Body
Zoom offers multiple security options that can be configured when creating a meeting invitation or activated within an active meeting. Do NOT publicly post Zoom meeting links on social media, etc.
Security options available when creating a meeting invitation (prevent Zoombombing)
Zoom bombing, the unauthorized intrusion into Zoom meetings, can disrupt your online meetings and pose security risks. To ensure a safe and secure Zoom experience, follow these guidelines based on the best practices.
BEFORE MEETING STARTS
1. Set Meeting Passwords: Create a meeting password to add another layer of security. Attendees will need this password to access your Zoom meeting.
2. Manage Invitations: Share meeting links and passwords securely, only with intended attendees. Avoid posting links on public websites or social media. Require participants to be logged in with a UTRGV account or Zoom account.
3. Disable Join Before Host:
- This setting ensures that the host must be present for the meeting to start. Participants cannot join before the host arrives.
4. Use Waiting Rooms: Enable the waiting room feature to review and admit participants individually. This way, you can control who joins your meeting.
5. The University of Texas Rio Grande Valley has taken a proactive stance by restricting the participation of outside AI Assistants in Zoom meetings. This measure will remain in effect until there is formal approval of the desired AI Assistant from the Information Security Office. Such policies are essential in safeguarding digital communication against unauthorized access and ensuring that sensitive information remains protected.
AFTER MEETING STARTS
Educate Participants: Inform your attendees about Zoom etiquette and the consequences of disruptive behavior during meetings.
5. Lock Meetings: Lock your Zoom meeting once all intended participants have joined. This action prevents new participants from entering.
6. Monitor Participants: Be vigilant during your meetings and promptly remove any disruptive or unauthorized participants.
7. Set Up Co-Hosts: If you have co-hosts or co-workers who can help you moderate the meeting, assign them co-host privileges. They can assist in managing participants and maintaining order.
- Select Security (shield icon) at the bottom of your meeting screen and select Lock meeting or Enable Waiting Room. You can also select what participants can do such as share screen, chat, un-mute themselves, etc.
- From the participant list, select More next to a name and select put in waiting room or remove.
8. Limit Screen Sharing: Only allow specific participants to share their screens during meetings. You can restrict this feature to the host or designated presenters.
9. Control Chat Functionality: Manage chat settings to prevent participants from sending messages during your presentation. You can limit chat access to hosts or specific individuals.
10. Disable Participant Annotation: Prevent participants from annotating or drawing on the shared screen during the meeting, which can be used for disruptive purposes.
11. Update Zoom Software: Ensure you have the latest version of Zoom installed. Newer versions often include security updates and enhancements to prevent unwanted intrusions.
12. Report Zoombombing: If Zoom bombing occurs despite your precautions, report the incident to Zoom and take note of the disruptive participant's username for reference.
By implementing these security measures and staying informed about the latest recommendations, you can help protect your Zoom meetings from unwanted intrusions and ensure a productive and secure virtual gathering.
Security options once a meeting has started - using the Zoom Security Toolbar or Participant List
In-meeting security options for hosts/co-hosts:
Additional information