Video Level Permissions
Make sure you apply the appropriate viewing permissions when uploading a video. Permissions at the video level allow you to control who can see your video, who can own and edit it and assign access from within groups and channels. When you upload a video into Stream, you have the option to select, Allow everyone in your company to view this video. Any users with an ECU Microsoft 365 account can see the video and add it to their groups and/or channels. The Shared with field is where you select who can view/own your video and in which groups/channels. Use the drop-down to search and select viewers.
- My groups – search for and grant access to groups for which you have access to share video file(s).
- Channels – search for and grant access to channels for which you have access to share your video file(s).
- People – search for and grant access permissions to individual people, AD Security Groups, and/or Office 365 Groups.
With the ability to easily record, capture, upload and distribute information, we want to make sure you are fully aware of the capabilities of the software you are using and that you have the information you need to be successful. By using this tool, you agree that you have been informed and understand the best practices and policies, as well as federal, state and international laws associated with these tools. If you are recording anyone besides yourself, please be aware of the requirements contained in the Media Consent Release Guidelines (see Related Articles). Digital media content that is protected by FERPA must be password-protected to ensure the content is not accessible to persons outside ECU. This includes any digital media recordings that include student identifiers or student interaction. Access to digital media captured for the purpose of an ECU-registered course should be restricted to only those faculty and students registered to teach or take that course. Access to this content may only be granted to ECU faculty, staff or external guests at the permission of the instructor of record for that course. Information protected by copyright should not be uploaded to these systems. All users of university IT services are reminded that unauthorized downloading and sharing of music, video and software is a violation of Title 17, of the U.S. Copyright Act, Sections 504 and 505 and is punishable with civil and criminal penalties ranging from $750 to $250,000 and up to 10 years of imprisonment. For more information concerning compliance with the Copyright Act, visit the U.S. Copyright Office website at www.copyright.gov and check out the FAQs. ECU resources are available at https://copyright.ecu.edu and the file sharing information page. No sensitive information is approved for these systems. Sensitive information includes social security numbers, proprietary research data, legal data, personnel information, drivers’ license numbers and credit and debit card information. Sensitive Health, Protected Health and HIPAA Data: Content that is protected by HIPAA, or considered sensitive personal health data, protected health or otherwise should NOT be posted online in any form, even if it is protected by password. This includes sharing any HIPAA, PHI, other sensitive data and protected content while using any of ECU’s Digital Media Capture programs. HIPAA, PHI, other sensitive data and protected content should be 100% offline and should be protected in accordance with the privacy rules. It is the responsibility of the instructor of the course and the recorder of the content to ensure any tool they use to record digital media and any content that is recorded is approved to be shared with sources external to the United States. If there are questions on country, content or access, then please submit an Export Controls Review service request. More information on applicable United States Federal laws, including CFR 15 Parts 300 to 799, Commerce and Foreign Trade can be found at the Code of Federal Regulations website. All ECU faculty, staff, students and approved external users are expected to follow applicable security policies regarding the capture of digital media. These include but are not limited to the following: