

Follow the strategies below to make sure it is secure and safe for you and your meeting participants. On top of the built-in security technologies and settings, there are a number of features and strategies available to increase the safety of your meetings. You can also use an API call to pre-provision users from any database back-end, so universities and organizations can add users to their managed domains. OAuth-based provisioning works with Google or Facebook to make this extremely fast. Compatible services include Okta, Delinea (formerly Centrify), Microsoft Active Directory, Gluu, OneLogin, PingOne, and more. Zoom pairs with a variety of enterprise identity management platforms to make monitoring and managing access easy. Each can be individually enabled or disabled for an account. Zoom is compatible with multiple authentication methods, including SAML, OAuth, and Password-based. This keeps voicemails safe and means storage is handled on their end. These are accessed through the Zoom client, which has a secured access. Phone voicemail recordings use cloud storage. These meetings can be password protected or access can be restricted to people within your organization. If you choose to use Zoom’s Cloud Recording add-on, meetings will be stored to their cloud. After recordings are saved to your device, you can use an encryption software to protect the recording. Meeting recordings can be stored on the host’s local device or on Zoom’s cloud (with the Cloud Recording option added to your plan). This protects the chat from being intercepted, eavesdropped on, or otherwise tampered with.

Chat sessions are encrypted using both asymmetric and symmetric algorithms, and session keys are generated using a device-specific hardware ID so only your device can read the chat. Zoom’s chat features are encrypted using Advanced Encryption Standard (AES-256) to ensure users have a secure line of communication between sender and recipient. Read their entire privacy policy for more information on how they collect and use your information. They collect user data required to provide and improve their services, including a user’s IP address, OS, and device type.

They do not monitor or store your meetings aside from cloud recordings for your use. Zoom does not sell your personal data, no matter what type of entity you are. Zoom only stores information included on your user account profile, including your: Top Zoom security features to keep your calls safeīefore we cover Zoom features, add-ons, and strategies for security, we’ll take a look at the built-in security technology, including what encryption is used, what privacy policies they use, and how recordings are stored. Top Zoom security features to keep your calls safeīefore we dive into strategies and features you can use, let’s cover the basic security technology used and privacy policies in place.
