What:
Basic settings that should be applied to all Zoom meetings to reduce the risk of disruption and help protect user and data privacy.
Why:
Without setting these controls, you run the risk of attackers Zoom-bombing your session or accessing information without your permission.
How:
Who:
This applies to all faculty, staff or students who need to host a private meeting and applies to most use cases (most online class or labs, team/organization meetings etc.). Analogous to in-person meetings, these sessions should not create a data or privacy breach situation if someone was to pass-by and listen in or accidentally “walk-in” to the meeting.
What:
Additional security and privacy settings that should be considered for Zoom meetings where sensitive subjects or topics need to be addressed, or the participant list may be undefined or difficult to moderate (size, composition, etc.).
Why:
For NKU meetings, classes or labs that are usually conducted within controlled environments because of the heightened sensitivity of the subjects and discussion.
How:
Who:
This applies to faculty, staff or students who need a higher level of security to host a private meeting for select use cases (controlled “locked door” labs, team/organization meetings, advising sessions etc.). Analogous to in-person meetings, these sessions may create a data or privacy breach situation or expose sensitive information if someone was to pass-by and listen in or accidentally “walk-in” to the meeting.
What:
Further security and privacy settings that should considered for Zoom meetings to maximize security.
Why:
For NKU meetings, classes or labs that are conducted with more strictly controlled environments where the need to ensure security and privacy of the subjects and discussion are of utmost importance.
How:
Who:
This applies to faculty and staff who need the highest level of security to host a private meeting and applies to limited use cases (highly controlled “locked door” meetings, HR, or legal sensitive matters etc.). Analogous to in-person meetings, these sessions would create a data or privacy breach situation if someone was to pass-by and listen in or accidentally “walk-in” to the meeting.
Note: If your meeting requires end-to-end encryption, please contact the NKU IT Help Desk to host this session.