You are responsible for using Zoom in ways that comply with sensitive data laws and regulations, as outlined in the Sensitive Data Guide entries. Zoom for Health at U-M (Sensitive Data Guide). Check the Zoom entries in the Sensitive Data Guide to IT Services for a list of the sensitive data types that are and are not permitted with each of the U-M Zoom services: Zoom provides appropriate security and compliance assurance that allows it to be used for teaching and learning, as well as many other use cases. See the U-M ITS Quick Start Guide: Securing Meetings in Zoom for more information. We highly encourage our community to do everything possible to secure their meetings, participants, and data, and recommend the following methods of securing your Zoom meetings. As reports of Zoombombing rise, U-M is taking proactive measures to ensure our meetings, classes, and community are protected. “Zoombombing” is a form of trolling that disrupts online meetings and classes with disturbing language or images through screen sharing. We also recommend you review their 30 Minutes to Becoming a Webinar Subject Matter Expert. If after reviewing the charts below you decide a webinar fits your need, you will need to complete the U-M ITS Meeting vs Webinar form to request a webinar license. Below you will find a key feature comparison and a use case comparison chart. Though Zoom Meetings and Zoom Webinars provide comparable features, there are some differences to be aware of when deciding on which tool best suits your need. Zoom Meetings for Education (Students & Educators).U-M Live Training & Drop-in Q&A Sessions.First, check out U-M ITS’s guides on Getting Started and Common Tasks for links to instructions and instructional videos.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |