Privacy Best Practices
Protect privacy while using PDF Ghost
Understanding and following privacy best practices helps protect both your organization and your recipients.
Data Collection
What Data PDF Ghost Collects
User Account Data
- Email address (for authentication)
- Name (for display purposes)
- Password (encrypted)
- Profile picture (optional)
Organization Data
- Organization name
- Team member list
- Billing information
- Usage statistics
Job Data
- Original PDF files
- Recipient information (emails or names)
- Fingerprinting options
- Generated artifacts
Usage Data
- Login activity
- Job creation and downloads
- Feature usage
- Error logs
- Basic cookieless telemetry is always on; cookie consent controls sensitive analytics enrichment only.
What PDF Ghost Doesn't Collect
- Content of your documents is not analyzed
- Recipient personal data beyond what you provide
- Browsing history outside the application
- Contact lists or address books
- Social media information
Minimizing Data Collection
Only Collect What's Needed
Recipient Information
- Use email addresses only (not full profiles)
- Don't include unnecessary personal data
- Remove recipients from list after distribution
- Use generic identifiers when possible
Document Content
- Remove unnecessary metadata before upload
- Redact sensitive information
- Use minimum required pages
- Don't include draft or scratch notes
Recipient Privacy
Respect Recipient Information
- Only use data for intended purpose
- Don't share recipient lists
- Secure storage of recipient data
- Delete when no longer needed
Inform Recipients
- Let recipients know documents are fingerprinted
- Explain the purpose (leak prevention)
- Provide contact for questions
- Be transparent about tracking
Data Storage and Retention
Storage Policies
Where Data is Stored
- Secure cloud storage (encrypted)
- Database with access controls
- Automatic backups
- Geographic redundancy
How Long Data is Kept Retention periods vary by plan:
- Free: 7 days
- Starter: 30 days
- Pro: 90 days
- Team: 180 days
- Enterprise: 365 days (1 year)
What Happens After Retention
- Artifacts automatically deleted
- Job metadata retained (no PDFs)
- Billing records kept per regulations
- Audit logs maintained
Managing Your Data
Download Your Data
- Export job history
- Download all artifacts
- Save recipient lists
- Export reports
Delete Your Data
- Delete individual jobs
- Remove organization
- Delete account (removes all data)
- Request data deletion (contact support)
Compliance
GDPR Compliance
For EU Recipients
- Lawful basis for processing
- Minimal data collection
- Right to access data
- Right to deletion
- Data portability
- Privacy by design
Your Responsibilities
- Obtain consent when required
- Provide privacy notices
- Honor data subject requests
- Report breaches promptly
CCPA Compliance
For California Recipients
- Disclose data collection
- Allow opt-out of sale (not applicable)
- Provide access to data
- Enable data deletion
- Non-discrimination
Other Regulations
HIPAA (Healthcare)
- Business Associate Agreement may be needed
- Additional security measures
- Audit trail requirements
- Enterprise features recommended
FERPA (Education)
- Student privacy protections
- Parental access rights
- Secure handling of education records
Sharing and Access
Internal Sharing
Within Your Organization
- Only share with necessary team members
- Use appropriate role assignments
- Audit access regularly
- Remove access promptly when not needed
Job Visibility
- Organization members can view jobs with ORGANIZATION privacy
- Job artifacts are downloadable based on job privacy and access rules
- Admin and Owner roles govern organization-scoped resources only
- Members can create jobs and download artifacts they are authorized to access
- Job ownership is mandatory (
userIdis required on every job); before member/user removal, resolve owned jobs by deletion or reassignment
External Sharing
With Recipients
- One artifact per recipient only
- Use secure transmission methods
- Don't bulk-share download links
- Track distribution
With Third Parties
- PDF Ghost doesn't share your data
- No advertising or marketing use
- No data selling
- Processors bound by agreements
Privacy Features
Built-in Privacy Protection
Organization Isolation
- Each organization's data is separate
- No cross-organization access
- Independent billing and storage
- Secure multi-tenancy
Encryption
- Data encrypted in transit (HTTPS)
- Data encrypted at rest
- Secure key management
- Modern encryption standards
Access Controls
- Role-based access (Owner, Admin, Member)
- Session management
- Two-factor authentication
- Automatic logout
Audit Trails
- All access logged
- Download tracking
- Member activity
- Leak check history
Privacy Best Practices
For Organizations
Policy Development
- Create internal privacy policy
- Document data handling procedures
- Train team members
- Regular privacy reviews
Data Minimization
- Only fingerprint necessary documents
- Remove old jobs promptly
- Limit recipient information
- Use shortest retention period needed
Access Management
- Assign minimum necessary permissions
- Review access quarterly
- Revoke access for departing members
- Monitor for unusual activity
For Individual Users
Personal Data Protection
- Use strong passwords
- Enable two-factor authentication
- Review active sessions
- Sign out on shared devices
Recipient Respect
- Don't over-distribute documents
- Honor confidentiality requests
- Secure recipient information
- Delete data when done
Data Breach Response
If You Discover a Breach
-
Immediate Actions
- Change passwords
- Revoke compromised sessions
- Document the incident
- Assess scope of breach
-
Notification
- Notify PDF Ghost support
- Inform affected individuals
- Report to authorities if required
- Follow internal procedures
-
Investigation
- Determine cause
- Identify affected data
- Assess potential harm
- Implement remediation
-
Prevention
- Update security measures
- Review access controls
- Train team members
- Update procedures
Privacy Settings
Account Privacy
Profile Visibility
- Control what information is visible
- Manage profile picture
- Username privacy
- Email visibility to team
Activity Privacy
- Job creation visibility
- Download history
- Usage statistics
- Activity logs
Organization Privacy
Member Information
- Who can see member list
- Contact information sharing
- Role visibility
- Activity tracking
Job Privacy
- Who can view jobs
- Download permissions
- Artifact access
- History retention
Questions About Privacy
Common Privacy Questions
"Can PDF Ghost see my document content?" PDF Ghost processes your PDFs to add fingerprints but doesn't read or analyze the content for any other purpose.
"Who has access to my jobs?" Access depends on job privacy:
- USER jobs are visible to the job owner and organization Owners/Admins
- ORGANIZATION jobs are visible to members of that organization (based on role permissions)
"How long is my data kept?" Artifacts are kept according to your plan's retention period, then automatically deleted.
"Can I delete all my data?" Yes, you can delete individual jobs, your organization, or your entire account.
"Is my data sold or shared?" No, PDF Ghost never sells your data or shares it with third parties for marketing.
Next Steps
- Review Security Best Practices
- Learn about Data Protection
- Read Terms of Service
- View Privacy Policy