Check the Let others host my Personal Room Meetings without me check box.
Select one of the following options: • Allow anyone with a host account on this site or anyone joining from an authenticated Cisco video device to be an alternate host for my Personal Room meetings • Let me choose alternate hosts for my Personal Room meetings These settings apply for all of your Personal Room meetings (instant and scheduled meetings).
If you opted to choose your alternate hosts in Step 3, enter their email addresses (separated by commas).
To edit your Personal Room name, enter the new name.Your Personal Room name can be 1–128 characters in length.
To edit your Personal Room link, enter a new ID.Your Personal Room link has these requirements:Can be 1–64 characters in length.Must contain at least one alphabetic character.Must not contain any symbols or special characters except hyphens (-), periods (.), or underscores (_).Must not already be in use by someone else on the site. If you change your Personal Room ID, update your previously scheduled Personal Room meetings to use your new Personal Room URL. The previous URL no longer works.
For Host PIN enter a number that’s easy for you to remember.Your Host PIN must be exactly four digits, and can’t repeat or be sequential, for example, 1111 or 1234. You can change your Host PIN later, by entering a new four digit number.
To lock your Personal Room automatically after the meeting starts, check Automatic lock, and specify the number of minutes.You can choose 0, 5, 10, 15, or 20 minutes. After a meeting locks, attendees wait to join the meeting until you admit them.
For Notification, check Notify me by email when someone enters my Personal Room lobby while I am away receive an email notification when someone enters your Personal Room.
For Cohost, check Allow cohosts for my Personal Room meetings.If you allow another person or video device to cohost your Personal Room meetings, select one of the options:Automatically make the first person with a host account on this site or the first person joining from an authenticated Cisco video device in this organization the cohost of my Personal Room meetingsLet me choose cohosts for my Personal Room meetingsTo specify cohosts, enter their email addresses separated by commas or semicolons.
Do not post the link to your meeting anywhere public or on social media. Only share links to your meetings or personal room on email, Google Classroom or PowerSchool.
Lock the meeting once all attendees have joined the meeting. This practice prevents more attendees from joining. Hosts can lock or unlock the meeting at any time while the session is in progress. To lock a meeting that you’re currently hosting, go to Meeting > Lock Meeting.
This option prevents anyone from joining the meeting, including participants who have been invited to the meeting but have not yet joined it. To unlock a meeting that you’re currently hosting, go to Meeting > Unlock Meeting.
Validate Identity of All Users in a Call
Accounting for every attendee by using a roll call is a secure practice. Ask users to turn on their video or state their name to confirm their identity.
To attend a meeting using a phone, a caller only needs a valid Webex dial-in number and the nine-digit meeting ID. If attendees can join meetings on your site by phone without a password, they will not be prevented from joining the audio conference portion of the meeting.If attendees without an account are allowed to join the meeting, then unauthorized users can identify themselves with any name in your meeting.
Remove a Participant from the Meeting
Participants can be expelled at any time during a meeting. Select the name of the participant whom you want to remove, go to Participant > Expel.
Share Application, Not Screen
Go to Share > Application > instead of Share > My Screen to share specific applications and prevent accidental exposure of sensitive information on your screen.
Control Who Can Share
If allowed at the site level, Webex meeting hosts can choose whether to allow all participants to share. If you don’t enable the option, you can assign the Presenter role to select participants or attendees.
Only designated Presenters can share content from video devices and the Webex Teams app.
When the meeting is over, be sure to end the meeting for all participants. You may be presented with an option to leave the meeting running without ending it. If you need to leave early, make someone else the host, who will responsible for ending the meeting.
Locking meetings in your Personal Room helps keep them secure by making sure no one joins who isn’t supposed to. When you lock your Personal Room, it prevents more attendees from joining until you admit them. You can lock or unlock the room at any time while the session is in progress. If you have back-to-back meetings or need privacy in your Personal Room, lock the room.
When the room is locked:
No one can enter the room until you unlock it.
You see a list of all attendees waiting in the lobby. The list indicates who has logged in and who hasn’t. You can choose who to allow into the Personal Room meeting.
Anyone who already joined the meeting, including the host, can’t call in to connect to the meeting audio. They can still use their computer for audio, or have the meeting call them.
For users on Cisco Webex video platform version 1.0: If you set your meeting to automatically lock 0 minutes after the meeting starts, we recommend that you start your meeting from the Cisco Webex Meetings app so that you can admit participants. You won’t be able to admit participants by using the video device. To find out which versions you’re using, see Find Your Cisco Webex Meetings Version Number.
Lock or unlock your meeting
During a meeting in your Personal Room, go to More options in the meeting controls, and then choose Lock Meeting or Unlock Meeting.Your site administrator can allow unauthenticated attendees to enter an unlocked room if they have signed in recently within a specified time period. The default is two weeks.If your site settings prevent unauthenticated users from entering unlocked rooms unless the host admits them, when the room is unlocked:Attendees who have not signed have to wait in the lobby.The host sees a list of who is waiting and can choose who to admit.
Automatically lock your Personal Room
You can set an option in your Personal Room preferences to automatically lock your room after it starts. You can choose from 0, 5, 10, 15, or 20 minutes. By default, your Personal Room locks after 10 minutes.
On your Webex site in Classic View, go to My Webex > Preferences > My Personal Room, or from Modern View, go to Preferences > My Personal Room.
Check the box next to Automatic lock, and then choose how many minutes you want before your Personal Room locks.
Do not post any videos on YouTube that may contain Personally Identifiable Information (PII) of students or staff. Examples of PII include names, contact information, and photos. Videos that have PII should be posted on Google Drive and not shared with anyone outside the district.
When you upload a video to YouTube you can set the video to Public, Unlisted, or Private. Public will list the video on YouTube while Unlisted while make it hidden. USD 497 Technology recommends using the Unlisted setting for most videos.
Unlisted videos are hidden from the public. Only the people yo share the link to the video with can see it. Unlisted videos can also be posted on Google Classroom and Unified Classroom.
Can share URL
Can be added to a channel section
Shows up in search, related videos, and recommendations
Hover over the video you’d like to update. To see your live uploads, select the Live tab.
Click the down arrow under “Visibility” and choose Public, Private, or Unlisted.
About privacy settings
Public videos can be seen by anyone at YouTube. They can also be shared with anyone using YouTube. They’re posted on your channel when you upload them and show up in search results and related video lists.
Private videos and playlists can only be seen by you and the people you choose. Your private videos won’t appear to others who visit the “Videos” tab of your channel page. They also won’t show up in YouTube’s search results.
Find the video you want to share, then select Edit.
Beneath the “Privacy Settings” drop-down menu, select Share.
Enter the email addresses of people you’d like to share your video with, then select OK.
Comments are not available on private videos. If you want to allow comments on a video that’s not publicly available, change the privacy setting to unlisted.
Unlisted videos and playlists can be seen and shared by anyone with the link. Your unlisted videos won’t appear to others who visit the “Videos” tab of your channel page. They won’t show up in YouTube’s search results unless someone adds your unlisted video to a public playlist.
You can share an unlisted video’s URL with other people. The people you share the video with don’t need a Google Account to see the video. Anyone with the link can also re-share it.
For example, research from RiskIQ, a security company, said it identified almost 1,000 malicious apps using holiday-related terms, and over 6,000 apps using names and slogans from popular retailers to reel in unsuspecting victims. RiskIQ also said it found 65 malicious websites posing as popular retailers in an attempt to fool you into giving up your personal information.
Here’s how you can stay safe…
Look Out for Phishing
In a phishing scheme, the victim receives an email or text message directing them to enter payment information or other personal details on a fraudulent website, which is often designed to look just like a legitimate site.
A recent survey by cybersecurity company McAfee reports that 41% of Americans fell victim to email phishing schemes in 2019. Unsurprisingly, a similar number — 39% — reported that they don’t check email senders or retailer websites for authenticity.
To top it all off, 30% of respondents reporting losses of $500 or more just in the last year alone.
If the data from RiskIQ is any indication, expect a surge in messages claiming to be from Amazon, Best Buy, Walmart, Target or other large retailers over the next few months. If you receive an email asking you to update your payment method or requesting other personal information, contact the company’s help desk to make sure the email is legit before you do anything else.
The sender’s email address looks almost right but contains extra characters or misspellings.
Misspellings and/or bad grammar either in the subject line or anywhere in the message.
Addresses you with generic terms (“Mr.” or “Ms.” or “Dear Customer”) instead of by name.
The message warns that you need to take immediate action and asks you to click a link and enter personal details, especially payment information.
The messages promise a refund, coupons or other freebies.
Protect Your Credit Card Information
Tim Mackey, principal security strategist for Synopsis, a digital security company, warns, “There isn’t an obvious way for the average person will be able to identify if or when a website has been compromised. The only potential tell-tale sign might be that the website itself doesn’t quite look ‘right.'”
Mackey suggests a few strategies consumers can use to protect themselves:
Don’t save your credit card information on retail sites.
If possible use a third-party payment method like Apple Pay, Google Wallet or PayPal.
Enable purchase alerts on all your credit cards.
Disable international purchases on all credit cards.
Only make purchases from your home or cellular network, never on public Wi-Fi where your payment could be intercepted.