SlideShare a Scribd company logo
THE LESSON WE ARE
LEARNING FROM ZOOM
KIERRA HICKS, NIKOLAS FRONTIERO-JIMENEZ, WOODOLPH MYRTIL,
JOSHUA PETREE
ABOUT ZOOM
• Zoom provides a remote conferencing service that combines video conferencing, online meetings,
chat, and mobile collaboration.
• Zoom Rooms is the original software-based conference room solution used around the world in
board, conference, huddle, and training rooms, as well as executive offices and classrooms.
• Founded in 2011, Zoom helps businesses and organizations bring their teams together in a
frictionless environment to get more done. Zoom is a publicly traded company on Nasdaq (ticker:
ZM) and headquartered in San Jose, California.
ABOUT CONT.
Unparalleled usability
Enable quick adoption with meeting capabilities that make it easy to start, join, and
collaborate across any device.
Join anywhere, on any device
Zoom Meetings syncs with your calendar system and delivers streamlined enterprise-
grade video conferencing from desktop and mobile
Video for every need
Enable internal and external communications, all-hands meetings, and trainings through
one communications platform.
PRIVACY ISSUES
• Has a weakness that would have allowed malware to attach to Zoom and hijack our web
cameras.
• Trolls have crashed people’s video meetings and bombarded them with inappropriate
material like pornography
ZOOM’S PRIVACY POLICY
• Does not address whether Zoom shares data with third parties like companies such as Apple and Cisco
who explicitly address this in their privacy policies.
• Tech companies can monetize user data in many ways without directly selling it, including by sharing it
with other companies that mine the information for insights, according to research published by
the M.I.T. Sloan School of Management.
• In some cases, tools to collect data from users are “rented” to third parties. Such practices would
technically make it true that your personal data was not “sold,” but a company would still make money
from your data.
• Lynn Haaland, Zoom’s global risk and compliance officer, said the company does not anonymize or
aggregate user data or rent it out in exchange for money but it was pointed out that this is not stated
in the privacy policy which raises questions.
FLAWS
• The article states that “products for Windows and Mac computers have weaker security by design” this
is because the company opted not to provide its app through Apple’s official Mac app store or the
Microsoft Windows app store.
• Due to it not being an app and downloaded from a website, “software avoids living in a so-called
sandboxed environment, which would have restricted its access to Apple and Microsoft operating
systems.”
• As a result, Zoom is able to gain access to deeper parts of the operating systems and their web
browsers.
• Sinan Eren, chief executive of Fyde, an app security firm says that “By choosing to circumvent safer
methods for installing its app, Zoom has opted for weaker security architecture”
VIDEO!
HOW TO STAY SAFE USING ZOOM
• It’s safer to use Zoom on a mobile device, like an iPad or an Android phone, than on a Mac or
Windows PC because mobile apps operate in a more restricted environment with limited
access to your data.
• Turn on Zoom security settings, like meeting passwords, to prevent unwanted guests from
“Zoombombing” your sessions.
DISCUSSION
1) How do you feel about using zoom?
2) Do feel comfortable using the app now knowing about some of the privacy issues?
3) What are some policies that you would put in place in terms of privacy for Zoom?
4) Do you use any other video-conferencing application/software and if so, please state the
benefits and why you use it.

More Related Content

Similar to Privacy Presentation

Seminar on zoom meeting technology
Seminar on zoom meeting technologySeminar on zoom meeting technology
Seminar on zoom meeting technology
Chala Geta
 
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PCStep by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Andualem192
 
Course tspk101
Course tspk101Course tspk101
Course tspk101
Annzalie (Ann) Barrett
 
Ibm sametime 9 for social communications
Ibm sametime 9 for social communicationsIbm sametime 9 for social communications
Ibm sametime 9 for social communications
a8us
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
Sina Manavi
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
Brent Spencer
 
Whitepaper on the uptake of virtual conferences- essentials for success
Whitepaper on the uptake of virtual conferences- essentials for successWhitepaper on the uptake of virtual conferences- essentials for success
Whitepaper on the uptake of virtual conferences- essentials for success
AfriciaRabare
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
Symantec
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
Hybrid Cloud
 
Byod
ByodByod
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
Tim Youm
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
Online Business
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
Marc Vael
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
Diego Alberto Tamayo
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Bp302 final
Bp302 finalBp302 final
Bp302 final
Peter Lurie
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
AGILLY
 

Similar to Privacy Presentation (20)

Seminar on zoom meeting technology
Seminar on zoom meeting technologySeminar on zoom meeting technology
Seminar on zoom meeting technology
 
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PCStep by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
Step by Step Tutorial to Use Zoom Meeting Software with Mobile and PC
 
Course tspk101
Course tspk101Course tspk101
Course tspk101
 
Ibm sametime 9 for social communications
Ibm sametime 9 for social communicationsIbm sametime 9 for social communications
Ibm sametime 9 for social communications
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
 
Whitepaper on the uptake of virtual conferences- essentials for success
Whitepaper on the uptake of virtual conferences- essentials for successWhitepaper on the uptake of virtual conferences- essentials for success
Whitepaper on the uptake of virtual conferences- essentials for success
 
Why you need to secure mobile apps - now
Why you need to secure mobile apps - nowWhy you need to secure mobile apps - now
Why you need to secure mobile apps - now
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Storage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented dataStorage Made Easy solution to fragmented data
Storage Made Easy solution to fragmented data
 
Byod
ByodByod
Byod
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Bp302 final
Bp302 finalBp302 final
Bp302 final
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 

Recently uploaded

María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 

Recently uploaded (16)

María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 

Privacy Presentation

  • 1. THE LESSON WE ARE LEARNING FROM ZOOM KIERRA HICKS, NIKOLAS FRONTIERO-JIMENEZ, WOODOLPH MYRTIL, JOSHUA PETREE
  • 2. ABOUT ZOOM • Zoom provides a remote conferencing service that combines video conferencing, online meetings, chat, and mobile collaboration. • Zoom Rooms is the original software-based conference room solution used around the world in board, conference, huddle, and training rooms, as well as executive offices and classrooms. • Founded in 2011, Zoom helps businesses and organizations bring their teams together in a frictionless environment to get more done. Zoom is a publicly traded company on Nasdaq (ticker: ZM) and headquartered in San Jose, California.
  • 3. ABOUT CONT. Unparalleled usability Enable quick adoption with meeting capabilities that make it easy to start, join, and collaborate across any device. Join anywhere, on any device Zoom Meetings syncs with your calendar system and delivers streamlined enterprise- grade video conferencing from desktop and mobile Video for every need Enable internal and external communications, all-hands meetings, and trainings through one communications platform.
  • 4. PRIVACY ISSUES • Has a weakness that would have allowed malware to attach to Zoom and hijack our web cameras. • Trolls have crashed people’s video meetings and bombarded them with inappropriate material like pornography
  • 5. ZOOM’S PRIVACY POLICY • Does not address whether Zoom shares data with third parties like companies such as Apple and Cisco who explicitly address this in their privacy policies. • Tech companies can monetize user data in many ways without directly selling it, including by sharing it with other companies that mine the information for insights, according to research published by the M.I.T. Sloan School of Management. • In some cases, tools to collect data from users are “rented” to third parties. Such practices would technically make it true that your personal data was not “sold,” but a company would still make money from your data. • Lynn Haaland, Zoom’s global risk and compliance officer, said the company does not anonymize or aggregate user data or rent it out in exchange for money but it was pointed out that this is not stated in the privacy policy which raises questions.
  • 6. FLAWS • The article states that “products for Windows and Mac computers have weaker security by design” this is because the company opted not to provide its app through Apple’s official Mac app store or the Microsoft Windows app store. • Due to it not being an app and downloaded from a website, “software avoids living in a so-called sandboxed environment, which would have restricted its access to Apple and Microsoft operating systems.” • As a result, Zoom is able to gain access to deeper parts of the operating systems and their web browsers. • Sinan Eren, chief executive of Fyde, an app security firm says that “By choosing to circumvent safer methods for installing its app, Zoom has opted for weaker security architecture”
  • 8. HOW TO STAY SAFE USING ZOOM • It’s safer to use Zoom on a mobile device, like an iPad or an Android phone, than on a Mac or Windows PC because mobile apps operate in a more restricted environment with limited access to your data. • Turn on Zoom security settings, like meeting passwords, to prevent unwanted guests from “Zoombombing” your sessions.
  • 9. DISCUSSION 1) How do you feel about using zoom? 2) Do feel comfortable using the app now knowing about some of the privacy issues? 3) What are some policies that you would put in place in terms of privacy for Zoom? 4) Do you use any other video-conferencing application/software and if so, please state the benefits and why you use it.

Editor's Notes

  1. https://youtu.be/xk992LJ4N9M