Zoom OAuth & Data Usage

Last Updated: January 2026

This page explains why our Zoom application requests certain permissions ("OAuth scopes") and how Zoom data is used when you enable the Service.

Overview

Our Zoom application provides AI-generated live captions, real-time translation, and post-meeting summaries for Zoom meetings. To deliver these features securely and responsibly, the application requires limited access to specific Zoom data during active meetings.

We follow a least-privilege approach and request only the permissions necessary to operate.

OAuth Authentication

The Service uses Zoom's OAuth 2.0 authentication system.

  • Users authorize access explicitly during installation
  • Access tokens are issued by Zoom and stored securely
  • Tokens are revoked immediately when the app is uninstalled

The Service does not access Zoom data without user authorization.

Zoom Permissions We Request and Why

Meeting Audio Access

Purpose: Live meeting audio is processed in real time to generate live captions and real-time translations.

Important:
  • Audio is not recorded
  • Audio is not stored
  • Audio is processed only during active meetings

Meeting Metadata

Purpose: Limited meeting metadata (such as meeting ID, timestamps, and language settings) is used to associate captions, translations, and summaries with the correct meeting session.

Participant Information

Purpose: Participant display names may be accessed to improve caption clarity and to support host controls.

How Zoom Data Is Used

Zoom data is used only to:

  • Generate live captions during meetings
  • Provide real-time translations
  • Create AI-generated summaries and recaps after meetings

Zoom data is never used for advertising, profiling, or analytics unrelated to the Service.

Data We Do Not Access

We do not:

  • Record or store meeting audio
  • Access or store meeting video
  • Monitor meetings outside of active sessions
  • Retain Zoom data long-term
Security Measures

We protect Zoom data using industry-standard security practices:

Encryption of data in transit (TLS)
Secure storage of OAuth tokens
Strict access controls and monitoring
Immediate token revocation upon uninstall

If you have questions about OAuth permissions or data usage, contact us at:

support@bignetai.com