Atlassian uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. Accept all cookies to indicate that you agree to our use of cookies on your device. Atlassian cookies and tracking notice, (opens new window)
U of T Information Security
Information Security Handbook

Information Security Handbook
Results will update as you type.
  • Getting started
  • Strategies
  • How-tos
    • Back up data
    • Baselines and configurations
    • Classify data
    • Computing or storage environment for research
    • Cyber security alerts and advisories
    • Data collection and survey management
    • Data integrity
    • Delete or destroy data and devices
    • Encrypt data and devices
    • Passwords, passphrases and passkeys
    • Physically secure data and devices
    • Remote interviews
    • Report a security event or incident
    • Safe web browsing
    • Security awareness training
    • Send, share or transfer data
    • Synchronize system's time with a U of T time server
    • Travel or work remotely
    • Updates and patching
    • Virtual private networks (VPN)
    • Virus and malware protection

    You‘re viewing this with anonymous access, so some content might be blocked.
    /
    Remote interviews
    Updated May 02, 2024

      Remote interviews

      Purpose

      Performing interviews and other research activities via videoconferencing software, such as Teams and Zoom, can allow for greater collaboration and expand your participant pool, but introduces new risks compared to in-person meetings including: disruptive intrusions to meetings, privacy concerns about cloud-based data storage and transcription, etc.  


      Audience

      researchers


      On this page

      • 1 Initial considerations
        • 1.1 Consult your human ethics protocol.
      • 2 What can I do?
        • 2.1 Follow established best practices for common meeting tools.
          • 2.1.1 Teams
          • 2.1.2 Zoom
        • 2.2 Visit Connect+Learn for upcoming and past training sessions on Teams and Zoom.
        • 2.3 Contact your local IT group about what security settings are available to you through your U of T Teams or Zoom account.

      Initial considerations

      Consult your human ethics protocol.

      • Your human ethics protocol will need to specify the platform or solution you are using to interview research participants and how security is being maintain. It is essential that you adhere to the requirements outlined within your protocol and should a new platform or solution be required, that you amend your protocol.

      • If you are unsure about your obligations, please contact the relevant ethics unit.

        • https://research.utoronto.ca/ethics-human-research/ethics-human-research


      What can I do?

      Follow established best practices for common meeting tools.

      Teams

      • https://learn.microsoft.com/en-us/microsoftteams/teams-security-best-practices-for-safer-messaging

      Zoom

      • https://uoft.service-now.com/utm_iits?id=kb_article_view&sys_kb_id=f0ba8777dbb6c510f0d18d6d139619d4

      • Best practices for securing your zoom meetings - Zoom

      Visit Connect+Learn for upcoming and past training sessions on Teams and Zoom.

      • https://easi.its.utoronto.ca/training-documentation/connect-learn/

      Contact your local IT group about what security settings are available to you through your U of T Teams or Zoom account.

      • Contact us | Information Technology (IT)Preview


      Search

      How do I...


      Additional help

      General

      Contact us | Information Security (IS)Preview

      Contact us | Information Technology (IT)Preview

      Researchers

      https://security.utoronto.ca/services/research-information-security-program/


      Related articles

      • Page:
        Passwords, passphrases and passkeys
      • Page:
        Data collection and survey management
      • Page:
        Security awareness training
      • Page:
        Synchronize system's time with a U of T time server
      • Page:
        Virtual private networks (VPN)
      • Page:
        Computing or storage environment for research

       

       

       

      {"serverDuration": 12, "requestCorrelationId": "1d0571734560475fa822fbe22cfe7ecf"}