Skip to main content
Visit Remote Work Tools & Guidelines and Student Remote IT Support for details on working remotely under the University's Coronavirus (COVID-19) recommendations
Penn Information Systems & Computing Systems Home

Search form

  • Find my LSP
  • Penn
System Status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Backup for Desktop & Laptop
      • Cloud Solutions
      • Data Center Services
      • Database & Middleware Services
      • Endpoint Management
      • Recovery Services
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • Knowledge Link
      • LinkedIn Learning
      • Provider Support Services
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • Penn+Box
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • Network Names & Numbers
      • PennNet
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Broadcasting Studio
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • PennNet Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Services
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
  • Collaborations
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Cloud First
    • Next Generation Unified Communications
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee
        • About PTIC
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • Events
  • About
    • Overview
    • Leadership & Groups
    • Purpose & Values
    • Strategic Goals
    • Recognition
    • Tech Jobs @ Penn
    • Contact Us
  • Hot Topics
  • Get Help
    • Support Center
    • Contact ISC Client Care
    • Rates for All Services

You are here

Home » Recommended Best Practices Using Zoom

Recommended Best Practices Using Zoom

This Zoom Best Practices guide is designed for the Penn Zoom account holders to provide information on how to hold secure Zoom sessions and classes free from participants interruption.

Contact your School/Center IT support staff
  • Create a Zoom account at upenn.zoom.us/signin 
  • Discuss downloading the Zoom app for access to the full suite of functionalities.
  • Consider accommodating access to your session using mobile devices.
  • Set up streaming service and test it, e.g., stream live Youtube video.  
  • Test your audio, video, headset, and microphone.
  • Go over Zoom applications you plan to use during the session and how to use them securely including recording options. 
Prepare for the meeting
  • Visit ZOOM FOR FACULTY/STAFF/TAS on CANVAS at Penn for information on integrating Zoom in CANVAS.
  • Disable desktop/screen sharing for users in large meetings to prevent participants from sharing unwanted content. 
  • Disable the “File Transfer” option to prevent participants from sharing unauthorized files. 
  • Disable “Allow Removed Participants to Rejoin” to prevent individuals you removed from joining the session again. 
  • Consider enabling the “Waiting Room” feature to control when a participant joins the meeting.
  • Make sure the “Join Before Host” feature is disabled.
  • Require a meeting passcode. Set a meeting password and provide it to the participants to prevent unwanted guests from joining.
  • Enable “Require authentication to join” (with “Penn users only” selected) for meetings/sessions held only for Penn community members (faculty, staff, and students).
  • Assign a co-host. Zoom requires a designated host to hold a meeting session. If a host loses connectivity, Zoom automatically designates a host from the participants' list. 
During the meeting
  • Enable the “Mute participants upon entry” and mute all participants and use the setting to not allow participants to unmute in large and public meetings.
  • Using the Security icon, manage participants by:
    • Checking “Lock meeting” to prevent new participants from joining after starting the session.
    • Making sure “Enable waiting room” is checked if using this feature.
    • Unchecking the “Chat” option if text chat amongst participants is not needed.
    • Uncheck “Rename Themselves” to prevent participants from renaming themselves to a different (and potentially offensive) name.
    • Pause the meeting to remove unauthorized content or a participant. During the meeting, and from the security icon:
      • Click on “Suspend Participant Activities” to pause the session.
      • Click on “Remove Participant” to remove unauthorized or disruptive participants.
      • Unclick the “Suspend Participant Activities” to resume the meeting session.
  • If sharing a screen during a meeting, disable participants’ ability to annotate the screen by navigating to the “More…” menu item at the top of your screen and clicking on “Disable participants annotation”.  Note, this option is only available after screen sharing has started.
Additional information
  • Register for the Zoom Basics 2 hour course in Knowledge Link.
  • Guidance on how to secure your session is available at: OIS Zoombombing Allows Uninvited Guests to Join a Zoom Session
  • Additional guidance directly from Zoom is available at: Best Practices for Securing Your Zoom Meetings
  • Zoom guidance for OnZoom events specifically: Preventing OnZoom event disruptions as a Host
  • University of Minnesota’s Zoom: Best Practices in a Meeting one-page guide.

Share:

  • Facebook
  • Twitter
Print
InfoSec Home
Resources
  • Zoombombing Allows Uninvited Guest Join a Zoom Session 
  • InfoSec News & Alerts
  • ISC News
  • Privacy Considerations When Using Zoom
  • PDF Copy of this guidance in Penn Box
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn
System Status

© 2021 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff