Secure meeting in Zoom with encryption

Zoom meeting encryption is used to create secure meetings and prevent unauthorized access to meeting content.
This may, for example, concern meetings with patients or similar meetings where sensitive personal data or confidential information is present. The function should be seen as an alternative for researchers and administrators where increased confidentiality is needed. For those of you who have this need, it is important that you read the instructions below properly and familiarize yourself with how the security levels work and can be ensured.

Zoom uses end-to-end encryption.
When turning on end-to-end encryption (E2EE) in Zoom, you will lose some functionality. Among other things, it is not possible to participate in the meeting via web browser, older video conference systems or call in by phone. Cloud recording, shared whiteboard, breakout rooms, polling and several other functions that cannot be encrypted with E2EE are also turned off.


To hold a Zoom meeting with full-length encryption, it must be enabled and the meeting must be scheduled in advance. You should not use full-length encryption in your private meeting room.

 

Set-up for meetings with end-to-end encryption

You must start by turning on the feature in your settings

1. Log in to Zoom https://lu-se.zoom.us/ Links to an external site. (Links to an external site).
2. Click Settings in the navigation panel.
3. Click the Meeting tab.
4. Enable "Allow use of end-to-end encryption" found in the Security section.
5. Under "Default encryption type", "end-to-end encryption" is selected by default. With this, the encryption key is stored locally on your computer and no one else can access it. (If "Enhanced encryption" is used, the encryption key is stored in the cloud.)

Create the meeting

When end-to-end encryption is switched on, you can schedule your meeting. You can choose to do it on the website or in the client (downloaded application on your device). Scheduling is done as usual, but now encryption is included. If you have "end-to-end encryption" in your settings, this is the default and you do not need to make any changes.
End-to-end encryption limits functionality in Zoom for security reasons. To regain full functionality in Zoom until it is time for your encrypted meeting, you need to deactivate encryption in your settings - just don't forget to activate it again before holding your encrypted meeting.

Invite participants to the meeting

Copy the meeting invitation just like you do in a normal Zoom meeting. Think about how you send out the invitation to ensure that no one but the participant can see it. You can e.g. send an SMS with the meeting ID and password to the meeting participant via a service telephone or another secure method. Information about the meeting must not be included in the SMS.

With the invitation, you need to inform the participant about what they need to prepare before the meeting.

  • Inform them to install the Zoom app and if Zoom is already installed update to the latest version. They must log in to the Zoom application when using end-to-end encryption. 
  • Inform that the participant should not share the meeting ID or the password with other people.
  • Inform the participant to be in a room where no other unauthorized persons can hear what is being said.
  • Inform the participant not to store other devices, such as mobile phones, tablets or smart speakers near the Zoom meeting as it can be a security risk.

 

Start your encrypted meeting


1. Check that "Allow use of end-to-end encryption" is enabled in your settings.
2. Start the meeting.
3. Check that there is a green shield icon with a padlock icon , this shows that the meeting is encrypted.
4. If you click on the icon with a padlock and "verify", a window will appear with several codes. You and your participants have the same security codes and to be really sure that the encryption works, you should compare the security codes with the other participants in the meeting.

Security codes example

 

Tips on extra security measures at the Zoom meeting

  • Hold the meeting in a room where you don't risk being overheard.
  • Ensure that the Zoom meeting has end-to-end encryption enabled before the meeting begins.
  • Ask the meeting participant if someone else unauthorized can eavesdrop on the meeting. If the meeting participant confirms that there is a risk of overhearing, the meeting must not take place.
  • Ask if the participant has smart devices such as mobile phone, tablet or similar nearby. If the participant answers yes, they must be asked to move these.

 

Information to participants in the encrypted Zoom meeting

As a host, you can send out this information to your participants with the invitation.

Ensure the safety of your Zoom meeting

  • Have the Zoom application installed and updated to the latest version on your device. You must log in to the Zoom application when using end-to-end encryption. Log in via the web browser is not allowed.
  • Do not share the meeting ID and password with anyone. Keep them where no one else can get them.
  • Use a secure device (computer, iPad or mobile phone) for the meeting. The device must be protected with a password and use an anti virus program. Make sure your device is updated.
  • Conduct the meeting in a room where no one else can hear what is being said.
  • Do not keep other computers, mobile phones or smart devices near your device when you are participating in the Zoom meeting.

Join the Zoom meeting

  • Click on "Join".
  • Enter the meeting ID found in the link to the meeting you have been invited to.
  • Click on "Join".
  • Enter the password you received from the host of the meeting.
  • You will now end up in a waiting room. Wait until you are admitted to the meeting.
  • You can see that the meeting is protected with end-to-end encryption via the green padlock icon at the top left. Click on verify to get the security codes
    Compare the security codes with each other.

 

Recording of meeting

You can also record the meeting, but certain criteria must be met.

  • Use your work computer when making a recording. Do not use a shared computer.
  • When the Zoom meeting is over, you need to relocate the recording to a safe storage space immediately.
  • When you have relocated your recording to your safe storage space, you then need to delete the recording locally on the computer.

 

End-to-end encryption limits your functions in Zoom for security reasons. Don't forget to deactivate end-to-end encryption when your meeting is finished to regain full functionality in Zoom.

You will find Zoom's data management and data storage at Zoom at LU and Security