ϳԹ

Main Menu

International Travel Security Policy

PURPOSE

Information assets and IT resources that contain, distribute, and store data are vital to the systems that support ϳԹUniversity’s ongoing mission of discovery, learning, and engagement. The purpose of this policy is to define minimum requirements for the acceptable use of university-owned and personally-owned devices being utilized and/or accessing ϳԹUniversity networks and/or IT resources remotely, while traveling abroad.

POLICY

To ensure all international travel is properly authorized: (1) all faculty and staff users will need to obtain and supply written permission from the appropriate Executive Team member supporting proposed travel and accessibility to use ϳԹUniversity information assets, IT resources, or access to ϳԹUniversity networks while abroad; (2) all students and individuals participating in a university sponsored education experience and/or organized travel will need to adhere to this policy for guidance on usage of their personal devices. Particular care should be taken for proposed travel to countries, specific regions, or cities which the U.S. Department of State has designated as medium or high risk.

No access to ϳԹUniversity networks or IT resources will be permitted/granted if travel is to any embargoed country, as designated by the U.S. Department of State.

UNIVERSITY-OWNED DEVICES


ACCESS to UNIVERSITY NETWORKS or SYSTEMS
Secure, access to university networks or systems while abroad requires strong encryption at all times.


PERSONALLY-OWNED DEVICE SECURITY
If a personally-owned device, including a smartphone, is taken abroad with the intention of accessing ϳԹUniversity networks or IT resources, it must adhere to the following minimal requirements:

PRIVACY, OPERATIONS, and MONITORING

ϳԹUniversity seeks to maintain its IT environment and manage all information assets including data, computing devices, systems technology, telephony, and IT resources in a manner that respects individual privacy and promotes user trust. However, the use of ϳԹUniversity IT resources is not completely private, and users should have no expectation of privacy in connection with the use of any information asset or IT resource.
ϳԹUniversity has the legal right to access, preserve, and review all information stored on or transmitted through any information asset or IT resource, including the inspection of e-mail messages, logging of activities, monitoring usage patterns, and data audits/integrity checks. IT Services may, with or without notice to users, take any other action it deems necessary to preserve, secure, and protect systems, information assets, or IT resources for the betterment of ϳԹUniversity. Without limiting its right to take action, ϳԹUniversity may, it is sole discretion, disclose the results of any general or individual monitoring or access permitted by this policy, including the contents and records of individual communications, to appropriate ϳԹUniversity personnel and/or law enforcement agencies.

SCOPE of AFFECTED PARTIES

This policy applies to all users, such as students, faculty, and staff of ϳԹUniversity, as well as any other persons attempting to access ϳԹUniversity information assets and/or IT resources while traveling abroad.

ROLES & RESPONSIBILITIES

All ϳԹUniversity students, faculty, staff, and other parties with access to ϳԹUniversity information assets and IT resources shall be responsible for:

USERS


CIO/CISO – INFORMATION PRIVACY OFFICER


IT SERVICES STAFF


RELATED TOOLS

RELATED POLICIES & GUIDELINES
BOG#35: Information Technology Security
Acceptable Use Policy
IT Information Security & Privacy Policy

Password Guidelines
Social Security Number Guidelines
Work from Home / Remote Access Guidelines

POLICY: International Travel Security Policy
IMPACT: Data, Technology, and IT Resources
RESPONSIBLE OFFICE: IT Services
CREATED: December 9, 2022
REVISED: December 9, 2022
APPROVED BY: CIO/CISO – Information Privacy Officer
VERSION: 23.1