Quick Hits

  • Customs officials can search the content on electronic devices, but Transportation Security Administration (TSA) agents cannot.
  • Companies can revise their employee handbooks to include detailed policies about how to secure electronic devices while traveling.

Recently, there have been increasing concerns about potential data breaches or disclosure of sensitive information stored on employees’ laptops, phones, and tablets as they travel for work or personal reasons.

In some cases, employees’ devices contain troves of data that must be kept private for legal or business reasons. For example, attorneys may have private information about clients, and executives may have proprietary information about a company’s products, processes, or customer lists.

The Fourth Amendment of the U.S. Constitution prohibits unreasonable searches by the government, but courts have maintained that border searches, including of digital devices,  do not require a warrant. As people enter the country, U.S. Customs and Border Patrol (CBP) can access or download photos, emails, texts, and social media activity. Putting a device on airplane mode can prevent CBP from accessing data hosted on cloud services.

CBP can retain devices for an undetermined amount of time. CBP searches aim to prevent terrorist activity, child pornography, drug smuggling, human trafficking, export control violations, intellectual property rights violations, visa fraud, and other violations.

Unlike CBP, TSA agents cannot legally search the content on a person’s devices without a warrant. They can swab devices for evidence of explosives.

The border policies and searches in other countries vary widely. For example, European privacy laws generally limit when and how border officials can search electronic devices without a warrant or reasonable suspicion.

Depending on the person’s immigration status and other factors, refusing to cooperate with a CBP search or provide passwords could result in denied entry, device seizure, or further detention. This could be disruptive to an employer’s operations or work-related events, such as a planned speech or business meeting. Having a device stolen while traveling could be equally disruptive and/or have data privacy implications for employers.

Updating and communicating written policies with workers may help to minimize the impact of border searches and theft of devices.

Next Steps

Employers with employees who travel frequently for work may wish to consider drafting new policies to protect confidential or proprietary information. This could include:

  • encouraging workers to not carry their laptops or other company devices across international borders unless it is absolutely necessary for work;
  • encouraging workers to bring a device without sensitive information on it if they travel internationally;
  • instructing employees to allow for extra time for customs searches;
  • informing workers that they can tell customs officials about their concerns regarding confidential or proprietary information;
  • instructing employees on what they should and should not do if their device is searched by customs officials or stolen;
  • requiring employees to contact internal counsel and/or the information security department if their device is confiscated or stolen;
  • encouraging workers to use strong passwords, implement two-factor authentication, and be mindful of what is available in their cloud storage; and
  • requiring workers to turn on device encryption, if possible, and turn off the device or put it on airplane mode before entering another country.

Ogletree Deakins will continue to monitor developments and will provide updates on the Cybersecurity and Privacy and Technology blogs as new information becomes available.

Dee Anna D. Hays is a shareholder in Ogletree Deakins’ Tampa office.

This article was co-authored by Leah J. Shepherd, who is a writer in Ogletree Deakins’ Washington, D.C., office.

Follow and Subscribe
LinkedIn | Instagram | Webinars | Podcasts

Author


Browse More Insights

Fingerprint Biometric Authentication Button. Digital Security Concept
Practice Group

Technology

Ogletree Deakins is uniquely situated to provide tech employers and users (the “TECHPLACE™”) with labor and employment advice, compliance counseling, and litigation services that embrace innovation and mitigate legal risk. Through our Technology Practice Group, we support clients in the exploration, invention, and/or implementation of new and evolving technologies to navigate the unique and emerging labor and employment issues present in the workplace.

Learn more
Modern dark data center, all objects in the scene are 3D
Practice Group

Cybersecurity and Privacy

The attorneys in the Cybersecurity and Privacy Practice Group at Ogletree Deakins understand that data now accumulates quickly and transmits easily. As the law adapts to technical advancements, we effectively advise our clients as they work to comply with new developments and best practices for protecting the privacy of the data that their businesses collect and retain.

Learn more

Sign up to receive emails about new developments and upcoming programs.

Sign Up Now