Vigilantly staying on top of one's private communications is simply a good practice when traveling within the states. Things get slightly hairier when you travel abroad, because there are compatibility issues to consider too.
1. Don't Use Open Wi-Fi:
Careful people don't even peruse private accounts on Wi-Fi networks at Starbucks in Dallas, let alone China. If you think your sentence-long password is going to protect your data, you're probably wrong
. And if you're not wrong today, you'll be wrong tomorrow.
2. Use "Burner" Accounts":
These are exactly what they sound like. Companies often advise (or require) that their employees use burner email addresses and passwords that will be deleted once they return. Nothing else is allowed in the account except for communications between companies and the employees, and extremely sensitive material will be kept to a minimum. Part of the rational behind the burner is that old accounts are a treasure trove of sensitive account information that will help hackers identify targets.
3. Employ PGP -- When Practicable: "Pretty Good Privacy" encryption
is a way of hiding one's private communications by employing a stream of public and private encryption keys. The key is encrypted using the public key, but can only be unlocked with the private key -- or about a billion years of continuous brute force. The mathematics behind PGP are beyond this post, but companies and attorneys should really consider this option. Apps for PGP are available in proprietary form.
4. Make Use of VPNs
: The advantages with using VPNs are not as strong as they once were, but they're certainly better than going naked. Keys must be updated at an almost ridiculous rate: at least twice a month if not more frequently.
As Krysia Lenzo so aptly points out
, one cannot count on autocratic countries to abide by customs of "fair play and substantial justice." But who are we Americans to talk? Remember PRISM, anyone? Because it sure remembers you...