International Travel
International university travel offers opportunities but presents cybersecurity challenges like device loss, theft, and unauthorized access. Planning ahead with security best practices protects you, your data, and the university.
Before You Travel
Preparation is key to minimizing risks:
Travel Approvals & Risk Assessment
Ensure your international travel is approved through the university's official process (e.g., Concur). Be aware that travel to destinations designated as high-risk by the Texas A&M System requires additional review and approval. Check the A&M System International Travel Risk Status website.
Required Training
Complete any mandatory international travel safety training, such as the course available in TrainTraq (Course #2111728), as required by university policy. Depending on your role and funding sources (e.g., federally funded research under NSPM-33), additional security briefings may be necessary.
Use Loaner Devices (Highly Recommended)
Whenever possible, request and use a university-provided "loaner" device (laptop, tablet) specifically for your trip. These devices are typically configured with minimal essential software and data, significantly reducing risk if lost, stolen, or inspected. Contact your local IT support or Help Desk Central well in advance to inquire about loaner device availability.
Travel to High-Risk Countries
For travel to certain designated high-risk countries or countries of concern, using a university-provided loaner device is required, and taking university-owned devices containing university data may be prohibited. Consult with the Research Security and Export Controls (RESEC) office and System Risk Management for guidance.
Prepare Your Device (If Loaner is Not Possible)
If using your regular university-owned device is unavoidable (which is strongly discouraged for international travel), take these critical steps:
- Back Up: Ensure all essential data is securely backed up before you leave.
- Sanitize: Remove all non-essential data from the device, especially anything classified as Confidential, Critical, proprietary, or subject to export controls. Travel only with the absolute minimum data required for your trip.
- Secure: Ensure the device has the latest OS and application security patches, updated anti-virus software, a strong login password/PIN, short screen-lock timeout, and full-disk encryption enabled. Disable any auto-login or saved password features in browsers or applications.
Export Controls
Consult with the RESEC Export Controls office (exportcontrols@tamu.edu) well in advance if you plan to take any university equipment, software, technical data, prototypes, or samples abroad, as export licenses or specific handling procedures may be required.
During Travel
Maintain heightened security awareness throughout your trip:
Physical Security
Keep devices under your direct physical control at all times. Never leave them unattended in hotel rooms (even in safes), meeting rooms, vehicles, or public areas. Do not pack laptops or other critical devices in checked luggage.
Network Security
Avoid using public Wi-Fi (airports, hotels, cafes) for sensitive activities or logging into university resources. Use a mobile hotspot (personal or university-provided) if possible. When using any untrusted network, always connect through the official Texas A&M VPN service to encrypt your connection. Only use websites secured with HTTPS.
Connectivity
Turn off Wi-Fi and Bluetooth when not actively using them.
Limit Sensitive Access
Avoid accessing Confidential or Critical university data or systems unless absolutely necessary. Be aware that accessing data from abroad may be subject to local laws and surveillance.
Limit Personal Use
Minimize personal use of university-owned devices while traveling internationally.
Upon Return
Take these steps immediately upon returning:
Change Passwords
Change your NetID password and any other university or personal passwords you used while traveling.
Return Loaner Devices
Return any loaner devices promptly to the IT unit you borrowed them from. Do not connect the loaner device to the Texas A&M network before returning it, as it needs to be securely wiped and reimaged by IT staff.
Device Inspection
If you used your regular university-owned device, contact your IT support to have it checked for any signs of tampering or malware infection.
Reporting Incidents
Report any lost, stolen, or potentially compromised devices immediately, even while still abroad. Contact local authorities if appropriate, and notify the Texas A&M Security Operations Center via email at security@tamu.edu or your departmental IT support.
Following these guidelines can significantly reduce the cybersecurity risks associated with international travel and help protect both you and the university.
Last Modified: August 11, 2025