Furthermore, if such a meeting is recorded, the ability to post the recording to a non-secure page on the internet may also compromise the attorney-client privilege. Poor security and lack of privacy in a Zoom meeting may compromise attorney-client privilege. When something is posted on the internet, it is on the internet forever! Once recorded, no restrictions exist on where the recorded meeting may be posted on the internet or otherwise made available.
Zoom offers no indication to a participant that a meeting is being recorded. This may induce meeting participants to let down their guard and may prompt someone to make crude or offensive remarks that could be considered harassment. A Zoom meeting from home may lead participants to adopt a more casual, relaxed approach and a sense that work from home is not really being at work. These revelations have the possibility of subjecting a company to discrimination litigation. Zoom meeting participants may neglect to consider the background art, pictures, memorabilia, apparel, or other assorted personal items visible behind them during a Zoom meeting. Disclosure of personal information in Zoom conversations may be combined with information about the same person, available elsewhere, to facilitate the crime of identity theft. The most vulnerable participants are those accessing Zoom meetings through iPhones. Zoom is currently the subject of several lawsuits regarding the collection and sale of personal information obtained in meetings with advertisers. Entrance into a password-protected meeting is illegal according to the Computer Fraud and Abuse Act. Unauthorized participation in a government-sponsored public meeting is generally not illegal unless the speech contributed by the unauthorized participant is threatening, dangerous, or perpetuates a criminal act.Įntrance into a private, but not password-protected meeting, is a form of cyber trespass. An intruder could also gain information about participants in order to perpetuate identity theft or extortion crimes. Damages that such an intruder may cause range from simple embarrassment, to criminal mischief, to theft of confidential or sensitive information.Ī stealth intruder could make offensive, slanderous, or libelous statements about the company or could trick meeting participants into revealing proprietary information about the company.
The most common type of system break-in is called Zoombombing, which occurs when an unauthorized intruder enters a Zoom meeting.
#Microsoft zoom download software
The flawed software also permits viewers to study hand motions in order to determine which computer keys a participant is typing, including any password being entered. Security flaws allow hackers to easily break into the system, allow meeting participants to reuse passwords, and do not provide controls to prevent meeting participants from distributing data obtained during Zoom meetings. Zoom meeting usage increased so quickly during the pandemic that the software outgrew its rudimentary security.