![]() The page will reload, and the ID should be listed to the right of "Meeting ID". Sign into the UT Zoom web portal with your EIDĭo not select 'Recurring meeting', even if your meeting is part of a series.Ĭlick 'Save'. If you are posting about a meeting on a public resource (for example, a departmental website), we recommend generating a unique ID. Although they are less convenient than using a recurring meeting ID or your personal Zoom room, unique IDs make it harder for previous disruptive participants to join future meetings. If one of your previous meetings was compromised, a similar disruption could happen again if you use the same ID. To join a meeting, participants provide a 9- or 10-digit ID number unique to said meeting. BEFORE THE MEETINGīefore your meeting begins, consider the below options to reduce the likelihood of unwelcome or disruptive participants joining your event. Here are a few quick steps you can take to make it more difficult for uninvited guests to join and participate in your meetings. This page contains a number of tools you can employ to improve the security of your Zoom meetings. If you are unable to use a webinar license, require participants to register. NOTE: Sign in with your UT EID and password to view this article.If you have a one-time requirement for a webinar room you can request a temporary license by following steps in this article.Please send an email to for more information.If you have a recurring use case for a webinar room, we recommend purchasing a webinar license.If you are a registered student organization please contact for access to a webinar license.A webinar will give you control over who participates with video, audio, chat, and screen sharing.NOTE: A webinar license is necessary for the conversion.Convert your meeting to a webinar ( here’s how).If you must have a public Zoom event (post the Zoom link publicly via social media, website, etc):.For more information please see reporting a participant for inappropriate behavior Report instances of Zoombombing to Information Security Office by sending email of the incident to Meeting host can also report instances of Zoombombing during and after a Zoom meeting.Hosts can then re-enable participants to share video and use chat after malicious actor are removed and the session can be unlocked if necessary. You may also remove the participant and submit a report for the user through Zoom This will allow the host to report and remove malicious actors.Ĭlick the Security icon on the bottom Zoom toolbar In a Zoombombing situation, Suspend Participant Activity allows a host to immediately suspend all participants from sharing camera, using microphones, chat, screenshare, annotation, and the meeting will become locked to prevent new participants from joining. Most of these are perpetrated via publicly available Zoom links however, not all depending on your settings. These uninvited guests share their screens to bombard real attendees with offensive content. Zoombombing is the term for when individuals "gate-crash" Zoom meetings. The following article includes many steps to better prevent unwanted disruptions during Zoom calls. To maintain the integrity of your Zoom meeting or webinar, you may take advantage of several features offered in Zoom at UT. Zoom Privacy and Security | Zoom retweet icon bullhorn icon reply icon info icon flickr icon tumblr icon vimeo icon reddit icon podcast icon angle-down icon angle-left icon angle-right icon angle-up icon ban icon hamburger icon book icon bookmark icon bug icon caret-down icon caret-left icon caret-right icon caret-up icon chain icon check icon check-circle icon chevron-down icon chevron-left icon chevron-right icon chevron-up icon circle icon circle-o icon clone icon close icon download-cloud icon code icon download icon ellipsis icon envelope icon warning icon external-link icon eye icon eye-slash icon facebook icon github icon google-plus icon heart icon heart-o icon home icon info-circle icon instagram icon linkedin icon lock icon medium icon minus-circle icon send icon pause-circle icon play-circle icon plus-circle icon question-circle icon quote-left icon quote-right icon rss-square icon search icon share-alt icon slack icon snapchat icon ticket icon twitter icon wheelchair icon youtube icon
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |