Automation with security and a peace of mind
One single access-point and data security and privacy. Learn about our commitment to your company's security and privacy. Whether you're a team of 5 or a team of 1,000, we care about your security.
Enterprise Level Encryption
Your data is encrypted at rest with AES-256, and in transit with SSL.
We believe that everyone has a right to manage their data, so we have extended these updates to all Zoom.ai users around the world and their contacts. Users can access their data through our GDPR Portal.
Penetration and Threat Detection Testing
We perform regular penetration tests with Qualys Guard Express and reports are available on request.
Zoom.ai requires data from the user and your organization to power our automated assistant and help your employees get back to their priority work.
We have a commitment to privacy, to protecting your data, and to being transparent about our security measures. Read more below.
Individual User Data Access
Zoom.ai only requires Mail Settings, Calendar and Contact access on a per-user basis. Zoom.ai is granted organizational access at the sign-up stage for the individual user, only once authentication is complete.
Zoom.ai does not have access to data for employees that have not authenticated their credentials, and administrators have complete control over user signups with the ability to manage users, data, and more, from the Zoom.ai Administrator Panel.
OAUTH2: Users consent to Zoom.ai using their Office 365 (or G-Suite) credentials with no username or password required.
Data Accessed and Data Stored
For the meeting scheduling function, Zoom.ai requires access to: Mailbox settings, Calendar, Contacts, Email headers and User Profile. Zoom.ai only processes and stores data from a limited subset of these APIs. Additional access is required for organizational file storage systems for enterprise search and document generation functions.
As per Zoom.ai’s contractual legal agreement to provide services to your organization, we only use the data in scope listed in the data access chart “Processed & Stored” to provide our solution to your users.