{"id":12898,"date":"2021-05-05T19:25:45","date_gmt":"2021-05-05T19:25:45","guid":{"rendered":"https:\/\/internetaddictsanonymous.org\/?page_id=12898"},"modified":"2024-04-08T01:08:56","modified_gmt":"2024-04-08T05:08:56","slug":"sikkerheds-retningslinjer-for-itaa-mode-vaerter","status":"publish","type":"page","link":"https:\/\/internetaddictsanonymous.org\/da\/security-guidelines-for-itaa-meeting-hosts\/","title":{"rendered":"Sikkerhedsretningslinjer for ITAA-m\u00f8dev\u00e6rter"},"content":{"rendered":"<p>ITAA-m\u00f8der kan v\u00e6re m\u00e5lrettet af forstyrrende trolde. Nedenfor er nogle forslag, der kan hj\u00e6lpe dig med at holde dit Zoom-m\u00f8de sikkert og sikkert. M\u00f8der opfordres til at holde gruppesamvittighed og diskutere planer for, hvordan man kan forebygge og reagere p\u00e5 forstyrrelser. <strong>En videodemo af forslagene nedenfor kan findes <a href=\"https:\/\/www.loom.com\/share\/0962dd4d02924e9caa30ff0ee7ec326e?sid=cb36c3e4-46ac-45b0-8550-04b095fab1ef\" target=\"_blank\" rel=\"noreferrer noopener\">her<\/a>.<\/strong><\/p>\n\n\n\n<p><em>Bem\u00e6rk venligst, at disse sikkerhedsforanstaltninger kun er beregnet til bevidst forstyrrende personer, og ikke til at censurere \u00e6gte deltagere fra at dele, selv om det, de siger, kan v\u00e6re udl\u00f8sende for andre. Som vores tredje tradition siger, er det eneste krav til ITAA-medlemskab et \u00f8nske om at stoppe med at bruge internet og teknologi tvangsm\u00e6ssigt.<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">Hvis der opst\u00e5r afbrydelser<\/mark><\/strong>, <em>s\u00f8rg for, at du har gjort krav p\u00e5 v\u00e6rtskoden<\/em> og klik p\u00e5 knappen &quot;Sikkerhed&quot; i bunden af zoomsk\u00e6rmen (i form af et skjold) og tryk p\u00e5 den r\u00f8de knap &quot;Suspender deltageraktiviteter&quot;. <strong>Det er den hurtigste m\u00e5de at afslutte en zoom-bombning p\u00e5.<\/strong> Du bliver n\u00f8dt til at trykke p\u00e5 en anden r\u00f8d &quot;Suspend&quot;-knap i en popup for at bekr\u00e6fte. Dette vil deaktivere video og lyd, deaktivere chat, forhindre brugere i at omd\u00f8be sig selv og l\u00e5se m\u00f8det (hvilket forhindrer nye brugere i at deltage). Du kan derefter fjerne den forstyrrende deltager <strong>og rapporter dem til Zoom<\/strong>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">For at g\u00f8re krav p\u00e5 v\u00e6rtskoden<\/mark><\/strong>, klik p\u00e5 fanen &quot;Deltagere&quot; nederst p\u00e5 Zoom-sk\u00e6rmen for at \u00e5bne deltagernes sidebj\u00e6lke. Nederst til h\u00f8jre p\u00e5 sidebj\u00e6lken er en knap, der siger &quot;krav v\u00e6rt&quot;. N\u00e5r du har klikket p\u00e5 dette, bliver du bedt om at indtaste v\u00e6rtskoden. Generelt foresl\u00e5r vi, at du ankommer et par minutter f\u00f8r m\u00f8det og indtaster v\u00e6rtskoden, s\u00e5 du er forberedt. <\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0);color:#ff0000\" class=\"has-inline-color\">G\u00f8r mindst \u00e9t betroet medlem til Zoom-medv\u00e6rt<\/mark><\/strong>. Medv\u00e6rter kan f\u00e5 adgang til alle Zoom-sikkerhedskontroller. For at g\u00f8re nogen til medv\u00e6rt skal du klikke p\u00e5 &quot;...&quot; \u00f8verst til h\u00f8jre p\u00e5 deres videofirkant eller ved siden af deres navn i deltagerens sidebj\u00e6lke. S\u00f8rg for, at du genkender deres stemme, eller at de har deres video t\u00e6ndt, f\u00f8r du g\u00f8r dem til medv\u00e6rt, da zoombomber nogle gange efterligner andre medlemmer. Dit m\u00f8de \u00f8nsker m\u00e5ske at etablere en almindelig teknisk v\u00e6rtstjenesteposition for at hj\u00e6lpe med at administrere sikkerhedsindstillinger og fjerne forstyrrende medlemmer.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Ventev\u00e6relse. <\/strong>Du kan aktivere ventev\u00e6relset ved at klikke p\u00e5 knappen \"Sikkerhed\" i bunden af zoomsk\u00e6rmen. Det kan v\u00e6re en god id\u00e9 at vente et \u00f8jeblik, f\u00f8r du lukker ukendte navne ind til m\u00f8det. Trolls har en tendens til at slutte sig til m\u00f8der undervejs og arbejde i grupper, s\u00e5 hvis du midt i m\u00f8det ser en gruppe mennesker slutte sig til ventev\u00e6relset p\u00e5 \u00e9n gang, er det et tegn p\u00e5, at de kan v\u00e6re trolls (is\u00e6r hvis de har unormale brugernavne, som f.eks. en ber\u00f8mthed). Hvis du er usikker, kan du lade deltagerne komme ind, men v\u00e6r opm\u00e6rksom og klar til at gribe hurtigt ind, hvis der opst\u00e5r noget forstyrrende.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deaktiver muligheden for, at deltagerne selv kan sl\u00e5 lyden til<\/strong>. Du kan g\u00f8re dette ved at klikke p\u00e5 knappen &quot;Sikkerhed&quot;. Deltagerne bliver n\u00f8dt til at r\u00e6kke h\u00e6nderne op (eller trykke p\u00e5 *9, hvis de ringer ind), og s\u00e5 kan v\u00e6rten sl\u00e5 dem til. Dette forhindrer trolde i at afbryde medlemmer, mens de deler. Alternativt kan du \u00f8nske at deaktivere deltagernes mulighed for kun at sl\u00e5 lyden til for sig selv, mens nogen deler, og derefter genaktivere deltagernes mulighed for at sl\u00e5 sig selv til, n\u00e5r delingen er f\u00e6rdig. Dette vil forhindre afbrydelser, samtidig med at deltagerne stadig kan sl\u00e5 lyden til (uden at skulle r\u00e6kke h\u00e5nden op), n\u00e5r de f\u00f8ler sig tilskyndet til at dele.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deaktiver deltagernes mulighed for at omd\u00f8be sig selv<\/strong>. Du kan g\u00f8re dette ved at klikke p\u00e5 knappen &quot;Sikkerhed&quot;. Dette forhindrer trolde i at \u00e6ndre deres navne for at efterligne andre medlemmer i m\u00f8det eller for at skjule sig for m\u00f8dev\u00e6rterne.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Kr\u00e6v, at video er sl\u00e5et til. <\/strong>Du kan bede alle deltagere om at t\u00e6nde deres video under m\u00f8det, eller i det mindste t\u00e6nde deres video, n\u00e5r de pr\u00e6senterer sig selv. Hvis nye medlemmer tiltr\u00e6der, kan de blive bedt om at t\u00e6nde deres video og pr\u00e6sentere sig selv. Dette afskr\u00e6kker trolde, der \u00f8nsker at forblive i skyggen.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deaktiver private beskeder.<\/strong> Du kan deaktivere dette ved at \u00e5bne chatsidebj\u00e6lken, klikke p\u00e5 &quot;...&quot; nederst til h\u00f8jre og v\u00e6lge &quot;Deltagere kan chatte med: Alle offentligt.&quot; Du kan ogs\u00e5 \u00e6ndre dette til &quot;Deltagere kan chatte med: Kun v\u00e6rt.&quot;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For endnu st\u00f8rre m\u00f8desikkerhed kan du bruge et breakout-rum til selve m\u00f8det, og s\u00e5 bruge hovedrummet til at lukke folk ind fra ventev\u00e6relset \u00e9n ad gangen og tjekke eventuelle trolls. Det er mere komplekst, men meget sikkert. Du kan finde en guide og en videotutorial <a href=\"https:\/\/docs.google.com\/document\/d\/1SJwND-Ugc_MGlyOKVr_wqd89esfXkgrbAyNejL6bQ5M\/edit?usp=sharing\">her<\/a>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Du kan ogs\u00e5 kr\u00e6ve, at folk sender en e-mail til kontaktmailen p\u00e5 forh\u00e5nd og beder om ID og adgangskode for at deltage.<\/li>\n<\/ul>\n<!-- PMB print buttons is only displayed on a single post\/page URLs-->","protected":false},"excerpt":{"rendered":"<p>ITAA-m\u00f8der kan v\u00e6re m\u00e5lrettet af forstyrrende trolde. Nedenfor er nogle forslag, der kan hj\u00e6lpe dig med at holde dit Zoom-m\u00f8de sikkert og sikkert. M\u00f8der opfordres til at holde gruppesamvittighed og diskutere planer for, hvordan man kan forebygge og reagere p\u00e5 forstyrrelser. En videodemo af forslagene nedenfor kan findes her. Bem\u00e6rk, at \u2026 <a href=\"https:\/\/internetaddictsanonymous.org\/da\/security-guidelines-for-itaa-meeting-hosts\/\" class=\"more-link\">Forts\u00e6t med at l\u00e6se <span class=\"screen-reader-text\">Sikkerhedsretningslinjer for ITAA-m\u00f8dev\u00e6rter<\/span><\/a><\/p>","protected":false},"author":35194237,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width-page.php","meta":{"inline_featured_image":false,"_lmt_disableupdate":"","_lmt_disable":"","jetpack_post_was_ever_published":false,"footnotes":""},"tags":[],"class_list":["post-12898","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internetaddictsanonymous.org\/da\/sikkerheds-retningslinjer-for-itaa-mode-vaerter\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous\" \/>\n<meta property=\"og:description\" content=\"ITAA meetings may be targeted by disruptive trolls. Below are some suggestions that can help you keep your Zoom meeting safe and secure. Meetings are encouraged to hold group consciences and discuss plans for how to prevent and respond to disruption. A video demo of the suggestions below can be found here. Please note that &hellip; Continue reading Security guidelines for ITAA meeting hosts\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internetaddictsanonymous.org\/da\/sikkerheds-retningslinjer-for-itaa-mode-vaerter\/\" \/>\n<meta property=\"og:site_name\" content=\"Internet and Technology Addicts Anonymous\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-08T05:08:56+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/\",\"name\":\"Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#website\"},\"datePublished\":\"2021-05-05T19:25:45+00:00\",\"dateModified\":\"2024-04-08T05:08:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/security-guidelines-for-itaa-meeting-hosts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security guidelines for ITAA meeting hosts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#website\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/\",\"name\":\"Internet and Technology Addicts Anonymous\",\"description\":\"Worldwide 12-step Fellowship for Internet and Technology Addiction\",\"publisher\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#organization\",\"name\":\"Internet and Technology Addicts Anonymous\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/cropped-ITAA-logo-480px.png\",\"contentUrl\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/cropped-ITAA-logo-480px.png\",\"width\":480,\"height\":480,\"caption\":\"Internet and Technology Addicts Anonymous\"},\"image\":{\"@id\":\"https:\\\/\\\/internetaddictsanonymous.org\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sikkerhedsretningslinjer for ITAA-m\u00f8dev\u00e6rter - Internet and Technology Addicts Anonymous","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internetaddictsanonymous.org\/da\/sikkerheds-retningslinjer-for-itaa-mode-vaerter\/","og_locale":"da_DK","og_type":"article","og_title":"Security guidelines for ITAA meeting hosts &#8211; Internet and Technology Addicts Anonymous","og_description":"ITAA meetings may be targeted by disruptive trolls. Below are some suggestions that can help you keep your Zoom meeting safe and secure. Meetings are encouraged to hold group consciences and discuss plans for how to prevent and respond to disruption. A video demo of the suggestions below can be found here. Please note that &hellip; Continue reading Security guidelines for ITAA meeting hosts","og_url":"https:\/\/internetaddictsanonymous.org\/da\/sikkerheds-retningslinjer-for-itaa-mode-vaerter\/","og_site_name":"Internet and Technology Addicts Anonymous","article_modified_time":"2024-04-08T05:08:56+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimeret l\u00e6setid":"4 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/","url":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/","name":"Sikkerhedsretningslinjer for ITAA-m\u00f8dev\u00e6rter - Internet and Technology Addicts Anonymous","isPartOf":{"@id":"https:\/\/internetaddictsanonymous.org\/#website"},"datePublished":"2021-05-05T19:25:45+00:00","dateModified":"2024-04-08T05:08:56+00:00","breadcrumb":{"@id":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/internetaddictsanonymous.org\/security-guidelines-for-itaa-meeting-hosts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/internetaddictsanonymous.org\/"},{"@type":"ListItem","position":2,"name":"Security guidelines for ITAA meeting hosts"}]},{"@type":"WebSite","@id":"https:\/\/internetaddictsanonymous.org\/#website","url":"https:\/\/internetaddictsanonymous.org\/","name":"Anonyme internet- og teknologiafh\u00e6ngige","description":"Verdensomsp\u00e6ndende 12-trinsf\u00e6llesskab for internet- og teknologiafh\u00e6ngighed","publisher":{"@id":"https:\/\/internetaddictsanonymous.org\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internetaddictsanonymous.org\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/internetaddictsanonymous.org\/#organization","name":"Anonyme internet- og teknologiafh\u00e6ngige","url":"https:\/\/internetaddictsanonymous.org\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/internetaddictsanonymous.org\/#\/schema\/logo\/image\/","url":"https:\/\/internetaddictsanonymous.org\/wp-content\/uploads\/2023\/01\/cropped-ITAA-logo-480px.png","contentUrl":"https:\/\/internetaddictsanonymous.org\/wp-content\/uploads\/2023\/01\/cropped-ITAA-logo-480px.png","width":480,"height":480,"caption":"Internet and Technology Addicts Anonymous"},"image":{"@id":"https:\/\/internetaddictsanonymous.org\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P9Fwob-3m2","_links":{"self":[{"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/pages\/12898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/users\/35194237"}],"replies":[{"embeddable":true,"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/comments?post=12898"}],"version-history":[{"count":30,"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/pages\/12898\/revisions"}],"predecessor-version":[{"id":17841,"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/pages\/12898\/revisions\/17841"}],"wp:attachment":[{"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/media?parent=12898"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetaddictsanonymous.org\/da\/wp-json\/wp\/v2\/tags?post=12898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}