These revelations have the possibility of subjecting a company to discrimination litigation.Ī Zoom meeting from home may lead participants to adopt a more casual, relaxed approach and a sense that work from home is not really being at work. Background items may also reveal health-related issues and subject a firm to HIPAA exposure. A background may inadvertently reveal information regarding a person’s race, religion, orientation, age, or membership in a protected class. Zoom meeting participants may neglect to consider the background art, pictures, memorabilia, apparel, or other assorted personal items visible behind them during a Zoom meeting. One prevalent scheme is to discover a person’s name, phone number, place of employment, then use this information to file a fake unemployment claim. Privacyĭisclosure of personal information in Zoom conversations may be combined with information about the same person, available elsewhere, to facilitate the crime of identity theft. The most vulnerable participants are those accessing Zoom meetings through iPhones. Zoom is currently the subject of several lawsuits regarding the collection and sale of personal information obtained in meetings with advertisers. Entrance into a password-protected meeting is illegal according to the Computer Fraud and Abuse Act. Entrance into a private, but not password-protected meeting, is a form of cyber trespass. Unauthorized participation in a government-sponsored public meeting is generally not illegal unless the speech contributed by the unauthorized participant is threatening, dangerous, or perpetuates a criminal act. An intruder could also gain information about participants in order to perpetuate identity theft or extortion crimes. A stealth intruder could make offensive, slanderous, or libelous statements about the company or could trick meeting participants into revealing proprietary information about the company. Damages that such an intruder may cause range from simple embarrassment, to criminal mischief, to theft of confidential or sensitive information. The most common type of system break-in is called Zoombombing, which occurs when an unauthorized intruder enters a Zoom meeting. The flawed software also permits viewers to study hand motions in order to determine which computer keys a participant is typing, including any password being entered. Security flaws allow hackers to easily break into the system, allow meeting participants to reuse passwords, and do not provide controls to prevent meeting participants from distributing data obtained during Zoom meetings. Zoom’s lack of reliable security and accompanying privacy problems have resulted in numerous legal issues. Zoom meeting usage increased so quickly during the pandemic that the software outgrew its rudimentary security.
0 Comments
Leave a Reply. |