RINGCENTRAL TRUST CENTER

Building trust in
your communications

Keep your data safe at every level of your business with enterprise-grade security, reliability, and privacy.

Information Security

Best-in class DevSecOps

From our product design to the operations of our business, we employ rigorous security and data best-practices in everything we do. We provide our customers with a robust security platform by integrating security principles into the development process from the get-go.

  • Physical security
  • Network security
  • Data encryption
  • Toll fraud prevention
  • Incident response
  • Protected data
  • Operations security
  • Supplier management
  • Data handling
  • Software development cycle
  • Penetration testing
Guide: The CISO Guide to Cloud Communications Security

The CISO Guide to Cloud Communications Security

Learn about essential cyber security, data privacy, and compliance requirements for cloud communications.

Product Security

Security Policy Controls

Our platform puts a comprehensive set of administrative controls across video, message and phone at your fingertips, such as requiring your meeting attendees to authenticate, limiting who can enable screen sharing, and requiring waiting rooms for your users to approve attendees who can join.
  • Single sign-on (SSO)
  • Require password
  • Restrict screen sharing
  • Enforce waiting room
  • Restrict meeting attendance to authenticated users
  • Allow user to enable meeting recordings
  • Enable moderator turn on/off video for all participants
  • Moderator remove participants
  • Moderator mute participants
  • Virtual background for privacy
  • Hide meeting ID
  • Control data file sharing
  • Audit trail to track changes
  • Video meeting insight
  • Enable E2EE before meeting
  • Dynamically turn on E2EE
  • TLS encryption/SRTP secure voice
  • Single sign-on (SSO)
  • Block phone numbers
  • AI-based spam blocking
  • RoboCall mitigation using STIR/SHAKEN standards
  • Number masking
  • RingOut—calling on third-party devices with your business phone number
  • Emergency response locations for E911 calls
  • RAY BAUM’S Act and Kari’s Law compliant
  • Voicemail routing based on business hours
  • Analytics portal
  • 99.999% SLA uptime
  • TLS encryption/SRTP secure voice
  • Allow/block list—external guest domains
  • Allow/block list—webmail accounts
  • Clear guest identification within 1:1 and group chats
  • Enforce policies
  • SEA FINRA 17a-4
  • Single sign-on (SSO)
  • Enforced multi-factor authentication (MFA)
  • Device PIN enforcement
  • User management
  • Data-at-rest
  • Data-in-transit
  • TLS encryption/SRTP secure voice
  • E2EE via Message Layer Security (MLS)
  • Single sign-on (SSO)
  • Require password
  • Restrict to authenticated users
  • Session timer to logout inactivity
  • Authorized apps manager
  • VoIP country blocking
  • Centralized IT management of free and paid users
  • Audit trail to track changes
  • Enterprise mobility management via RingCentral for Intune
  • Native and 3rd party archive via RingCentral API
  • eDiscovery, content capture and DLP via Theta Lake

The latest Trust Center news

RingCentral Video with end-to-end encryption security

Security

Introducing dynamic end-to-end encryption for RingCentral Video
Act compliance with RingCentral MVP location awareness

Corporate news

RAY BAUMs Act compliance with RingCentral MVP location awareness
Client presentation explaining the end-to-end encryption feature of RingCentral Video

Security

Protecting your data: How RingCentral helps IT secure your hybrid workforce

We keep you informed

We work with security researchers to identify vulnerabilities and keep you informed if any should exist in our products or on our websites. 
Megaphone illustrating how RingCentral keeps customers informed about possible security issues
More resources
CORPORATE SOCIAL RESPONSIBILITY
Find out how we’re connecting to something bigger with RCause 
LAW ENFORCEMENT
Access all of our legal documents in one place
Security
What to look for in a UCaaS provider

GLOBAL COMPLIANCE

Security and compliance certifications

Our third-party attestations and certifications speak to our commitment to data security. RingCentral is built on a secure cloud platform with a robust portfolio of security and compliance certifications, including:

  • SOC 2 attestation
  • SOC 3 attestation
  • ISO 27001 and ISO 27017-18 certifications
  • STIR/SHAKEN (Spam blocking)
  • HITRUST certificate
  • HIPAA attestation of compliance
  • GDPR
  • PCI-certified merchant
  • PIPEDA
  • FINRA

This means your data is secure, private, and compliant across mobile, video, and phone, making RingCentral the most reliable and secure unified cloud communications platform built for every experience. You can see the full list of our independent certifications here.

Guide: The CISO Guide to Cloud Communications Security

The CISO Guide to Cloud Communications Security

Learn about essential cyber security, data privacy, and compliance requirements for cloud communications.

The latest Trust Center news

RingCentral Video with end-to-end encryption security

Security

Introducing dynamic end-to-end encryption for RingCentral Video
Act compliance with RingCentral MVP location awareness

Corporate news

RAY BAUMs Act compliance with RingCentral MVP location awareness
Client presentation explaining the end-to-end encryption feature of RingCentral Video

Security

Protecting your data: How RingCentral helps IT secure your hybrid workforce

DATA PRIVACY

Our commitment to privacy and transparency

At RingCentral, maintaining customer trust in our data handling practices and demonstrating respect for customers' data privacy is fundamental. Our privacy program is based on the following principles:

  • Accountability
  • Transparency
  • Data minimization
  • Privacy by Design and default
  • Protection of data subject rights
  • Data security
  • Safeguards of data transfers
Whitepaper: Privacy and Data Protection at RingCentral

Whitepaper: Privacy and Data Protection at RingCentral

Learn about data protection policies, processes, and controls established and operated by RingCentral.

RingCentral is committed to protecting user privacy everywhere we do business. Visit our global resources to learn how we comply with global privacy regulations. 

When we transfer data from the European Economic Area (EEA), UK and Switzerland, we rely on the Standard Contractual Clauses approved by the European Commission and provide additional safeguards. We offer to our customers a data transfer agreement based on the applicable Standard Contractual Clauses and we also provide our customers with resources about the data transfer risk assessments we performed.

RingCentral operates as a data controller and as a data processor at the same time. Please read our whitepaper to learn more about RingCentral as a data controller. We use sub-processors and we execute with them data processing terms  equally protective as those we enter into with our customers, including the applicable Standard Contractual Clauses for the transfer of personal data out of the EEA, UK, and Switzerland.

Transparency

We are committed to maintaining the privacy and trust of our customers by giving you full visibility. Our Transparency Report describes how we respond to customer data requests submitted by law enforcement and government agencies around the world.
Two hands shaking each other, connected around in one arm symbolizing transparency and RingCentral's commitment to maintaining customer privacy and trust
More resources
Webpage
Data Processing Addendum
Webpage
Security Addendum
PDF
Customer Data Transfer Agreement
Webpage
Data Subject Request Access Form
Webpage
Subprocessor List

The latest Trust Center news

RingCentral Video with end-to-end encryption security

Security

Introducing dynamic end-to-end encryption for RingCentral Video