Safe video conferencing

Audiovisual and multimediaMedia Services

Concerned about your video conference meeting's security?  Follow these best practices to have a safe video conference.

Be careful about sharing your meeting ID

Though you may want to recruit as many people as possible to your meeting or live event, exposing your Meeting ID on social media, websites or other public forums can attract the wrong kinds of attendees. There are many examples where attendees have shared unsavoury content in "all-welcome" events. Be extra vigilant about this if your meeting involves students. 

Always use a password on your meeting

Meeting organizers should apply a password to heighten meeting security. Passwords add an additional layer of security, allowing only those with the correct code to join the meeting. Some videoconferencing services offer advanced fraud detection to detect and report on repeated login failures and meeting join failures. This helps block the type of malicious intruders who scan for meeting IDs over a set period of time.  Never share the password in your meeting link - be sure to send it separately to your attendees.

Use a unique meeting ID

A common problem occurs when a meeting host with back-to-back meetings uses their Personal Meeting ID. One meeting overruns and the participants for the next call join, listening in to the previous meeting. University Systems recommends you always use a One-Time Meeting ID.

Keep watch on meeting joiners

Meeting hosts have the ability to track who joins meetings in a variety of different ways. Most allow the host to set an audible alert to announce when new attendees join. Some also display entry and exit banners with the names of joining attendees on-screen. The host should also view the meeting roster to verify who is on the videoconference. If unrecognised or anonymous names are on the list, ask them to confirm their identity by voice or chat.

Waiting rooms on UVic Zoom meetings are enabled for meeting guests, allowing you to screen those joining your meeting.  Signed-in users in our UVic tenant do not have to wait.

Master the controls

To prevent unwanted participants joining your meeting or event, Zoom allows the host to eject or drop a participant and prevent them from re-joining.  You can also lock your meeting once all of the required individuals are present.  These options are critical when you plan to cover sensitive or confidential information.

Read more about Zoom's in-meeting security options.

Mute participant audio and video

The host can mute the audio and video of some or all participants, and put the meeting in "host-only" mode. This helps keep the group focused and prevents disruptions, including from unwanted guests. Participants that want to ask questions have other options such as virtually "raising their hands" or using the chat.

Disable file sharing

Zoom allows in-meeting file transfers which can be conduits for malware sharing. UVic has disabled file transfers in your meeting to prevent malware being shared.  We recommend posting and sharing files via CourseSpaces for instructors and Connect for staff.

By default, UVic accounts also have screen sharing disabled for attendees.

Do not use cloud-based recording

We have turned off cloud-based recording in Zoom at UVic. You can save meeting recordings to your local computer, and share them via CourseSpaces and Video on Demand as needed.

Review the privacy policy

Currently, our Zoom tenant is hosted outside of Canada.  University Systems encourages you to review Zoom's Privacy Policy.  If you have any questions, please contact Bradley Weldon, Chief Privacy Officer and Legal Counsel, 250-472-5080,, prior to using this service

Always practice basic security hygiene

Many cyberattacks start with a phishing campaign. If you receive a link by email or social channels to join a video conference, contact the sender to confirm its legitimacy. Never open links and attachments in emails from unknown senders. Look for the classic clues of phishing like spelling errors in URLs and emails.

This information was adapted from BlueJean's Safe Video Conferencing information