Close

Zoom Phones – Secure & Compliant

The shift to a remote workplace and the transition to a cloud communication platform that adequately supports remote work has continued into 2022.

One important aspect that is likely to be on the mind of every decision-maker through this transition is security. Whether the communication is happening in the office, from the home office, or somewhere in between – it’s vital that this communication stays both secure and compliant.

Zoom, one of VIcom’s cloud communication partners has a variety of features within their cloud phone solution that ensures a secure and safeguarded cloud calling experience.

Here are the top security features according to Zoom:

Encryption:

256-bit AES-GCM encryption: Zoom uses 256-bit AES-GCM encryption as their standard for real-time content and media, which applies to data in transit across Zoom Meetings and Chat, Zoom Video Webinars, meetings occurring via Zoom Rooms, and Zoom Phone data transmitted over the public internet

End-to-end encryption (E2EE) for Zoom Phone (coming soon): Previously only available in Zoom Meetings, their E2EE offering will be extended to Zoom Phone this year. Zoom Phone users making on-net calls on the Zoom Phone network will have a new option to upgrade to E2EE during one-on-one, intra-account phone calls that occur via the Zoom client.

TLS encryption: During SIP registration, Zoom Phone leverages TLS encryption.

Caller ID masking: Depending on the purpose of the call and subject to applicable laws, users can choose to display their direct number, a main office number, a call queue number, or no number as the outbound caller ID. This feature helps support the privacy and security of employees’ personal contact information.

Private network peering: Zoom Phone is optimized for secure internet traversal. For additional traversal considerations, Zoom has established direct private network peering links between Zoom Phone data centers and Zoom Phone PSTN service provider networks to prioritize data protection.

Toll fraud: Zoom Phone utilizes access control and automated detection capabilities in order to detect irregular calling patterns to help prevent toll fraud. If irregularities are detected, our security department will notify users of potential fraudulent activities.

Calling block lists: Customizable global and personal block lists enable Zoom Phone users and administrators to easily add and manage blocked phone numbers.

In addition to security, compliance is also a key aspect of today’s communication technology, including Zoom Phone. According to Zoom, Zoom Phone conforms to the requirements of the following laws, standards, and certifications:

Ray Baum’s Act and Kari’s Law: Zoom Phone supports nomadic E911 services for its users without the need for third-party solutions. Zoom Phone users can be compliant with the U.S.-based mandates for Kari’s Law and Ray Baum’s Act with the proper configurations of existing emergency features, which are outlined in depth in our guide.

Certifications, attestations, and standards attained by the Zoom platform: Zoom Phone is included in a variety of certifications, attestations, and standards that apply to the entire Zoom platform. These include SOC 2 Type II, Cyber Essentials certification – NCSC, CSA STAR Assessment (Level 2), and many more, all of which can be found here.

STIR/SHAKEN: As part of the STIR/SHAKEN authentication standards required by the FCC, Zoom Phone will show “caller verified” check marks on incoming calls to users so they can help identify potential robocalls and spam calls. A check mark icon appears if the carrier has authenticated the calling party and they are authorized to use the calling number. The check mark icon appears in the call log and inbound call notifications (shown in the Zoom client and application) for several inbound call scenarios. More details can be found here.

Recording compliance: Zoom Phone’s automatic call recording feature can be configured for users and call queues that need to record all interactions. There are configurable data retention periods and configurable data storage location options for collaboration contents that enable customers to define where (regionally) data is stored at rest. We’ve even created a recordings admin role to help customers manage who can access certain recordings, and we have a robust set of APIs designed to enable customers to manage their recordings.

 

Cloud phones are just one element within your cloud communication strategy. VIcom has the partners and experience to work alongside your organization to make your transition to the cloud seamless and efficient.

If you’re interested in speaking with a Cloud Communication Expert here at VIcom, please fill out the form below and we’ll be in contact!

 

Let’s Get In Touch

Fill in the form and we will get back to you in 24 hours !

ABOUT VICOM

Teleconferencing Virginia Beach | VIcom is well experienced in teleconferencing solutions. Moreover, VIcom assists many organizations in simplifying and enhancing their ability to teleconferencing efficiently.

We are also Virginias’ premier technology solutions integrator for Teleconferencing, Zoom, Audio Visual, Unified Communications, Security Applications, Cloud & IT, Church AV Systems, and Educations AV Solutions. Moreover, we are proud to serve clients throughout the mid-Atlantic region of Virginia. For example, Virginia Beach, Chesapeake, Norfolk, Portsmouth, and Suffolk, VA. Also providing service to customers in Newport News, Hampton, Poquoson, Yorktown, Williamsburg, Tabb, Grafton, and Seaford VA.

Furthermore, we have an office in Richmond, VA, better serving clients in the Northern Virginia region, including Richmond, Powhatan, Colonial Heights, Chester, Petersburg, Chesterfield County Midlothian VA.

For more information, call: (757) 490-7777. Please be sure to follow VIcom on Linked In.

Keywords: Zoom, Zoom Phone, Office Phone