How to Use Zoom Safely and Privately

Get started with our “Zoom Introduction: How to Use Zoom Safely and Privately.” This comprehensive guide covers the advantages and disadvantages of Zoom, along with detailed instructions on how to use it effectively. Learn essential privacy tips to keep your online meetings secure and your personal information protected. Whether you’re a beginner or looking to enhance your Zoom experience, this resource will help you navigate the platform confidently and securely. Stay connected and safeguard your privacy with our expert Zoom guide!

Learn more ways to keep safe online!
Check out our available courses down below.

how to use zoom

zoom logo

Why Zoom?

A big part of Zoom’s appeal is simplicity. It’s easy to get started, the app is lightweight, and the interface is relatively intuitive to use with popular features like Gallery View — a mode that allows you to see every person on the call at once — built right into the app.

Zoom Privacy

Get Started With Zoom


Advantages

  • Free plan supports up to 100 people
  • Reliable connectivity and conferencing quality
  • User-Friendly and uncomplicated interface
  • Google Calendar support

Disadvantages

  • Uses a lot of processing power on devices
  • Free sessions are only 40 minutes
  • Zoom bombing: Unwanted individuals can crash a meeting
  • Too many subscriptions and add-ons

How to use Zoom

Check out this tutorial here: Source

Android & iOS

Windows & macOS

Safety and Privacy Concerns

Zoom claimed that it’s video-conferencing was end-to-end encrypted, meaning that only the people attending the meeting could see the video or chat messages. However, in reality Zoom management had the means to view the video calls and chats if they wanted to, meaning hackers could also find a way. While this deceptive practice has been corrected, it does not set a good track record, and end to end encryption is not enabled by default.

Source

Zoom bombing occurs when an uninvited user joins a meeting and hijacks the meeting by taking over the screen share function and showing offensive or obscene materials. This can happen because the unique meeting ID can be leaked, randomly guessed, or in case of a public meeting, be accessed by anyone. While moderators can kick out these bad actors, it might be too late to stop them from posting bad content.

Source

The Zoom app on Apple devices was caught sending user data to Facebook such as their location, device models, operating systems, and carriers. Although many other apps do this, Zoom did not state this practice in their privacy policy, as was subject to legal action. While this practice is no longer happening, it does not set a good track record.

Source

The company mentions clear criteria to define retention periods, promises to not store data for longer than needed to offer services or as required by law. Hosts of Zoom calls can password-protect saved calls, password-protect meetings, lock a meeting to prevent new participants, turn on/off enter and exit chimes, mute participants on the call, and even remove participants from the call. All Zoom participants have the ability to annotate the video of a call, but only hosts can clear all annotations and disable annotation for everyone. In the paid version, Zoom hosts are able to record meetings, with the option of saving the recording locally to their hard drive or remotely to Zoom’s cloud.

Source

Resources

View our other tipsheets

Explore our resources on cybersafety, privacy protection, and educational content tailored for everyone. Our collection of tipsheets covers essential topics in cybersecurity, ensuring users of all backgrounds can navigate the digital world securely. Whether you’re safeguarding personal information, learning about privacy best practices, or seeking educational resources, our page equips you with practical insights to stay safe online. Dive into our resources and enhance your digital resilience today.