Securing the Zoom for Government Platform

Protecting the Zoom Platform for Government Use

As more and more government agencies adopt Zoom as their primary communications tool, ensuring the platform’s security has become increasingly important. In response to this growing need, Zoom has taken several steps to secure the platform for government use, including:

  • Implementing robust encryption and security protocols: Zoom uses state-of-the-art encryption and security protocols to protect the privacy of your data and communication.
  • Obtaining certifications and accreditations: Zoom has obtained certifications such as FedRAMP, SOC 2 Type 2, and ISO 27001, which are recognized industry standards for secure cloud services.
  • Providing government-specific security features: Zoom offers government-specific security features such as support for multi-factor authentication and the ability to disable recording, screen sharing, and file sharing.
  • Partnering with security experts: Zoom has partnered with leading security experts to ensure that our platform remains secure and compliant with government regulations.

With these security measures in place, Zoom provides a secure platform for government agencies to communicate and collaborate effectively, while keeping sensitive information protected.


“Ensuring the Safety and Security of Vital Information

with Zoom for Government With the exchange of sensitive information being a critical aspect of government operations, it’s imperative that the right controls are in place to ensure secure communications.

To meet this crucial requirement, Zoom has developed a specialized platform – Zoom for Government – specifically designed to cater to the unique security needs of the public sector.

Zoom for Government is equipped with robust security features and supports various compliance requirements to ensure the safe and secure exchange of information. Here are the six key ways in which Zoom for Government protects your information: ”


1. End-to-end encryption (E2EE)

Zoom Meetings

The Zoom for Government client enables this feature in the meeting settings that helps encrypt the communication between registered meeting participants, when the Zoom for Government client is used, using Zoom’s standard 256-bit AES-GCM encryption. As a consequence, only the devices of participants in the meeting are aware of the cryptographic keys, which is a significant difference. There can be no third party access to the meeting’s private keys, therefore third parties, such as Zoom, cannot access them.

Zoom Phone

The Zoom Phone feature is available for Zoom for Government users on the same Zoom for Government account to conduct Zoom Phone calls through the Zoom client, where Zoom for Government users are on the same Zoom for Government account and their Zoom for Government accounts are on the same Zoom for Government account, and thus can upgrade to E2EE. It is possible to elevate a call to an encrypted one during a call by clicking “More” and then selecting “Encrypted” when you select “More”. As soon as E2EE is enabled, the call is encryptd using cryptographic keys which can only be decrypted by the caller’s and receiver’s devices. A unique security code will also be provided by one user to another in order to verify that they are part of the E2EE protocol.

2. A growing list of certifications 

It has been approved as a Moderate Level FedRAMP product by Zoom for Government. There has been a provisional authorization granted by Defense Information Systems Agency (DISA) for conducting meetings at Impact Level 4 (IL4) at the Department of Defense (DoD) and an authorization to operate (ATO) was granted by the Department of Air Force for conducting meetings at Impact Level 4 (IL4) in the United States. It has also achieved a StateRAMP Moderate approval and supports HIPAA, CJIS, and CMMC compliance requirements, and also supports HIPAA, CJIS, and CMMC compliance requirements.

There are a few more attestations that Zoom has attained, all of which can be found in our Trust Center, along with these government specific authorizations. Zoom commercially has also acquired a number of other relevant attestations.

3. Nomadic E911 

The Zoom Phone for Government applications offer enhanced 911 features (E911) that can be used in the event that an emergency call is placed using Zoom Phone for Government. This feature can be used to direct emergency services to an exact location based on the location of the emergency call itself. Zoom Phone soft and hard phones, when combined with Zoom’s Nomadic E911, can receive a call from an emergency call center to let the dispatcher know where a user is as they move around a facility, enabling the dispatcher to provide exactly the location of the user during an emergency.

It comes as a standard feature in Zoom Phone and is called Nomadic E911, and uses the Nomadic E911 technology, which helps modern day government agencies comply with the RAY BAUM’s Act, which requires modern organizations to report an instantly dispatchable location when it comes to personnel safety. It is very important for agencies to have this feature since they are embracing flexible working practices, which is helping to ensure employees are kept safe wherever they are.

It is important to keep in mind that nomadic E911 cannot be configured on Zoom Phones, so please see this guide for details.

4. U.S.-based staff and data centers 

An example of this kind of solution would be Azure Public Cloud which is part of Amazon’s GovCloud infrastructure, along with co-locating data centers located in the United States. A US-based company is responsible for the deployment and management of the system. There is no commercial Zoom version available with this feature. It is available only with Zoom for Government.

5. Watermarking 

The Zoom watermark is a feature that can be enabled by meeting hosts as a means of protecting confidential information shared during a meeting and preventing leaks.

  • As a part of the image watermark feature, a portion of a meeting participant‘s email address is superimposed on an image on a shareable screen. As well as being splashed throughout the content that someone is presenting, this image is also displayed as a video.

  • Watermarks are invisible, inaudible marks that are added to any offline recording of a meeting containing a user’s information. There is a possibility that Zoom can help detect who recorded the meeting if the audio file is shared without permission.

6. Authenticated login 

As part of Zoom for Government’s efforts to ensure that users are authenticated as they log on to the client, we offer a single sign-on (SSO) feature, which makes it very safe and quick for users to login to the client. It is still possible to add an extra layer of security to the process by combining two-factor authentication with single sign-on if you are not able to use single sign-on. In order to achieve zero-trust architecture, two-factor authentication and single sign-on have become essential, which have been identified as key factors that will strengthen agencies’ security posture as a result.

“Elevating Public Sector Security Measures

Zoom for Government offers a range of security features and authorizations to ensure secure communication for the public sector. Both the government and commercial versions of Zoom are equipped with numerous security-focused options, from in-meeting controls to privacy notifications, to make security an integral aspect of government communications.

Effective and secure communication is critical for government operations. Whether sharing policy updates or working on a team project, government employees can trust Zoom for Government to provide fast, flexible and seamless exchange of sensitive information, all while fortifying the security stance of the public sector.”


What is the security of Zoom for Government?

A user experience that is intuitive and secure, comparable to that of the commercial version of Zoom is provided by Zoom for Government. Both iterations of the platform are scalable and versatile, providing modern companies operating in the public sector with the tools they require to accomplish their objectives while also assisting in the protection of vital information.

What is the best way to secure Zoom?

Require a Passcode to Join
You may take the security of your meetings to an even higher level by forcing attendees to enter a passcode in order to participate. This function may be applied to both newly planned meetings as well as your Personal Meeting ID, making it so that only people who know the password will be able to contact you regarding the meeting.

Is there a difference between Zoom and Zoom for Government?

What sets Zoom Commercial apart from Zoom for Government? / What are the key differences? Zoom for Government includes all of the same functionality as Zoom Commercial, but it works in a dedicated and secure infrastructure that was developed to meet the criteria of the FedRAMP Moderate baseline and the DOD Impact Level 2 certifications.

How do I share my screen in Zoom for Government?

Share Screen/Content

Simply select the “Share Screen” option from the conference controls on your computer. b. Click the Basic option to share your whiteboard, a selected application window, or your complete desktop.

Is Zoom encrypted and secure?

Audio, video, and application sharing (such as screen sharing and whiteboarding) in transit between Zoom applications, clients, and connectors are all encrypted with 256-bit AES GCM by default when using Zoom for meetings and webinars.

How do I protect my Zoom privacy?

Use Zoom security features during a meeting
  1. Join the meeting being held on Zoom.
  2. To enable the waiting room, lock the meeting, remove participants, or any other feature you need, you must first click the Security icon that is located in the meeting control.


What are key risks for Zoom?

Major Risks
  • Cyber security risk​
  • Financial risk​
  • Competition risk​
  • Third-party risk​
  • Catastrophic risk​
  • Legal and compliance risk​
  • Reputational risk.


What are the safety issues with Zoom?

If you are using Zoom to hold confidential meetings, then the possibility of being “zoom-bombed” with strange content should be the least of your worries. Instead, you should be cautious of latent security holes that hackers can use to eavesdrop on the meeting and steal important data. These flaws can be found in almost any computer system.

Who uses Zoom for Government?

It is only available to the federal government of the United States, state and municipal governments, and contractors that have been pre-approved.

Does Zoom Government have a time limit?

Meeting ends after 30 hours
*Note that even though the meeting is begun without the host being present, it is still bound by the time limit that the host has set, which in this case is thirty hours.