Enterprise-grade
Security

This is automation with security and peace of mind.
At Zoom.ai, your privacy and security is our priority.

 

Whether you’re a team of 5 or 5000,
your privacy matters.

Zoom.ai has one single access-point for data security and privacy.

 
 

Enterprise Level Encryption

Your data is encrypted at rest with AES-256, and in transit with SSL.

zoomai_securityGDPR.png

GDPR Compliant

Users can access their data at anytime through our GDPR Portal.

zoomai_securityshield.png

Penetration & Threat Detection

We perform regular penetration tests with Qualys Guard Express.

Reports are available upon request.

 

You asked. We answered.

Why does Zoom.ai need user data?

Zoom.ai requires data from the user and your organization to power your Meeting Assistant and help you and/or your employees schedule meeting faster. We are committed to privacy, protecting your data, and being transparent about our security measures.

How do I access my user data?

Zoom.ai only requires Mail Settings, Calendar and Contact access on a per-user basis. Zoom.ai is granted organizational access at the sign-up stage for the individual user, only once authentication is complete.

Zoom.ai does not have access to data for employees that have not authenticated their credentials. If you are a corporate account administrator, then you have complete control over user signups with the ability to manage users, data, and more, from the Zoom.ai Administrator Panel.

OAUTH2: Users consent to Zoom.ai using their Office 365 (or G-Suite) credentials with no username or password required.

Where is data accessed and stored?

For our meeting scheduling function, Zoom.ai requires access to Mailbox settings, Calendar, Contacts, Email headers and User Profile. Zoom.ai only processes and stores data from a limited subset of these APIs. Additional access is required for organizational file storage systems for enterprise search and document generation functions.

As per Zoom.ai’s contractual legal agreement to provide services to your organization, we only use the data in scope listed in the data access chart “Processed & Stored” to provide our solution to your users.

 

Read our Privacy Policy and Terms of Use to learn more.
Have more questions? Get in touch with our team.