Communications Options and Ideas
Microsoft Teams Calls
Microsoft Teams Calls has all the functionality you expect from a traditional desk phone including hold and transfer, call forwarding, voicemail, and blocking unwanted callers.
Click the links below for video tutorials that will teach you how to make the most of Teams Calls.
- Learn how to make a call with Teams
- Configure Voicemail in Teams Calls
- Block calls and change your status/notifications settings
- Manage Contacts and Speed Dial in Teams Calls
- Place a Call on Hold and Transfer a Caller
- Access Dial pad & Initiate Multi-party Call in Teams Calls
- How to create a Shared line (or delegate) in Teams Calls
- OIT Telecom Liaison Townhall Presentation
Zoom
You can make ‘Audio Calls’ from Zoom – just turn off your camera. The software is free and ubiquitous. Simply start a new meeting and send the link to your attendee(s).
Notes:
- This is a great choice for communicating with just about anyone.
- See the general notes below about using Zoom with Controlled Unclassified Information (CUI).
- Not for use when discussing CUI or Export Controls. See below.
Personal Cell Phone Tips
The below are not recommendations, but options if you choose to use your personal cell phone for OCG business.
- Forward your work number to your cell phone. https://oit.colorado.edu/tutorial/cisco-voip-forward-your-phone
- Hide your cell phone number when calling (dial *67 and then the number).
- Other ideas can be found here: https://www.komando.com/how-tos/ways-to-block-your-number/739255/
General Notes and Caveats
Use a land line, cell phone or in-person meetings for:
- Conversations concerning details related to controlled unclassified information (e.g. the actual data, anything marked CUI by government, whatever is controlled). Do not use Teams or Zoom.
- Conversations concerning details related to export control issues (what, who, technology). Do not use Teams or Zoom.
- Google Voice should not be used for any work communication because of security concerns, per Scott Maize in CU Boulder’s Research Cybersecurity.