Data Travel Hygiene: Security Vulnerability at Border Crossings


Posted on in Presentations

Border security agents are increasingly forcing international travelers to surrender passwords, unlock and decrypt mobile devices, and allow inspection and backup of mobile device contents. Travelers who lose their data are not victims but targets for prosecution and legal action by data owners and privacy legislators. What are the new best practices for data travel hygiene?

Learning Objectives:
1: Understand mobile vulnerabilities encryption will not protect against.
2: Discuss innovative solutions.
3: Brainstorm best practices.

Participants
Brian Warshawsky

Participant

Manager of Export Control Compliance, University of California Office of the President

Protecting Data & Applied Crypto Mobile & IoT Security

mobile security endpoint security encryption strategy & trends data security BYOD


Topic

Subtopic


Share With Your Community