Data Protection at Borders
Data protection at borders encompasses the strategies and preparations that safeguard sensitive information when staff cross international boundaries with electronic devices. Border authorities in most jurisdictions possess broad powers to inspect, copy, and retain devices, with legal protections that apply domestically frequently inapplicable at ports of entry. For organisations operating across multiple countries, particularly those handling protection data, beneficiary information, or politically sensitive programme content, border crossings represent a distinct threat vector requiring specific countermeasures beyond standard device security.
The core challenge stems from a fundamental asymmetry: border agents can compel device access without the judicial oversight required for domestic searches, while staff face immediate consequences (detention, device confiscation, entry denial) for non-compliance. This asymmetry necessitates a data protection strategy that assumes inspection will occur and prepares accordingly, rather than relying on concealment or refusal.
- Border search
- Inspection of persons, belongings, and electronic devices conducted by customs, immigration, or border security officials at a port of entry. Distinguished from domestic searches by reduced or absent warrant requirements.
- Travel device
- A device configured specifically for border crossing, containing minimal data and credentials. Distinct from a staff member’s primary work device.
- Sanitised device
- A device that has been wiped and restored to a clean state containing no organisational data, used for crossing borders before being reprovisioned.
- Cloud-only configuration
- Device setup where no organisational data resides locally; all access occurs through authenticated cloud services after crossing.
- Forensic imaging
- Bit-for-bit copying of a device’s storage, capturing all data including deleted files and system artefacts. Some border agencies conduct forensic imaging during secondary inspection.
- Secondary inspection
- Extended examination conducted when initial screening identifies concerns. Device inspection typically occurs during secondary inspection rather than at the initial checkpoint.
Border Inspection Powers by Jurisdiction
Border authorities possess inspection powers that vary significantly across jurisdictions, but share common characteristics that distinguish them from domestic law enforcement. Understanding these powers informs device configuration decisions and staff preparation.
In the United States, Customs and Border Protection (CBP) conducts device searches under the border search exception to the Fourth Amendment. CBP distinguishes between basic searches (manual review of accessible content) and advanced searches (connecting devices to external equipment for analysis). Basic searches require no suspicion; advanced searches require reasonable suspicion of a legal violation, though the standard remains lower than probable cause. CBP policy permits device retention for up to five days for advanced forensic review, extendable to 15 days with supervisor approval. Encrypted devices can be held until the traveller provides credentials or CBP determines the device cannot be accessed.
The United Kingdom grants border officials powers under Schedule 7 of the Terrorism Act 2000 and the Customs and Excise Management Act 1979. Officers can require device passwords and examine device contents. Failure to comply constitutes a criminal offence carrying up to three months imprisonment under the Terrorism Act. The UK does not require suspicion for examination, though examinations under the Terrorism Act must relate to terrorism concerns.
The European Union lacks harmonised border device inspection rules, with powers varying by member state. Schengen entry points apply the Schengen Borders Code, which does not specifically address electronic device inspection. Individual states apply domestic customs law. Germany requires judicial authorisation for device searches in most circumstances; France permits searches at borders without warrant under customs law; Poland grants broad inspection powers at external Schengen borders.
Israel conducts extensive device inspection at Ben Gurion Airport, particularly for travellers visiting Palestinian territories or with Arab names. Officials routinely request social media account access and may copy device contents. Refusal typically results in device confiscation and entry denial.
China requires travellers to permit inspection of devices upon request, with penalties including device confiscation and detention. The 2017 Cybersecurity Law provides broad authority for inspection of electronic data. Reports indicate systematic installation of inspection software on devices at Xinjiang border crossings.
| Jurisdiction | Legal basis | Suspicion required | Password compulsion | Maximum retention |
|---|---|---|---|---|
| United States | Border search exception | None (basic) / Reasonable suspicion (advanced) | Not compellable; device may be retained | 5 days standard, 15 days extended |
| United Kingdom | Terrorism Act Schedule 7, CEMA 1979 | None | Criminal offence to refuse | Indefinite under Terrorism Act |
| EU (varies) | Member state customs law | Varies by state | Varies by state | Varies by state |
| Israel | Entry regulations | None | Entry conditional on compliance | Indefinite |
| China | Cybersecurity Law 2017 | None | Compellable | Indefinite |
| Australia | Customs Act 1901 | None | Criminal offence to refuse | Unspecified |
| Canada | Customs Act | None | Compellable for basic inspection | Device copies retained per policy |
These powers apply at official border crossings. Internal movement within the Schengen area, East African Community, or other free-movement zones generally does not trigger border inspection powers, though domestic law enforcement powers still apply.
Device Configuration Strategies
Device configuration for border crossing follows one of three primary strategies, each with distinct risk profiles and operational implications. The appropriate strategy depends on the sensitivity of data typically handled, the jurisdictions involved, the frequency of travel, and organisational capacity to support travel device programmes.
+------------------------------------------------------------------+| DEVICE STRATEGY SELECTION |+------------------------------------------------------------------+| || +---------------------+ || | Data sensitivity | || | assessment | || +---------+-----------+ || | || v || +---------+-----------+ +-----------------------------+ || | Protection/ |---->| Strategy: Sanitised device | || | safeguarding data | Yes | No org data crosses border | || +---------+-----------+ +-----------------------------+ || | No || v || +---------+-----------+ +-----------------------------+ || | Politically |---->| Strategy: Cloud-only | || | sensitive content | Yes | Zero local storage | || +---------+-----------+ +-----------------------------+ || | No || v || +---------+-----------+ +-----------------------------+ || | Routine business |---->| Strategy: Travel device | || | data only | Yes | Minimal data, limited creds | || +---------+-----------+ +-----------------------------+ || | No || v || +----------------------+ +-----------------------------+ || | Mixed sensitivity |---->| Strategy: Sanitised + | || | | | cloud-only hybrid | || +----------------------+ +-----------------------------+ || |+------------------------------------------------------------------+Figure 1: Device strategy selection based on data sensitivity
Sanitised Device Strategy
The sanitised device strategy eliminates organisational data from devices before border crossing. Staff travel with devices wiped to factory state or containing only personal data unrelated to work. After crossing, devices connect to organisational systems and download necessary data. This strategy provides the strongest protection against border inspection because no sensitive data exists on the device to discover.
Implementation requires a device wiping procedure that removes all organisational data, including data in application caches, browser storage, and cloud sync folders. Full device reset to factory state represents the most reliable approach, though it requires significant time for post-crossing setup. For staff crossing borders frequently, maintaining a separate travel device that never contains organisational data reduces setup overhead.
The sanitised approach creates operational friction. Staff cannot work during transit or immediately upon arrival. Documents required for meetings must be accessed after crossing, which may be problematic if connectivity at the destination is unreliable. Organisations implementing this strategy should establish cloud-based document access that functions well over limited connectivity, or pre-position materials at the destination through alternative means.
Cloud-Only Strategy
The cloud-only strategy configures devices to access organisational data exclusively through authenticated cloud services, with no local data storage. Documents remain in cloud storage; email stays on servers; applications function in browser-based modes. The device itself contains no organisational data, only the credentials (or means to obtain credentials) for accessing cloud services.
This configuration reduces border crossing risk while maintaining some work capability during transit. If border officials inspect the device, they find no organisational data locally stored. Cloud service inspection would require the traveller to authenticate to each service, and multi-factor authentication can be configured to prevent authentication during inspection (see Credential Handling below).
Cloud-only configuration requires disabling offline access features across all applications. Microsoft 365 apps, Google Workspace, and similar services default to caching data locally for offline access. These features must be explicitly disabled:
# Microsoft 365 offline settings# Group Policy or Intune configurationOneDrive Files On-Demand: Enabled (files not downloaded until accessed)Outlook Cached Exchange Mode: DisabledTeams offline access: Disabled
# Google Workspace# Admin console settingsDrive offline access: Disabled at organisational unit levelGmail offline: DisabledBrowser-based access naturally avoids local storage, but browser caches accumulate data over time. Configure browsers to clear data on exit or use private/incognito mode exclusively for organisational access.
Travel Device Strategy
The travel device strategy uses a device specifically configured for border crossing, containing limited data and credentials. Unlike the sanitised approach, travel devices contain some organisational data, but this data is carefully curated to include only what the traveller needs and nothing sensitive.
Travel devices work well for staff who cross borders frequently with routine business needs. A programme manager attending a coordination meeting needs access to meeting documents and general programme information, not protection case files or financial records. The travel device contains the former but not the latter.
Implementing travel devices requires clear guidance on what constitutes acceptable content. Organisations should maintain a positive list of data categories permitted on travel devices rather than attempting to enumerate all prohibited categories:
Permitted on travel devices:
- Published reports and public communications
- General programme descriptions
- Meeting agendas and logistics
- Personal calendar and contacts necessary for trip
- Reference materials (standards, guidelines, public documents)
Never permitted on travel devices:
- Protection and safeguarding case data
- Beneficiary personally identifiable information
- Financial records and banking credentials
- Internal security assessments
- Staff personal information beyond what the traveller needs
- Source code or technical documentation for sensitive systems
Credential Handling During Travel
Credentials present a distinct challenge because even a sanitised device may enable access to sensitive systems if the traveller possesses valid credentials. Border officials who observe authentication credentials or compel their disclosure can access organisational systems independently of the device being inspected. Credential handling strategy must therefore address both device-stored credentials and credentials the traveller can recall or access.
+--------------------------------------------------------------------+| CREDENTIAL ACCESS ARCHITECTURE |+--------------------------------------------------------------------+| || BEFORE DEPARTURE AT BORDER AFTER CROSSING || || +----------------+ +---------------+ || | Full | | Full | || | credentials | | credentials | || | (home) | | (restored) | || +-------+--------+ +-------+-------+ || | ^ || | Credential | || | reduction Credential| || v restore | || +-------+--------+ +----------------+ +-------+-------+ || | Travel |---->| Inspection |---->| Reauth | || | credentials | | (limited | | process | || | (limited) | | access only) | | | || +----------------+ +----------------+ +---------------+ || || Components: || - Travel-only password (if compelled) || - MFA device left at origin or disabled || - Time-limited access tokens || - Credential vault inaccessible during travel || |+--------------------------------------------------------------------+Figure 2: Credential access architecture showing reduction before crossing and restoration after
Password Strategy
Staff should not travel with passwords that grant access to sensitive systems. This principle requires either not knowing the passwords (relying on password managers that are inaccessible during travel) or using temporary passwords that are rotated after crossing.
Password managers present a particular challenge. A password manager on a travel device provides access to all stored credentials if border officials compel the master password. Options for addressing this include:
Leave password manager at origin: The simplest approach removes the password manager from travel devices entirely. Staff memorise the limited credentials needed for travel (personal email, travel booking) and cannot access organisational credentials until reaching a trusted environment where they can access their password manager.
Separate travel vault: Some password managers support multiple vaults. A travel vault contains only credentials appropriate for travel; the primary vault remains inaccessible. This approach requires discipline in maintaining vault separation and does not protect against compelled disclosure of the primary vault’s master password if the official knows it exists.
Duress password: Some password managers support a duress password that opens a vault containing decoy credentials. This approach carries significant risk: if officials detect the deception, consequences may be severe, and the approach may constitute obstruction or fraud in some jurisdictions. Most organisations should avoid duress mechanisms in favour of legitimate credential limitation.
Multi-Factor Authentication Configuration
Multi-factor authentication can prevent access to organisational systems even if passwords are disclosed, provided the second factor remains unavailable. Configure MFA to require a factor that the traveller does not carry:
Hardware token left at origin: FIDO2 security keys provide the strongest protection. A staff member who leaves their security key at the origin cannot authenticate to protected systems even if they disclose their password. This approach requires organisational systems to support hardware-only authentication or fallback procedures for legitimate access needs.
Phone-based MFA with travel number: If MFA uses SMS or voice call to a specific number, that SIM card can be left at the origin. The traveller carries a different SIM for personal communication. This approach provides weaker protection than hardware tokens because officials may observe the travel number and request codes be sent to it.
Time-based tokens with device separation: TOTP authenticator apps can run on a device separate from the travel device. However, if the traveller carries both devices, both are subject to inspection.
The strongest configuration combines hardware MFA tokens that remain at the origin with authentication systems that have no fallback mechanism during the travel window. This does mean that if an emergency requires system access during travel, no access is possible until reaching a location where alternative verification can occur.
Temporary Account Provisioning
For frequent travellers or particularly sensitive destinations, organisations can provision temporary accounts with limited access for the travel period. The traveller’s primary account is disabled or has its permissions reduced; a travel account grants access only to systems and data needed for the trip.
+------------------------------------------------------------------+| TEMPORARY ACCOUNT LIFECYCLE |+------------------------------------------------------------------+| || +-------------+ +-------------+ +-------------+ || | Pre-travel | | During | | Post-travel | || | (T-24h) | | travel | | (arrival) | || +------+------+ +------+------+ +------+------+ || | | | || v v v || +-------------+ +-------------+ +-------------+ || | Primary | | Primary | | Primary | || | account: | | account: | | account: | || | Active | | Suspended | | Reactivated | || +-------------+ +-------------+ +-------------+ || || +-------------+ +-------------+ +-------------+ || | Travel | | Travel | | Travel | || | account: | | account: | | account: | || | Created | | Active | | Disabled | || +-------------+ +-------------+ +-------------+ || || Travel account access: || - Email (read-only or separate mailbox) || - Calendar (own calendar only) || - Document access (specific folders only) || - No admin rights || - No access to protection/HR/finance systems || |+------------------------------------------------------------------+Figure 3: Temporary account lifecycle for travel periods
This approach requires administrative overhead to provision and deprovision accounts, but provides strong assurance that credential disclosure during travel cannot compromise sensitive systems. The travel account credentials, if disclosed, grant access only to the limited set of resources appropriate for the trip.
Cloud Access Versus Local Storage
The decision between cloud access and local storage during travel involves tradeoffs between border inspection risk, operational continuity, and destination access conditions. Neither approach is universally superior; the appropriate choice depends on specific travel circumstances.
Cloud access minimises border inspection risk because data does not physically cross the border. However, cloud access requires reliable connectivity at the destination and may be blocked, monitored, or throttled in some countries. China’s Great Firewall blocks access to Google services, many Western email providers, and numerous cloud storage platforms. Staff travelling to China with a cloud-only configuration may find themselves unable to access any organisational resources unless the organisation maintains infrastructure accessible from within China.
Local storage ensures access regardless of destination connectivity but exposes data to border inspection. Full-disk encryption provides some protection: border officials can compel password disclosure, but encryption means they cannot access data without the password. Some jurisdictions (UK, Australia) criminalise password refusal, making encryption less protective in those locations.
The hybrid approach stores non-sensitive reference materials locally while keeping sensitive data in the cloud. A programme manager’s device might contain published reports, public guidelines, and meeting logistics locally, while case data, financial information, and internal communications remain cloud-only. This approach provides some operational continuity while limiting exposure.
Destination Access Planning
Before travel, verify access conditions at the destination:
Network availability: Will the traveller have reliable internet access? Field locations may have intermittent connectivity unsuitable for cloud-only configurations. Urban destinations typically have adequate connectivity.
Service blocking: Are organisational cloud services accessible from the destination country? Test access from the destination network before relying on cloud services for critical work. VPN use may circumvent blocking but may itself be illegal or monitored.
Monitoring and interception: In some jurisdictions, network traffic is subject to state surveillance. Cloud services with end-to-end encryption provide protection; services that rely on transport encryption only remain vulnerable to interception by entities controlling network infrastructure.
Legal restrictions: Some countries restrict or require registration for encryption use. Others prohibit VPN use. These restrictions affect which technical controls remain available.
| Destination characteristic | Recommended approach |
|---|---|
| Reliable connectivity, no blocking | Cloud-only |
| Unreliable connectivity | Local storage of non-sensitive materials |
| Service blocking (China, Iran) | Local storage or organisation-provided VPN with legal review |
| Active surveillance (varies) | End-to-end encrypted services only; minimise data transmission |
| Encryption restrictions (Russia, some Middle East) | Legal review required; may need to avoid encryption |
Pre-Departure Preparation
Preparation for border crossing begins before departure and follows a systematic process that reduces data exposure, configures credentials appropriately, and establishes verification procedures for arrival.
72-Hour Pre-Departure Checklist
Device inventory and selection (72 hours before): Identify which devices will travel. For high-risk crossings, assign a dedicated travel device rather than the staff member’s primary device. Inventory should include all electronic devices: laptop, phone, tablet, e-reader, USB drives, external storage.
Data assessment (48-72 hours before): Review data on travelling devices. Remove sensitive data by category:
- Protection and safeguarding data: Remove completely
- Beneficiary PII: Remove completely
- Internal communications with sensitive content: Archive and remove
- Financial records: Remove completely
- Source code and technical documentation: Remove unless specifically needed
- Photos and media that could identify beneficiaries or sensitive locations: Review and remove as appropriate
Cloud service configuration (48 hours before): Disable offline access for cloud services. Sign out of cloud accounts on devices that should not retain access. Clear browser data and application caches.
Credential reduction (24-48 hours before): Implement credential strategy for the trip. Rotate passwords that will change for travel. Remove password manager access or configure travel vault. Confirm MFA tokens are arranged appropriately (left at origin, disabled, or alternative configured).
Device encryption verification (24 hours before): Confirm full-disk encryption is enabled and functioning. Verify encryption uses a strong passphrase that differs from other credentials. For travel to UK, Australia, or other jurisdictions with compelled decryption laws, understand that encryption provides limited protection.
Pre-departure backup (24 hours before): Back up all devices to organisational systems before any sanitisation. This backup ensures data can be restored after crossing and provides a recovery point if devices are confiscated.
Final sanitisation (departure day): For sanitised device strategy, perform final wipe and verify. For cloud-only strategy, verify no organisational data remains in local storage.
Documentation Preparation
Travel with minimal documentation about organisational IT systems. Do not carry:
- Network diagrams or IP address lists
- Password lists or credential documentation
- Security assessment reports
- Incident response documentation
- Technical configuration details
If meetings require technical documentation, transmit it through secure channels to the destination or access it through cloud services after crossing. Physical documents are also subject to inspection.
At-Border Procedures
Border inspection procedures vary by jurisdiction and by the demeanour and decisions of individual officers. Preparation cannot anticipate every scenario, but understanding common patterns enables appropriate response.
Initial Screening
Most travellers pass through initial screening without device inspection. Device inspection typically occurs during secondary inspection, which is triggered by factors including:
- Travelling from or to specific countries
- Travel patterns that match profiles of concern
- Visa status or immigration history
- Random selection
- Officer discretion based on interaction
If referred to secondary inspection, staff should:
Remain calm and cooperative: Confrontational behaviour increases scrutiny. Border officials have broad discretion; cooperation typically results in faster processing.
Provide required identification: Passport, visa, and travel documents must be provided. Organisational identification may or may not be relevant; follow local guidance on whether to volunteer organisational affiliation.
Understand device inspection request: If officials request device inspection, clarify what is being requested. A request to power on the device (to verify it functions) differs from a request to unlock and provide access to contents.
Device Inspection Response
If border officials request device access:
Know organisational policy before travelling: Staff should understand before departure whether organisational policy permits device access under compulsion, and what the procedure is. Attempting to determine policy while standing at a border checkpoint creates confusion and risk.
For sanitised or cloud-only devices: Compliance is straightforward because no sensitive data exists on the device. Unlocking the device reveals nothing of concern. This is the advantage of the sanitised approach: compliance carries no data risk.
For travel devices with limited data: Compliance exposes the limited data on the device. If data has been appropriately curated, this exposure is acceptable. Staff should not attempt to delete data during inspection; this behaviour may be detected and may constitute obstruction.
If compelled to access cloud services: Border officials may request that travellers authenticate to cloud services during inspection. The appropriate response depends on pre-configured credential availability:
- If MFA tokens are unavailable, authentication is impossible. Explain that you cannot authenticate without the second factor.
- If temporary travel credentials are in use, authentication reveals only the limited travel account access.
- If full credentials are available and compelled, disclosure exposes cloud-accessible data.
Device retention: If officials retain the device, obtain documentation of the retention including a receipt or reference number. Report the retention to IT security upon reaching communication capability. Assume any retained device is compromised and should not be used for organisational access upon return.
Documentation During Inspection
Document the inspection as circumstances permit:
- Time and location of inspection
- Names or badge numbers of officials if visible
- What was requested and provided
- Duration of inspection
- Whether device was connected to external equipment
- Whether accounts were accessed
- Whether device was retained
This documentation supports post-crossing assessment and incident reporting if data exposure occurred.
Post-Crossing Verification
After crossing a border where device inspection occurred or may have occurred, verification procedures confirm device integrity before reconnecting to organisational systems. Even without known inspection, verification is prudent because sophisticated device compromise may not be apparent.
+----------------------------------------------------------+| POST-CROSSING VERIFICATION FLOW |+----------------------------------------------------------+| || +----------------+ || | Border | || | crossing | || | complete | || +-------+--------+ || | || v || +-------+--------+ +------------------+ || | Was device |---->| Standard | || | inspected? | No | verification | || +-------+--------+ | (reduced scope) | || | Yes +------------------+ || v || +-------+--------+ +------------------+ || | Was device |---->| Do not use | || | out of sight | Yes | device | || | >10 minutes? | | Report to IT | || +-------+--------+ +------------------+ || | No || v || +-------+--------+ +------------------+ || | Was device |---->| Full device | || | connected to | Yes | wipe before | || | external | | reconnection | || | equipment? | +------------------+ || +-------+--------+ || | No || v || +-------+--------+ || | Standard | || | verification: | || | - Check | || | installed | || | apps | || | - Review | || | profiles | || | - Check | || | certificates | || +----------------+ || |+----------------------------------------------------------+Figure 4: Post-crossing verification decision flow
Verification Procedures
Application inventory comparison: Compare installed applications against a pre-departure inventory. Unknown applications indicate potential compromise. On mobile devices, check for device management profiles that were not present before travel.
Certificate store review: Check system and browser certificate stores for certificates added during travel. Added certificates could enable traffic interception. Compare against pre-departure baseline.
Network configuration review: Verify DNS settings, proxy configuration, and VPN profiles have not been modified. Changes could redirect traffic through monitoring infrastructure.
Startup item and scheduled task review: On laptops, review startup items and scheduled tasks for additions. Malware installed during inspection may configure persistence mechanisms.
For devices that were connected to external equipment or out of sight: Do not use. Connect only to verify contents, then wipe completely before any organisational use. Assume any data on the device has been copied and any software on the device may be compromised.
Credential Rotation
After crossing, rotate credentials that may have been exposed:
- Passwords entered on the device during or after inspection
- Passwords stored on the device (if password manager was accessible)
- Any credentials disclosed to border officials
If temporary travel accounts were used, disable those accounts. If primary accounts were accessible, rotate primary credentials even without confirmed disclosure.
Incident Reporting
Report border inspection events to IT security regardless of apparent outcome:
- Confirmed device inspection with access
- Suspected device inspection (device out of sight)
- Device retention or confiscation
- Credential disclosure (compelled or observed)
- Account access during inspection
This reporting enables security monitoring for subsequent anomalous access patterns and informs organisational risk assessment for future travel to the same destination.
Implementation Considerations
For Organisations with Limited IT Capacity
Organisations without dedicated security staff can implement border data protection through policy and procedure rather than technical controls. The sanitised device approach requires no special infrastructure: staff wipe devices before departure using built-in factory reset, travel with clean devices, and set up access after arrival.
Key elements for resource-constrained implementation:
- Written policy establishing which data categories must not cross borders
- Procedure for device reset before sensitive border crossings
- Cloud-based access to organisational resources (which most organisations already use)
- Post-crossing credential rotation procedure
The cloud-only approach works well with standard SaaS tools (Microsoft 365, Google Workspace) that most organisations already use. Disabling offline access requires configuration changes in admin consoles but no additional software.
Hardware MFA tokens (FIDO2 keys) cost approximately £20-50 per device and provide strong protection against credential misuse during travel. Staff can leave tokens at the office when travelling, preventing authentication to protected systems even if passwords are disclosed.
For Organisations with Established IT Functions
Organisations with dedicated IT capacity can implement more sophisticated controls:
Travel device programme: Maintain a pool of travel devices configured for border crossing. Staff check out a travel device before departure rather than travelling with their primary device. Travel devices contain no organisational data; staff access systems through cloud services after crossing.
Mobile device management for travel: Configure MDM policies specific to travel scenarios. Travel policy profiles disable offline data access, restrict application installation, and enable remote wipe. Staff devices switch to travel profiles before departure and return to standard profiles after verified safe arrival.
Automated credential lifecycle: Integration between travel systems and identity management enables automatic credential adjustment. When a travel request is approved for a high-risk destination, systems automatically provision a travel account, suspend primary account access, and schedule restoration upon return.
Endpoint detection and response integration: EDR tools can establish device baselines before travel and detect changes after return. Automated comparison identifies installed applications, certificates, and configurations that changed during travel, flagging potential compromise for investigation.
For High-Risk Operating Contexts
Organisations operating in contexts with heightened border risk (conflict zones, authoritarian states, politically sensitive programmes) require additional measures:
No data crossing: Implement strict policy that no organisational data crosses borders under any circumstances. All devices are wiped to factory state; all access occurs through cloud services after crossing. This approach accepts operational friction in exchange for maximum protection.
Separate infrastructure by jurisdiction: For organisations with programmes in high-risk jurisdictions, consider infrastructure separation. Systems and data relating to the high-risk programme exist only on infrastructure accessible from within that jurisdiction, separate from headquarters systems. Staff working on the programme access those systems only from within the jurisdiction, never carrying access credentials across borders.
In-country device provisioning: Maintain devices within high-risk jurisdictions that never cross borders. Staff arriving in-country receive locally stored devices; departing staff return devices to local storage. This approach prevents devices that have accessed sensitive in-country systems from crossing borders.
Courier-based data transfer: For data that must move across jurisdictions, physical courier through diplomatic pouch or trusted courier service may provide stronger protection than electronic transfer, depending on the specific jurisdictions and threat model.