I worked on lots of very large Zoom meetings. After you subscribe to the product, it’s your own responsibility to use the tools provided to moderate incoming users. Zoombombing is only possible with very poorly moderated or unmoderated Zoom meetings. They would have to do several things wrong, and here are some of them:
Not requiring a password to join the meeting
Including the password in the link to join the meeting.
Not setting admin/moderator permissions, allowing any user to take them
Not differentiating the meeting room from the default room.
Distributing the wrong Zoom link, there can be one for attendees and a different one intended for spectators, who should not have audio/video broadcast permissions.
That’s not all of them, but if this group improperly handles their Zoom setup, the company isn’t responsible because they already provided the security tools and the documentation to use them. At least, that’s my humble understanding.
It’s not about the company being responsible. I’m more referring to the hosts of the session being able to pursue legal action, or press charges. In the eyes of the court, would you be accessing (one of the ways to run afoul of that texas law) the hosts’ “computer systems” running the zoom software, or are you accessing Zoom’s computer systems? Is Zoom able to be run on your local server, or is everything processed on their end?
In either case, could they say that you were accessing those computer systems without the owner’s consent (one of the conditions for the crime I quoted)? The failure to set a password, giving out the password publicly, and maybe your option #5 might ways that a lawyer could construed as them giving ‘everyone’ permission to come, and thus void the crime… but we’re also talking about texas, and the law down there is as flippant as it is in the extreme court.
I want to give people things to think about before they did this, considering that the minimum level of crime they’ll be looking at carries up to 180 days in jail. Definitely use a burner phone, VPN, and every other way to cover your tracks.
I worked on lots of very large Zoom meetings. After you subscribe to the product, it’s your own responsibility to use the tools provided to moderate incoming users. Zoombombing is only possible with very poorly moderated or unmoderated Zoom meetings. They would have to do several things wrong, and here are some of them:
That’s not all of them, but if this group improperly handles their Zoom setup, the company isn’t responsible because they already provided the security tools and the documentation to use them. At least, that’s my humble understanding.
It’s not about the company being responsible. I’m more referring to the hosts of the session being able to pursue legal action, or press charges. In the eyes of the court, would you be accessing (one of the ways to run afoul of that texas law) the hosts’ “computer systems” running the zoom software, or are you accessing Zoom’s computer systems? Is Zoom able to be run on your local server, or is everything processed on their end?
In either case, could they say that you were accessing those computer systems without the owner’s consent (one of the conditions for the crime I quoted)? The failure to set a password, giving out the password publicly, and maybe your option #5 might ways that a lawyer could construed as them giving ‘everyone’ permission to come, and thus void the crime… but we’re also talking about texas, and the law down there is as flippant as it is in the extreme court.
I want to give people things to think about before they did this, considering that the minimum level of crime they’ll be looking at carries up to 180 days in jail. Definitely use a burner phone, VPN, and every other way to cover your tracks.