Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Privacy Considerations When Using Zoom

Privacy Considerations When Using Zoom

Many within the Penn community are using the Zoom software tool to remove live and recorded academic sessions and meetings.

This page provides some basic guidance on some privacy considerations when using Zoom conferencing during remote working and teaching. 

 

Privacy Considerations
  • Privacy Considerations
  • Privacy Data Protections with Zoom
  1. Where recording is permitted, it is permitted only by the host (typically instructor or meeting chair) for instructional purposes only. Students in a class and/or meeting participants are prohibited from recording, of any kind, without written permission from Penn and the instructor.
  2. Recordings are made available solely for educational use and may not be shared, copied or redistributed without the permission of Penn and the instructor.
  3. Video or audio recording (including taping, recording, photographing, screen capture and other methods of capture) for purposes other than instruction is prohibited absent a strong rationale and only if the host provides advance notice and opportunity to opt-out of video/audio participation.
  4. During video conferencing, there is a chat function that permits participants to ask questions and engage in dialogue with the class or meeting proceeding.  Recording, including photographing, screen capture, or other copying methods of chat exchanges is prohibited except by the instructor or meeting chair when advance notice is provided.
  5. Protect your classes and meetings delivered remotely from having unauthorized individuals join. (“Zoom bombing” is the practice of uninvited individuals entering a video call.)
  • Videoconferencing hosts should monitor participants on teleconference calls to reduce the chance of unauthorized persons on the calls.
  • Use a unique meeting ID for each meeting or require authentication and passcode for participants.
  • Limit reuse of access codes: if you’ve used the same code for many meetings, others will have access to your meetings using that same passcode.

For further privacy features and options for Zoom see “Zoombombing Allows Uninvited Guests Join a Zoom Session”

Zoom’s Privacy Policy and Privacy Statement states that:

  • Zoom collects only the user data that is required to provide Zoom services and does not sell personal data. 
  • Zoom does not use data obtained from your use of its services, including your meetings, for any advertising. 
  • Zoom does collect user data and utilizes cookies to store information on preferences.   As a user of Zoom, if you give Zoom access to any files or programs, you need to manage cookies through your browser settings in the way you do with other applications. 

For more information regarding Zoom’s privacy practices, Zoom recently issued the following statement at https://zoom.us/privacy.

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • Zoombombing Allows Uninvited Guests Join a Zoom Session 
  • Penn Data Risk Classification
  • Penn Privacy
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff