TL;DR: Zscalerโ€™s CEO boasted about training AI models on โ€œhalf a trillion daily transactionsโ€ from customer logs, triggering GDPR concerns. Despite corporate damage control, fundamental questions remain about data processing transparency, legal bases, and whether cybersecurity vendors can transform from processors to controllers without explicit consent.

The Spark That Lit the Fire

In August 2025, cybersecurity giant Zscaler found itself at the center of a data protection storm. CEO Jay Chaudhry made references this week to โ€œtrillionsโ€ of Zscalerโ€™s transaction-level logs being used to train its AI models. Those remarks were shared online, leading to some consternation regarding the potential impact on the firmโ€™s zero-trust promise.

The controversy began when privacy advocates noticed statements from Zscalerโ€™s earnings calls where leadership claimed they leverage their massive data pipelineโ€”โ€œover 500 billion transactions per day and hundreds of trillions of signals every dayโ€โ€”for AI model training. For a company whose entire value proposition rests on โ€œZero Trustโ€ principles, this raised uncomfortable questions about what exactly was being trusted.

Zscalerโ€™s Commitment to Responsible AI

The GDPR Challenge

The situation escalated when a privacy-conscious individual filed a formal GDPR Article 15 data subject access request, demanding transparency about how Zscaler processes personal data for AI training purposes. The request, reproduced in the images above, was methodical and legally precise, asking for:

  • Categories of personal data processed for AI training- Legal basis under GDPR Article 6- Recipients and retention periods- Automated decision-making information- Copies of personal data undergoing such processing

The individualโ€™s follow-up request cut to the heart of the matter: โ€œFor avoidance of doubt, under GDPR Zscaler cannot discharge its obligations by referring me to my employer if Zscaler itself processes data as a controller for AI development or related purposes.โ€

Zscaler Data Processing Agreement

Zscalerโ€™s Defensive Response

In a response from Zscaler CISO Sam Curry, the company stressed its commitment to responsible AI. โ€œZscaler does not use customer data to train its AI models,โ€ Curry wrote. โ€œEach customer owns their proprietary information or personal data โ€ฆ in the Zscaler logs. We only use data or metadata that does not contain customer or personal data for AI model training.โ€

But this response immediately raised more questions than it answered. The companyโ€™s blog post explained: โ€œThink of it like water flowing through pipes: while the content of the water belongs entirely to each customer, the knowledge of how the water movesโ€”its pressure, velocity, and patternsโ€”can inform the system without ever extracting the water itself.โ€

The metaphor, while poetic, sidesteps crucial technical and legal details about what constitutes โ€œmetadataโ€ and whether it truly contains no personal data.

Zscaler (ZS) Q4 2024 Earnings Call Transcript | The Motley Fool

The Technical Reality Gap

Hereโ€™s where Zscalerโ€™s explanations become problematic from a GDPR perspective. Independent reporting interpreted the CEOโ€™s remarks as saying Zscaler leverages transactional logs โ€” including structured and unstructured elements and full URLs โ€” as training material for internal AI models.

Full URLs are inherently personal data under GDPR when they can identify or relate to individuals. Consider these examples:

  • https://linkedin.com/in/john-smith-12345- https://company.com/employee-portal?user=jane.doe- https://medical-site.com/patient-dashboard?id=patient123

If Zscalerโ€™s AI models are trained on such URLsโ€”even in aggregated formโ€”theyโ€™re processing personal data. The companyโ€™s claim that they only use โ€œmetadata that does not contain customer or personal dataโ€ becomes legally questionable when that metadata includes potentially identifying information.

Zero Trust Maturity Evaluator | Free Assessment Tool for CISOs

The Controller vs. Processor Problem

This controversy illuminates a fundamental shift in cloud security relationships. When Zscaler acts as a security service processor for its customers, it operates under strict contractual limitations. But the EDPBโ€™s view is that when looking at whether the controller conducted an appropriate assessment, supervisory authorities should consider โ€œwhether the controller has assessed some non-exhaustive criteria, such as the source of the data and whether the AI model is the result of an infringement of the GDPRโ€.

The key legal question: If Zscaler repurposes customer log data for its own AI development, does it transform from a processor to a controller for that processing? If so, it needs:

  1. A separate legal basis under GDPR Article 62. Transparent privacy notices about AI training3. Data subject rights mechanisms for the AI processing4. Legitimate interest assessments if relying on Article 6(1)(f)

Zscalerโ€™s Data Processing Agreement (DPA) reportedly lacks provisions for AI model training, suggesting this processing wasnโ€™t contemplated in the original customer agreements.

AI RMF to ISO 42001 Crosswalk Tool

The Broader Industry Implications

Zscaler isnโ€™t unique. Security researchers and frustrated administrators reacted because the phrasing used in earnings calls and media reports โ€” mention of โ€œproprietary logs,โ€ โ€œfull URLs,โ€ and โ€œcomplete logsโ€ โ€” reads to many like an admission of training on high-fidelity customer records.

This reflects a broader trend where cybersecurity vendors are pivoting to AI-powered services, often leveraging the massive data flows they already process. The regulatory landscape is struggling to keep pace:

  • The EDPB has also emphasised that safeguards can assist in meeting the balancing test for legitimate interest processing- The CNIL affirms that training AI models on personal data sourced from public content can be lawful under the GDPRโ€™s legitimate interest basis, provided certain conditions are met- The EDPB Opinion also emphasised the need for controllers deploying the models to carry out an appropriate assessment on whether the model was developed lawfully

The Geopolitical AI Brain Trust: When Foreign Investment Meets National Security in Cybersecurityโ€™s New World Order

The Transparency Deficit

What makes this case particularly concerning is the apparent lack of proactive transparency. Customers and data subjects werenโ€™t informed about AI training uses until after public controversy erupted. Article 13 GDPR requires that data subjects be informed of their rights, including the right to object (which applies where processing is based on legitimate interests). In some cases, to satisfy the fairness principle, it may be appropriate to provide a specific notification to data subjects and give them the opportunity to object before processing is carried out.

What This Means for Organizations

For companies using Zscaler and similar services:

Immediate Actions:

  • Review your vendor contracts for AI training clauses- Understand whether vendors are processing your data as controllers for AI purposes- Assess your own GDPR obligations for vendor data processing

Strategic Considerations:

  • Explicit model-training clauses: Prohibit any use of customer-identifiable data for third-party model training unless explicitly consented to in writing- Implement vendor auditing procedures for AI development activities- Consider data residency and sovereignty implications

GDPR & ISO 27001 Compliance Assessment Tool

The Road Ahead

While the CNILโ€™s guidance provides welcome clarity on how legitimate interest can support GDPR compliance during AI training, it does not attempt to resolve adjacent legal or strategic questions. The Zscaler controversy highlights the urgent need for:

  1. Clearer regulatory guidance on processor-to-controller transitions in AI contexts2. Industry standards for transparency in AI training by service providers3. Better contractual frameworks that anticipate AI development uses4. Technical solutions for privacy-preserving AI training

Conclusion

The Zscaler case represents more than a single companyโ€™s misstepโ€”itโ€™s a preview of the regulatory challenges facing the entire cybersecurity industry as AI becomes central to service delivery. Zero trust underpins the Zscaler USP, with the Z in its company name standing for zero. But when it comes to AI training transparency, the industry may need to rebuild that trust from the ground up.

The All-Seeing AI: How Cybersecurity Companiesโ€™ AI Systems Access Your Most Sensitive Data

The controversy also demonstrates the power of individual GDPR rights. A single, well-crafted data subject access request exposed gaps that could affect millions of users worldwide. As AI deployment accelerates, such scrutiny will likely intensify.

Organizations should prepare now: audit your vendor relationships, understand the data flows, and ensure your AI-powered security tools donโ€™t become compliance liabilities. In the age of AI-driven cybersecurity, trust must be not just zeroโ€”it must be earned through transparency, legal compliance, and respect for fundamental privacy rights.


This analysis is based on publicly available information and should not be considered legal advice. Organizations should consult qualified data protection counsel for specific compliance guidance.