Pull up their picture from the student database and see if it looks
like the person on the screen.
On Wed, Nov 13, 2013 at 09:29:35PM +0000, Roger A Safian wrote:
How would you know the person on the other end is who they claim to be?
From: The EDUCAUSE Security Constituent Group Listserv [mailto:
SECURITY () LISTSERV EDUCAUSE EDU] On Behalf Of Moore, Beverly Y
Sent: Wednesday, November 13, 2013 3:12 PM
To: SECURITY () LISTSERV EDUCAUSE EDU
Subject: [SECURITY] Do you use video conferencing for identity proofing
Does anyone use video conferencing for identity proofing of remote
students? We have a secure video conferencing platform by which to do so.
What are the ramifications of doing so?
Beverly Y. Moore, CISSP CBCP GCIH CHPS
Manager, IT Security
713.486.2251 | Beverly.Y.Moore () uth tmc edu<mailto:
Beverly.Y.Moore () uth tmc edu>