Apply
  1. U of R Home
  2. IS
  3. Information Security
  4. Personal Security Resources

Personal Security Resources

Traveling with University of Regina assets, including data, and computer equipment requires special consideration and preparation.

Employees are required to complete a Travel Authorization Request Form prior to departure on University travel. Refer to University of Regina Travel Policy.

Travel Advisory: International Travel

As academic collaboration continues across borders, members of the University of Regina community are responsible for checking the status of the destination and for exercising appropriate caution when traveling for academic or research purposes. Please review the following considerations and resources before your trip.

The following guidelines are designed to help travelers secure their devices and work-related information while traveling.

What should I do to prepare prior traveling?
  • Create an out of office automated reply, if applicable.
  • Access your voicemail by calling 306-585-4800 and using your 4-digit mailbox number along with your passcode.  If forwarding voicemail messages to email is desired, please contact the IS Service Desk for help.
  • Ensure you have strong passwords for UofR related services according to the password guidelines.
  • Ensure your Antivirus is current and actively running scans.
  • Backup your devices before traveling. Should your device be lost or stolen, your data will be stored safely elsewhere. Do not store the backup on portable media, such as a USB drive, and pack it with your luggage. Leave the backup at home, or at the office in an appropriately locked storage.
  • Travel light: Plan to bring a minimum number of devices. Reducing the number of devices that are being traveled with reduces the risk of compromise. Do not bring a device unless it is required.
  • Ensure all devices are configured to use a password, passphrase, or passcode. Ensure the passcode or password is automatically enabled when the device is unattended, locked, or sleeps. Never store the passcode with or on the device.
  • Remove all sensitive, or personal data from devices before traveling. For example, on a smartphone or tablet, prior to traveling it is recommended that you save your data, reset to factory defaults, and restore your backup when you return. For laptop computers, remove any documents containing personally identifiable data, confidential data, or institutional data from your computer.
  • Have your unit head contact the IS Service Desk 1 week prior to make arrangements, if a temporary device is desired for travel.
  • Ensure the University of Regina VPN client is installed. The VPN client should be used when accessing University services across the internet.
    • The VPN tunnel does not encrypt all traffic. Only traffic destined for University Network services is encrypted. See, technote for installation of the VPN client for multiple types of devices.
    • When traveling to countries listed in the OFAC sanctions list, there may be restrictions on using American made software such as the Fortinet VPN software used by the University of Regina.  Please review sanctions before travel.
  • Familiarize yourself with the Information Security policy. These policies apply when you are traveling for university business.
  • Complete the online Information Security Awareness Training.
    • The Information Security Awareness Training is designed to raise awareness about information security, good information security practices, and related policy in order to help prevent unintentional compromises of sensitive information and computing systems. 
    • Specific topics related to traveling include handling of confidential data, physical security, wireless access points, recognizing and reporting a security incident, and working in public places.
How do I connect to some University of Regina software/applications if off-campus?
  • Ensure the VPN client is installed.
  • The VPN client should be used when accessing University services across the internet.
Note: The VPN tunnel does not encrypt all traffic. Only traffic destined for University Network services is encrypted. See, technote for installation of the VPN client for multiple types of devices.
What security risks should I be aware of while traveling?
  • Do not plug your phone or tablet into public USB chargers or kiosks. This can be a threat to the data on the phone as the cable may be connected to a hostile computer or device designed to infect your phone.
  • It is recommended to only use your own trusted chargers, cables, and power supplies.
  • Do not leave your devices unattended. Do not assume that a computer or mobile device left in a hotel room will be secure.
  • Do not share your device with anyone else.
  • Avoid using public computers when possible, such as those provided by libraries, hotels, etc.
  • Minimizing the amount of sensitive data created, stored, and transmitted is important in reducing information security risk.
Are Public (internet) Networks safe to use?
  • Public networks are often unsecured and potentially monitored by the service provider, use caution when connecting to the internet using public networks.
  • When possible, limit your use to casual browsing, example: checking the news, looking up restaurant or flight information, etc.
  • If required, use VPN when accessing University network services.
What should I do when I return from travels?
  • If account compromise as a result of travel is suspected, change your uregina.ca password, and Banner password (if applicable): Instructions for changing password accounts.
  • If any signs of an loss of confidentiality, data integrity, or data loss occur as a result of travel, follow the directions to report an information security incident.

Physical Security

  • To reduce the risk of data loss or compromise from physical threats it is recommended that the following precautions be practiced. 
Lock your computer/laptop if unattended

If you are away from your computer, lock it so that a password is required for log in. 

Ensure that computers/laptops automatically lock after a period of being idle and require a password to unlock

Configure your screen saver to lock after a short period of idle and require a password to unlock.

Windows 10

  1. Right-click on your Windows 10 desktop, and select Personalize, then click on "Lock screen" in the left pane.
  2. Scroll down the Lock Screen settings and click on "Screen Saver Settings".
  3. Enter the maximum idle time before screen locks in minutes in the "Wait" box. Recommended to be as short as reasonable, but not longer than 60-minutes. 
  4. Click on the On resume, display logon screen option, and click "Apply".

Windows 11

  1. Open the Start menu and go to “Settings”
  2. Click on “Personalization”.
  3. Select “Lock Screen”.
  4. Select “Screen Saver”.
  5. Choose a screen saver from the drop down menu or select None if you want a blank screen.
  6. Set the “Wait” time to the desired length before the system locks.
  7. Check “On resume, display logon screen”.

Mac

Apple Support

  1. Open System Settings.
  2. Select the "Lock Screen" menu item.
  3. Under “Start Screen Saver when inactive”, set a time (ex: 5 minutes).
  4. "Require password after screen saver begins or display is turned off", choose Immediately (or a delay if preferred).
Other Phyical Security Tips
  • Keep sensitive data on approved storage locations rather than on local desktops or laptops, as local machines can be more easily stolen.
  • Shut down or lock devices when not in use.
  • Secure devices in public areas with lock and key when possible.
  • Hard copies containing sensitive information should be kept in locked storage, and make a habit of turning documents face down.
  • Minimize the amount of printing. Paper copies can lead to information breaches. Also, ensure sensitive documents are properly disposed of by shredding.
  • Exercise caution when using public terminals.
  • Do not use found physical media such as USB sticks.
  • Minimize use of portable media such as memory sticks or portable hard drives as they are vulnerable to loss, damage or compromise.