14:56","date_gmt":"2023-08-31T16:14:56","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/?page_id=4639"},"modified":"2025-01-02T18:33:48","modified_gmt":"2025-01-02T23:33:48","slug":"international-travel-best-practices-2","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/","title":{"rendered":"International Travel Technology Recommendations: High-Risk Countries"},"content":{"rendered":"<div class=\"introtext text parbase section\">\n<div class=\"title section\">\n<h2><img decoding=\"async\" src=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg\" \/><\/h2>\n<h2 id=\"title_1057183540\">What are high-risk countries?<\/h2>\n<\/div>\n<div class=\"text parbase section\">\n<p>Here is a list of high-risk countries that are the subject of Travel Warnings by the U.S. Department of State and countries identified as high risk by other U.S. Government sources such as the Department of the Treasury Office of Foreign Assets Control (OFAC), the Federal Bureau of Investigation (FBI), and the Office of the Director of National Intelligence (ODNI).<\/p>\n<ul>\n<li><span class=\"teaser teaser-inline \" data-model=\"SyntheticpageTeaser\"><a class=\"teaser-primary-anchor\" href=\"http:\/\/travel.state.gov\/content\/passports\/english\/alertswarnings.html\"><span class=\"teaser-inner\"><span class=\"teaser-title\">Travel Warnings by the U.S. Department of State<\/span><\/span><\/a><\/span><\/li>\n<\/ul>\n<\/div>\n<div class=\"parsys_column cq-colctrl-4-4-c1\">\n<div class=\"text parbase section\">\n<div class=\"title section\">\n<h3 id=\"title_961086113\">Before you go<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>Forward your voicemail to email. This saves you from having to dial into your voicemail account, potentially revealing your voicemail passcode.<\/li>\n<li>Ensure that the devices you are traveling with are compliant with the Trinity Security Standards for Desktops, Laptops, Mobile, and Other Endpoint Devices.<\/li>\n<li>Work with your IT support staff to secure college-owned devices<\/li>\n<li>Make sure that any personally owned devices are secure<\/li>\n<li>Review your\u00a0MFA two-step verification options<\/li>\n<li>Create a backup of your devices before travel<\/li>\n<\/ul>\n<div class=\"title section\">\n<h3 id=\"title_405053027\">While you&#8217;re traveling<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>Do not plug your phone into USB charger kiosks. A hostile computer may be on the other end of that innocent-looking wire.<\/li>\n<li>Be aware of your surroundings. Watch for those looking over your shoulder or potential thieves.<\/li>\n<li>Do not leave your devices unattended. Even hotel safes are not secure.<\/li>\n<li>Use the Trinity VPN if accessing college resources outside of campus.<\/li>\n<li>Review your MFA two-step verification options.<\/li>\n<li>Contact your department or the Trinity Help Desk immediately if your multifactor authentication options are compromised and need to be reset.<\/li>\n<\/ul>\n<div class=\"title section\">\n<h3 id=\"title_2059809154\">When you return<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>Reset your Trinity password.<\/li>\n<li>If you checked your voicemail while traveling, change your voicemail passcode (If applicable.)<\/li>\n<li>If you brought your computer, save any documents you created while traveling to an external drive and restore them from your pre-departure backup.<\/li>\n<\/ul>\n<div class=\"title section\">\n<h2 id=\"title_1961627999\">Traveling with computers<\/h2>\n<\/div>\n<div class=\"title section\">\n<h3 id=\"best\">Best: Travel light<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>We strongly recommend leaving your current devices here and traveling with a Trinity loaner device. Loaner devices are set up specifically for your use and wiped back to factory settings upon your return. Contact the Help Desk to see if loaners are available.<\/li>\n<\/ul>\n<\/div>\n<div class=\"title section\">\n<h3 id=\"good\">Good: Travel with less data<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>Another option is to take a new or freshly rebuilt machine and only take the data you&#8217;ll need for the trip.\n<ul>\n<li>Whenever possible, do not travel with a USB device or other removable media storage. These are easily lost and easily corrupted. If you must travel with a USB device, ensure it&#8217;s encrypted.<\/li>\n<li>Remove unnecessary data, such as emails you have downloaded before you travel.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"title section\">\n<h3 id=\"minimum\">Minimum: Travel encrypted<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>If you must take your laptop or tablet, there are additional steps you should take before you go:\n<ul>\n<li>Make sure your software and operating system are up to date, and\u00a0install anti-virus and firewall software.<\/li>\n<li>Make sure your device is fully backed up and encrypted.<\/li>\n<li>Remove any documents containing Level 3 or 4 Data.<\/li>\n<li>When you return, save the documents you created while traveling to another device, thoroughly wipe the device, and restore it from the backup made before your travel.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<div class=\"title section\">\n<h2 id=\"title_521486010\">Traveling with mobile phones<\/h2>\n<\/div>\n<div class=\"title section\">\n<h3 id=\"best2\">Best: Go without<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>The first thing to consider is whether you really need a mobile phone. Are you going to make calls? Can you get by with a Wi-Fi-only device? Can you get by without a phone for a short trip?<\/li>\n<\/ul>\n<\/div>\n<div class=\"title section\">\n<h3 id=\"good2\">Good: Get it there<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>Purchase a basic phone at your destination. You can also take an unlocked phone and purchase a local SIM card.<\/li>\n<\/ul>\n<\/div>\n<div class=\"title section\">\n<h3 id=\"minimum2\">Minimum: Have a plan<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>If you must use your own phone:\n<ul>\n<li>Back it up before you leave.<\/li>\n<li>Enroll it in an international rate plan to avoid incurring excessive roaming charges.<\/li>\n<li>Save\/backup your data before departure and restore your backup when you return.<\/li>\n<li>Ensure your apps and operating system are up to date, turn on multifactor authentication verification for all accounts, and use security measures to lock your devices.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Planning ahead protects your privacy and reduces the risk to your personal information and the college&#8217;s information.<\/p>\n<div class=\"title section\">\n<div class=\"title section\">\n<h2 id=\"title_1261622295\">China: a special travel situation<\/h2>\n<\/div>\n<div class=\"title section\">\n<h3 id=\"title_310795527\">What to expect while you\u2019re traveling<\/h3>\n<\/div>\n<div class=\"text parbase section\">\n<ul>\n<li>Travelers to the People&#8217;s Republic of China have experienced a range of issues:\n<ul>\n<li>Access to services that we take for granted, like Gmail and other Google apps, Wikipedia, and Yahoo Web Mail, are often blocked altogether or filtered.<\/li>\n<li>Skype connections may be monitored by the government.<\/li>\n<li>Those using VPNs reported that they are often cut off for hours at a time.<\/li>\n<li>Hotel staff and government officials can access hotel room safes, so don&#8217;t expect that a computer or mobile device left in a hotel safe will be secure.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<h3 id=\"title_689576473\">See also:<\/h3>\n<\/div>\n<div class=\"list parbase section\">\n<div id=\"ubcms-gen-122756442\" data-columnize-row=\"1\" data-model=\"UBList\">\n<ul class=\"link-list\" data-columnize=\"1\">\n<li><span class=\"teaser teaser-inline \" data-model=\"SyntheticpageTeaser\"><a class=\"teaser-primary-anchor\" href=\"http:\/\/travel.state.gov\/content\/passports\/english\/alertswarnings.html\"><span class=\"teaser-inner\"><span class=\"teaser-title\">Travel Warnings by the U.S. Department of State<\/span><\/span><\/a><\/span><\/li>\n<li><span class=\"teaser teaser-inline \" data-model=\"SyntheticpageTeaser\"><a class=\"teaser-primary-anchor\" href=\"http:\/\/www.treasury.gov\/about\/organizational-structure\/offices\/Pages\/Office-of-Foreign-Assets-Control.aspx\"><span class=\"teaser-inner\"><span class=\"teaser-title\">Department of the Treasury Office of Foreign Assets Control (OFAC)<\/span><\/span><\/a><\/span><\/li>\n<li><span class=\"teaser teaser-inline \" data-model=\"SyntheticpageTeaser\"><a class=\"teaser-primary-anchor\" href=\"https:\/\/www.fbi.gov\/\"><span class=\"teaser-inner\"><span class=\"teaser-title\">Federal Bureau of Investigation (FBI)<\/span><\/span><\/a><\/span><\/li>\n<li><span class=\"teaser teaser-inline \" data-model=\"SyntheticpageTeaser\"><a class=\"teaser-primary-anchor\" href=\"http:\/\/www.odni.gov\/\"><span class=\"teaser-inner\"><span class=\"teaser-title\">Office of the Director of National Intelligence (ODNI)<\/span><\/span><\/a><\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What are high-risk countries? Here is a list of high-risk countries that are the subject of Travel Warnings by the U.S. Department of State and countries identified as high risk by other U.S. Government sources such as the Department of the Treasury Office of Foreign Assets Control (OFAC), the Federal Bureau of Investigation (FBI), and [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":0,"parent":3470,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4639","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>International Travel Technology Recommendations: High-Risk Countries - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"International Travel Technology Recommendations: High-Risk Countries\" \/>\n<meta property=\"og:description\" content=\"What are high-risk countries? Here is a list of high-risk countries that are the subject of Travel Warnings by the U.S. Department of State and countries identified as high risk by other U.S. Government sources such as the Department of the Treasury Office of Foreign Assets Control (OFAC), the Federal Bureau of Investigation (FBI), and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-02T23:33:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/\",\"name\":\"International Travel Technology Recommendations: High-Risk Countries - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg\",\"datePublished\":\"2023-08-31T16:14:56+00:00\",\"dateModified\":\"2025-01-02T23:33:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#primaryimage\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg\",\"contentUrl\":\"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg\",\"width\":1597,\"height\":390},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Information Security\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Education &amp; Awareness\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"International Travel Technology Recommendations: High-Risk Countries\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"International Travel Technology Recommendations: High-Risk Countries - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/","og_locale":"en_US","og_type":"article","og_title":"International Travel Technology Recommendations: High-Risk Countries","og_description":"What are high-risk countries? Here is a list of high-risk countries that are the subject of Travel Warnings by the U.S. Department of State and countries identified as high risk by other U.S. Government sources such as the Department of the Treasury Office of Foreign Assets Control (OFAC), the Federal Bureau of Investigation (FBI), and [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2025-01-02T23:33:48+00:00","og_image":[{"url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/","name":"International Travel Technology Recommendations: High-Risk Countries - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#primaryimage"},"image":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg","datePublished":"2023-08-31T16:14:56+00:00","dateModified":"2025-01-02T23:33:48+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#primaryimage","url":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg","contentUrl":"https:\/\/www.trincoll.edu\/lits\/wp-content\/uploads\/sites\/14\/2023\/09\/International-Travel-Header-1.jpg","width":1597,"height":390},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/international-travel-best-practices-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Information Security","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/"},{"@type":"ListItem","position":4,"name":"Education &amp; Awareness","item":"https:\/\/www.trincoll.edu\/lits\/technology\/security\/it-security-awareness-education\/"},{"@type":"ListItem","position":5,"name":"International Travel Technology Recommendations: High-Risk Countries"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/4639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=4639"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/4639\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/3470"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=4639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}