Security and data protection

Data Privacy and Security

Find out how we put your privacy first. Find out more about our approach to data management in this section.

PDF Wizard Privacy Policy

We want to be transparent about how we process your data. In this brief overview, we provide you with the key information about our approach. For more details, see the full Privacy Policy.

In our commitment to ensuring your privacy, we adhere to the following principles:

  • Data Collection: We only collect the information necessary to provide our services.
  • Data Security: Your data is securely stored and protected.
  • Data Sharing: We do not sell your data to third parties.
  • Cookies: We use cookies to improve your experience. Learn more in the full policy.
  • Your Rights: You have the right to control your data and its use.

Security Policy Overview

text

Evaluation and Improvements in Progress

text

Certifications and compliance

Security, confidentiality and trust as a priority: our compliance with standards and regulations

PDF Wizard is proud to be ISO/IEC 27001:2017 certified, recently renewed in March 2023. This certification ensures rigorous compliance with global information security standards. Access our ISO 27001 certificate.

As a European-based company, PDF Wizard is fully GDPR compliant and ensures absolute respect for data protection. We diligently safeguard your rights, including access, rectification, and deletion of personal data.

We integrate services provided by Qualified Trust Service Providers (QTSPs) under eIDAS, which allows us to offer electronic signatures and seals that meet the highest standards of security and authenticity. This guarantees the legal validity and integrity of your signed documents.

Product Safety

Find details on how we secure and protect user data and document processing.

Infrastructure du Cloud
PDF Wizard leverages strong cloud infrastructure partnerships for a secure and adaptable environment, ensuring resilience to effectively meet user demands.
Network Communications
We rely on a global content delivery service and DDoS protection, ensuring fast access worldwide and robust security against online threats.
Storage space
PDF Wizard's cloud infrastructure is backed by a leading data storage provider. It's important to note that PDF Wizard does not store user documents.
Data encryption

Data encryption is a fundamental pillar of our product security. We implement strong encryption protocols, including the use of Hypertext Transfer Protocol Secure (HTTPS), to protect your data, both in transit and at rest. This rigorous encryption ensures the confidentiality and integrity of your data, giving you peace of mind when using our services.

In addition, we use end-to-end encryption to ensure the highest level of security for your data from the moment you upload it until it is processed and returned to you.

Data retention and deletion

text

User Protection

text

Payment Information (Powered by Stripe)

text

Product Safety

Discover the comprehensive measures and protocols implemented to secure PDF Wizard's internal operations and data.

Centralized account management
We use a centralized account management system, which streamlines the control and monitoring of user accounts to enhance security.
Controlled physical access
The implementation of security measures such as alarms, fingerprint authentication, fire protection and anti-theft measures to ensure strict control of physical access to our facilities.
Password Management System
We've collected tax forms, insurance forms, and more in one place to help you easily find and edit them.
Employee Onboarding and Offboarding Process
Our onboarding and offboarding procedures include a checklist that prioritizes security best practices, ensuring employee access complies with our security standards.
Two-factor authentication (2FA)
We implement two-factor authentication (2FA) for all nominal accounts, which adds an extra layer of protection to your user accounts, improving security and further protecting your data and credentials.
Principle of Least Privilege
Access privileges are meticulously managed, adhering to the principle of least privilege. This means that users are only granted the minimum level of access required to perform their tasks, minimizing potential security risks.