🎉 Special Offer: Get 50% off Premium Annual Plan! Limited time only. Claim Offer →
🔒 Enterprise-Grade Security

Security and Data Protection

This page outlines our comprehensive measures and protocols designed to ensure the confidentiality, integrity, and safety of your files. Learn about the robust security practices we employ to protect your data.

Data Privacy and Security

We want to be transparent about how we handle your data. In our commitment to ensuring your privacy, we adhere to the following principles:

Data Collection

We collect only the information necessary for providing our services.

Data Security

Your data is securely stored and protected with encryption.

Data Sharing

We do not sell your data to third parties.

Cookies

We use cookies to enhance your experience.

Your Rights

You have the right to control your data and its usage.

Security Policy Overview

Our Security Policy focuses on preventing, detecting, and responding to security incidents to safeguard confidential data and ensure uninterrupted service. It applies to all individuals interacting with PDF Work services.

Key Responsibilities

  • Resource allocation by executive management
  • Policy oversight by the Security Committee
  • Adherence to security measures by all employees
  • Reporting incidents by employees and authorized users

Key Security Measures

  • Access Control - Strict authentication and authorization protocols
  • Security Training - Regular employee security awareness training
  • System Updates - Continuous patching and vulnerability management
  • Risk Mitigation - Proactive threat detection and response
  • Data Encryption - End-to-end encryption for all files
  • Security Audits - Regular third-party security assessments

Ongoing Evaluation and Improvement

We manage and protect information security with a Continuous Improvement Plan. We regularly review our policies to ensure their effectiveness and relevance in a changing landscape. Additionally, we actively seek opportunities for improvement in our information security processes. This commitment allows us to stay ahead of emerging threats and continuously enhance our safeguards for user data.

Certifications and Compliance

Security, privacy, and trust in focus: Our adherence to standards and regulations.

ISO/IEC 27001:2017 Certified

PDF Work proudly holds ISO/IEC 27001:2017 certification, assuring rigorous adherence to global information security standards.

GDPR Compliant

As a company committed to data privacy, we are fully GDPR compliant, ensuring utmost respect for your data privacy rights including access, rectification, and erasure.

eIDAS Compliant Signatures

We integrate services from Qualified Trust Service Providers (QTSP) under eIDAS, offering electronic signatures that adhere to the highest standards of security and legal validity.

Product Security

Cloud Infrastructure

PDF Work utilizes robust cloud infrastructure partnerships for a secure and adaptable environment, ensuring resilience to meet user demands effectively.

Network Communications

We rely on a global content delivery and DDoS protection service, guaranteeing rapid access worldwide and robust security against online threats.

Storage

PDF Work's cloud infrastructure is bolstered by leading data storage providers. It's important to emphasize that PDF Work does not retain user documents beyond the processing window.

Data Encryption

Data encryption is a fundamental pillar of our product security. We implement robust encryption protocols, including the use of HTTPS protocol, to protect your data, both in transit and at rest. This stringent encryption guarantees the confidentiality and integrity of your data, offering peace of mind when using our services.

Additionally, we employ end-to-end encryption to ensure the highest level of security for your data from the moment you upload it until it's processed and delivered back to you.

256-bit SSL/TLS Encryption End-to-End Protection

Data Retention and Removal

Respecting your privacy and adhering to applicable regulations are core principles of our data retention and removal policies.

2 Hours - All files automatically deleted within 2 hours of processing
Manual Deletion - You can manually delete files from the download screen
Signed Documents - Retained for up to 5 years in compliance with legal requirements

User Protection

At PDF Work, we prioritize user protection. As part of our commitment to enhancing security, we offer Two-Factor Authentication (2FA). With 2FA, your account is fortified with an additional layer of security, ensuring that only authorized users can access it. Your data remains protected, and your user experience is more secure than ever.

Payment Information (Powered by Stripe)

For seamless and secure transactions, PDF Work is powered by Stripe, a renowned and trusted payment gateway. Stripe offers top-tier security for your payment information and is certified as a PCI Level 1 Service Provider.

We do not collect or store any payment information on our servers. All payment data is handled directly by Stripe's secure infrastructure.

Internal Security Measures

Centralized Account Management

Streamlined control and oversight of user accounts to enhance security.

Password Management

Robust password management system with 90-day rotation requirements.

Controlled Physical Access

Alarms, biometric authentication, fire protection, and anti-robbery safeguards.

Employee Security Training

Security best practices integrated into onboarding and ongoing training.

Principle of Least Privilege

Users granted only minimum access required to perform their tasks.

Continuous Improvement

Regular policy reviews and security enhancements.

PDF Work Information Security Policy

At PDF Work, we strengthen data security with ISO/IEC 27001 standards. Our system ensures confidentiality, integrity, and availability, backed by ongoing improvement and resource allocation for compliance.

PDF Work is formed of a team of experienced professionals in the Information Technology sector, whose mission is to develop products that facilitate the conversion, editing, and management of files.

Basic principles of our Information Security Policy:

  • Commitment to continuous improvement in information security performance
  • Ensure optimal security of all information, systems, and communications, guaranteeing confidentiality, integrity, and availability
  • Management commitment to promoting and leading security levels in alignment with security objectives
  • Integration of information security management into organizational processes
  • Ensuring availability of necessary resources for the information security management system
  • Commitment to compliance with applicable legal, regulatory, and contractual requirements

Report a Security Concern

If you discover a security vulnerability or have concerns about your data security, please contact us immediately.