www.CostaRicaTicas.com https://forum.costaricaticas.com/ |
|
Advice on taking my laptop computer? https://forum.costaricaticas.com/viewtopic.php?f=1&t=30234 |
Page 1 of 3 |
Author: | Jebapafu1 [ Sat Aug 22, 2009 9:08 pm ] |
Post subject: | Advice on taking my laptop computer? |
First time taking my laptop with me on a trip. Will be leaving for CR in a day or so on a whim. Anyone have any advice on keeping it safe at the hotel?.....any tricks of the trade? |
Author: | Steven1 [ Sat Aug 22, 2009 9:22 pm ] |
Post subject: | |
I have taken a laptop with me on each and every trip; left it out in the hotel room, etc., etc. Never a problem. Hotels used: Castillo and Amistad. It's gonna depend on where you stay as to whether or not you're going to "feel safe" in just leaving it out. Which hotel are you using, that will help in steering you in the "safe" direction..... |
Author: | Jebapafu1 [ Sat Aug 22, 2009 9:25 pm ] |
Post subject: | |
Steven1 wrote: I have taken a laptop with me on each and every trip; left it out in the hotel room, etc., etc. Never a problem. Hotels used: Castillo and Amistad.
It's gonna depend on where you stay as to whether or not you're going to "feel safe" in just leaving it out. Which hotel are you using, that will help in steering you in the "safe" direction..... Probably Castillo...I like the atmosphere of that place |
Author: | SnapperTrapper [ Sat Aug 22, 2009 9:26 pm ] |
Post subject: | Re: Advice on taking my laptop computer? |
Jebapafu1 wrote: First time taking my laptop with me on a trip. Will be leaving for CR in a day or so on a whim.
Anyone have any advice on keeping it safe at the hotel?.....any tricks of the trade? I bring my laptop all the time and stay at the Castillo, never had a problem. |
Author: | HikerTom [ Sun Aug 23, 2009 12:26 am ] |
Post subject: | |
I bring mine too on every trip, no problems. However, don't carry it with you if you decide to walk somewhere, as you'd be just asking to get robbed. Leave it safely behind in your room. |
Author: | Dramatist [ Sun Aug 23, 2009 2:29 am ] |
Post subject: | Re: Advice on taking my laptop computer? |
Jebapafu1 wrote: First time taking my laptop with me on a trip. Will be leaving for CR in a day or so on a whim.
Anyone have any advice on keeping it safe at the hotel?.....any tricks of the trade? I bring my macbook everywhere I go. Depending on it's size most safes accommodate them. Having never stayed at the Castillo I'm not sure of their safes dimension so the others will have to chime in with some intel. A rule of thumb; never, and I mean NEVER leave it unattended while in public - you'll be amazed at how quickly these things can sprout legs! . Most laptops have a hole on the side which is used to house a security cable. http://us.kensington.com/html/11179.html Wish a safe journey! |
Author: | LionKing [ Sun Aug 23, 2009 2:39 am ] |
Post subject: | |
If you take any pictures and put them on the laptop email them to yourself. TSA will sometimes check your computer for images upon your arrival back into the USA. Also, get a copy of the Ticas I.D. from your hotels receptionist to cover your ass just in case. These Ticas may be legal but they look young enough to cause problems, specially if you like spinners. Just my 2 cents. Enjoy your trip. |
Author: | El Viejo [ Sun Aug 23, 2009 8:26 am ] |
Post subject: | |
I take my laptop and stay at Castillo. I feel perfectly safe there. Even so, when I'm not using the laptop, I put it in a dresser drawer under some clothes...out of sight. To me that's simply a normal travel precaution. |
Author: | Pacifica55 [ Sun Aug 23, 2009 10:51 am ] |
Post subject: | |
You can add SL to the list of "safe for laptops" hotels. I stayed for weeks at a time and left my laptop on the table next to the bed whether I was in the room or not. Never a problem at all. Quote: TSA will sometimes check your computer for images upon your arrival back into the USA.
Has anyone had this happen? I know they can check your laptop but I am wondering how often they actually do.... |
Author: | Steven1 [ Sun Aug 23, 2009 11:30 am ] |
Post subject: | |
Pacifica55 wrote: Quote: TSA will sometimes check your computer for images upon your arrival back into the USA. Has anyone had this happen? I know they can check your laptop but I am wondering how often they actually do.... Not once; never; not in over 17 trips in under the past 20 months....port of entry is always Houston....I heard tell them North Carolina hall monitors are a bit more aggressive.... |
Author: | Skink [ Sun Aug 23, 2009 11:38 am ] |
Post subject: | |
One time flying out of Ft. Lauderdale I had a TSO say he needed to check my laptop. He only had it for about 20 seconds so I'm thinking it was just to see if it would boot up normally. |
Author: | Patriot [ Sun Aug 23, 2009 12:00 pm ] |
Post subject: | |
Not being a lawyer these statements may be wrong: I'm not sure TSA can do anything except check your lap top for explosive residue. The contents of the hard drive are considered private and I believe it would be viewed as an invasion of privacy if they "searched" it with out just cause or some sort of evidence or warrant to show they needed to. If they asked me to boot it up I would do so, but as far as anything else is concerned no. Same thing with a digital camera. I have been asked to turn on my laptop and or my camera but that is as far as it went. The few times it happened as soon as they saw it starting to boot they said OK. I look at it that they are doing their "Due Diligence" by asking for this. |
Author: | SnapperTrapper [ Sun Aug 23, 2009 12:08 pm ] |
Post subject: | |
Skink wrote: One time flying out of Ft. Lauderdale I had a TSO say he needed to check my laptop. He only had it for about 20 seconds so I'm thinking it was just to see if it would boot up normally.
TSA officers are supposed to regularly check laptops along with other electronics on the ETD machines. They run a swipe over the laptop with a swab and place the swab in the machine that checks for traces of explosives. According to S.O.P. that machine should be continuously used to check for threats. Also, officers can seize your laptop without much probable cause. It’s not a common practice but they do have that option….. The price we have to pay for security/safety I guess. http://www.huffingtonpost.com/alan-rose ... 13374.html ![]() |
Author: | Dramatist [ Sun Aug 23, 2009 12:13 pm ] |
Post subject: | |
deleted |
Author: | Dramatist [ Sun Aug 23, 2009 12:14 pm ] |
Post subject: | |
The CBP can and will detain any electronic device it perceives a "threat" U.S. Customs and Border Protection Policy Regarding Border Search of Information July 16,2008 This policy provides guidance to U.S Customs and Border Protection (CBP) Officers, Border Patrol Agents, Air and Marine Agents, Internal Affairs Agents, and any other official of CBP authorized to conduct border searches (for purposes of this policy, all such officers and agents are hereinafter referred to as "officers") regarding the border search of information contained in documents and electronic devices. More specifically, this policy sets forth the legal and policy guidelines within which officers may search, review, retain, and share certain information possessed by individuals who are encountered by CBP at the border, functional equivalent of the border, or extended border. This policy governs border search authority only; nothing in this policy limits the authority of CBP to act pursuant to other authorities such as a warrant or a search incident to arrest. A. Purpose CBP is responsible for ensuring compliance with customs, immigration, and other Federal laws at the border. To that end, officers may examine documents, books, pamphlets, and other printed material, as well as computers, disks, hard drives, and other electronic or digital storage devices. These examinations are part of CBP's long-standing practice and are essential to uncovering vital law enforcement information. For example, examinations of documents and electronic devices are a crucial tool for detecting information concerning terrorism, narcotics smuggling, and other national security matters; alien admissibility; contraband including Ch*ld pornography, monetary instruments, and information in violation of copyright or trademark laws; and evidence of embargo violations or other import or export control laws. Notwithstanding this law enforcement mission, in the course of every border search, CBP will protect the rights of individuals against unreasonable search and seizure. Each operational office will maintain appropriate mechanisms for internal audit and review of compliance with the procedures outlined in this policy. B. Review of Information in the Course of Border Search Border searches must be performed by an officer or otherwise properly authorized officer with border search authority, such as an ICE Special Agent. In the course of a border search, and absent individualized suspicion, officers can review and analyze the information transported by any individual attempting to enter, reenter, depart, pass through, or reside in the United States, subject to the requirements and limitations provided herein. Nothing in this policy limits the authority of an officer to make written notes or reports or to document impressions relating to a border encounter. C. Detention and Review in Continuation of Border Search (1) Detention and Review by Officers. Officers may detain documents and electronic devices, or copies thereof, for a reasonable period of time to perform a thorough border search. The search may take place on-site or at an off-site location. Except as noted in section D below, if after reviewing the information there is not probable cause to seize it, any copies of the information must be destroyed. All actions surrounding the detention will be documented by the officer and certified by the Supervisor. (2) Assistance by Other Federal Agencies or Entities. (a) Translation and Decryption. Officers may encounter information in documents or electronic devices that is in a foreign language and/or encrypted. To assist CBP in determining the meaning of such information, CBP may seek translation and/or decryption assistance from other Federal agencies or entities. Officers may seek such assistance absent individualized suspicion. Requests for translation and decryption assistance shall be documented. (b) Subject Matter Assistance. Officers may encounter information in documents or electronic devices that is not in a foreign language or encrypted, but that nevertheless requires referral to subject matter experts to determine whether the information is relevant to the laws enforced and administered by CBP. With supervisory approval, officers may create and transmit a copy of information to an agency or entity for the purpose of obtaining subject matter assistance when they have reasonable suspicion of activities in violation of the laws enforced by CBP. Requests for subject matter assistance shall be documented. (c) Original documents and devices should only be transmitted when necessary to render the requested assistance. (d) Responses and Time for Assistance. (1) Responses Required. Agencies or entities receiving a request for assistance in conducting a border search are to provide such assistance as expeditiously as possible. Where subject matter assistance is requested, responses should include any findings, observations, and conclusions relating to the laws enforced by CBP. (2) Time for Assistance. Responses from assisting agencies are expected in an expeditious manner so that CBP may complete its border search in a reasonable period of time. Unless otherwise approved by the principal field official such as the Director, Field Operations or Chief Patrol Agent, responses should be received within fifteen (1 5) days. This timeframe is to be explained in the request for assistance. If the assisting agency is unable to respond in that period of time, CBP may permit extensions in increments of seven (7) days. For purposes of this provision, ICE is not considered to be a separate agency. (e) Destruction. Except as noted in section D below, if after reviewing information, probable cause to seize the information does not exist, any copies of the information must be destroyed. D. Retention and Sharing of Information Found in Border Searches (1) By CBP. (a) Retention with Probable Cause. When officers determine there is probable cause of unlawful activity-based on a review of information in documents or electronic devices encountered at the border or on other facts and circumstances-they may seize and retain the originals andlor copies of relevant documents or devices, as authorized by law. (b) Other Circumstances. Absent probable cause, CBP may only retain documents relating to immigration matters, consistent with the privacy and data protection standards of the system in which such information is retained. (c) Sharing. Copies of documents or devices, or portions thereof, which are retained in accordance with this section, may be shared by CBP with Federal, state, local, and foreign law enforcement agencies only to the extent consistent with applicable law and policy. (d) Destruction. Except as noted in this section, if after reviewing information, there exists no probable cause to seize the information, CBP will retain no copies of the information. (2) By Assisting Agencies and Entities. (a) During Assistance. All documents and devices, whether originals or copies, provided to an assisting Federal agency may be retained by that agency for the period of time needed to provide the requested assistance to CBP. (b) Return or Destruction. At the conclusion of the requested assistance, all information must be returned to CBP as expeditiously as possible. In addition, the assisting Federal agency or entity must certify to CBP that all copies of the information transferred to that agency or entity have been destroyed, or advise CBP in accordance with section 2(c) below. (i) In the event that any original documents or devices are transmitted, they must not be destroyed; they are to be returned to CBP unless seized based on probable cause by the assisting agency. (c) Retention with Independent Authority. Copies may be retained by an assisting Federal agency or entity only if and to the extent that it has the independent legal authority to do so-for example, when the information is of national security or intelligence value. In such cases, the retaining agency must advise CBP of its decision to retain information on its own authority. E. Review and Handling of Certain Types of Information (1) Business Information. Officers encountering business or commercial information in documents and electronic devices shall treat such information as business confidential information and shall take all reasonable measures to protect that information from unauthorized disclosure. Depending on the nature of the information presented, the Trade Secrets Act, the Privacy Act, and other laws may govern or restrict the handling of the information. (2) Sealed Letter Class Mail. Officers may not read or permit others to read correspondence contained in sealed letter class mail (the international equivalent of First Class) without an appropriate search warrant or consent. Only articles in the postal system are deemed "mail." Letters carried by individuals or private carriers such as DHL, UPS, or Federal Express, for example, are not considered to be mail, even if they are stamped, and thus are subject to a border search as provided in this policy. (3) Attorney-Client Privileged Material. Occasionally, an individual claims that the attorney-client privilege prevents the search of his or her information at the border. Although legal materials are not necessarily exempt from a border search, they may be subject to special handling procedures. Correspondence, court documents, and other legal documents may be covered by attorney-client privilege. If an officer suspects that the content of such a document may constitute evidence of a crime or otherwise pertain to a determination within the jurisdiction of CBP, the officer must seek advice from the Associate/Assistant Chief Counsel or the appropriate U.S. Attorney's office before conducting a search of the document. (4) Identification Documents. Passports, Seaman's Papers, Airman Certificates, driver's licenses, state identification cards, and similar government identification documents can be copied for legitimate government purposes without any suspicion of illegality. F. No Private Right Created This document is an internal policy statement of CBP and does not create any rights, privileges, or benefits for any person or party. |
Page 1 of 3 | All times are UTC - 5 hours [ DST ] |
Powered by phpBB® Forum Software © phpBB Group https://www.phpbb.com/ |