Security and Privacy Update from Zoom

Security and Privacy Update from Zoom

Zoom has become a popular and vital means of communication for many and as a result has also become a target for hackers and questionable intent. Below are some facts about videoconferencing, which are currently being discussed on many online platforms.


Attention Tracking

This function identifies whether participants have clicked away from the active Zoom window for more than 30 seconds.
As of April 2, 2020, Zoom removed the attendee attention tracker feature as part of their commitment to the security and privacy of their customers.


Privacy and Data Protection 

Cytosorbents Europe GmbH also have a data protection contract with Zoom in accordance with EU guidelines.
Data is transferred from a Zoom on social media Applications (e.g. Facebook) if the social media application is used to register with Zoom. This is not the case for our company accounts as all users are invited to join via our Zoom business account and not via social media.  Zoom have also reconfigured their IOS client it to prevent Facebook from collecting unnecessary device information from their users.
Unlike other communication applications such as Skype and Whatsapp, Zoom does not use the information from your address book. In addition, Whatsapp, Skype, Skype Business, Lynx and teams, all from Microsoft. Microsoft also sells usage data. Zoom have explicitly stated that they do not sell their users’ data, They have never sold user data in the past, and have no intention of selling users’ data going forward.

Gate crashing (Zoombombing“) online Meetings have always existed pre Zoom. Zoom have provided a few reminders below to ensure we do not fall victim to this. 

  • When you share your meeting link on social media or other public forums, that makes your event … extremely public. ANYONE with the link can join your meeting.
  • Avoid using your Personal Meeting ID (PMI) to host public events. Your PMI is basically one continuous meeting and you don’t want randos crashing your personal virtual space after the party’s over. Learn about meeting IDs and how to generate a random meeting ID (at the 0:27 mark) in this video tutorial.
  • Familiarize yourself with Zoom’s settings and features so you understand how to protect your virtual space when you need to. For example, the Waiting Room is an unbelievably helpful feature for hosts to control who comes and goes. (More on that below.)


Also when creating zoom meetings, we have the option to set passwords for the meetings.
While there is a lot of criticism on almost all cloud solutions i.e. Adobe Creative Cloud, Zoom has also become the latest target.
One safer alternative is to use “on site” services which Zoom actually offer. However, one would need to set up their own server which in turn will need to be suitably powerful enough and Secure from Third party / unwanted access. This requires resources, and can also result in huge Financial expenditures.
While no solution is perfect. Zoom have responded and adapted promptly and responsibly to both the demand and the critisicsms.

If you require more information, you can also visit Zoom’s blogpage at https://blog.zoom.us.

Tags: IT
Please enter these characters in the following text field.

The fields marked with * are required.