Data can and will be captured by border agencies – are your on-the-road personnel ready?

Data can and will be captured by border agencies – are your on-the-road personnel ready?

Data can and will be captured by border agencies – are your on-the-road personnel ready?

Does your company have a travel policy that instructs and supports employees traveling internationally for business regarding collaboration and collaboration? This is not a tricky question. to receive travel program Which provides employees with anticipated scenarios, and provides them with unique tools for international travel, a significant investment of resources, both physical and monetary.

The revelation that US Customs and Border Protection (CBP) Regularly downloads content from individuals’ devices Those entering the United States should attract the attention of every CISO. The fact that CBP routinely captures device content is not new; In fact, several lawsuits over the years have challenged the authority of the CBP, which has always been recognized as legitimate.

Handling the Secondary Interview at the Border

When one does further research, they find that these data capture incidents occur as part of a secondary inspection/interview by a CBP officer prior to being allowed entry into the United States. The time and place are important, as the CBP officer determines whether the person standing in front of them is to be allowed or denied entry into the US and asked to leave without officially entering the US. Is. You are not technically in the United States unless you are passed by a CBP officer, physically at the airport and in the CBP area.

The immediate question everyone must ask is is it the same everywhere?

The short answer is yes. Every country has a secondary screening process. I have been placed in secondary screening in Australia and the UK because my travel pattern prior to arrival was strange (even for me). In my case, it was a five-minute discussion after they emptied my bag on the table and determined that I was doing what I said I was there, and My device (I had a cellphone and a thin client tablet, both powered.) I was not asked to open either device, but if they had asked, I would have accepted because the devices were “travel devices” – That is, they were devoid of any data other than the connection to the VPN and the secure cloud environment where the data I needed for my work lived.

Border areas have unique rules

CISOs need to be aware that international border areas whether they are at an airport, port, train station, or land crossing, are intellectual property opportunities that are plundered by governments with interest or interest in the employee or company. Huh. For example, in 2019, The New York Times Unveils China’s Surveillance of Tourist Phones, In this case, the situation was far more dire than the inspection and data dump at the airport. Rather, the authorities require the installation of a specific application that allows for real-time monitoring of individuals.

Copyright © 2022 IDG Communications, Inc.

#Data #captured #border #agencies #ontheroad #personnel #ready

مقالات ذات صلة

اترك تعليقاً

لن يتم نشر عنوان بريدك الإلكتروني. الحقول الإلزامية مشار إليها بـ *

زر الذهاب إلى الأعلى
سيتات آورج 2022 سيتات آورج 2022