Skip to content

In the Matter of Zoom Video Communications, Inc. (2020) — Encryption Claims, Mac Update, and FTC Security Order

Table of contents

Executive Summary

In November 2020, the Federal Trade Commission announced a proposed settlement with Zoom Video Communications, Inc. The FTC alleged that Zoom deceived users about the level of security provided for Zoom meetings, including claims about "end-to-end, 256-bit encryption," and that Zoom misled cloud-recording users about when recordings were encrypted. The FTC also alleged that Zoom unfairly undermined a Safari browser safeguard when a July 2018 Mac update installed the ZoomOpener web server without adequate notice or consent.

The Commission finalized the order in January 2021 and announced final approval in February 2021. The order requires a comprehensive information security program, security review of software updates, independent biennial assessments, Commission notification for covered incidents, and restrictions on privacy and security misrepresentations. The matter was resolved by consent; it is an enforcement and remediation record, not a litigated court holding.

FTC Enforcement

The FTC alleged deceptive and unfair practices under Section 5 of the FTC Act. The deception theory focused on public and product statements about encryption and cloud-recording protection. The unfairness theory focused on the Mac ZoomOpener web server, which allegedly bypassed a Safari safeguard, increased the risk of remote video surveillance by strangers, persisted after deletion of the Zoom app, and could reinstall the app in certain circumstances.

  • Deception: Security and privacy claims must match actual architecture, cryptographic key custody, storage behavior, and product operation.
  • Unfairness: Product changes that undermine user security controls can create unreasonable injury risk even when framed as convenience features.
  • Order compliance: A comprehensive security program must be documented, measured, assessed, and embedded into software release and claims-review workflows.

Security Technical Summary

Summary

The FTC matter centered on gaps between security representations and product behavior. The FTC alleged that Zoom did not provide end-to-end encryption for all meetings because Zoom maintained cryptographic keys that could allow access to meeting content. It alleged Zoom secured meetings in part with a lower level of encryption than promised and stored some cloud recordings unencrypted on Zoom servers for up to 60 days before transfer to secure cloud storage. It also alleged that a Mac update installed ZoomOpener, which bypassed a Safari security prompt and remained after app deletion.

Engineering Takeaways

Security claims and architecture

  • Validate every encryption, privacy, and security representation against implemented design and key custody.
  • Maintain an approval workflow for claims used in product UI, marketing, blogs, and customer materials.

Secure release governance

  • Review software updates for security impact before release, including interactions with browser and operating-system safeguards.
  • Document release notes accurately and require Legal/Security review for security-sensitive changes.

Program and evidence readiness

  • Maintain annual risk assessments, vulnerability management, MFA and credential controls, data deletion controls, and incident notification processes.
  • Preserve evidence for independent biennial assessments and potential FTC review.

Understanding Regulatory and Court Orders

Read the originals—the FTC complaint, final order, and FTC press releases below are the authoritative sources. Use the Understanding regulatory and court orders page to convert order language into operational obligations.

DocumentDateSourceKey obligation or allegation
Complaint — In the Matter of Zoom Video Communications, Inc.Nov. 9, 2020FTCAlleged deception about encryption and cloud recordings; unfair Mac ZoomOpener deployment
Decision and Order — Zoom Video Communications, Inc.Jan. 19, 2021FTCComprehensive security program, update review, assessments, breach notification, misrepresentation prohibition

Case Pack Documents

Case DocumentSummaryWriting Scenario
Executive and board
Board PackBoard briefing on FTC order response and trust remediation.CISO briefs the Board Audit Committee after the proposed FTC settlement.
Executive Security Risk SummaryExecutive view of deception, software-update, and program risks.Security Director summarizes Zoom order obligations for CEO and leadership.
Security Program Status ReportProgram status against FTC order obligations.Program owner reports progress to CISO and General Counsel.
Strategic Security Initiative JustificationBusiness case for security-by-design and encryption claims governance.CISO requests funding for order remediation initiative.
Regulatory and compliance
Regulatory Security ExplanationPlain-language explanation of controls for FTC-facing review.Security lead explains program design to FTC staff.
Compliance Justification DocumentMaps controls to FTC order obligations.GRC lead justifies controls for counsel and assessor.
Controls Evidence MapEvidence map for order compliance.Control owners prepare evidence package for independent assessment.
Governance Response MemoGovernance response to regulator or assessor questions.CISO responds to audit request about program oversight.
Legal-technical
Detailed Narrative of EventChronology of alleged statements, cloud recording handling, and Mac update issue.Legal and security prepare factual narrative for counsel.
Security Architecture Explanation for Legal ReviewArchitecture/legal review of encryption, key handling, and update safety.Lead engineer explains technical posture to General Counsel.
Risk RegisterRisk register for claims, cryptography, update, and evidence risks.Security Director maintains risk register for remediation steering committee.
Security Decision DocumentationDecision record for encryption-claims review and release gating.Security Director records control decision for counsel and product leadership.
Policy and governance
Security Policy DraftPolicy draft for security claims, cryptography, and software updates.Security Director drafts enterprise policy for CISO approval.
Security Governance MemoGovernance model for product security, legal review, and order compliance.CISO issues governance memo to product, engineering, legal, and marketing.
Security Program JustificationProgram scope and resourcing rationale under FTC order.CISO presents program justification to executive team.
Internal Security DirectiveDirective for encryption representations and secure update review.CISO mandates immediate operating changes.
Public communication
Security Public StatementPublic-facing security statement aligned with order restrictions.Communications team drafts public statement with Legal and Security.
Customer Security ExplanationCustomer explanation of meeting security changes.Security and customer trust team explains controls to enterprise customers.
Security Transparency Report SectionTransparency-report section on FTC order remediation.CISO drafts annual trust report section.
Operational
Audit Packet ChecklistEvidence checklist for order and assessment readiness.GRC lead assembles regulator or assessor packet within 48 hours.
Implementation Checklist0-30 / 30-60 / 60-90 day implementation plan.Program owner drives near-term execution against order obligations.

Facts and Timeline

  • June 2016 onward — FTC materials state that Zoom represented that users could secure meetings with end-to-end encryption and made related statements about 256-bit encryption.

  • July 2018 — Zoom deployed a Mac desktop update that installed the ZoomOpener web server, which the FTC alleged bypassed a Safari browser safeguard and remained after users deleted the Zoom app.

  • July 2019 — Apple removed the ZoomOpener web server from users' computers through an automatic update, according to FTC materials.

  • December 2019 to April 2020 — FTC materials state Zoom's user base grew from about 10 million to 300 million during the COVID-19 pandemic.

  • Nov. 9, 2020 — The FTC announced an administrative complaint and proposed settlement requiring a comprehensive security program and related relief.

  • Jan. 19, 2021 — The Commission voted 3-2 to finalize the settlement.

  • Feb. 1, 2021 — The FTC announced final approval of the Zoom settlement.

References

Primary (official documents)

Cited

  1. Federal Trade Commission. FTC Requires Zoom to Enhance its Security Practices as Part of Settlement, Nov. 9, 2020.
    https://www.ftc.gov/news-events/news/press-releases/2020/11/ftc-requires-zoom-enhance-its-security-practices-part-settlement

  2. Federal Trade Commission. FTC Gives Final Approval to Settlement with Zoom over Allegations the Company Misled Consumers about Its Data Security Practices, Feb. 1, 2021.
    https://www.ftc.gov/news-events/news/press-releases/2021/02/ftc-gives-final-approval-settlement-zoom-over-allegations-company-misled-consumers-about-its-data

  3. Federal Register. Zoom Video Communications, Inc.; Analysis to Aid Public Comment, Nov. 13, 2020.
    https://www.federalregister.gov/documents/2020/11/13/2020-25130/zoom-video-communications-inc-analysis-to-aid-public-comment

© 2026 Yi Zhang. Licensed under the MIT License.
Last updated: 2026 April 30 6:55 AM