Traveling with UoB-PC: Difference between revisions

From IThelp
Epe036 (talk | contribs)
No edit summary
St06047 (talk | contribs)
mNo edit summary
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
[[no:På reise med UiB-PC]]
These advices will help ensure that information security is properly managed when you are traveling. The advice is to all employees at UiB where the UiB-owned equipment or -information is brought along. You are responsible for maintaining a sufficient level of information security so that electronic aids or information are not stolen or misused.
These advices will help ensure that information security is properly managed when you are traveling. The advice is to all employees at UiB where the UiB-owned equipment or -information is brought along. You are responsible for maintaining a sufficient level of information security so that electronic aids or information are not stolen or misused.



Latest revision as of 12:11, 8 May 2019

These advices will help ensure that information security is properly managed when you are traveling. The advice is to all employees at UiB where the UiB-owned equipment or -information is brought along. You are responsible for maintaining a sufficient level of information security so that electronic aids or information are not stolen or misused.

Please note that if you are traveling to a risk country, special measures must be taken. Read more about this.

Before the travel

The danger of being hit by unwanted events on electronic aids is greater than when you are at home. Contact the person responsible for the travel and find out what information is available about the trip and what precautions you should take in general.

Foreign authorities can seize equipment. You should think about how to handle an event where you cannot use the online tools that you have planned.

Consider the value of the information you bring with you and encrypt information that is confidential. Never bring sensitive information.

Remember to:

  • Encrypt hard drives and other storage media that are brought on the go.
  • Make sure you have installed the latest updates for the equipment, operating system, anti-virus software, and other software installed.
  • Ensure that the device locks automatically when inactive (screen shutter) and that password / code verification works when you re-open the device.
  • Provide your own charging and power supplies. Do not use public charging devices for mobile devices.
  • Use secure passwords. Consider changing your passwords before traveling to ensure that you have control over the logins you need on your trip.
  • Use two-factor authentication wherever you can.

During the travel

  • Turn off the ability of wireless and bluetooth connections on all the devices you have with you. Consider the need to turn these on in each case. Please note that such connections may cause unwanted access to your devices. Remember to turn them off after use.
  • Do not use open and unknown wireless networks. By using them, it is easy for unauthorized persons to access your devices and thereby steal information or install malware. Check if the person you are visiting can give you access to secure networks that you can use.
  • Use 3G / 4G wherever you can, as this is usually safer (but these can alsoturn out to be fake).
  • When connecting to UiB services, always use an encrypted connection (VPN). The need for such a connection must be considered in each individual case. When traveling to risk countries (see point 5), one should not connect to UiB services.
  • When receiving electronic gift items (such as memory sticks), consider whether these should be connected to UiB equipment or not. Such devices can often be the source of unwanted software being installed.

After the travel

Consider switching passwords on any service you have used during your trip. Remember to use a different device to change passwords than the one you brought with you on the journey.

If your electronic devices work differently than expected or you suspect that they have installed unwanted programs, contact BRITA Support at the IT Department and ask for help to find out if this is the case or request reinstallation.