- Trust Centerhttps://zoominfo.trust.page
Please refer to this page to learn about California Resident Rights
- EU-US Privacy Shield
While ZoomInfo continues to be certified by and adhere to the principles of the Privacy Shield Frameworks, in light of the Court of Justice of the European Union decision regarding the legal effect of the EU-US Privacy Shield Framework, ZoomInfo does not rely upon the Frameworks to ensure the lawful transfer of data from EEA to non-EEA countries.ZoomInfo complies with the EU-US Privacy Shield Framework and Swiss-U.S. Privacy Shield Framework as set forth by the US Department of Commerce regarding the collection, use, and retention of personal information transferred from the European Union and Switzerland to the United States. ZoomInfo has certified to the Department of Commerce that it adheres to the Privacy Shield Principles.
9 more topics
- Product Security
- Audit Logs
Audit logs may include changes to accounts, groups, or roles, login and authentication events, terminal activity, power management events, file changes, failed syscalls, changes in configuration, and processes.
8 more topics
- Data Security
- Data Encrypted At-Rest
Customer data is encrypted with AES 256 at rest.
- Data Encrypted In-Transit
Customer data is encrypted with TLS 1.2 in transit.
1 more topic
- Data Retention Policy
ZoomInfo has a data retention policy governing the storage of information. Customers can request deletion of their information at any time.
3 more topics
- Incident Management & Response
- Data Breach Notification
- Incident Response Plan (IRP)
- Availability & Reliability
- Auto Scaling
The infrastructure is auto-scaling to maintain high availability through our infrastructure. The application is designed to support any large number of concurrent users. Clients with 1000's of users have the same blazing fast response as a sole proprietor does.
We use target points of monitoring and alerting to enable us to manage our service effectively. By being in the cloud, we have automated certain events that can add resources as needed based on defined thresholds.
- Data Redundancy
Data is regularly backed up to the cloud.
5 more topics
- Organizational Security
- Confidentiality Agreements
- Employee Background Checks
In the US, ZoomInfo uses a third party background screening service for employee background checks.
7 more topics
- Business Continuity
- Business Continuity Plan
ZoomInfo executes relevant business continuity planning to ensure that services can be provided in accordance with any service level agreements.
- Disaster Recovery Plan
ZoomInfo maintains a disaster recovery plan that outlines its response to unplanned disruptions, and executes relevant business continuity planning to ensure that services can be provided in accordance with any service level agreements.
2 more topics
- Multi-Tenant Architecture
ZoomInfo uses a series of multi-tenant systems that logically separate client data based on unique identifiers for users and client companies. The applications allow user access only to data that is labeled with their corresponding identifiers.
- ISO 27001 - Data Center
4 more topics
- Threat Management
- Penetration Testing
Penetration tests are conducted on an annual basis by a third party.
3 more topics
Sign up to view ZoomInfo's Subprocessors
Sign up to see the rest of ZoomInfo's posture and unlock unlimited access.
Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.