Overview
This article will cover the most common questions you may have regarding the Zendesk/Zoom Applications Security.
Q: What data can the applications access?
A:
Zoom Meetings:
- Zoom User ID
- Zendesk User ID
- Zendesk Domain
- Zoom Domain
- Name
- Ticket Information
- Meeting Recordings
Zoom Phone:
- Zoom User ID
- Zendesk User ID
- Zendesk Domain
- Zoom Domain
- Name
- Caller/Callee Phone Number
- Call Recordings
Zoom App:
- Zoom User ID
- Client ID
- Zendesk Domain
- Zoom Domain
- Name
- Signature
- Meeting Recordings
Q: Is all data within the applications encrypted?
A:
Yes! All data within the applications are encrypted at rest and in transit.
The following protocols are used:
- At Rest: AES-GCM 256
- In Transit: AES 256 & SHA 384 (or better)
Q: Do you transfer or process data from the applications?
A:
We do not.
Q: Where is my data stored?
A:
Data is stored in a US data center in the cloud!
Q: How long is my data retained?
A:
Only as long as necessary. Generally speaking though, data is retained for as long as a user employs the applications within their instances.
Q: Who can access my data?
A:
Only necessary members from the development and infrastructure teams.
Q: What about location data?
A:
No geographic data from the applications are retained.
Q: What is your privacy policy?
A:
We take privacy very seriously here at Faye. For a full breakdown of our policy, please refer to the following page: Faye Privacy Policy
Q: What happens if something goes wrong?
A:
We like to overprepare here at Faye, and if you want to see how that is done, please send an email to support@fayebsg.com for a copy of our Incident Response Plan, Cyber Liability Insurance, and other fun documents.
Comments
0 comments
Please sign in to leave a comment.