{"id":31568,"date":"2020-11-11T09:47:33","date_gmt":"2020-11-11T07:47:33","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=31568"},"modified":"2025-08-28T04:21:49","modified_gmt":"2025-08-28T01:21:49","slug":"us-authorities-accuse-zoom-of-deceiving-users-over-data-protection","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/us-authorities-accuse-zoom-of-deceiving-users-over-data-protection\/","title":{"rendered":"US authorities accuse Zoom of deceiving users over data protection"},"content":{"rendered":"<p><span style='font-weight: 400;'>U.S. Federal Trade Commission (FTC) <\/span><a href='https:\/\/www.ftc.gov\/news-events\/press-releases\/2020\/11\/ftc-requires-zoom-enhance-its-security-practices-part-settlement' target='_blank' rel='noopener noreferrer'><span style='font-weight: 400;'>accused<\/span><\/a><span style='font-weight: 400;'> the Zoom platform of &quot;misconduct that undermined user security&quot;. The service claimed to use end-to-end encryption, but in fact provided a lower level of protection for calls.<\/span><!--more--><\/p>\n<p><span style='font-weight: 400;'>The FTC noted that Zoom stored cryptographic keys that could provide access to the content of its customers&#8217; meetings.<\/span><\/p>\n<p><span style='font-weight: 400;'>The platform also misled users who stored call recordings in the company&#8217;s cloud service. Zoom claimed that data were encrypted immediately after the call ended. However, some of them reportedly remained unencrypted for up to 60 days on Zoom&#8217;s servers and were only then moved to secure cloud storage, according to the FTC.<\/span><\/p>\n<p><span style='font-weight: 400;'>The commission found a violation in the covert installation of ZoomOpener software, which automatically connected a user to a meeting, &quot;circumventing Safari&#8217;s protection that guards against common malware&quot;.<\/span><\/p>\n<p><span style='font-weight: 400;'>According to the FTC, Zoom&#8217;s misleading statements gave users a false sense of security. That was particularly true for those who used the platform to discuss personal topics, such as health and financial information.<\/span><\/p>\n<blockquote>\n<p><span style='font-weight: 400;'>&quot;In numerous messages, Zoom specifically advertised its encryption level as the reason customers used the service,&quot; the statement said.<\/span><\/p>\n<\/blockquote>\n<p><span style='font-weight: 400;'>In response to the accusations, Zoom pledged to develop and implement a comprehensive security program.<\/span><\/p>\n<p><span style='font-weight: 400;'>Earlier this summer, the platform said it planned to provide the FBI with access to users who violate the law. It proposed protecting data from third-party access through encryption for paid accounts.<\/span><\/p>\n<p>Subscribe to ForkLog news on Telegram: <a href='https:\/\/t.me\/forklogfeed' target='_blank' rel='nofollow noopener noreferrer'>ForkLog Feed<\/a> \u2014 the full feed of news, <a href='https:\/\/telegram.me\/forklog' target='_blank' rel='nofollow noopener noreferrer'>ForkLog<\/a> \u2014 the most important news and polls.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>U.S. Federal Trade Commission (FTC) accused Zoom of &#8216;misconduct that undermined user security&#8217;. The service claimed to use end-to-end encryption, but in fact provided a lower level of protection for calls.<\/p>\n","protected":false},"author":1,"featured_media":31569,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1142,1111,1656],"class_list":["post-31568","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-cryptography","tag-cybersecurity","tag-data-protection"],"aioseo_notices":[],"amp_enabled":true,"views":"15","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=31568"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31568\/revisions"}],"predecessor-version":[{"id":31570,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/31568\/revisions\/31570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/31569"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=31568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=31568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=31568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}