Student Guide to Secure Video Conferencing Tools
There are a number of web conferencing tools available to UTSA students to host your own meetings for peer interaction, such as collaborations on a group projects, study sessions, etc. This document provides information on the major features and security associated with our university approved video conferencing tools*.
Tips to Ensure SEcurity Video Conferencing
The initial settings on many video conferencing tools and home Wi-Fi networks are not secure by default, which—if not changed—can allow malicious actors to compromise confidential data while you work from home.
- The security settings on UTSA approved video conferencing tools listed in this guide are automatically enabled. Learn more about the security settings and other features on this tool comparison worksheet.
- Change default password to strong, complex passwords for your router and Wi-Fi network.
- Choose a generic name for your home Wi-Fi network to help mask who the network belongs to, or its equipment manufacturer.
- Avoid using public hotspots and and networks.
Uncontrolled access to conversations may result in disruption or compromise of your conversations, and exposure of sensitive information. To control meeting access, click on each tool linked below for more.
- Require participants to register or enter a password/access code to enter the event. Try not to repeat passwords or codes. Send passwords to students only through Blackboard or through your UTSA email. You may also enable two-factor authentication on some video conference providers.
- Manage policies to ensure only members from your organization or desired group can attend. Be cautious of widely disseminating invitations.
- Enable “waiting room” features to see and vet attendees attempting to access your event before granting access.
- Lock the event once all intended attendees have joined.
- Ensure that you can manually admit and remove attendees (and know how to expeditiously remove unwanted attendees) if opening the event to the public.
- Review Digital Learning’s Netiquette Guidelines for specific standards to be observed when using web conferencing tools.
Mismanaged file sharing, screen sharing, and meeting recording can result in unauthorized access to sensitive information. Uncontrolled file sharing can inadvertently lead to users executing and clicking malicious files and links, which could, in turn, lead to system compromise. To manage file sharing, screen sharing, and meeting recording, click on each linked below for more.
- Consider sensitivity of data before exposing it via screen share or uploading it during video conferences. Toggle settings to limit the types of files that can be shared (e.g., not allowing .exe files).
- When recording meetings, make sure participants are aware of the recording and that the meeting owner knows how to access and secure the recording.
- Recordings must be saved on your personal devices and servers and adhere to proper licensing, usage rights, consents, and/or permissions, including, but not limited to FERPA, Texas Recording Law, and copyright laws. All recordings saved on UTSA servers (whether cloud or otherwise) will be deleted on a quarterly basis
Outdated or unpatched video conference applications can expose security flaws for hackers to exploit, resulting in a disruption of meeting privacy and potential loss of information.
- UTS provides patch management and automatic updates for university equipment.
- Personal devices/equipment however require owners keep applications and operating systems up to date at all times.
- Enable automatic updates on personal devices/equipment to keep software up to date.