Internal Security Directive (Zoom Video Communications, Inc.)¶
Directive for encryption representations and secure update review.
Purpose¶
This document turns the FTC Zoom matter into a practical security, legal, and governance artifact. It is grounded in the FTC complaint, the final Decision and Order, and FTC public statements about alleged encryption, cloud-recording, software-update, and security-program failures.
Hallucinated writing examples¶
Scenario: (2021) (Security/legal lead) (executive, regulator, customer, or assessor audience) (CISO mandates immediate operating changes.)
Subject: Internal Security Directive for Zoom FTC order response
Context: The FTC alleged that Zoom made misleading statements about meeting encryption, cloud recording protection, and a Mac update that installed the ZoomOpener web server. The final order requires a comprehensive information security program, security review of software updates, biennial independent assessments, breach notification to the Commission, and restrictions on future privacy and security misrepresentations.
Decision or ask: Approve a cross-functional remediation track focused on mandating immediate controls for claims and software releases. The work should be jointly owned by Security, Product Engineering, Legal, Privacy, Communications, and GRC so public claims, product behavior, and evidence records remain aligned.
Implementation: Direct teams to freeze unreviewed security claims, route security-sensitive releases through review, preserve evidence, and remediate known gaps. The first phase inventories public and in-product security claims; the second phase validates cryptographic design, key custody, update behavior, and cloud-recording storage; the third phase creates release gates and evidence packages for independent assessment.
Measurement: Track claim-review coverage, percentage of security-sensitive releases reviewed before launch, encryption-control test results, unresolved high-risk findings, assessor evidence acceptance rate, and time to remediate exceptions.
Expected output: A directive with owners, effective date, and mandatory evidence expectations. Success means Zoom can demonstrate that security statements are reviewed before publication, software updates do not weaken third-party security protections, and order-required controls are supported by durable evidence rather than one-time attestations.