top of page
ZOOM Presentation
Security Protocol
When we schedule our presentations
-
We check "Only authenticated users" can join our presentations. Authentication requires users to sign in to join Zoom sessions.
When we host our presentations
-
We create waiting rooms to ensure only registered participants be let in.
-
We manage participants in meetings by muting participants, putting participants on hold, and more.
-
We remove disruptive participants.
-
We control screen sharing for participants and presenters. The Zoom default allows only the host to share screens. Please only share the screen you select and when needed.
*Our protocols are subject to revisions at any time.
bottom of page