Body
Overview
Zoom sessions are susceptible to uninvited attendees eavesdropping or disrupting a conference. However, there are features in Zoom and cybersecurity best practices that may be employed to secure conferences.
Details / Instructions
General Meetings:
Meeting with External Guests:
Sensitive Content Meetings:
- Use only approved Zoom meeting services with unique meeting IDs and enable a password.Instruct attendees not to share the meeting ID or password.
- Restrict meeting entry to authenticated users only; this will require attendees to sign in
- Use the dashboard feature to maintain a view of all participants at all times.
- Lock the meeting once you have identified all the participants and lines in use.
- Only conduct meetings on UR approved devices.
- Do not record the session and do not allow participants to record
Public Meeting:
See Also
Zoom Video Storage Recommendations