The conference systems BurgMeet, GoogleMeet and Zoom offer different functions, limits and data security standards. This article provides an overview.

BURG Meet 

  • Provider Jitsi Meet

  • Access BurgMeet can be used without a registration or login.

  • Maximum number of participants 50, recommended for smaller groups

  • Data security 
    - Data is only stored within the BURG network and deleted after the conference ends 
    - End-to-end encryption (e2ee) or DTLS encryption
    - No login required
    - Conferences can be protected through passwords

  • Stability
    Stability problems occur especially through large numbers of participants or poor internet connection

  • Features and functions
    - Video conferencing
    - Screen and YouTube video sharing
    - Video recording
    - Chat


     

Google Meet

  • Access
    Participation in meetings is possible without having a Google account. To start a conference, the registration in the Google Workspace by the Rechenzentrum is necessary.

  • Maximum number of participants
    Video conferences with up to 100 people and live streams for up to 100,000 viewers

  • Data security 
    - Google encrypts all data and stores meeting records on EU intern servers, outside the BURG
    - Google promises DSGVO-compliant handling of user data. 
    - Access to conferences can be restricted, but not password-protected

  • Stability
    High stability even with a large number of participants. A stable internet connection is required

  • Functions
    - Share screen and YouTube videos
    - Recording
    - Chat
    - Subtitles
    - Google internal whiteboard or connecting with Miro 
    - Non-verbal feedback using emojis and raising hands
    - Change background


     

Zoom 

  • Access
    To create a meeting, an account is required. Participating in a meeting does not require an account. 

  • Maximum number of participants 100 in the free version

  • Data protection 
    Using Zoom involves a high risk in terms of protecting personal data, hacking and data theft. Zoom also uses data from users to train AI. A guide to the safest possible use can be found here

  • Stability High stability. A stable internet connection is required.

  • Functions
    - Video conferencing
    - Share screens and videos
    - Recording
    - Chat 
    - Zoom internal whiteboard
    - Meeting surveys
    - Non-verbal feedback through emojis and hand raising
    - Change background