You wouldn’t leave the office of your business unprotected, so why risk your video conferencing security? Here’s how BlueJeans protects your online meetings and events with GDPR compliance.
When the EU’s General Data Protection Regulation (GDPR) went into effect back in 2018, BlueJeans hit the ground running as a GDPR-compliant video conferencing solution.
Since 2014, the video meeting and event platform has had SOC 2 attestation – an annual, third-party report that discloses the organization’s controls relevant to security, availability, and confidentiality of data.
Fast forward to 2022 and you’ll find BlueJeans continues to lead the way in enterprise security with the following GDPR-compliant privacy and data protection practices in place:
1. Storage of Basic Data with Easy Removal Options
The BlueJeans database stores only the most basic of personal information, including username, password (SHA-256 salted hash), email, name, title, company name, and profile picture. Your personal information can be accessed, edited, or deleted at any time using the GDPR Data Privacy procedures.
2. Standards-Based Encryption
BlueJeans delivers secure meetings and events through encryption using standards-based protocols including SIP, SRTP, TLS, and H.323. Regardless of your hardware environment, these protocols ensure the highest levels of confidentiality and security for all your business video communications.
3. AES-256 GCM Encryption
BlueJeans employs AES-256-bit GCM encryption at rest to all video meetings and events. Widely considered the gold standard of encryption for securing data, AES-256 ensures meeting recordings are stored in secure containers in the cloud. Whether you access BlueJeans through the app or your browser, meeting recordings are only accessible to the meeting originator.
Learn more about BlueJeans video conferencing security for the enterprise
BlueJeans prioritizes international data privacy regulations, including GDPR, to secure video conferencing for clients across the globe. Check out our enterprise solutions for an expanded view of current security and privacy protocols.