IBG Information Security Month
IBG Information Security Month
Episode 3:
Secure Meetings, Safeguard Gatherings
To protect DiDi's core information assets and ensure secure virtual meetings, this episode of IBG Information Security Month focuses on "Online Meeting Security". Join us in building robust safeguards for worry-free collaboration!
1. Pre-Meeting Preparation
For All Participants:
✅ Real-name entry: Display real name (no nicknames e.g., "Test")
✅ Secure login: Use @didiglobal.com SSO accounts only
✅ Company devices: Avoid personal devices for sensitive content
✅ Sharing links: Share meeting links ONLY via DChat/company email
Organizers Must:
Enable "Restrict to internal users"
Enable "Generate unique meeting ID" and avoid reusing the same meeting ID or personal meeting ID.
2. In-Meeting Rules
All Attendees:
🚫 Avoid information leakage: Minimize "captures" (screenshots/ photos/ audio/video) unless it's essential
🔐 Report anomalies immediately
If you see unverified attendees or suspicious actions (e.g., sharing unknown files), immediately alert the meeting host or InfoSec via DChat
3. Post-Meeting Clearance
💻 Exit promptly: Leave Zoom/Voov meeting room immediately after the meeting ends
🗃 Information control: Never share minutes/sensitive data with unauthorized personnel
⚠️ Critical for Sensitive Meetings:
For meetings involving discussions of sensitive information—such as key business tactics, core metrics, or overall business performance—including highly confidential meetings on such as new city launch or strategic planning, organizers must exercise heightened vigilance.
Pre-Meeting
Set unique password for every meeting + enable "Require password to join"
During Meeting
Creating meetings via conference room TV QR codes or tablets is prohibited.
Lock meeting after attendance confirmation
💡👉 How to: "Host tools"→"Lock meeting"
Remove unverified participants and alert the meeting host or InfoSec via DChat
💡👉 How to: More"→"Remove"
Post-Meeting
Click "End meeting for all" when meeting concludes
Delete recordings unless retention is required
⚠️ All IBG Orangers must comply with these protocols.
📌 Explore InfoSec Security Month