Travel Requirements
International Travel Requirements
Employee Access and University-Owned Devices
All employees that plan to travel internationally must adhere to the following:
- Notify IT of your travel plans in advance to ensure that the plan for your device is updated for international travel to avoid excessing roaming charges
- Mifi devices will not work when traveling abroad
- Do not use free/public wireless networks whenever possible
- Do not bring university-owned devices that are encrypted
- Avoid using VPN services
- Do not share TROY credentials with anyone for any purpose
- Do not carry (electronically) sensitive research or data that the University considers as Protected or Sensitive (review ePolicy Section 800)
- Request an IT review of all devices taken on the trip immediately upon return
Additional information is provided below.
Wireless/Cellular Plans (Roaming Charges)
All employees that plan to use university-provided wireless phones must contact Information Technology or submit a Helpdesk ticket to ensure that the wireless plans are modified for international use. This is not an automatic process; IT must be aware of the travel and update the plan in advance. Failure to do so will result in high roaming charges for all activities, including phone calls, text messaging, checking e-mail and accessing websites.
Wireless (WiFi) Access
Wireless mifi devices will not work when traveling abroad.
Avoid free/public wireless networks whenever possible. These networks are very insecure, and it is not difficult for someone else on the wireless network to view and save your traffic, including credentials that you use and which websites you visit.
Encrypted Devices
Most University-owned devices are encrypted. IT strongly suggests that employees DO NOT carry TROY-owned encrypted devices with them.
The export or import of certain goods, services, information and materials (including some fairly common items) is restricted by the laws of the U.S. and other countries. Items that may be affected by export and import restrictions include:
- Laptops and other electronic devices
- Certain kinds of technologies (including software)
- Research or technical data.
The simple release of information or technical data to a foreign entity or foreign national in the U.S., through a visual inspection, verbal exchange or by email or internet can be an export controls violation. Encrypting laptops and other electronic devices is often a way to protect sensitive data (a method that Troy University employs). However, many countries, including the U.S., restrict encrypted devices from entering the country. The devices may be requested to be unlocked during various inspections points in the U.S.
Virtual Private Network (VPN)
Only use a VPN connection if no other option exists. VPN may work but some foreign telecommunications providers consider the use of a VPN to be a violation of government policies.
Credential Management
Do not share your credentials with anyone, for any purpose. This includes your username and password to your devices, e-mail, Self-Service and all other services. In addition, do not reveal your passwords to anyone, including university staff, regardless of the communication method used to convey information.
Additional Information
Gmail is often blocked in China. Although Troy University doesn’t support or endorse Gmail, many users employ the services on their phones, and, is required for Android-based devices. The relationship between Google and China is complicated and changes frequently.
Upon Return
After returning from international travel ensure that you request an IT review of all technology that was taken on the trip. This is so we may verify that the devices have not been compromised (malware, viruses). Malware is frequently discovered on devices that were used during international travel.