On 2013-03-14 at 12:37 -0700, Harvey Rothenberg wrote: > I thought that firms that send techs and admins across boarder would > be interested in this news. Do you cross boarder ? I would guess > not. Does this Group not have members that work for internationals > and some times have to cross US boarders ? This is why I posted this > piece of news.
At a level that might be more germane for LOPSA: is there anyone here whose employers have introduced travel policies about crossing borders with company equipment, and if so which borders, and how has this affected you as system administrators administering those laptops. Including those outside the US with employees who travel to the US? Will the change, within the ninth circuit only (alas), positively impact your administrative overhead, or is this a case of "Well, we knew taking stuff across borders was problematic but we'd only recently felt enough pain from risk of state-sponsored corporate espionage to sort out doing something we probably should have been doing anyway, and now we have a framework in place, we're going to stick with it as just generally safer, or at least until this decision gets backed at the federal level"? What sort of approaches have people had to deal with? Eg, "no storage devices with company data across borders, you get a loaner machine from our IT department in the other country and all the docs you need to access should be in Google Drive already. Make sure you have two-factor turned on first. If your phone is confiscated, here's the Support Dept internal business card with phone numbers on it, find a way to call in so we can disable the device, and manually reset the two-factor so you have to enable again when you're back in a trusted country" In the instances I recall hearing about, such travel policies have affected primarily travel across Chinese borders by American employees (or Chinese employees of American companies) but I can certainly see organizations in other countries having similar policies about the US (after all, who released Stuxnet, again?). Regards, -Phil _______________________________________________ Discuss mailing list [email protected] https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss This list provided by the League of Professional System Administrators http://lopsa.org/
