Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Recommended Best Practices Using Zoom

Recommended Best Practices Using Zoom

This Zoom Best Practices guide is designed for the Penn Zoom account holders to provide information on how to hold secure Zoom sessions and classes free from participants interruption.

Contact your School/Center IT support staff
  • Create a Zoom account at upenn.zoom.us/signin 
  • Discuss downloading the Zoom app for access to the full suite of functionalities.
  • Consider accommodating access to your session using mobile devices.
  • Set up streaming service and test it, e.g., stream live Youtube video.  
  • Test your audio, video, headset, and microphone.
  • Go over Zoom applications you plan to use during the session and how to use them securely including recording options. 
Prepare for the meeting
  • Visit ZOOM FOR FACULTY/STAFF/TAS on CANVAS at Penn for information on integrating Zoom in CANVAS.
  • Disable desktop/screen sharing for users in large meetings to prevent participants from sharing unwanted content. 
  • Disable the “File Transfer” option to prevent participants from sharing unauthorized files. 
  • Disable “Allow Removed Participants to Rejoin” to prevent individuals you removed from joining the session again. 
  • Consider enabling the “Waiting Room” feature to control when a participant joins the meeting.
  • Make sure the “Join Before Host” feature is disabled.
  • Require a meeting passcode. Set a meeting password and provide it to the participants to prevent unwanted guests from joining.
  • Enable “Require authentication to join” (with “Penn users only” selected) for meetings/sessions held only for Penn community members (faculty, staff, and students).
  • Assign a co-host. Zoom requires a designated host to hold a meeting session. If a host loses connectivity, Zoom automatically designates a host from the participants' list. 
During the meeting
  • Enable the “Mute participants upon entry” and mute all participants and use the setting to not allow participants to unmute in large and public meetings.
  • Using the Security icon, manage participants by:
    • Checking “Lock meeting” to prevent new participants from joining after starting the session.
    • Making sure “Enable waiting room” is checked if using this feature.
    • Unchecking the “Chat” option if text chat amongst participants is not needed.
    • Uncheck “Rename Themselves” to prevent participants from renaming themselves to a different (and potentially offensive) name.
    • Pause the meeting to remove unauthorized content or a participant. During the meeting, and from the security icon:
      • Click on “Suspend Participant Activities” to pause the session.
      • Click on “Remove Participant” to remove unauthorized or disruptive participants.
      • Unclick the “Suspend Participant Activities” to resume the meeting session.
  • If sharing a screen during a meeting, disable participants’ ability to annotate the screen by navigating to the “More…” menu item at the top of your screen and clicking on “Disable participants annotation”.  Note, this option is only available after screen sharing has started.
Additional information
  • Register for the Zoom Basics 2 hour course in Workday Learning.
  • Guidance on how to secure your session is available at: OIS Zoombombing Allows Uninvited Guests to Join a Zoom Session
  • Additional guidance directly from Zoom is available at: Best Practices for Securing Your Zoom Meetings
  • Zoom guidance for OnZoom events specifically: Preventing OnZoom event disruptions as a Host
  • University of Minnesota’s Zoom: Best Practices in a Meeting one-page guide.

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • Zoombombing Allows Uninvited Guest Join a Zoom Session 
  • InfoSec News & Alerts
  • ISC News
  • Privacy Considerations When Using Zoom
  • PDF Copy of this guidance in Penn Box
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff