logo
Products
Solutions
Resources
Safety

Zoom Safety Center

Just like your conversations with friends at home and with colleagues at the office, your virtual conversations only live in the moment unless you record them. We know how these things can be fleeting, which is why we at Zoom approach online Trust & Safety with those kinds of exchanges in mind.

security shield logo
zoom collaboration

How to keep your meetings safe

When you host a meeting using Zoom, you can decide who joins and what they can do there, just as you would during an in-person interaction. We’ve designed features to help keep your meetings safe and manage how your guests communicate. Some of these features include:

  • The Waiting Room is your virtual bouncer, letting you decide who’s allowed into your meetings. Meeting hosts can also add a video for participants to view while they wait for the host to allow them into the meeting.

  • Hosts can “geofence” access to their meetings to block unexpected participants joining from VPNs or from outside of their geographical area.

  • Hosts can instantly suspend all participant activity, which disables audio, video, chat, annotation, and renaming, and hides participant profile pictures. It allows the host to quickly identify, eject, and report the offender so the meeting can resume.

And so many more.

Learn more about how to deploy these tools by enrolling in our Zoom Security Basics training. Upon successful completion of the free training and included quiz, you’ll receive a Zoom Security Champion badge!

We also have our own tools to detect and warn our users of potential abuse before it happens, like our At-Risk Meeting Notifier.

How Zoom Trust & Safety works

Disruptions and issues can still occur in online interactions. In addition to the tools we proactively employ to keep our users safe, we encourage you to report abuse on Zoom if and when you see it. We evaluate every report by applying the Acceptable Use Guidelines (AUG) and, if necessary, take action when we determine a violation of these guidelines has occurred.

You can report abuse to us either from within a meeting, the web portal for a past meeting or webinar that you hosted (if enabled by an account owner or admin), or via our Trust Form.

Zoom will only take action if we receive reports about possible violations of our Terms of Service or AUG. You can make us aware of a potential violation before, during, or after an event, and we will make a determination on what action is appropriate as quickly as we are able. We may also provide user information to law enforcement and government agencies in response to valid legal requests consistent with our Government Request Guide.

shield icon outline

If a report doesn’t have enough information to establish proof of a violation, then we dismiss it.

Why this approach?

Our approach reflects the nature of the Zoom platform. That makes us different from social media companies. For example, on Zoom, you’ll find:

  • Zoom products like Zoom Chat, Zoom Phone, Zoom Whiteboard, and Zoom Meetings do not have text feeds or posts and do not use algorithms to show you content. If you stream your content to other sites that use feeds and algorithmic ranking, you’ll need to follow their rules.

  • Zoom users can’t follow each other or search for unknown contacts on the platform.

  • Just like your in-person conversations, your communications on Zoom Meetings live only in the moment unless your account settings enable storage or archiving in your account or on your device.

zoom on a laptop

News

logo
Products
Solutions
Resources
Safety

Zoom Safety Center

Just like your conversations with friends at home and with colleagues at the office, your virtual conversations only live in the moment unless you record them. We know how these things can be fleeting, which is why we at Zoom approach online Trust & Safety with those kinds of exchanges in mind.

security shield logo
zoom collaboration

How to keep your meetings safe

When you host a meeting using Zoom, you can decide who joins and what they can do there, just as you would during an in-person interaction. We’ve designed features to help keep your meetings safe and manage how your guests communicate. Some of these features include:

  • The Waiting Room is your virtual bouncer, letting you decide who’s allowed into your meetings. Meeting hosts can also add a video for participants to view while they wait for the host to allow them into the meeting.

  • Hosts can “geofence” access to their meetings to block unexpected participants joining from VPNs or from outside of their geographical area.

  • Hosts can instantly suspend all participant activity, which disables audio, video, chat, annotation, and renaming, and hides participant profile pictures. It allows the host to quickly identify, eject, and report the offender so the meeting can resume.

And so many more.

Learn more about how to deploy these tools by enrolling in our Zoom Security Basics training. Upon successful completion of the free training and included quiz, you’ll receive a Zoom Security Champion badge!

We also have our own tools to detect and warn our users of potential abuse before it happens, like our At-Risk Meeting Notifier.

How Zoom Trust & Safety works

Disruptions and issues can still occur in online interactions. In addition to the tools we proactively employ to keep our users safe, we encourage you to report abuse on Zoom if and when you see it. We evaluate every report by applying the Acceptable Use Guidelines (AUG) and, if necessary, take action when we determine a violation of these guidelines has occurred.

You can report abuse to us either from within a meeting, the web portal for a past meeting or webinar that you hosted (if enabled by an account owner or admin), or via our Trust Form.

Zoom will only take action if we receive reports about possible violations of our Terms of Service or AUG. You can make us aware of a potential violation before, during, or after an event, and we will make a determination on what action is appropriate as quickly as we are able. We may also provide user information to law enforcement and government agencies in response to valid legal requests consistent with our Government Request Guide.

shield icon outline

If a report doesn’t have enough information to establish proof of a violation, then we dismiss it.

Why this approach?

Our approach reflects the nature of the Zoom platform. That makes us different from social media companies. For example, on Zoom, you’ll find:

  • Zoom products like Zoom Chat, Zoom Phone, Zoom Whiteboard, and Zoom Meetings do not have text feeds or posts and do not use algorithms to show you content. If you stream your content to other sites that use feeds and algorithmic ranking, you’ll need to follow their rules.

  • Zoom users can’t follow each other or search for unknown contacts on the platform.

  • Just like your in-person conversations, your communications on Zoom Meetings live only in the moment unless your account settings enable storage or archiving in your account or on your device.

zoom on a laptop

News