All Zoom meetings and webinars are encrypted by default, but for meetings you can enable more secure end-to-end encryption (E2EE) for added protection.
E2EE is ideal when you want enhanced privacy and data protection for your meetings, and is an extra layer to mitigate risk and protect sensitive meeting content. While E2EE provides added security, some Zoom functionality is limited. Individual Zoom users should determine whether they need these features before enabling E2EE in their meetings.
Caution: E2EE does not eliminate human vigilance: avoid sharing sensitive data if local recording or screenshots are allowed.
- Allow use of end-to-end encryption enabled in the Zoom web portal.
- Zoom desktop app for Windows, macOS, or Linux: Global minimum version or higher.
- Zoom mobile app for Android or iOS: Global minimum version or higher.
- Zoom Rooms for Conference Room: Global minimum version or higher.
Log in to the EPFL Zoom web portal.
- Go to Settings → Meeting → Security.
- Enable Allow use of end-to-end encryption.
- Choose the Default Encryption Type:
- Enhanced Encryption → standard AES 256 GCM encryption, compatible with all features (encryption key stored in the cloud).
- End-to-end Encryption → strong encryption but with restrictions (encryption key stored on your local device. No one else can obtain your encryption key, not even Zoom).
Note: Due to E2EE restrictions, it is recommended to use Enhanced Encryption as the default encryption type and reserve end-to-end encryption for meetings that require additional protection.
In addition to identifying the shield icon
that appears in the meeting window, the meeting host should also read the security code aloud and the meeting participants can verify that their codes match. Participants will see the security code that they can use to verify the secure connection.
- On a supported Zoom app or device, start an end-to-end encrypted meeting as the host.
- Click or tap the shield icon at the top of the meeting window.
Meeting information will be displayed. - If end-to-end encryption is enabled, click or tap the Verify link to view the security codes.
- Read the security codes to all of the meeting participants. Participants should verify that their codes match.
Note: If you are using breakout rooms in the meeting, each breakout room will have its own unique meeting encryption key.
- Enabling E2EE will disable the following in-meeting features:
- AI Companion features
- Cloud recording
- Continuous meeting chat
- Live streaming
- Live transcription
- Polling and Surveys
- Zoom Apps
- Zoom Notes
- Zoom Whiteboard
- The Zoom Web App and third-party clients leveraging the Zoom Web SDK are not currently supported.
- Users will not be able to join by telephone or SIP/H.323 devices as these endpoints cannot be encrypted end-to-end. Calling out to SIP/H.323 devices from Zoom Rooms will also be disabled.
- E2EE meetings are limited to 1000 meeting participants.
- Inform participants that the meeting is protected by E2EE.
- Ensure everyone is using an updated Zoom client.
- Test before a sensitive meeting to avoid technical issues (participants blocked, missing features).
E2EE is a strong security guarantee: Zoom cannot access the content of the exchanges.
However:
- Metadata (such as time, duration, IP addresses) are not E2EE encrypted.
- Risks related to human use (screenshots, local recordings) remain possible.
For highly confidential meetings:
- Always enable E2EE.
- Limit the number of participants.
- Prohibit recording (even local recording) if necessary.
This meeting will be protected by Zoom’s end-to-end encryption (E2EE). Only participants connected via the Zoom client (desktop/mobile) will be able to access it. Some features (cloud recording, closed captions, streaming) will not be available.
Zoom webinars do not support E2EE encryption. This is because webinars often involve advanced features (streaming, Q&A, polling, integrations) that are not yet compatible with E2EE.
Webinars use AES GCM encryption in transit, which protects audio/video streams from interception. However, the encryption keys for each webinar are generated and managed by Zoom’s servers.
Please visit the “Using end-to-end encryption (E2EE) in Zoom meetings” page on the Zoom website.