The primary focus of this paper is to clarify in detail the security information for Zoho Meeting with respect to India.
All data collected from a user to create their Zoho Account, such as name and email address, is highly confidential and can only be shared as identification with other participants present in your online meeting or webinar based on your prior consent.
Zoho uses the information collected during creation of the account to facilitate servicing of the meeting and webinar. Zoho stores this information in its servers and if at all you delete your Zoho Account, your data will be automatically deleted within 6 months.
Other data such as your chat transcripts, information regarding attendee performance, webinar registrant information, poll results, and Q&A information is only stored for the duration of the meeting to generate detailed session reports with the user's consent. This data is wiped from data servers immediately when the user deletes the respective session report.
Media-data is encrypted at both during transit and rest. All data exchanged during a webinar or an online meeting takes place through TLS 1.2, 256-bit Advanced Encryption Standard (AES).
Customer data at rest is encrypted using a 256-bit Advanced Encryption Standard (AES). We own and maintain the keys using our in-house Key Management Service (KMS).
Every meeting/webinar hosted from your account will be mapped through our dedicated Indian servers irrespective of the geographic location. Thus, we can guarantee that the data collected, processed, and stored inside India, stays inside India at all times and does not leave India.
Zoho doesn't use any third party Software Development Kit (SDKs) or code belonging to other companies. We develop, test, and maintain our applications.
We do not have any third party trackers on our website and within our applications.
At any point of time, Zoho does not serve any third party advertisement to users.
Zoho has taken care to ensure that the privacy of the meeting is not violated by someone trying to enter using brute-force/random keys.
More details about the security can be found here.