{"id":39962,"date":"2020-04-13T00:00:00","date_gmt":"2020-04-13T00:00:00","guid":{"rendered":"https:\/\/newrcblog.wpengine.com\/ringcentral-commitment-to-privacy-and-security\/"},"modified":"2020-10-19T22:09:45","modified_gmt":"2020-10-19T22:09:45","slug":"ringcentral-commitment-to-privacy-and-security","status":"publish","type":"post","link":"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/","title":{"rendered":"RingCentral\u2019s commitment to privacy and security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more recently, security, data privacy and user safeguards have come to the forefront when it comes to video conferencing services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the spirit of transparency, we wanted to provide clarity to our customers \u2013 and potential customers \u2013 about our focus and commitment to privacy and security.<\/span><\/p>\n<h4><b>Our Approach to Security<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">RingCentral\u2019s long-standing commitment to security is multidimensional. <\/span><span style=\"font-weight: 400;\">As a cloud company, we look at cyber security in four dimensions &#8211; Enterprise, Cloud, Product, and Customer Trust. We approach each as an essential priority to our business. We know that a strong company, and a strong service for our customers, requires commitment and discipline in each of these areas.<\/span><\/p>\n<h4><b>Enterprise Security<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">RingCentral applies an enterprise-grade, multi-layered security strategy. Led by our global security team, and encompassing many company-wide cross-functional efforts,<\/span><span style=\"font-weight: 400;\"> w<\/span><span style=\"font-weight: 400;\">e have implemented a series of organizational, technical, and operational cybersecurity measures. We continuously monitor several metrics to give us visibility into various dimensions of our cybersecurity efforts, perform proactive security assessments, and engage in cybersecurity governance and enterprise risk management activities. Throughout the year, we perform multiple security assessments of various types, cyber security governance activities, and enterprise risk management activities. Our senior management maintains an active involvement.<\/span><\/p>\n<h4><b>Cloud Security<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Cloud Security is the security of our infrastructure, back-end communications platform, service environments, and service operations. We employ a layered defense throughout our service cloud consisting of border defenses, multi-factor access controls, cloud security infrastructure, host-level defenses, security telemetry and monitoring. Our operational security practices include more than 300 controls that we audit annually. Our Security team has dedicated security engineering, security data analytics, and detection and response personnel. Our Network Operations Center monitors service availability [24\/7] and initiates response for any service interruptions. We don\u2019t host our services in China, nor route customer traffic to locations in China.\u00a0 We strive to remain transparent with our customers about where customer data is stored and processed.<\/span><\/p>\n<h4><b>Product Security<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Product security is the security measures we build into our product and services.\u00a0 We perform security testing on each release of our products using internal and external expertise. Our product security testing leverages both off-the-shelf and manual methods. Our Security team has dedicated application security personnel. <\/span><span style=\"font-weight: 400;\">W<\/span><span style=\"font-weight: 400;\">e leverage <\/span><span style=\"font-weight: 400;\">multiple secure software development frameworks, and generate data throughout the software development cycle that we use to measure several security-specific software development metrics <\/span><span style=\"font-weight: 400;\">into our work, such as privacy-by-design and secure software development frameworks, and every year we undertake penetration testing and red team activities.<\/span><\/p>\n<h4><b>Trust Programs<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Trust security is our overall security framework and philosophy for providing transparency to our customers, embedding security principles into our product development activities,\u00a0 infrastructure and service operations, and engaging with independent third-party experts to test our security measures and recommend best practices. We believe that we have a strong vision when it comes to security, but we know that it\u2019s important to include both inside and outside perspectives. This is valuable for us, and valuable to our customers. Independent perspectives allow us to provide transparency. <\/span><span style=\"font-weight: 400;\">We undergo <\/span><span style=\"font-weight: 400;\">f<\/span><span style=\"font-weight: 400;\">requent and proactive testing, assessments, and third-party security audits throughout the year <\/span><span style=\"font-weight: 400;\">to give our customers assurance that controls are operating effectively for various environments.<\/span><\/p>\n<p><b>Some specifics include:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Service border defenses<\/b><span style=\"font-weight: 400;\"> at network and application layers such as firewalls, session border controllers, unified communications threat management, DDoS mitigation and multi-factor authentication measures.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Service cloud security measures<\/b><span style=\"font-weight: 400;\">, including <\/span><span style=\"font-weight: 400;\">multiple types of security infrastructure devices, anti-malware, endpoint detection and response, configuration and vulnerability management, container scanning, security analytics for threat detection, and cloud threat monitoring.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Application security<\/b><span style=\"font-weight: 400;\"> which includes static application security testing, dynamic application security testing, runtime application security testing, penetration testing, code quality metrics, web application testing, mobile application testing, and API scanning.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Encryption:<\/b><span style=\"font-weight: 400;\"> We use standards-based encryption to protect data in-transit using TLS, SIP over TLS, SRTP and WebRTC, and at-rest using AES with 256-bit keys. We also encrypt desk phone provisioning, and support local data encryption in our softphone client.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>User policy settings<\/b><span style=\"font-weight: 400;\">: We empower our customers with several identity and access management features, including access verification, passwords, session timeout, waiting room, meeting lock, roles and permissions, account federation, data retention management, audit trail, developer API keys, OATH for Google, and support for SAML 2.0.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Pre-built integrations<\/b><span style=\"font-weight: 400;\"> that extend our customers\u2019 security options and empower customers to expand the coverage of their existing security and compliance tools such as RingCentral for Smarsh, integration with Okta, and Theta Lake for RingCentral. We, our partners, and our customers are continually building more integrations for a variety of business use cases using our secure developer APIs.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Privacy practices <\/b><span style=\"font-weight: 400;\">and disclosures that are clear and transparent. We never have sold and do not sell customer data. And we are compliant with the <\/span><a href=\"https:\/\/gdpr-info.eu\/\"><span style=\"font-weight: 400;\">General Data Protection Regulation<\/span><\/a><span style=\"font-weight: 400;\">\u00a0(GDPR), <\/span><a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa\"><span style=\"font-weight: 400;\">California Consumer Privacy Act<\/span><\/a><span style=\"font-weight: 400;\"> (CCPA), and <\/span><a href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\"><span style=\"font-weight: 400;\">Health Insurance Portability and Accountability Act<\/span><\/a><span style=\"font-weight: 400;\">, (HIPAA).\u00a0We strive for privacy practices and disclosures that are clear and transparent.\u00a0<\/span><\/li>\n<\/ul>\n<h4><b>Annual audits:<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">SOC2 and SOC3 audits, which validate that service operations controls regarding security, availability, and confidentiality are operating effectively. Our SOC-2 report is available upon request, and our<\/span> <a href=\"https:\/\/netstorage.ringcentral.com\/documents\/rc_soc3_report_2018.pdf\"><span style=\"font-weight: 400;\">SOC-3 report is published on our website<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">HIPAA, FINRA and HITRUST audits ensure that our customers in highly regulated industries, such as healthcare and finance, know that we satisfy third-party verifications for exceeding the minimum standards for compliance. <\/span><span style=\"font-weight: 400;\">We have recently achieved the U.K. National Cyber Security Centre\u2019s Cyber Essentials certification.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">This year we also intend to add ISO 27001 and ISO 270171 certification, and C5 audits to our trust program.<\/span><\/li>\n<\/ul>\n<h4><b>RingCentral Meetings Security<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Since the RingCentral Meetings product is based on the Zoom platform, we want to provide clarity on several questions regarding privacy and security associated with RingCentral meetings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There are areas that are top of mind for customers and are addressed below.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Q: Was my meeting data routed through China?<br \/>\n<\/b><br \/>\nA: RingCentral hosts and controls its own media servers that route RingCentral Meetings data. These servers do not reside in China, so this issue does not apply to RingCentral Meetings.<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Q: Was my user data shared with Facebook via an SDK?<br \/>\n<\/b><br \/>\nA: This issue does not apply to RingCentral Meetings, as our product does not use the Facebook SDK.<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Q: Is the RingCentral Meetings MacOS client vulnerable to local privilege escalation and hijacking of the clients permissions to access a Mac user\u2019s camera and microphone?<br \/>\n<\/b><br \/>\nA: These vulnerabilities are listed as CVE-2020-11469 and CVE-2020-11470, respectively. They are not present in RingCentral Meetings\u2019 MacOS client, nor are the script, entitlements and authentication tool described by the published security research as enabling factors of these exploits.<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Q: How can I keep uninvited participants from entering meetings and sharing content?<\/b>A: We strongly recommend some effective measures and best practices when using RingCentral Meetings as these security capabilities are already available to you:1.\u00a0 Set passwords for all meetings to ensure that only those who have the password are able to attend.<br \/>\n2. Only send meeting links to people you want to attend the meeting and do not publish meeting links on social media.<br \/>\n<span style=\"font-weight: 400;\">3<\/span><b>.\u00a0 <\/b><span style=\"font-weight: 400;\">Lock<\/span> <span style=\"font-weight: 400;\">meetings after all participants have arrived to block unauthorized attendees.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">RingCentral is actively working with Zoom to incorporate applicable security updates into RingCentral Meetings. Users can track updates related to specific security and privacy questions on our<\/span> <a href=\"https:\/\/support.ringcentral.com\/s\/ringcentral-meetings-security-response\"><span style=\"font-weight: 400;\">support website<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/p>\n<h4><b>Keeping Customers Safe\u00a0<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">These are unprecedented times for all of us. Helping our customers through these challenges is our priority. Security, privacy, transparency and reliability have been the foundational pillars for RingCentral since our inception. Our commitment to you is our continuing and unwavering focus on enabling safe and secure business communications.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more recently, security, data privacy and user safeguards have come to the forefront when it comes to video conferencing services. In the spirit of transparency, we wanted to provide clarity to our customers &#8230;<\/p>\n","protected":false},"author":36,"featured_media":39963,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23732],"tags":[],"class_list":["post-39962","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>RingCentral\u2019s commitment to privacy and security | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RingCentral\u2019s commitment to privacy and security\" \/>\n<meta property=\"og:description\" content=\"In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-13T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-19T22:09:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Curtis Peterson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Curtis Peterson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\"},\"author\":{\"name\":\"Curtis Peterson\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/9c424ce4966e9016592fdab984473cba\"},\"headline\":\"RingCentral\u2019s commitment to privacy and security\",\"datePublished\":\"2020-04-13T00:00:00+00:00\",\"dateModified\":\"2020-10-19T22:09:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\"},\"wordCount\":1285,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\",\"name\":\"RingCentral\u2019s commitment to privacy and security | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage\"},\"thumbnailUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg\",\"datePublished\":\"2020-04-13T00:00:00+00:00\",\"dateModified\":\"2020-10-19T22:09:45+00:00\",\"description\":\"In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg\",\"width\":1050,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RingCentral\u2019s commitment to privacy and security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/9c424ce4966e9016592fdab984473cba\",\"name\":\"Curtis Peterson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=96&d=mm&r=g\",\"caption\":\"Curtis Peterson\"},\"description\":\"Curtis Peterson has more than 20 years' experience managing information technology and carrier-scale data and packet voice communication networks. At companies ranging in size from start-ups to Fortune 500 firms, Curtis has managed teams responsible for engineering, project management, operations, data security, network security, data center, Carrier Operations, and internet backbone design and operation. Peterson has built world-class teams that can develop highly scalable networks while directing systems with ever-increasing compliance and security requirements in heavily regulated industries. Curtis has been a pioneer in VoIP services in the business communications space and has been developing, launching and operating Class 4 VoIP and customer-facing hosted PBX systems since 2002. Currently, he serves as the VP of Operations at RingCentral, a leading cloud communications platform for businesses in the U.S., Canada and the U.K. He lives in Half Moon Bay, Calif. with his wife and two children.\",\"url\":\"\/us\/en\/blog\/author\/curtis-peterson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"RingCentral\u2019s commitment to privacy and security | RingCentral Blog","description":"In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/","og_locale":"en_US","og_type":"article","og_title":"RingCentral\u2019s commitment to privacy and security","og_description":"In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2020-04-13T00:00:00+00:00","article_modified_time":"2020-10-19T22:09:45+00:00","og_image":[{"width":1050,"height":360,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg","type":"image\/jpeg"}],"author":"Curtis Peterson","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"Curtis Peterson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#article","isPartOf":{"@id":"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/"},"author":{"name":"Curtis Peterson","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/9c424ce4966e9016592fdab984473cba"},"headline":"RingCentral\u2019s commitment to privacy and security","datePublished":"2020-04-13T00:00:00+00:00","dateModified":"2020-10-19T22:09:45+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/"},"wordCount":1285,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg","articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/","name":"RingCentral\u2019s commitment to privacy and security | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage"},"thumbnailUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg","datePublished":"2020-04-13T00:00:00+00:00","dateModified":"2020-10-19T22:09:45+00:00","description":"In recent weeks, video conferencing has been embraced by people around the globe \u2013 businesses, schools, government agencies and our families. But more","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#primaryimage","url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg","width":1050,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"RingCentral\u2019s commitment to privacy and security"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/9c424ce4966e9016592fdab984473cba","name":"Curtis Peterson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=96&d=mm&r=g","caption":"Curtis Peterson"},"description":"Curtis Peterson has more than 20 years' experience managing information technology and carrier-scale data and packet voice communication networks. At companies ranging in size from start-ups to Fortune 500 firms, Curtis has managed teams responsible for engineering, project management, operations, data security, network security, data center, Carrier Operations, and internet backbone design and operation. Peterson has built world-class teams that can develop highly scalable networks while directing systems with ever-increasing compliance and security requirements in heavily regulated industries. Curtis has been a pioneer in VoIP services in the business communications space and has been developing, launching and operating Class 4 VoIP and customer-facing hosted PBX systems since 2002. Currently, he serves as the VP of Operations at RingCentral, a leading cloud communications platform for businesses in the U.S., Canada and the U.K. He lives in Half Moon Bay, Calif. with his wife and two children.","url":"\/us\/en\/blog\/author\/curtis-peterson\/"}]}},"rc_img_url":"\/us\/en\/blog\/wp-content\/uploads\/2020\/07\/businessman-working-on-laptop-protection-network-security-computer-picture-id1167560531-1.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/curtis-peterson\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">Curtis Peterson<\/span><\/a>","rc_author_full_name":"Curtis Peterson","rc_author_avatar":"https:\/\/secure.gravatar.com\/avatar\/4aea9af09aa0bbb64821759708874f94a6476d18ab97e53c8e95341a46897714?s=480&d=mm&r=g","rc_author_link":"\/us\/en\/blog\/author\/curtis-peterson\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/security\/amp\">Security<\/a>","amp_link":"\/us\/en\/blog\/ringcentral-commitment-to-privacy-and-security\/amp","excerpt_title":"RingCentral\u2019s commitment to privacy and security","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/39962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=39962"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/39962\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media\/39963"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=39962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=39962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=39962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}