Data Travel Hygiene: Security Vulnerability at Border Crossings


Posted on in Presentations

Border security agents are increasingly forcing international travelers to surrender passwords, unlock and decrypt mobile devices, and allow inspection and backup of mobile device contents. Travelers who lose their data are not victims but targets for prosecution and legal action by data owners and privacy legislators. What are the new best practices for data travel hygiene?

Learning Objectives:
1: Understand mobile vulnerabilities encryption will not protect against.
2: Discuss innovative solutions.
3: Brainstorm best practices.
Participants
Brian Warshawsky

Participant

Director, Research Ethics and Compliance, University of California, Berkeley


Share With Your Community