On the road

On this page you will find advice on information security when working remote. Regardsless of whether you are working from home or when travelling.


Stay safe - also when working on the road

After the coronavirus pandemic, working from home and working on the go has become a normal part of everyday life for many of us. But the level of security is not the same on a train, in a library or in a hotel lobby as it is at the university.

You should be careful about your routines and behaviour so that you can help maintain a high level of security at the university wherever you’re working.

If you're travelling to high-risk countries for work, you need to take extra precautions. See below.


Good advice when you're on the road

IT security when travelling

Employees and students should make sure they are aware of IT security – also when travelling.

  • Be careful when using your PC, mobile phone or tablet outside AU's secure network.
  • Make sure that your equipment is encrypted and updated, and that you only use authorised browsers and apps.
  • Also think about how you treat and store your device during a trip so that it is not lost or stolen.

The Centre for Cyber Security (CFCS) and the Ministry of Foreign Affairs of Denmark have prepared guidelines/publications and advice on IT security when travelling.

Business trips to high-risk countries

Be extra vigilant about information security when travelling to high-risk countries:

  • Take as little equipment with you as possible - a 'clean' PC and only the data that is absolutely necessary and relevant on an encrypted USB stick.
  • Contact your local IT support team if you need to borrow a 'clean' PC. Borrowed 'clean' PCs must be returned to your IT support team after travelling to high-risk countries - the PC must not be reconnected to the AU network after returning home. 
  • Limit access to AU data on your PC during your trip. You may have to log on to your PC and leave it with the authorities for checking at the airport before you are allowed to enter the country. This increases the risk of installing spyware and malware as well as the possibility of copying data. 
  • Use VPN every time you access a network - don’t use Wi-Fi in hotels or at conferences. Someone might be looking over your shoulder if you use Wi-Fi. (in some cases however, you may not be able to access VPN if it’s blocked by the digital wall.)
  • Set up two-factor authentication for access to your email.
  • Limit direct access to AU data from your phone as much as possible.
  • Think carefully about what you store in the safe deposit box in your hotel room, as hotel staff have access to the safe deposit box and may be forced by the authorities to give them access to the box.
  • If you have the slightest suspicion that your device or user login has been compromised, contact your IT support team to take the necessary steps.

See also the page on the AU website on Security in International Research and Innovation Collaboration (URIS).


See also instructions and recommendations from CFCS (Centre for Cyber Security), the Ministry of Foreign Affairs of Denmark and PET (Danish Security and Intelligence Service).

Use VPN when working on wireless networks in public places

Be careful when using Wi-Fi in airports, cafés or in other public places. There is a risk that sensitive information can be intercepted and misused when working in public places.  

Only log on to Wi-Fi that requires a password. When working on Wi-Fi in public places it is a good idea to use VPN. That encrypts the communication between the device you are using and AU's systems.

Delete Wi-Fi from your phone and computer when it is no longer relevant.

If you have been connected to a public network at the airport or in other public places, you should delete it afterwards.

See how you access VPN

Use privacy filters on your computer and phone

A privacy filter is a plastic filter that you stick on the screen of your computer or phone and is especially useful if you often work in public spaces.

With a privacy filter, unauthorised persons cannot read what's on your screen from the side. The screen can only be read by the person holding it in front of them.

The AU IT webshop sells privacy filters. Select 'unspecified product'. Then type in which product you need the filter for.

Consider what you are sharing in online meetings

Who will participate in the meeting? 

Who is permitted to participate in the meeting depends on what types of data will be shared at the meeting. Read about AU’s four data classifications.

Open meetings where everyone with a link can participate

It is easy for external participants to hide their identity behind an avatar or fake photo in open online meetings.  

When you conduct an open online meeting it is important that you have control over who participates to avoid externals interupting your meeting with e.g. malicious audio, video, chat and/or screen sharing. To have better control over who enters the meeting, you can use a meeting password, the waiting room feature or mandatory registration. 

If you do not wish to use these features, you should change your meeting to a webinar. That way, you will automatically get control over who participates with video, audio, chat and screen sharing. 

Closed meetings are only possible with a personal invitation

Consider if the participants should use a password to enter the meeting. 


Be aware of what you are sharing on your screen

When you participate in an online meeting and have to give a presentation, take care that you do not reveal more than you intend.

Sharing a screen, program or presentation can sometimes mean that other participants see your notes and other internal information. When you share your screen, close all other unnecessary programs and avoid showing your desktop, so that only the presentation, photo or document is shown to all participants. This will help you keep check of what the other participants can see.   


Useful links

Do not share sensitive topics in public, on social media or text messages

When you are working from cafés, hotels, trains and busses, anyone can listen in. This increases the risk of unauthorised persons gaining access to confidential information about products, data, colleagues and partners. This applies to both digital and physical meetings. This may also apply when working from home.

Use headphones so that unauthorised listeners can only hear one part of the interview. This will help to protect your conversation partners and their information.

Social media

It is easy to leak internal, confidential and sensitive data if you post photos or video material from your place of work on social media. Therefore, be particularly careful with work-related tasks and information you share on social media. Avoid photos of screens, communication equipment, notes and documents.  

Text messages and similar messaging services

Many people are not aware that the information they send via messaging services, especially ordinary text messages, is sent in clear text. This means that the messages are not protected and can be read by others if they are intercepted. Therefore, consider whether your message needs to be protected and, if so, use an encrypted message service instead.  

Keep your equipment updated

All AU-computers (PC and Mac) are updated automatically with the software provided by AU..

If you have an AU smartphone and/or tablet, you must update the operating system and apps yourself.

As a general rule, only use systems and software provided by AU

IT security is in order when it comes to the systems and software provided by AU.

If you have needs beyond what AU makes available, please contact your local IT support team before downloading any new apps.

This will help IT support and AU IT ensure that the basic IT security is in order and that the procurement rules have been complied with. 

Read the guidelines for acquiring new systems.

Manage your documents carefully, no matter where you are

Do you use printed documents, USB flash drives or other material, and do you store documents and media from home or when you are on the move? Then consider whether the information is internal, sensitive or confidential, and whether it should be withheld from others.


Remember to lock your screen

Always use screen lock, no matter where you are, so that unauthorised persons do not get access to AU data.  


Printed documents

Do not throw away AU documents with internal, sensitive and/or confidential information or data in your own bin or in a shared bin. Get an approved shredder for your home office or bring the documents to AU and shred them there. 

Also make sure that AU documents are not lying around so they can be seen by visitors or passers-by.


Useful links