The purpose of this document is to provide information on the encryption methods used for the Zoom platform.
The goal of our encryption design is to provide the maximum amount of privacy possible while supporting the diverse needs of our client base.
There are several different use cases and potential ways an individual may connect to Zoom.
The following document outlines the encryption methods used by potential interfaces to the platform.
Want to learn more? Download the FREE data sheet.