Zoom and security
Is Zoom Safe?
You can use Zoom for meetings discussing confidential matters if you set the meeting to use End-to-end encryption.That mean that all transfered meeting data, sound, video and chat, will be encrypted all the way between the participants and the encrypted data will not be decrypted during transfer at any point.
Some features and functions will not be available in an end-to-end encrypted meeting.
Participants can not join the meeting by calling in from a telephone nor participating with a traditional video conference system.
When scheduling the meeting chose the setting "End-to-end encryption". This setting is also available for your personal meeting room.
Zoom, as many other services, are used by criminals to lure users to give them personal data, credit card information etc.
Keep your Zoom client updated. When you get a notice that there is an update, please install it. It is important for security reasons, and to access new functionality.
Sunet has feedback that there are and circulates questions / rumors about Zoom and personal data, etc.
Sunet's Zoom installation is completely separated from the public Zoom solution (Zoom cloud).
The public Zoom solution is the one often seen in the press, especially with questions about the use of personal data, credit cards etc. These are issues that we are not touched on by our separate installation.
In collaboration with NORDUnet, Sunet has produced a brief description and a short “FAQ” around our installation, please feel free to feedback if there are missing areas!
NORDUnet's FAQ can be found at:
A comprehensive description, including what data is handled where can be found at:
Sunet's page about the E-meeting service
(UU already have an agreement with Sunet for Zoom. You should not submit a new applicant.)
Standard meeting encryption
A meeting between 2 participants are encrypted all the way between the 2. A meeting with more than 2 participants need to pass a bridge server that distributes the meeting content to every participant. The communication between a participant and the bridge server is encrypted but within the bridge server the communication are decrypted. Technicians at Nodunet might be able to see that communication as it flies by. All communication in and out to the Internet are encrypted. To obtain higher security, chose End-to-end encryption.
|General Data Protection Regulation /DFS|
No meeting content is stored at the service provider. Recordings, saved text from chat, annotations etc are saved locally on the saving users computer. The meeting host decides who are allowed to record a meeting.
Name of person, account and mail address is saved by the supplier to be able to deliver the service to our users.
If you have questions, please ask IT-servicedesk by phone 4400 or by email firstname.lastname@example.org