Secure devices you use with Zoom


UW Zoom users have a responsibility to protect both personal and institutional data. UW Office of Information Security and UW-IT recommend the following to maintain secure use of UW Zoom.

On This Page

Zoom Chat File Security

Zoom offers both in-meeting and out-of-meeting Chat. To maintain security, Zoom Chat messages are automatically deleted after 120 days and file types sent using Zoom Chat are limited to the following file types. Allowed Documents:

Allowed Images:

Allowed Audio and video files:

Zoom does not scan files for malware and viruses when transferring files using Zoom chat. When receiving files from within Zoom, ensure your devices are secure by reviewing the device security best practices.

Understand your responsibility to protect UW data

As a University of Washington (UW) employee, you may have access to UW information systems or come in contact with UW data. Access to UW information systems or the processing of UW data comes with responsibility, and the UW wants to make sure you are aware of those responsibilities. Check if you have already reviewed and accepted the Access and Use Agreement for UW Data and Information Systems.

Secure UW Zoom Data on Your Devices

Devices you use to access UW Zoom must be updated and maintained to protect UW data.

Reporting Stolen or Lost Devices

Devices used for purposes of UW activity (including mobile devices, laptops, tablets, and computers) must be reported when stolen or lost. This includes personally owned devices with access to UW data stored on them.

Regularly Update Your Software

Devices used for purposes of UW activity (including mobile devices, laptops, tablets, and computers) must be regularly updated to maintain security protections.

UW NetID Recovery and Resetting or Changing Your Password

Use a strong password and change your password on a regular basis.

Use a Strong Passphrase on your Mobile Device

Ensure your mobile device has a strong, unique passphrase. Refer to Smartphone Configurations and Best Practices for specific recommendations.

Security Training

The UW Office of Information Security recommends the following trainings to maintain best security practices:

Device Security for IT Administrators

IT Administrators should utilize mobile device management (MDM) functionality to manage and protect UW-owned devices with features such as the following:

External Vendor Relationship Management

Service desks, departments, and individuals using external vendors to provide Zoom-related services should require security developments and other user protection safeguards in the contract for services.