Security and Zoom

Zoom Security and Access Guidelines

As part of our standard risk management process, Zoom has undergone a comprehensive technology risk assessment. This includes an in-depth review of its contract and security features, and we have confirmed that the platform meets our standards for data security. Zoom uses robust encryption protocols to secure data in transit, and it does not store any of our Western credentials, such as usernames and passwords, in its systems.

Access Control Considerations

Please be aware that for most Zoom meetings, any individual (whether affiliated with Western or not) who has the session link can access the meeting. To maintain security and privacy:

  • Carefully consider who needs access to each meeting, particularly when discussing sensitive or confidential information.
  • Be mindful of how meeting links are shared to ensure that only intended participants receive them.

For more information, please visit: Zoom Security Information – https://zoom.us/docs/doc/Zoom-Security-White-Paper.pdf

 


Published on  and maintained in Cascade.