We are excited to announce Trustpage has been acquired by Vanta!

Read the press release →
Company logo

ZoomInfo

We combine the leading business contact database with best-in-class tech to pinpoint your customers & deliver the intelligence you need to hit your number.
  • Website
    https://www.zoominfo.com
  • Trust Center
    https://zoominfo.trust.page

  • Compliance

    • CCPA

      Our Privacy Statement for California Residents supplements the information contained in the ZoomInfo Privacy Policy. ZoomInfo has adopted this statement to comply with the California Consumer Privacy Act of 2018 (the “CCPA”) and other California privacy laws, and it applies solely to “consumers” as that term is defined in the CCPA.

      Please refer to this page to learn about California Resident Rights

    • EU-US Privacy Shield

      While ZoomInfo continues to be certified by and adhere to the principles of the Privacy Shield Frameworks, in light of the Court of Justice of the European Union decision regarding the legal effect of the EU-US Privacy Shield Framework, ZoomInfo does not rely upon the Frameworks to ensure the lawful transfer of data from EEA to non-EEA countries.ZoomInfo complies with the EU-US Privacy Shield Framework and Swiss-U.S. Privacy Shield Framework as set forth by the US Department of Commerce regarding the collection, use, and retention of personal information transferred from the European Union and Switzerland to the United States. ZoomInfo has certified to the Department of Commerce that it adheres to the Privacy Shield Principles.

      To view our certification page, please visit this page

    • 9 more topics

  • Product Security

    • Audit Logs

      Audit logs may include changes to accounts, groups, or roles, login and authentication events, terminal activity, power management events, file changes, failed syscalls, changes in configuration, and processes.

    • Multi-Factor Authentication

      Currently supports: SMS Text and smartphone app (Android and IOS)

    • 8 more topics

  • Data Security

    • Data Encrypted At-Rest

      Customer data is encrypted with AES 256 at rest.

    • Data Encrypted In-Transit

      Customer data is encrypted with TLS 1.2 in transit.

    • 1 more topic

  • Privacy

    • Privacy Policy
    • Data Retention Policy

      ZoomInfo has a data retention policy governing the storage of information. Customers can request deletion of their information at any time.

    • 3 more topics

  • Incident Management & Response

    • Data Breach Notification
    • Incident Response Plan (IRP)
  • Availability & Reliability

    • Auto Scaling

      The infrastructure is auto-scaling to maintain high availability through our infrastructure. The application is designed to support any large number of concurrent users. Clients with 1000's of users have the same blazing fast response as a sole proprietor does.

      We use target points of monitoring and alerting to enable us to manage our service effectively. By being in the cloud, we have automated certain events that can add resources as needed based on defined thresholds.

    • Data Redundancy

      Data is regularly backed up to the cloud.

    • 5 more topics

  • Organizational Security

    • Confidentiality Agreements
    • Employee Background Checks

      In the US, ZoomInfo uses a third party background screening service for employee background checks.

    • 7 more topics

  • Business Continuity

    • Business Continuity Plan

      ZoomInfo executes relevant business continuity planning to ensure that services can be provided in accordance with any service level agreements.

    • Disaster Recovery Plan

      ZoomInfo maintains a disaster recovery plan that outlines its response to unplanned disruptions, and executes relevant business continuity planning to ensure that services can be provided in accordance with any service level agreements.

    • 2 more topics

  • Infrastructure

    • Multi-Tenant Architecture

      ZoomInfo uses a series of multi-tenant systems that logically separate client data based on unique identifiers for users and client companies. The applications allow user access only to data that is labeled with their corresponding identifiers.

    • ISO 27001 - Data Center
    • 4 more topics

  • Threat Management

    • Bug Bounty
    • Penetration Testing

      Penetration tests are conducted on an annual basis by a third party.

    • 3 more topics

  • Subprocessors

    • Sign up to view ZoomInfo's Subprocessors

Sign up to see the rest of ZoomInfo's posture and unlock unlimited access.

Unlimited access to the directory allows you to review and compare thousands of security postures sourced from around the web.

Sign Up
About
Join the community:
Copyright © 2023 Trustpage. All rights reserved.
Logos provided in part by Clearbit.