Zoom Privacy and Security

decorative green line

HIPAA Support Matrix

HIPAA Standard


Access Control:

  • Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to authorized persons or software programs.
  • Unique User Identification: Assign a unique name and/or number for identifying and tracking user identity.
  • Emergency Access Procedure: Establish (and implement as needed) procedures for obtaining necessary electronic health information during an emergency.
  • Automatic Logoff: Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity.
  • Encryption and Decryption: Implement a mechanism to encrypt and decrypt electronic protected health information.

Audit Controls:

  • Implement hardware, software and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.

Integrity:

  • Mechanism to authenticate electronic protected health information.
  • Implement methods to corroborate that information has not been destroyed or altered.

Person or Entity Authentication:

  • Verify that the person or entity seeking access is the one claimed.

 


Transmission Security:

  • Protect electronic health information that is being transmitted over a network.
  • Integrity controls: Ensure that protected health information is not improperly modified without detection.
  • Encryption: Encrypt protected health information whenever deemed appropriate.

decorative green line

How Zoom Supports the Standard


 

  • Multi‐layered access control for owner, admin, and members.
  • Web and application access are protected by verified email and strong password.
  • Meeting access is protected by a password.
  • Meetings are not listed publicly.
  • Meeting host can easily disconnect attendees or terminate sessions in progress.
  • Meeting data transmitted across the network is protected using a unique Advanced Encryption Standard (AES) with a 128-bit key generated and securely distributed to all participants at the start of each session.
  • Meeting ends automatically with timeouts.


  • Meeting connections traverse Zoom's secured and distributed infrastructure.
  • Meeting connections are logged for audio and quality-of-service purposes.
  • Account admins have secured access to meeting management and reports.

  • Application executables are digitally signed.
  • Data transmission is protected using HMAC-SHA-1 message authentication codes.




  • Web and application access are protected by verified email and strong password.
  • Meeting host must log in to Zoom using a unique email address and account password.
  • Access to desktop or window for screen sharing is under the host's control.

  • End-to-end data security protects passive and active attacks against confidentiality.
  • Data transmission is protected using HMAC-SHA-1 message authentication codes.
  • Meeting data transmitted across the network is protected using a unique Advanced Encryption Standard (AES) with a 128-bit key generated and securely distributed to all participants at the start of each session.

decorative green line

Security and Encryption

Only members invited by account administrators can host Zoom meetings in accounts with multiple members. Hosts control meeting attendance through the use of meeting IDs and passwords. Each meeting can only have one host. The host can screen share or lock screen sharing. The host has complete control of the meeting and meeting attendees, with features such as lock meeting, expel attendees, mute/unmute all, lock screen sharing, and end meeting. Zoom HIPAA Compliance Guide, January 2015 Zoom employs industry-standard end-to-end Advanced Encryption Standard (AES) encryption using 128- bit keys to protect meetings. Zoom encryption fully complies with HIPAA Security Standards to ensure the security and privacy of patient data.

Screen Sharing in Healthcare

Medical professionals and authorized healthcare partners can use Zoom’s screen sharing, and video and audio conferencing to meet with patients and other healthcare professionals and screen-share health records and other resources. Zoom does not distribute the actual patient data. Screen sharing transmits encrypted screen capture along with mouse and keyboard strokes only, not the actual data. Zoom further protects data confidentiality through a combination of encryption, strong access control, and other protection methods.

HIPAA Certification

Currently, the agencies tasked with certifying health technology – the Office of the National Coordinator for Health Information Technology and the National Institute of Standards and Technology – do "not assume the task of certifying software and off-the-shelf products" (p. 8352 of the Final Security Rule) or accredit independent agencies that do HIPAA certifications. Additionally, the HITECH Act only provides for testing and certification of Electronic Health Records (EHR) programs and modules. Thus, as Zoom is not an EHR software or module, our type of technology is not certifiable by these unregulated agencies.

decorative green line