Data Travel Hygiene: Security Vulnerability at Border Crossings

Posted on in Presentations

Border security agents are increasingly forcing international travelers to surrender passwords, unlock and decrypt mobile devices, and allow inspection and backup of mobile device contents. Travelers who lose their data are not victims but targets for prosecution and legal action by data owners and privacy legislators. What are the new best practices for data travel hygiene?

Learning Objectives:
1: Understand mobile vulnerabilities encryption will not protect against.
2: Discuss innovative solutions.
3: Brainstorm best practices.
Brian Warshawsky


Director, Research Ethics and Compliance, University of California, Berkeley

Share With Your Community