InvestorsHub Logo
Followers 1039
Posts 115394
Boards Moderated 13
Alias Born 06/10/2006

Re: Cartmontster post# 233235

Thursday, 09/01/2022 10:36:22 AM

Thursday, September 01, 2022 10:36:22 AM

Post# of 235061
They all have Zoom or another well-known platforms.

Which is excellent. Plus my discussions with two IT VP's revealed they already have enterprise wide safety measures. Not just for video conferencing.

They both agreed that no matter how good any system is, someone can always take a picture of the screen!

ZOOM


Encryption: Protecting your event content by encrypting the session’s video, audio, and screen sharing. This content is protected during transit with 256-bit Advanced Encryption Standard (AES) using a one-time key for that specific session when all participants use a Zoom client.

End-to-end Encryption, when enabled, ensures that communication between all meeting participants in a given meeting is encrypted using cryptographic keys known only to the devices of those participants. This ensures that no third party -- including Zoom -- has access to the meeting’s private keys.

Advanced Chat Encryption, when enabled, allows for a secured communication where only the intended recipient can read the secured message. Zoom uses both asymmetric and symmetric algorithms to encrypt the chat session. Private keys are generated on the device and not shared. This ensures that the session cannot be eavesdropped on or tampered with.

Zoom Phone Voicemail recordings are processed and stored in Zoom’s cloud and can be managed through the secured Zoom client.

Recordings can be stored on the host’s local device with the local recording option or on Zoom’s cloud with the Cloud Recording option (available to paying customers).

Local Recording Storage: Recordings stored locally on the host’s device can be encrypted if desired using various free or commercially available tools.
Cloud Recording Storage: Cloud recordings are processed and stored in Zoom’s cloud after the meeting has ended; account owners control whether these recordings are passcode-protected. The recordings are stored in both video/audio format and audio only format.
If a meeting host enables cloud recording and audio transcripts, both will be stored encrypted. The account owner and people and apps they approve can access encrypted content stored in ZoomCloud (and Zoom can access stored content for troubleshooting if requested by the account owner).
If a meeting host enables file transfer through in-meeting chat, those shared files will be stored encrypted and will be deleted within 31 days of the meeting.
Audio Signature embeds a user's personal information into the audio as an inaudible watermark if they record during a meeting. If the audio file is shared without permission, Zoom can help identify which participant recorded the meeting.

Watermark Screenshot superimposes an image, consisting of a portion of a meeting participant’s own email address, onto the shared content they are viewing and the video of the person who is sharing their screen.