Back to blog list
23 Oct, 2020 | video meetings, video solutions for business, video conferencing, security, privacy, encryption

Video Meeting Privacy and Security | RingPlan Meet™

Developing a platform that will provide value to users is very important to us. Privacy and security play a critical role in providing value to today's consumer;  a responsibility we take very seriously. 

That is why we provide our customers access to an unlimited, fully-secure meeting space that leaves no digital fingerprints. 

Interested in a demo, email

What Does Fully Secure Mean?

RingPlan Meet leaves no digital fingerprints of any meeting, of any kind. Meetings are private and meetings expire once they are done taking place. 

Meetings are created when an individual initiates a meeting and the meeting is deleted once the last person leaves. 

Rejoining the same room after the meeting has expired initiates a new meeting, deleting any connection to the previous meeting even if the meetings have the same name. 

Ensuring meetings expire immediately helps keep your communications secure. Other systems, with rooms that allow the re-creation or re-use of the same meetings, leave open vulnerabilities that make it easier for cyber attacks. These meetings leave digital fingerprints that attackers use to pinpoint and identify meetings they can target.

Although there are no digital fingerprints, one still has to be careful about where meeting links are shared and advertised, to prevent targeted mischief. However, one can prevent such problems by setting a meeting password and sharing this password with attendees only.

Passwords expire at the end of a meeting when the last person leaves the room, or when the host is the only person in the room and exits.     

Anyone Can Mute or Remove You from a Meeting

Don’t take it as a loss of control, but rather a useful feature that gives everyone the ability to do their part in helping you protect your privacy. 

For your security and privacy, RingPlan Meet employs moderation controls a bit differently than most. We decentralize meeting moderation. 

Moderation controls serve to help address technical issues that arise in video meetings. Often, users do not realize they are experiencing connectivity issues; that their microphones are noisy, or that they have left their camera running. Opening moderation control to everyone in the meeting helps a meeting proceed with minimal interruption to the presenter, and reduces your exposure to such risks.

Rather than one individual being responsible for both the presentation and technical issues. Others in the meeting can utilize these soft controls to mediate the technical issues, leaving the presentation uninterrupted.  

RingPlan Meet Supports End-to-End Encryption

Turn on end-to-end encryption (e2ee) during any meeting, on any browser that support insertable streams. Users can turn on e2ee by selecting the ‘End-to-End Encryption’ option in the overflow menu during any meeting. Attendees of e2ee meetings will need to make sure they enter the exact same password in the Key field. 

Browsers that support insertable streams, based on Chromium 83 and above can support end-to-end encryption. This includes Microsoft Edge, Google Chrome, Brave, and Opera.

Even without end-to-end encryption, RingPlan Meet security remains strong 

Meetings operate in 2 ways: Peer-to-Peer (P2P) or Videobridge (RVB). P2P is used for 1-to-1 meetings, encrypted using DTLS-SRTP from send to receiver. 

Meetings with more people are also encrypted using DTLS-SRTP. This encryption is removed while traversing RingPlan Videobridge, but never stored or retained in memory while being routed. End-to-end encryption of packets can not be removed, this acts as a second layer of encryption on top of the DTLS-SRTP.  

Why is Security Important to Us

Your Privacy and Security is important to us. Over the years we have seen many examples of how privacy breaches can wreak havoc on businesses. 

Our world is not the same as it once was. All of our important data is stored digitally. There are individuals who make a living by exploiting vulnerabilities in this digital system for fiscal gain. 

Businesses must be quick to adapt to these threats to protect user data from exploitation.

RingPlan answer to the threat, in regards to video conferencing, is to delete the data thieves are after, while decentralizing moderation control of all meetings to allow colleagues to assist each other protect their privacy.

Interested in a Video Demo?

Get a video demo of RingPlan Meet and all other features included in the RingPlan System, including Hosted Phone, SMS Text Messaging from computer, Fax from computer, amongst others. Reach out to to get started or fill out the form below.

Like this Post? Subscribe to RingPlan!