Technology To Connect Seniors
Our Mission
To create new technology to enable seniors to safely and easily connect with their loved ones – whether they live independently or in a long-term care facility.

Privacy and Security
When using video chat apps and sites
Many people assume that since they are not discussing matters of national interest that they don’t really need to worry about privacy and security when visiting with friends and relatives online. It’s true that hackers would love to get a hold of state secrets but they are also on the lookout for your personal information. Here are a few things to consider before starting your next video chat with your grandkids.
Remember to be skeptical when someone contacts you claiming to be: a relative, from your bank or credit company, a government official. Even if they have your name, account number, Social Insurance Number, phone number, address or any other details. These pieces of information are relatively easy for a scammer to access and use to manipulate you.
Privacy
- Ensure you set a password or entry key code to your teleconference session.
- Before downloading software, read the company’s privacy policy to ensure that they do not share/sell your information to third party companies.
- Set up the software to always start the call with your audio and video off. This will ensure that you aren’t broadcasting until you are ready.
- Be sure to never post the link, password, meeting number openly.
- Physically close the camera (if it has a lens cover) or block it with a sticker when not in use.
- Use blurred backgrounds or generic backgrounds to prevent information/people in the background from being accidentally recorded.
- Be very cautious about discussing personal information like health or financial information.
- Create a new or temporary email address and use false information to register your account.
Security
- Undetected malware on your device may leave your videoconference contents easily viewable.
- Make sure you download the video conferencing software from the manufacturer or verified app/game store. Often hackers will post links to similar sounding products or websites with similar spelling.
- Ensure that the antivirus software on your device is installed and up to date.
- Disable the recording function in the software.
- Check to make sure the software you are using is ‘end-to-end’ encrypted.
- Utilize password and account management best practices: use strong passwords, never repeat them on more than one account, use a password manager to store your passwords, and change them regularly
Resources for Seniors and Long-Term Care Staff
Managing Privacy During Virtual Family Visits – Toolkit
As the world continues to adapt to the demands of our new reality, in this era of COVID-19 and social distancing, many residents in long-term care homes have turned to the use of various virtual platforms to connect with and keep in touch with loved ones. This toolkit explores unique privacy and security concerns encountered during these virtual visits. It presents practical tools to manage the rapidly evolving privacy threats and mitigate potential losses and misuse of residents’ personal information.
Zoom
A helpful introduction on the advantages and disadvantages of Zoom, how to use, and privacy information.
why Zoom?
A big part of Zoom’s appeal is simplicity. It’s easy to get started, the app is lightweight, and the interface is relatively intuitive to use with popular features like Gallery View — a mode that allows you to see every person on the call at once — built right into the app.
Advantages
Free plan supports up to 100 people
Reliable connectivity and conferencing quality
User-Friendly and uncomplicated interface
Google Calendar support
Disadvantages
Uses a lot of processing power on devices
Free sessions are only 40 minutes
Zoom bombing – unwanted individuals can crash a meeting
Too many subscriptions and add-ons
How to use Zoom
Mobile Compatibility
Android
iOS
Desktop Compatibility
Windows
macOS
Safety and Privacy Concerns
False end-to-end encryption claims
Zoom claimed that it’s video-conferencing was end-to-end encrypted, meaning that only the people attending the meeting could see the video or chat messages. However, in reality Zoom management had the means to view the video calls and chats if they wanted to, meaning hackers could also find a way. While this deceptive practice has been corrected, it does not set a good track record, and end to end encryption is not enabled by default.
Zoom bombing
Zoom bombing occurs when an uninvited user joins a meeting and hijacks the meeting by taking over the screen share function and showing offensive or obscene materials. This can happen because the unique meeting ID can be leaked, randomly guessed, or in case of a public meeting, be accessed by anyone. While moderators can kick out these bad actors, it might be too late to stop them from posting bad content.
Sharing of information with Facebook
The Zoom app on Apple devices was caught sending user data to Facebook such as their location, device models, operating systems, and carriers. Although many other apps do this, Zoom did not state this practice in their privacy policy, as was subject to legal action. While this practice is no longer happening, it does not set a good track record.
Mozilla tips on how to control your data
The company mentions clear criteria to define retention periods, promises to not store data for longer than needed to offer services or as required by law. Hosts of Zoom calls can password-protect saved calls, password-protect meetings, lock a meeting to prevent new participants, turn on/off enter and exit chimes, mute participants on the call, and even remove participants from the call. All Zoom participants have the ability to annotate the video of a call, but only hosts can clear all annotations and disable annotation for everyone. In the paid version, Zoom hosts are able to record meetings, with the option of saving the recording locally to their hard drive or remotely to Zoom’s cloud.
A helpful introduction on the advantages and disadvantages of WhatsApp, how to use, and privacy information.
why WhatsApp?
What makes this app appealing is that it works on various phone and computer operating systems, so you can continue your conversation anytime, anywhere. It can also take advantage of Wi-Fi and cellular data to make one-on-one or group calls, reducing the need for expensive calling charges. WhatsApp uses your phone’s cellular or Wi-Fi connection to facilitate messaging and voice calling to nearly anyone on the planet, alone or in a group, and is especially nice for families and small collaborative workgroups. The app lets you make calls, send and receive messages, and share documents, photos, and videos. WhatsApp is completely free — with no fees or subscriptions
How to use Whats App
Mobile Compatibility
Android
iOS
Desktop Compatibility
Windows
macOS
Safety and Privacy Concerns
Forced Facebook sharing data
There are many apps that share data with other companies, however, they also have an option to opt out of such services. However, Facebook, who owns WhatsApp, has given its users an ultimatum to either accept it’s updated privacy policy, or to not use the app at all. The new policy allows WhatsApp to share with Facebook, and other Facebook owned companies. Data that includes your phone number, other peoples’ phone numbers stored on your device, profile picture and names, statuses, as well as diagnostic data. This allows Facebook to build a profile of you, even if you don’t have a Facebook account.
Unencrypted backups
While WhatsApp provides end to end encryption, meaning that only you and whoever you are talking to can see the contents of the message or video, by default the backups of such messages are not encrypted. Messages from your friends, family, and important contacts on your device can be saved to a cloud server such as Apple’s iCloud or Google Drive. However, these messages have already been decrypted on your device, meaning that you can read them. Backing up these files means that any breaches into these locations (while unlikely) can lead to a lot of personal and sensitive data being leaked. However, WhatsApp does provide secured chat backups, but it is disabled by default.
Unclear content review system
WhatsApp provides a system for reporting messages that are inappropriate, abusive, or offensive. However, this system of reporting is not very transparent. WhatsApp claims that only the user can trigger a report, and that the offending content as well as the four previous messages are sent to WhatsApp for review. Additionally, unencrypted info can also be scanned, such as phone numbers of the reported. The lack of clarity is concerning, as there’s nothing stopping WhatsApp from changing this system like they did to their Privacy Policy to include all messages and content, or implement a system to look for keywords.
Mozilla tips on how to control your data
The only way mentioned in WhatsApp’s policy to delete personal data is to delete the full account. This deletes your account info and profile photo, deletes you from all WhatsApp groups, and deletes your WhatsApp message history. It can take up to 90 days to delete the data. Copies of your information may also remain after the 90 days in the backup storage, ‘to recover in the event of a disaster, software error, or other data loss event’.
Facetime
A helpful introduction on the advantages and disadvantages of Facetime, how to use, and privacy information.
Why Facetime?
Apple’s FaceTime app works on Wi-Fi, so one major benefit it has over your regular Phone app is that it can make free internet-based calls anywhere you have a Wi-Fi connection. You can use FaceTime from home, a hotel, restaurants, or any Wi-Fi hotspot without the need for quality mobile service. Plus, since Wi-Fi is supported, it works on not only iPhone but also iPod touch, iPad, and Mac. FaceTime also runs on cellular networks, so you can use it away from home, too, via your device’s mobile data plan.
Advantages
A free application that comes preinstalled in Apple devices
Optimized software to run smoothly on Apple devices
Quick and easy to setup and use
Calls are end to end encrypted
Disadvantages
Can only be used on Apple devices
No text based messaging and chat
How to use Facetime
Mobile Compatibility
iOS
Desktop Compatibility
macOS
Safety and Privacy Concerns
Facetime security bug
While Apple, the creators and owners of FaceTime, have a very good track record with regards to privacy and security compared to other tech companies, there was a security bug where callers could initiate a FaceTime call and listen in on the recipient before the call was accepted. While this issue has now been fixed, it is important to keep in mind that issues like these can occur regardless of the software, or company. Furthermore, Apple was slow to respond to the issue, waiting for six days to address the issue.
Group spam calls
Some bad actors have been using FaceTime’s group call feature to bombard others up to 20 times, during late hours of the night. They are able to call up to 31 people at a time, and the moment you hang up, another call comes in as someone in the group who missed the initial call follows up with a call back, causing a chain reaction. The problem exists as FaceTime does not have the ability to accept only calls coming from the user’s contact list. Instead it’s similar to a phone number, where anyone can call as long as they have the number. While it is possible to block numbers from calling on FaceTime, users must do so manually, so it becomes a long process of blocking the numbers one by one.
Mozilla tips on how to control your data
Apple retains personal data only for so long as necessary to fulfil the purposes for which it was collected, as described in this Privacy Policy, in their service-specific privacy notices, or as required by law. No specific data retention periods are provided. Hosts and participants all have the same level of control, from muting their own mic to switching from their phone’s front-facing camera to the rear. FaceTime centers video conference calls around group chats within the iPhone’s Messages app. Anyone within a specific group chat can join the group FaceTime call at any time.
Google Duo
A helpful introduction on the advantages and disadvantages of Google Duo, how to use, and privacy information.
why Google Duo?
Google Duo is unlike other video calling services in that it is extremely straightforward and easy to use. All you need to do is sign in to the app, select a contact you wish to call, and tap the video call button. The interface is as minimal as it gets; you just see a list of contacts that have Duo installed, and there’s the option of inviting your friends over for those that don’t already use Duo.
Advantages
See who is calling by using the Knock Knock Feature
User friendly and intuitive interface
End to end encryption
Free on both Apple and Android devices
Disadvantages
No instant messaging, only video and voice calls
Requires a phone number to get started
How to use Google Duo
Mobile Compatibility
Android
iOS
Desktop Compatibility
Windows
macOS
Safety and Privacy Concerns
Video conferencing spy bug
Similar to the FaceTime bug where callers can see and hear from the recipient’s device before they’ve actually accepted the call, Google Duo also had this issue. Interestingly enough, this issue was discovered by a researcher working for Google Project Zero, rather than a user, and the issue has since been fixed. This goes to show that you should always exercise caution when using any type of software.
Mozilla tips on how to control your data
Google provides various privacy controls, accessible via Google Privacy tools. There are several clearly defined ways to delete personal data, including deleting data from separate services or deleting a whole Google Account. The retention periods are also listed in the Policy. Google also offers a possibility to set chat retention rules via its Vault service. For Google Duo, hosts can start calls, mute, and stop calls. Once someone is admitted into a meeting, they automatically have the ability to present.
Skype
A helpful introduction on the advantages and disadvantages of Skype, how to use, and privacy information.
why Skype?
Whether you’re working from home or looking for a way to chat with others using video, Skype has broken traditional barriers to communication. Along with chatting with people in your in-app contacts, you can also use it to make international calls. If the person you’re talking to also uses a Skype account, talking to them doesn’t cost anything extra. For an extra charge, however, you can call and text your non-Skype contacts on their cellphones.
Advantages
Free Skype to Skype video and voice calls
Available on many devices
Skype to Skype calls are encrypted
Ability to call cellphone and landlines for a fee
Disadvantages
Landline and international calls are not encrypted
Contains advertisements
How to use Sype
Mobile Compatibility
Android
iOS
Desktop Compatibility
Windows
macOS
Safety and Privacy Concerns
End-to end encryption is not enabled by default
You may have read previously about what end-to-end encryption is, but if you haven’t, it is simply a way to keep the conversation between you and whoever you are talking to, private. This means only you and the other party can see or hear what the content of the message is. While Skype does offer this feature, it is not enabled by default, meaning Microsoft, the owners of Skype, can tap into your messages if it wants to, or is requested by the government. If you are uncomfortable with the fact that someone can snoop around your messages when you’re talking to your family, it is best to enable the “Private Conversation” feature in Skype to enable end-to-end encryption.
Using conversations to improve services
In order to improve Skype calls and the Microsoft virtual assistant Cortana, Microsoft hired contract workers from China to review Skype calls. What is concerning is that access to these call recordings was passed from one contractor to another in the form of an email containing the login credentials. This means that access to voice recordings could easily have been sold or stolen. While Microsoft has rectified this issue by moving these review programs to secure facilities, it is better to just opt out of these review processes and enable the “Private Conversation” feature when talking or messaging on skype.
Mozilla tips on how to control your data
You can control or access your data via the Microsoft Privacy Dashboard. Microsoft does not state how long your data is kept for. Skype allows hosts to add and remove people from calls, mute users, toggle video and subtitles on and off, share screen, send an emoji reaction, and record calls. Those who pay for Skype for Business can choose who can enter, disable instant messages, mute all participants and block participants’ video.
Video Chat Safety Tips
From our KnowledgeConnect program this sheet highlights how to have video chats safely and privately.
Share your opinion
KnowledgeConnect - Family and Friends of Seniors Survey
KnowledgeConnect - LTC Facility Staff Survey
KnowledgeConnect - LTC Resident Family and Friend Survey
KnowledgeConnect - Seniors Living Independently Survey
