How to Maintain Digital Security While Traveling for Work

March 14, 2017

Traveling has become highly common in the modern workplace; whether it’s for a conference or office expansion, many employees find themselves traveling to a number of different countries. We are also seeing an increase in bring-your-own-device (BYOD) work environments, so employees are using their personal devices to stay connected to the office when traveling. Businesses must be aware of any potential security risks posed by an employee’s travel plans, particularly in regards to maintaining the security of endpoint devices. It’s up to the employer to take on the responsibility of educating their employees on how to ensure proper digital security.

Many users are unaware that when mobile electronic devices are taken abroad, they are subject to local laws. Border agents at all international borders can legally inspect the contents of the devices and even seize them indefinitely. Recently, border inspections have become even more rigorous in many countries.

Although courts have yet to officially rule on whether US and Canada border agents can force travelers to surrender device passcodes, the consequences for not complying could range from seizure of the device to being arrested and detained. In most cases, the pressure to comply is overwhelming.

Enterprises requiring their employees to travel should prioritize the development and communication of a policy around what to do if traveling with a company-owned device, or one with company-owned data stored on it.

We recommend that the policy should cover the following points:

  • Should a device containing company data be carried or shipped across a border at all?
  • What is the protocol employees should follow to protect data at borders and in foreign jurisdictions?
  • If requested by a border agent, should employees surrender the device passcodes?
  • Who should be informed if a border agent accesses or seizes the device?
  • What are the legal protections available for employees if detained (e.g. having a retainer for legal support)?

corporate travel

As a general rule of thumb, we do not recommend traveling across borders with any devices that may hold confidential company data that can harm the business. This is highly critical if employees will be traveling to countries where:

  • There is strong industrial and/or nation-state competition
  • The country is not on friendly terms with your home country
  • There is significant civil unrest, political discord, crime and or violence

However, if employees must carry a device with confidential data, we recommend taking the following measures to keep the company’s data secure:

  1. If possible, purchase devices specifically used for travel such as a prepaid “burner” phone or use temporary devices such as a freshly-built laptop.
  2. Backup any information from your device before the trip.
  3. Cover internal cameras and wipe the devices clean before travel for added protection.
  4. Carry a physical card with contact information of the corporate counsel, your immediate supervisor, and any other numbers you may need.
  5. Encrypt your devices and use strong passwords. While this may not be effective if border agents ask you to unlock your device for inspection, it may protect you from future surveillance.
  6. Minimize the confidential data contained on the device.
  7. Assume that anything you do on the device, particularly over the Internet, will be intercepted. In some cases, encrypted data may even be decrypted.
  8. Never use shared public computers or use public Wi-Fi to conduct confidential business. If this is unavoidable, use an encrypted tunnel if possible, although this may be illegal in some jurisdictions. Check local laws before travel.
  9. As much as practical, keep the device(s) with you at all times during your travel. Do not assume they will be safe in your hotel room or in the hotel’s safe.
  10. If you manage very confidential or important information, consider restoring the device to factory settings upon your return home – clear the memory and storage and reinstall the operating system.
  11. Change any passwords that you have used or that are stored on your device.

If your organization requires more information relating to the security risks of employee travel, please feel free to contact one of our security specialists.

About Herjavec Group

Dynamic IT entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity products and services to enterprise organizations. Herjavec Group delivers SOC 2 Type 2 certified managed security services supported by state-of-the-art, PCI compliant, Security Operations Centers, operated 24/7/365 by certified security professionals. This expertise is coupled with leadership positions across a wide range of functions including consulting, professional services & incident response. Herjavec Group has offices globally including across Canada, the United States, and the United Kingdom. For more information, visit

Stay Informed 

  rhsm-3  Follow us on Twitter

  rhsm-2  Connect with us on LinkedIn


*By selecting one of the communications above, you consent to Herjavec Group
 sending commercial electronic messages to you for marketing purposes, including information about the products, services and events selected.

About Herjavec Group

Dynamic entrepreneur Robert Herjavec founded Herjavec Group in 2003 to provide cybersecurity products and services to enterprise organizations. We have been recognized as one of the world’s most innovative cybersecurity operations leaders, and excel in complex, multi-technology environments. Our service expertise includes Advisory Services, Technology Architecture & Implementation, Identity Services, Managed Security Services, Threat Management and Incident Response. Herjavec Group has offices and Security Operations Centers across the United States, United Kingdom and Canada.

Stay Informed

Follow us on Twitter

Connect with us on LinkedIn