Zoom Meeting Controls to Secure Your Room

Securing your Zoom Meeting Room for Public Events:

If you must use your Zoom Meeting room for publicly advertised events, we strongly recommend you consider the following setting changes to your Zoom Meeting room:

Securing your Zoom Meeting Room for Class Instruction:

There is a low risk of classroom disruption unless a professor or a student publicly shares the Zoom Meeting link or meeting ID outside of a secure platform like Canvas. If you have shared your meeting room used for classes outside on social media or on public facing websites, please contact zoom@georgetown.edu immediately for assistance as to next steps.  

Student participants should be expected to behave in a Zoom classroom setting as they would in face-to-face classroom instruction.  If a student is disruptive in your Zoom classroom, the incident should be reported as you would an in-class disruption after your class has ended.  It may be helpful to remind students that all University policies–including the Code of Student Conduct, Honor Code, and Computer Systems Accessible Use Policy–continue to apply to behavior in the virtual learning environment.  

If you are having issues with a student(s) during a Zoom class session, there are steps you can take during the class to minimize the disruption(s):

Securing your Zoom Meeting Room for Private Meetings:

Most administrators on campus use Zoom to conduct meetings with colleagues about a wide range of University business.  Most of those meetings are created instantly or scheduled in advance. In either case, hosts should not use their PMI as their meeting room.  Your PMI is a virtual room that is permanently reserved for you, and is essentially one continuous meeting and anyone with the link can join at any time, all the time. Reusing your PMI for multiple meetings could mean that guests not intended for that meeting could inadvertently join as the meeting ID does not change. 

Depending on the sensitivity of the meeting, it may be important to restrict meeting attendance. To do this you may consider:

You may also consider limiting what participants can do in the meeting: