Have you been video conferencing in these days of social distancing? It’s pretty cool to see several people at once on the screen and be able to have a conversation as if everyone was in the same room. But we don’t want strangers in our meetings — and we’d all probably rather keep our information to ourselves. So let’s review some basic safety tips:
Use passwords and/or unique ID numbers for each meeting. If the conferencing service gives you these features, enable them for each meeting you host. If you’re not the host, ask whoever it is to do it. Other tools may be available to limit access to your video conference, like the ability to approve each participant before joining. Consider enabling those, too.
Keep the video conferencing software up to date. Many video conferencing companies are updating their software as they learn about vulnerabilities, so it’s important to have those patches and fixes. But, you should only accept updates directly from the service’s website. This is true, too, if you need to download a video conferencing app. You should only download it directly from the service’s website or a platform’s app store.
Don’t open unexpected video conference invitations. Hackers are sending emails mimicking video conferencing invitations. Those emails may have links that download malware on your computer or device. If you’re not expecting a video conference invitation, check first with the host separately. If you’re the host, tell the participants in advance that you’ll be sending the link.
Protect your privacy. Your camera and microphone may be on by default when you join a video conference, so check the settings in advance to learn how to mute yourself or turn off your camera if you need to. Also, keep in mind that your video conference may be recorded, so it’s best to avoid sharing private information via video conference. It’s also a good idea to review the service’s privacy policies to understand how your information will be handled.
A note about telehealth conferencing. If you’re conferencing remotely with a health care provider, ask about dedicated telehealth conferencing services that can include more safeguards to keep information private.
It is your choice whether to submit a comment. If you do, you must create a user name, or we will not post your comment. The Federal Trade Commission Act authorizes this information collection for purposes of managing online comments. Comments and user names are part of the Federal Trade Commission’s (FTC) public records system, and user names also are part of the FTC’s computer user records system. We may routinely use these records as described in the FTC’s Privacy Act system notices. For more information on how the FTC handles information that we collect, please read our privacy policy.
The purpose of this blog and its comments section is to inform readers about Federal Trade Commission activity, and share information to help them avoid, report, and recover from fraud, scams, and bad business practices. Your thoughts, ideas, and concerns are welcome, and we encourage comments. But keep in mind, this is a moderated blog. We review all comments before they are posted, and we won’t post comments that don’t comply with our commenting policy. We expect commenters to treat each other and the blog writers with respect.
We don't edit comments to remove objectionable content, so please ensure that your comment contains none of the above. The comments posted on this blog become part of the public domain. To protect your privacy and the privacy of other people, please do not include personal information. Opinions in comments that appear in this blog belong to the individuals who expressed them. They do not belong to or represent views of the Federal Trade Commission.
In reply to thank you. Suggest by LeaC