All critical data stores are replicated across machines and in some cases across cloud providers (IBM to AWS).The platform is capable of operating at various levels of degraded service, so if a single component is failing (ie, the Message Vault feature), voice communication will continue operating normally. Our standard service SLA is 99.9%, achieved through redundancy at every layer of the stack.Personal Information is classified according to GDPR standards.Zello makes hiring decisions based on the results of these in accordance to applicable law. Zello uses a consistent hiring process that includes multiple reference checks as well as a background check that verifies employment and education history, along with any criminal history.Customer data is not shared with 3rd parties in accordance with Zello’s Terms of Service and Privacy Policy.If a drive fails the wipe process or reaches end of life, it is taken out of commission and physically destroyed.Once complete the drive is ready to be redeployed to a new customer. This process is monitored and logged and is tracked. This ensures that any residual drive data is destroyed. IBM Cloud erases data using DOD 5220.22-M grade algorithm.All API communication occurs over HTTP/S the channel API is offered over secure websockets.TLS for control traffic encryption between Zello client and Zello server.1024 bit RSA for authentication, digital signatures and secure media session keys exchange.
Zello work login android#
Zello work login password#
Zello has a password policy that prohibits the sharing of passwords.Physical access to our office is controlled after hours via key access or electronic badge access.Zello Work allows for a solution hosted on-premise, please see Zello Work On-premise Server Requirements for more information.AWS is the failover cloud provider should IBM fail. Points of presence are located throughout the world and their physical security is detailed in IBM’s published Cloud Architecture document. Zello utilizes bare metal servers hosted in the IBM Cloud.The information security function reports directly to the Chief Security Officer.We provide periodic security training to employees.We require the signature of confidentiality and privacy agreements signed by all new employees.We perform background checks on all new employees.
We have a comprehensive set of information security policies, approved by senior management and disseminated to all Personnel.
Zello work login free#
Help center for individuals using the Zello free app with friends and family Help center for companies using a Zello Work private network The most widely used walkie talkie app in the world now with 150 million users