Security and data protection
This page is dedicated to outlining our comprehensive measures and protocols designed to ensure the confidentiality, integrity, and safety of your files. Learn about the robust security practices we employ to protect your data.
Data Privacy and Security
Discover how we prioritize your privacy. Explore the summary of our approach to data handling in this section
iLovePDF's Privacy Policy
We want to be transparent about how we handle your data. In this brief overview, we'll provide key insights into our approach. For more details, check the complete Privacy Policy.
In our commitment to ensuring your privacy, we adhere to the following principles:
- Data Collection: We collect only the information necessary for providing our services.
- Data Security: Your data is securely stored and protected.
- Data Sharing: We do not sell your data to third parties.
- Cookies: We use cookies to enhance your experience. Learn more in the full policy.
- Your Rights: You have the right to control your data and its usage.
Security Policy Overview
The iLovePDF Security Policy focuses on preventing, detecting, and responding to security incidents to safeguard confidential data and ensure uninterrupted service. It applies to all individuals interacting with iLovePDF services. For more details, see the complete Security Policy Overview.
Key Responsibilities
Responsibilities include resource allocation by executive management, policy oversight by the Security Committee, adherence to security measures, and reporting incidents by employees and authorized users.
Key Security Measures
Critical security measures encompass access control, security training, regular system updates, and essential risk mitigation strategies. Additionally, iLovePDF emphasizes data encryption, security audits, and a robust Continuous Improvement Plan to maintain information security and resilience.
Ongoing Evaluation and Improvement
We manage and protect information security with a Continuous Improvement Plan. We regularly review our policies to ensure their effectiveness and relevance in a changing landscape. Additionally, we actively seek opportunities for improvement in our information security processes. This commitment allows us to stay ahead of emerging threats and continuously enhance our safeguards for user data.
Certifications and compliance
Security, privacy, and trust in focus: Our adherence to standards and regulations
Product Security
Find details on how we secure and protect user data and document processing
Data Encryption
Data encryption is a fundamental pillar of our product security. We implement robust encryption protocols, including the use of the HTTPS (Hypertext Transfer Protocol Secure) protocol, to protect your data, both in transit and at rest. This stringent encryption guarantees the confidentiality and integrity of your data, offering peace of mind when using our services.
Additionally, we employ end-to-end encryption to ensure the highest level of security for your data from the moment you upload it until it's processed and delivered back to you.
Data Retention and Removal
Respecting your privacy and adhering to applicable regulations are core principles of our data retention and removal policies. At iLovePDF, all files processed within our platform are automatically and permanently deleted within two hours of being processed. We also provide users with the option to manually delete files from the download screen, giving you even more control over your data's lifecycle. For transparency, it's important to note that we retain signed documents for a maximum of 5 years in compliance with legal requirements.
User Protection
At iLovePDF, we prioritize user protection. As part of our commitment to enhancing security, we offer Two-Factor Authentication (2FA). With 2FA, your account is fortified with an additional layer of security, ensuring that only authorized users can access it. Your data remains protected, and your user experience is more secure than ever.
Payment Information (Powered by Stripe)
For seamless and secure transactions, iLovePDF is powered by Stripe, a renowned and trusted payment gateway. Stripe offers top-tier security for your payment information and is certified as a PCI Level 1 Service Provider.
We do not collect any payment information and are therefore not subject to PCI obligations.
Internal Security
Discover the comprehensive measures and protocols implemented to secure iLovePDF's internal operations and data
iLovePDF is formed of a team of experienced professionals in the Information Technology sector, whose mission is to develop products that facilitate the conversion, editing, and management of files.
iLovePDF possesses the necessary resources, including skilled personnel, suitable IT tools, and efficient work methodologies, to achieve its objectives in managing information security systems and personal data effectively.
Under the above premises, we declare the basic principles of our Information Security Policy:
- Commitment to continuous improvement in information security performance.
- Ensure optimal security of all information, systems, and communications managed by iLovePDF, guaranteeing confidentiality, integrity, and availability.
- Management is committed to promoting and leading security levels in alignment with the information security policy and approved objectives. This includes considering relevant external and internal issues as crucial components of an information security management system, with the goal of protecting the organization's assets.
- The information security management system is part of and integrated into the organization's processes, taking this into account during the design of processes, information systems, and controls.
- iLovePDF ensures the availability of the necessary resources for the information security management system.
- Commitment to compliance with applicable legal, regulatory, contractual, and other requirements regarding information security.
iLovePDF's Information Security Policy is a key part of its corporate culture, actively integrated into operations and widely communicated. The company ensures all personnel understand and acknowledge their responsibilities in upholding the policy, making information security a shared company-wide priority.
Marco Grossi
June 19th, 2025
Barcelona