

Zoom
Based exclusively on public evidence • 20 criteria (Privacy + AI)
Last review: 10 Feb 2026

AI Trust Summary
Safer Alternatives
Higher-rated software in the same category
Attention Points in AI (2)
AI criteria that require attention. Buy the Premium Analysis to see all 2 criteria.
Ethical AI principles and anti-bias measures not documented
AI decision contestation mechanism not available
Source: vendor public documents
Compliances in AI (3)
AI criteria the company meets. Buy the Premium Analysis to see all 3 criteria.
AI data retention policy clearly documented
Policy on data use for AI training clearly stated
AI training opt-out control available
Source: vendor public documents
Highlights in Privacy (3)
Most relevant criteria for this category. Buy the Premium Analysis to see all 3 criteria.
Data controller identity and contact not disclosed
Data controller and processor roles clearly defined
Privacy contact channel available
Source: vendor public documents
Conformance analysis (20)
AI data retention policy clearly documented
Reference: ISO/IEC 42001 (8.2) + ISO/IEC 27701 (7.4.6)
Policy on data use for AI training clearly stated
Reference: ISO/IEC 42001 (8.2) + ISO/IEC 23894 + EU AI Act
AI training opt-out control available
Reference: ISO/IEC 42001 (8.3) + ISO/IEC 29100 + EU AI Act
Source: vendor public documents
Follow this company and access all 20 criteria
Track score changes, get alerts on policy updates, and view the full conformance analysis
Don't miss any update
Sign up to follow this company and track changes in privacy and AI scores
Why trust the AITS Index: Open Community Audit
Public transparency, peer review and open evidence trails — all verifiable by the community
Trust guarantees
Peer review
users, professionals and experts confirm or contest items online.
Public history
vendor and index changes are versioned and accessible.
Participate
Evidence, confirmations and contestations
participate in the collaborative validation of AITS criteria
Understanding Zoom's Privacy and AI Governance: Strengths, Weaknesses, and Practical Guidance
Strength in Data Usage Policy
Zoom has established a clear data usage policy, which is crucial for users concerned about privacy. The AITS Privacy Score of 75% reflects the company's commitment to transparency regarding how user data is utilized, particularly in the context of AI training. This means that users can expect their data to be handled in a manner that is both responsible and ethical, reducing the risk of misuse. By clearly listing the purposes for which data is processed, Zoom enables users to make informed decisions about their data sharing. This transparency is particularly important for compliance with regulations like GDPR and LGPD, which emphasize user rights and data protection.
Robust Handling of Sensitive Data
Another notable strength is Zoom's documented safeguards for sensitive data. The platform has implemented additional protections when processing sensitive information, which is vital for users who may share confidential or personal data during video calls. This proactive approach helps mitigate risks associated with data breaches and unauthorized access. Users should feel reassured knowing that Zoom takes extra steps to protect their sensitive information, aligning with best practices in data governance and privacy standards.
Lack of Ethical AI Commitments
Despite its strengths, Zoom has significant weaknesses, particularly regarding its commitments to ethical AI. The absence of documented ethical guidelines raises concerns about potential biases in AI-driven features. For users relying on AI functionalities, such as automated transcription or meeting summaries, this lack of transparency could lead to unintended discrimination or inaccuracies. Users should be aware of these risks and consider limiting their reliance on AI features until Zoom addresses these ethical concerns more comprehensively.
Absence of AI Decision Contestation Mechanism
Additionally, the lack of a mechanism for contesting AI decisions is a critical shortcoming. Users may find themselves at a disadvantage if they disagree with an AI-generated outcome, such as a meeting summary that misrepresents their contributions. Without a clear process for contestation, users may feel powerless to rectify such issues. It is advisable for users to maintain thorough notes and records of their meetings to ensure they can address any discrepancies that may arise from AI outputs.
Unclear Data Controller Identity
Another area of concern is the lack of clarity regarding the identity of the data controller. Users should know who is responsible for their data and how to contact them in case of issues. The absence of this information can lead to uncertainties about accountability and recourse in the event of a data breach or misuse. Users are encouraged to reach out to Zoom's support for clarification on this matter and to ensure they understand their rights under GDPR and LGPD.
Practical Steps for Enhanced Privacy
To enhance their privacy while using Zoom, users can take several practical steps. First, review the privacy settings within the application to ensure that only necessary data is shared. Users should also consider disabling features that utilize AI until Zoom provides more robust ethical guidelines. Regularly checking for updates on Zoom's privacy policies and AI governance can help users stay informed about any changes that may impact their data security. Lastly, consider using alternative platforms that prioritize ethical AI practices if these weaknesses are a significant concern for your organization. By being proactive, users can better protect their privacy while leveraging Zoom's capabilities.
Other Communication and Collaboration software
Dive into in-depth research and analysis of each player
Source: vendor public documents
Analyzed Sources
Public documents used in the audit of Zoom:
Evidence, confirmations and contestations
participate in the collaborative validation of AITS criteria
Scope & Limitations
TrustThis/AITS assessments are based exclusively on publicly available information, duly cited with date and URL, following the AITS methodology (privacy & AI transparency).
The content is indicative in nature, intended for screening and comparison, not replacing internal audits.
TrustThis/AITS does not perform invasive tests, does not access vendor technology environments and does not process customer personal data. Conclusions reflect only the vendor's public communication at the date of collection.
Source: vendor public documents






