

Loom
Based exclusively on public evidence • 20 criteria (Privacy + AI)
Last review: 13 Feb 2026
AI Trust Summary
Safer Alternatives
Higher-rated software in the same category
Attention Points in AI (3)
AI criteria that require attention. Buy the Premium Analysis to see all 3 criteria.
AI data retention (prompts and responses) is not disclosed
AI training opt-out option not available
Ethical AI principles and anti-bias measures not documented
Source: vendor public documents
Compliances in AI (3)
AI criteria the company meets. Buy the Premium Analysis to see all 3 criteria.
Policy on data use for AI training clearly stated
Use of artificial intelligence clearly disclosed in policies
AI features clearly identified with their purposes
Source: vendor public documents
Highlights in Privacy (3)
Most relevant criteria for this category. Buy the Premium Analysis to see all 3 criteria.
Data controller identity and contact clearly disclosed
Data controller and processor roles clearly defined
Privacy contact channel available
Source: vendor public documents
Conformance analysis (20)
AI data retention (prompts and responses) is not disclosed
Reference: ISO/IEC 42001 (8.2) + ISO/IEC 27701 (7.4.6)
Policy on data use for AI training clearly stated
Reference: ISO/IEC 42001 (8.2) + ISO/IEC 23894 + EU AI Act
AI training opt-out option not available
Reference: ISO/IEC 42001 (8.3) + ISO/IEC 29100 + EU AI Act
Source: vendor public documents
Follow this company and access all 20 criteria
Track score changes, get alerts on policy updates, and view the full conformance analysis
Don't miss any update
Sign up to follow this company and track changes in privacy and AI scores
Why trust the AITS Index: Open Community Audit
Public transparency, peer review and open evidence trails — all verifiable by the community
Trust guarantees
Peer review
users, professionals and experts confirm or contest items online.
Public history
vendor and index changes are versioned and accessible.
Participate
Evidence, confirmations and contestations
participate in the collaborative validation of AITS criteria
Loom Communication and Collaboration: Privacy and AI Governance Insights
Transparency in Data Control
Loom excels in providing clear information regarding the identity and contact details of the data controller. This transparency is crucial for users who want to understand who is responsible for their data and how it is managed. With a solid score in this area, users can feel more secure knowing that they have a point of contact for any privacy-related inquiries. This is particularly important under regulations like GDPR and LGPD, which emphasize the need for clear accountability in data processing practices.
Defined Data Processing Agreement (DPA)
Another strength of Loom is the availability of a Data Processing Agreement (DPA) for enterprise clients. This document outlines the terms under which user data is processed, ensuring compliance with privacy laws. For organizations, having a DPA in place is essential for mitigating risks associated with data breaches and ensuring that their data handling practices align with legal requirements. Users should ensure they review this agreement to understand their rights and obligations regarding data management.
Unclear Video Retention Policies
Despite its strengths, Loom has notable weaknesses, particularly concerning the retention of recorded videos. The lack of defined retention periods raises concerns about how long user data is stored and when it might be deleted. This uncertainty can lead to potential privacy risks, especially for users who are conscious of data minimization principles outlined in GDPR. Users should regularly audit their stored videos and delete any that are no longer needed to mitigate risks associated with prolonged data retention.
Absence of AI Training Opt-Out Options
Another significant weakness is the absence of an option to prevent the use of recorded videos for AI training. This could lead to concerns about how user interactions are utilized to improve AI algorithms, potentially resulting in biases or discrimination. Users should be aware of this risk and consider limiting the sharing of sensitive information during their Loom sessions. It's advisable to reach out to Loom's support to inquire about future plans for implementing such an option.
Lack of Ethical AI Principles Documentation
Loom's failure to document its ethical AI principles is another area of concern. Without clear guidelines on how AI is used, users may worry about potential biases in AI-driven features. This lack of transparency can undermine trust, especially for organizations that prioritize ethical considerations in their operations. Users should stay informed about Loom’s developments in this area and advocate for clearer documentation to ensure their rights are protected under regulations like ISO 27701.
Practical Steps for Users
To enhance their privacy and security while using Loom, users should take proactive steps. First, regularly review the settings related to data retention and adjust them according to their privacy preferences. Users should also be vigilant about the type of content shared during recordings, avoiding sensitive information when possible. Lastly, consider reaching out to Loom for clarification on their AI practices and express the need for more robust privacy features. By staying informed and engaged, users can better navigate the complexities of Loom’s privacy landscape.
Other Communication and Collaboration software
Dive into in-depth research and analysis of each player
Source: vendor public documents
Analyzed Sources
Public documents used in the audit of Loom:
Evidence, confirmations and contestations
participate in the collaborative validation of AITS criteria
Scope & Limitations
TrustThis/AITS assessments are based exclusively on publicly available information, duly cited with date and URL, following the AITS methodology (privacy & AI transparency).
The content is indicative in nature, intended for screening and comparison, not replacing internal audits.
TrustThis/AITS does not perform invasive tests, does not access vendor technology environments and does not process customer personal data. Conclusions reflect only the vendor's public communication at the date of collection.
Source: vendor public documents






