Professional Documents
Culture Documents
Zoom Compiled
Zoom Compiled
Zoom Compiled
Step 1: Facts
What do we know?
Does zoom have a yearly internal and external security reviews? And do they have an
implemented vulnerability- management program?
Why does zoom offer end-to-end encryption to users with premium subscription only?
Step 2: Stakeholders
Stakeholders Stakes
General Public - Social Privacy
- Security of personal information
Zoom - Public Image/Reputation
- Possible lawsuits
- Compliance with international laws
Government - Laws imposed for security and privacy of
public
- Confidentiality Information
Step 3: Dillemas
Zoom giving third party application an access to the confidential information of user’s vs
Zoom prioritizing the welfare of their users by implementing secure and safe privacy
space
Zoom abiding by the government privacy laws vs easy to access and use the Zoom
application for users
Allocating product development cost to improving video meeting features and
specifications vs. prioritizing fixing bugs and improving privacy setting
Zoom conforming to the laws of the major countries around the world VS. users in
smaller third world countries are still vulnerable to different attacks specific to the
country or the application could be banned in those countries
Step 4: Alternatives
Step 6: Consequences
Users:
(-) Zoom is convenient for them
to use but their personal
information is not safe and
secure.
2. To prioritize their growth as Privacy and Zoom
a company, rather than to Security (+) Many users will be enticed
improve their privacy and Reputation to use Zoom because of features
security. (e.g. adding other Profitability not offered by another video
features not related to Practicality communication app.
security) (-) Lawsuits may be filed by
many users
Users:
(+) More convenient for them
(-) Personal information is not
safe and secure
3. Reform the software’s Assurance for users Zoom:
privacy policies. Assurance to (+)The reputation of Zoom as a
privacy safe software will increase
Customer loyalty
Reputation Users:
(+) Users are assured of the
privacy of their personal
information in the service that
they choose
(+) Privacy of what happens in
the meetings is maintained and
anyone can’t just access the
meetings and the details of the
users in the meeting are not
shared
(+) Users are more satisfied with
their assurance of privacy
4. Create a strict standards in Respect to privacy Zoom
creating meeting key and Safety (+) Zoom will remain
passwords that is less penetrable Reputation trustworthy among customers as
by hackers long as they continue to improve
security features
Users
(+) Customers continue to use
the easy-to-use application
(+) Users private information
will be kept safe.
Hackers can easily get an access by randomly guessing the number and they can easily
enter the meeting. Moreover, it is essential to have each meeting key a password that is also less
likely impenetrable. Zoom’s passwords are commonly some four to five digits, so any
experienced hacker can guess it. As a result, the Zoom company should make it a priority to
strengthen and upgrade its security features and privacy standards on a regular basis, especially
since their platform is utilized by a big number of individuals.
Zoom has to take this issue seriously since the users include Government officials and big
private corporations. There were users affected by their privacy and security issue. And as to
compensatory justice, the focus is on making amends, rather than on making the wrongdoer
suffer (Zoom Company). Since the company has plans to pay $85 million to people for privacy
issues, they could make it as their amends to user that were affected by it. It is important to take
measures as it could backfire and cause cyber terrorism. In the world where technology is widely
used, the questions to security and privacy must be taken seriously. After all, the hope is that the
right approach to wrongdoing will lead to healing and growth, both for the wrongdoer and for the
wronged. Compensatory justice is about restoration and forgiveness.