Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Version History

« Previous Version 23 Next »

Protecting your Devices and Resolving Security issues

  • Lehigh uses two software packages to monitor Lehigh-owned computers for malware and viruses: Malwarebytes Anti-Malware, and Avast Business Security.  These applications are centrally managed by the LTS Security team, and continuously updated.  
  • LAN File Storage servers (which house the H: and I: drives) are automatically scanned for infected files using Symantec AV, with alerts going directly to system administrators.  
  • Phishing - Google can help minimize the effect of email scams when they're notified.  
    • To report a scam email:  With the questionable message open in Lehigh Gmail, select the vertical ellipsis (three dots) next to the 'Reply' button and choose 'Report Phishing'.
  • Watch the Securing the Human video training series for help on identifying scams, as well as a host of other security-related topics.
  • The Student Technology And Repair Services (STARS) team provides in-person, onsite, and walk-up help for students, including fixing problems from virus/malware infections, hardware problems, and configuration issues.

International Travel with Computers and Electronic Devices

Overview

    • When traveling outside the United States with your computer, tablet or phone there are certain export control regulations and risks you should be aware of.   If your computing device is encrypted you may be in violation of U.S. export law as well as import law of the country you are traveling.  Since encryption can be used for illegal activities, some countries severely limit the import of computing devices that are encrypted.  This may cause you to be fined or your computer or electronic device to be confiscated.   
    • If you travel with a computing or electronic device that is not encrypted, and you have sensitive data stored on the computer, a data breach may occur if your computer is stolen.  Therefore, special care needs to be taken when traveling internationally with any computing device encrypted or not. 

Things you need to know before leaving the United States with an encrypted computing device

    • Regulations for taking encrypted devices out of the country are governed by the federal Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR).  You can take computing devices out of the country with mass marketed encryption products under the EAR license exception Temporary Exports Tools of the Trade (TMP).  To comply with the TMP, the computing device must be used for professional purposes, return to the country within 12 months and be under the control of the traveler. 
    • The TMP exception is NOT available if traveling to the following countries: Cuba, Iran, North Korea, Sudan and Syria.  If you must travel to these countries with an encrypted device, you need to apply for an appropriate export license through the U.S. Department of Commerce Bureau of Industry and Security (https://www.bis.doc.gov/)  This may take up to 90 days for review.

Things you need to know for taking encrypted devices to other countries

    • Laws and regulations governing what you can take into other countries depend on the country you are traveling to.  
    • Traveling to countries participating in the Wassenaar Arrangement  (http://www.wassenaar.org/).  Under this arrangement, one of the provisions (personal use exemption) allows you to freely enter a participating country as long as the traveler does not create, enhance, share, sell or distribute the encryption technology while visiting.  These Countries include:
    • Argentina, Mexico, Australia, Austria, Belgium, Bulgaria, Canada, Croatia, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Ireland, Italy, Japan, Latvia, Lithuania, Luxembourg, Malta, Netherlands, New Zealand, Norway, Poland, Portugal, Republic of Korea, Romania, Slovakia, Slovenia. South Africa, Spain, Sweden, Switzerland, Turkey, United Kingdom and the United States.
    • Countries that require an import license before entry with encrypted devices include:
    • Belarus, Burma (Myanmar), China, Hungary, Iran, Israel, Kazakhstan, Moldova, Morocco, Russia, Saudi Arabia, Tunisia, Ukraine.

Recommendations for International Travel

    • If you don’t need it, don’t take it. 
    • Consider taking a loaner laptop.  Library and Technology Services have a limited number of loaner laptops available.  Please contact Student Technology and Repair Services to reserve one.  
    • Decrypt your laptop or computing device and remove any sensitive data (personal and institutional) that is not needed during your trip.  
    • Leave your sensitive data at home and store it on the H: or I: drive at Lehigh.  Use the Lehigh VPN to connect from overseas if needed.  
    • Make sure your Anti-Virus software is up-to-date along with any Malware programs you have installed.


Encryption

  • Faculty and Staff computers running Windows are encrypted using Microsoft's BitLocker whole disk encryption technology.  MacOS systems use Apple's FileVault full-disk encryption (FileVault 2).
  • Keys are 'escrowed' by LTS, so that the university can retrieve data if needed.
  • If you see a message on your PC prompting for Recovery Key ID, you'll need a BitLocker recovery key to continue booting your computer.  

About Backups

  • Regardless of steps taken to protect your device and data, backups are crucial.  Please read LTS's Overview of Backup Options.
  • Lehigh expects that work product files are stored on LAN file servers, which are backed up by LTS.
  • For automatic backup of files stored on individual desktop systems, Code42 Crashplan is available and highly recommended for Faculty and Staff. 
  • If you have local files but cannot purchase software, you should at least backup important files using a free tool such as the Apple's Time Machine for macOS, Google Backup and Sync, or 'Backup and Restore' in Windows.




  • No labels