
U of T implements Zoom cloud recordings retention protocol

Zoom Phone Voicemail recordings are processed and stored in Zoom’s cloud and can be managed through the secured Zoom client. This ensures that the session cannot be eavesdropped on or tampered with.

Private keys are generated on the device and not shared. Zoom uses both asymmetric and symmetric algorithms to encrypt the chat session. This ensures that no third party - including Zoom - has access to the meeting’s private keys.Īdvanced Chat Encryption, when enabled, allows for a secured communication where only the intended recipient can read the secured message. This content is protected during transit with 256-bit Advanced Encryption Standard (AES) using a one-time key for that specific session when all participants use a Zoom client.Įnd-to-end Encryption, when enabled, ensures that communication between all meeting participants in a given meeting is encrypted using cryptographic keys known only to the devices of those participants. Encryption: Protecting your event content by encrypting the session’s video, audio, and screen sharing.
