After a backlash for safety and privacy issues, Zoom is freezing its feature updates for 90 days to address the problems.

Amid the coronavirus, the need for work from home makes Zoom a cultural phenomenon. The video-calling app is not only popular among Gen Z but also vital for people separated by virus prevention measures. However, Zoom’s recent growth has caused unwanted public attention due to a string of privacy and security issues, and the company is appealing to address them over the coming 90 days.

Zoom freezing feature updates for 90 days

As stated in a thorough post, Zoom Chief Executive Officer Eric S. Yuan clarifies exactly how the firm has been reacting to a substantial rise in customers. He explained that Zoom has never ever shared any user’s numbers previously, yet Yuan exposes that back in December the firm had an optimum of 10 million daily customers.

“In March this year, we reached more than 200 million daily meeting participants, both free and paid,”

states Yuan.

It is considered as an unexpectedly huge number of users for the company during the coronavirus pandemic. The difficulties of supporting 200 million users compared to just 10 million a few months ago are significant enough, but the privacy and security issues that have been unveiled recently present greater challenges for the company in the face of the user’s doubt. Now Zoom is freezing its feature updates for 90 days and focusing on its security and privacy issues instead. “Over the next 90 days, we are committed to dedicating the resources needed to better identify, address, and fix issues proactively,” explains Yuan. “We are also committed to being transparent throughout this process.”

Zoom is also committing to releasing a transparency report to share the number of requests from law enforcement and governments for user data. It’s something that digital rights advocacy groups have called on Zoom to release. Zoom is also “enhancing” its bug bounty program, consulting with other chief information security officers across the industry, and using white-box penetration tests to identify other security bugs.

Rate this post!
[Total: 0 Average: 0]

Comments are closed.

You may also like

More in News