Best Practices: Setting Up Meeting Security
The host should do the following
- Claim host
- Assign ONE co-host to monitor the waiting room and identify themselves with their display name (i.e., Name, Waiting Room / Security)
- If possible, in advance know who your security co-hosts are going to be.
- If this is not possible, look for someone WHO YOU KNOW and has had security training and co-host them.
- Only the Waiting room co-host should admit new people into the room.
- All Co-hosts should
- Understand their responsibilities and work with other security co-hosts to ensure clear and direct communication with each other. For example: to ensure that intruders who have been sent to the Waiting room are not readmitted.
- Rename themselves to indicate their role according to group conscious decisions.
- Additionally, security co-hosts should
- Keep eyes on the room.
- Pin unidentified or unknown participants.
- Host Tools Settings / Participants can…
- Screen share OFF.
- Optionally, limit chat to host and co-host (look for three dots in the chat box not in the security shield/host tools).
- Unmute themselves OFF.
- Collaborate with Zoom apps OFF.
- Share Notes OFF.
- Ability to rename OFF.
- Consider need to set meeting time ON.
High Level Security Options (in addition to above):
Use these when there are increased risk of intrusions:
- Add these additional Host Tool settings to “Participants can…”
- Ability to start video OFF.
- Show profile pictures OFF.
- Set meeting timer OFF.
- Option to lock meeting according to group conscious decisions.
Click here to learn more about Hosting a Zoom Meeting.
A security training workshop is offered approximately every two months. Contact security@oafootsteps.com or look at the OA Foot Steps calendar.