NH Business Review May 08, 2020

Page 22

22

N EW HAM PSH I R E B USI N ESS R EVI EW

N H B R.C O M

THE LAW

Videoconferencing: How to ensure privacy and security Beware of the risks – like ‘Zoombombing’ – and measures you can take to prevent them

Videoconferencing is a critical component of our new normal. Society is using it in record numbers to connect with family and friends, engage in remote education, sustain our businesses, participate in social gatherNASHUA REGION ings and for a multitude of other purposes. Like any technology, if not properly managed, videoconferencing poses risks to the privacy and the security of our personal information. Businesses and individuals using the technology should be aware of those RING, HOSPITALS, PERSONAL FINANCE, ENERGY risks, andBANKING, implement appropriate safeguard F, FLOTSAM, LAW, OPINIONS, THE LATEST, to mitigate or prevent them. ABOUT TOWN

without proper controls, the link can be used by anyone to access the conference, and sometimes links are publicized on the websites and social media, particularly if meetings are public. Hackers acquire links to videoconferences to steal personal information (like names, emails and contact information), and valuable confidential business information available as a part of those meetings. They also can disrupt meetings by overwhelming attendees with offensive content (typically pornography or hateful images), causing the meeting ON, HEALTHCARE, TOURISM, NEWS, CHARITABLE GIVING, MOREto ONLINE terminate. Predators and thieves also coce, CALENDAR, LAST WORD vertly penetrate videoconferences to gather Access and security controls information about children engaging in “Zoombombing” is the newest neologism remote education or connecting with friends, to enter our lexicons, and the most common and to acquire detailed video information insecurity. The term derives from a prominent useful for burglary. the videoconferencing application Zoom, These dangers are exacerbated if hackwhich exploded from about 10 million to 200 ers have installed malware on computers or million users practically overnight. mobile devices that permit them to control of To participate in a Zoom or other video the cameras and microphones. conference (like Skype, GoToMeeting, Google Most videoconferencing applications have Hangouts/Meet, Microsoft Teams, Slack, controls that can be configured to mitigate Cisco WebEx, etc.), the meeting organizer such dangers. For starters, all conference typically emails a link to attendees. However, transmissions should be encrypted. More-

over, organizers can require attendees to enter passwords to access meetings, and can restrict or eliminate the ability of participants to share content. Conferences also can be established with virtual waiting rooms, permitting organizers to admit only intended participants, or as webinars rather than meetings, restricting the ability of attendees to distribute content or interact with each other.

Notice, consent and secure retention Videoconference applications commonly either automatically record or permit recording of the content. Given the vast quantities of sensitive information exchanged using this technology, such recording raises significant privacy and security issues. Privacy laws require meeting organizers to notify participants and (in some situations) obtain consent to collect, use and disclose the personal information acquired about participants. State and federal wiretap laws likewise require consent to record and store certain audio and electronic communications.

Workplace Solutions for New Hampshire Employers

Organizers can require attendees to enter passwords and place restrictions on interactions to avoid hacking disruptions. As a result, meeting organizers should integrate appropriate notice into all videoconferences, technologically require express consent from participants whenever private meetings are recorded, and obtain at least implied consent from attendees of recorded webinars. Recorded videoconferences also should be securely stored, and the applications permit a variety of retention methods, such as on a cloud, device hard drive or server. Meeting organizers should ensure that the retention method selected is secure, including encryption of the recordings and such hard drives, and use of strong passwords and multi-factor authentication to access such clouds and networks. Additionally, organizers should technologically limit or prevent meeting participants from making their own recordings.

Due diligence and agreements

There is simply no substitute for good judgment and getting things right the first time. That’s where Drummond Woodsum attorneys Mark Broth, Matt Upton and Anna Cole can help. A group of highly specialized attorneys focused on providing human resource professionals with the guidance they need in dealing with personnel matters. We practice law differently. Since 1965.

dwmlaw.com | 800.727.1941 Portsmouth, Manchester, Lebanon, NH

Most videoconference providers disclose on their websites the privacy and security controls inherent in their applications, and provide instructions about how to configure such controls. Before using these applications, businesses and individuals should do due diligence to ensure that the controls are sufficient for their particular uses of the technology, and enable them to comply with the privacy and security laws that apply to them as well as the individuals who may participate in videoconferences. Some videoconference providers also will sign agreements with users that are designed to comply with privacy and security laws, including domestic laws like HIPAA, the Child Online Privacy Protection Act and the California Consumer Protection Act, as well as foreign laws like the European Union General Data Privacy Regulation. The coronavirus crisis presents a multiplicity of challenges and risks. As society increasingly adopts technologies like videoconference to facilitate our new normal, we all must implement appropriate measures to ensure that the use of these technologies does not endanger the privacy or security of our families, friends, businesses, customers and each other. Attorney Cam Shilling chairs McLane Middleton’s Information Privacy and Security Practice Group.


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Q&A INTERVIEW

2min
page 30

In NH jobless data, 72% of claims are in three industries

1min
page 3

Breweries face revenue losses as kegs go stale

2min
page 2

Is it time for New Hampshire to have a state bank?

3min
page 27

NHHFA recognizes top loan officers, lenders

1min
page 26

New ownership sees opportunity for Belknap Mall

2min
page 25

What happens after Covid-19?

3min
page 24

NHDES and some towns pave way for large-scale solar

3min
page 23

Videoconferencing: How to ensure privacy and security

3min
page 22

For families with shared custody, it’s business as usual

3min
page 21

Startups learn to adapt under Covid

9min
pages 1, 20

Under Covid, paid leave becomes a reality in NH

9min
pages 1, 18-19

Remote learning isn’t working for special education students

2min
page 17

Collect renewable energy payments for rooftop solar

3min
page 16

NH Campaign for Legal Services is even more essential

3min
page 16

Distributive work gets a boost

3min
page 15

The characteristics of leaders

3min
page 14

Should state business tax triggers be repealed?

7min
pages 12-13

Communicating in this time

3min
page 11

Mind your Zoom background

3min
page 10

Growing Pains

10min
pages 8-9
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.