Distance Learning Tools Assessment

  1. Home
  2.  → Distance Learning Tools Assessment

Preventing, or at least minimizing, the infringement of academic freedom at a technical level means that a digital education platform should address the following:

  1. Minimizing the ability of outside parties to eavesdrop or crash in on a lecture, using features such as:
    1. End to end encryption
    2. Secure management of encryption keys
    3. Meeting passwords
    4. Waiting rooms
    5. Presenter controls over attendees
    6. Barring anonymous participants
  2. Minimizing the ability of outside parties to censor or block lectures and/or lecture attendance, including refusing to honor such requests
  3. Minimizing the ability of foreign governments to request content and/or attendee data from a platform vendor
  4. Maximizing a student’s ability to connect to lectures.  This may include:
    1. Being accessible to students in a foreign country without the need to use a virtual private network (VPN)
    2. Being optimized for use over a VPN, as VPN’s incur more network overhead and latency

The following table has been developed using publicly available information from each of the distance education platform vendors listed below.  In some cases the feature is on by default, in other cases it is an available option that the presenter should select. All the solutions listed below are able to provide synchronous lectures (meetings & webinars) and record them for asynchronous use. Both Zoom and Yuja are currently configured and supported for faculty synchronous and asynchronous lectures. The remainder either requires significant configuration and documentation to get ready for faculty use (thus rated Low) or requires contract and procurement as a starting point (thus rated None).

Feature / VendorZoomMicrosoftGoogleKalturaYuja
PlatformZoomTeams for EducationMeetVirtual ClassroomActive Learning Platform (Video Conferencing)
End to End Encryption (data/video)N (1)YYYY
Encryption (phone)NNNNN
Encryption key holderZoom (2)Hybrid (3)GoogleKalturaYuja
Meetings require passwordsYYYYN
Start meeting only when presenter joinsYYYYY
Can enable waiting roomsYYYYN
Can disable attendee recordingYYYYY
Can bar anonymous attendeesYYY (4)Y (5)
Student access from ChinaUnblockedRequires VPNRequires VPNRequires VPNUnknown (6)
Will comply with foreign government requests for data (7)YYYYY
UCI Readiness to Deploy and Support for Faculty Synchronous LecturesHighLowLowNone (8)High (9)
  1. End to end encryption beta starting 7/31/2020.  General availability should follow soon thereafter.
  2. Customer key management feature announced as coming soon
  3. Vendor manages data in transit encryption key, customer manages data at rest encryption key
  4. Set at the organizational level, not the meeting level
  5. Feature requires vendor to administer
  6. Yuja states that it is not their responsibility to validate if they are accessible via China
  7. Assumes the request is legal under the foreign government’s laws
  8. Kaltura is included for comparison purposes.  Neither UCI nor the UC system has a contract with them
  9. Yuja Video Conferencing is integrated with Canvas and capable of synchronous lectures for 200 people or less (including lecturer).

The use of a VPN to access applications outside of China requires going through the country’s congested Internet border. VPNs wrap data traffic within a secure layer, adding additional overhead to network traffic. This in turn can result in poor network performance at points of congestion, meaning that although a service may be accessible, it is not practically usable.