Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Info
iconfalse

Table of Contents

Table of Contents
maxLevel3

Related Content

Child pages (Children Display)
sortcreation


Overview

Zoom is the video-conferencing tool connecting many schools, teachers, students etc  etc... These section will provide some tips to ensure everyone joining an event does so with good intentions and prevent your meeting from being hijacked. 

What is Zoom bombing?

A complete stranger can actually come to your meeting and chat with each otherpeople in the meeting.

Anyone who knows how to create and join a zoom meeting, and has the zoom video link, can have access to join the meeting and shock other participants with unrelated and offensive content creating a mayhem. 

Reminders!!

A Few reminders on using Zoom to host public events:

  • When you share your meeting link on social media or other public forums, that makes your event extremely public. ANYONE with the link can join your meeting. Share your meeting link only through secure channels.
  • Familiarize yourself with Zoom’s settings and features so you understand how to protect your virtual space when you need to.
  • Stop other participants from screen sharing.

  • Control who enters a meeting with the Waiting Room feature.

  • Turn off File Transfer.

  • Lock the meeting after it starts.

  • Keep Zooming responsibly.

  • Password Protect your meetings.

Read this blog about Zoom-bombing Here!!

Learn more about best practices for securing your virtual classroom Click Here!

Additional Resources


Filter by label (Content by label)
showLabelsfalse
showSpacefalse
sorttitle
cqllabel in ("etm","zoom") and space = "ETMH"