For many lawyers, the early days of the COVID-19 pandemic were a forced apprenticeship with virtual communications technologies, perhaps none more important than the easy-to-use, low-cost Zoom videoconferencing platform. Zoom calls, Zoom hearings, and Zoom depositions proliferated as a matter of necessity and, in nearly every jurisdiction, as a matter of judicial fiat.
But as Zoom’s footprint within the legal community grew rapidly, some wondered — prompted by news of “Zoom bombing” and Zoom-inspired phishing exploits — whether Zoom meetings were safe enough places to discuss client business and share privileged client information.
This eBook reviews security measures deployed by Zoom and security measures that should be adopted by users of the platform. Together, they can create an information-sharing environment that meets the legal profession’s ethical obligation to take reasonable measures to protect client information from access by unauthorized persons in most uses.
Download our eBook to learn:
- Security Features Offered By Zoom
- Stronger passwords, longer meeting identifiers
- Two-factor authentication
- End-to-end encryption
- “Zoom bombing” protections
- Data Security
- User Settings and Controls
- The waiting room
- Passcodes and meeting registration
- Chat settings
- File Transfer and screen-sharing
- Other controls
- Three Practical Tips
- Zoom Security RX