Source: Mashable.com
We are delighted to announce that Zoom Video Communications has complied with our request to provide copies of personal data that belong to our participants. We have contacted those participants individually with the instruction to download the data securely from my.somi portal or from SOMI app.
Click here to view the data request
Our letter of complaint was sent to Zoom Video Communications on 14 July 2020. It took more than 2 months before we received a substantive response, therefore, we continue our investigation by requesting all personal data that Zoom has collected about our participants.
There are many reasons why you should take action again Zoom's data breach. We list a few for you.
You are entitled to it
Because of the AVG/GDPR legislation, you are entitled to compensation if a company or agency leaks your data.
No cure no pay
No cure no pay
Zoom has violated your privacy
Due to a technical error, data of millions of Zoom users have been exposed.
Together we give a signal
Through this joint claim, we send a signal to companies and institutions that they must handle our personal data carefully.
The ZOOM video call service is being compromised due to alleged data breaches and privacy violations. Especially in these times, many people are forced to use online video calling services for work, school, or to call family/loved ones. Zoom recently admitted that data from iOS users is shared by ZOOM with Facebook.
Other security issues would also arise. For example, the press was reporting about linking data to personal LinkedIn profiles and an investigation into hacks is already ongoing in the US. Online recorded conversations via search engines also appear to be in the public domain.
We will start working on your claim in three simple steps. The more people participate, the faster we come to an agreement with Zoom.
Used Zoom? Register with us!
Leave your details in the form above.
You will receive a confirmation email and a proxy later.
Sign the power of attorney
We will take action for you and thousands of others. No cure no pay.
We get to work
Algemeen Dagblad
Tech news editor
06-04-20, 07:30
Zoom always gives those files a name that is structured in the same way. This makes file names easy to guess and easy to find. Few weeks after that, more vulnerability of Zoom reveals itself to the public. The video service, which until recently was only used by a small number of companies, has been extremely popular lately due to lockdown measures to curb the spread of the coronavirus. That also brought more attention to the way the company handles user data.
Source: Algemeen Dagblad
SOMI is a non-profit organization with the purpose to identify and influence issues of social importance
SOMI investigates abuses, informs the public and helps affected parties. With this action, SOMI wants to contribute to the online security and digital sovereignty of individuals. Only if companies are completely transparent about the use of personal data and possible negative consequences of this use, can individuals make informed decisions and thus exercise control over their digital persona.
SOMI investigates digital services and advocates for transparency regarding the use of personal data and the relevant risks.
For more information, please visit our websites:
SOMI: https://somi.nl
Tiktok Claim: https://tiktokclaim.org
Palantir Claim: https://somi.nl/palantirclaim
Bank Cartel Research: https://kenniscentrumvastgoedfinanciering.nl
Adequate provision of information to users.
This includes the obligation to inform individuals about the purpose of the data collection and the existence of any transfer of data to third parties. Depending on the intended use of personal data, permission will also have to be requested when appropriate.
Adequate security measures and restrictions on profiling
Not only does the GDPR oblige to take adequate security measures. The GDPR also contains special provisions that explicitly restrict the profiling of individuals. Profiling is lucrative. This method combines information to create an individual user profile. This profile can be used for advertising purposes, or to block certain users, but also, for example, to give users specific offers for the highest possible price.
Compensation for damage caused by breaches
Article 82 GDPR prescribes that anyone who has suffered damage as a result of a breach of this regulation has the right to receive damages from controllers or processors for the damage suffered. The claim for compensation can concern both material damage and non-material damage.
We expand our FAQ section daily based on the questions we receive.
Zoom is an American publicly traded company that was founded in 2011 and has approximately 2000 employees. In 2019, it posted sales of $620 million. Via Zoom, it's easy to start a digital meeting with multiple people. This can be done by calling one of the Zoom phone numbers, but also via video calling software. You do not need to download a separate program, as a conversation can be started via the browser.
The company was founded by the Chinese immigrant Eric Yuan, a Computer Science and Mathematics graduate. He successfully took the plunge to the United States in the late 1990s.
With strong ties to China, where a third of its employees work, most R&D work takes place there. This makes the company cheap, but also vulnerable. In the run-up to the IPO in 2019, Zoom had to recognize that the close relationship with China can pose security and privacy risks.
Zoom is very user-friendly and therefore comes in handy in times of lockdowns. It gives the user the opportunity to get in touch with family members, employees, students, and so on.
This is also reflected in the figures. In 2019, Zoom had roughly 10 million users every day. In the months of March and April 2020, this had increased to roughly 200 million users per day.
Zoom's security can be quite problematic. Security experts have discovered a few flaws. For example, there is a bug that can steal the windows password. Another bug makes it possible for an outsider to enter a meeting and act as an administrator or to take over the microphone or webcam.
Zoom bombing is also possible. Strangers enter a meeting to leave their message of any kind there. And so there are more flaws.
Concerns about data retention and the possibility that third parties can break in are further compounded by the discovery that Zoom IOS app automatically passed data to Facebook. Zoom's Privacy Code made no mention of this.
The flawed privacy code can have two worrying consequences:
A: There is a lack of transparency in the technical capabilities of the application. This enables the host of a call to undertake matters that remain invisible to the other participants. For example, he can record the conversations, elaborate them and discuss them later with third parties or pass the information on to third parties.
B: So the host can pass the information on to third parties without asking or getting permission. This is contrary to the GDPR/AVG. This requires that data collection may only take place on the basis of 'consent', which must also be well-informed and voluntary.
Under pressure from the erupted criticism, Zoom says they have tightened their security and privacy policy. It now reads that the "content" that users produce will not be shared. Zoom also claims to have never done this. Zoom also says that it has been overtaken by its turbulent growth. As mentioned, 200 million people now use Zoom every day, including 90,000 schools in more than 20 countries. The problem with this statement is that there were concerns about Zoom's privacy policy before the case exploded.
In defense of its current rattling privacy policy, Zoom argues that it focused primarily on the business market. They never thought that home workers and school children would use Zoom en masse. That is very strange reasoning at first sight. There would be very different rules in the field of security and privacy for companies, citizens, or even schoolchildren. This line of reasoning is therefore questionable and gives the impression that Zoom would have been the starting point for the lack of privacy.
Not quite. Take the encryption of data, for example. Zoom has admitted that until recently there was no end-to-encryption of data. End-to-end means that the provider cannot access that data at any time. Without that form of encryption, they can. That doesn't automatically mean the provider will do that, of course. However, Zoom also never mentioned that it will not attempt to intercept data or record communications! So there remains a doubt.
These question marks are also possible with the new transparency policy. On March 27, 2020, Zoom stated that it will record any meeting that the host desires. This means that Zoom has access to certain forms of content at all times. Zoom does not say anywhere that it does not store other forms of content. As long as Zoom does not state clearly that it uses end-to-end encryption, the content can still be accessed. We don't know if it will happen, nor how long it will keep the stored content.
Zoom says it complies with US law on government access to stored data. However, Zoom's field of activity is worldwide. This means that, for example, the US government has potential access to foreign data thanks to the Cloud Act. This means that the government can not only demand access to all kinds of company data but even confidential data from foreign powers.
Yes, a New York prosecutor has written a letter to the company in San Jose, California asking for clarification about Zoom's security policy. She points to Zoom's explosively growing popularity in times of Covid-19.
Zoomclaim.org - Part of SOMI
Zoomclaim.org - All rights reserved