Security is important for us. We use SSL and TLS security and file encryption at rest to protect your data. Our servers are hosted on the world-class infrastructure at Amazon AWS to keep your data safe and secure. API Platform Security Features

SOC 2 compliance: ByteScout, Inc. (d/b/a is in the process of implementation of SOC 2 and plan SOC 2 Type 1 examination, followed by the SOC 2. Request more information using this page

Review of platform’s security features:

  • API logs. API logs include the following data:
    • API endpoint
    • user agent
    • IP address
    • request body
    • response body

      Sensitive data such as passwords, document content is auto redacted from logs. API logs retention period varies depending on the selected subscription plan;

  • Access to API logs, files, document parser templates is available to the user only.
    Optional access for tech support purposes can be manually enabled by the user for two weeks. Users can terminate access at any time. Access is also auto-expires after 2 weeks.
  • Uploaded and generated files are stored under highly randomized file names;
  • Uploaded and generated files are auto-removed within 1 hour automatically by default.
    The expiration period may be decreased or increased up to 24 hours if needed for specific files;
  • API functions for forced output file removal are available;
  • Built-in secure permanent file storage
    • store documents, images, and other files for re-use in API
    • available only for use in API
  • Support for password-protected input files
  • Support for remote input files protected with HTTP authentication;
  • IP allows the list to restrict access to API and/or UI from predefined IP addresses only;
  • Single-sign on (SSO, SAML).  SSO mitigates compliance and security risks for organizations by giving businesses control over user authentication and user revocation via corporate-mandated tools;
  • History of Logins new – the history of recent logins is available for review and includes IP address, user agent, date, and time for every login session.

Application features:

  • Support for password-protected PDF files
  • Support for applying password protection and encryption to existing PDF;

The availability of specific security features may vary depending on your subscription plan.

Data Transmission

Security is important for us. We use forced SSL and TLS security and file encryption at rest to protect your data. Our servers are hosted on the world-class infrastructure at Amazon AWS to keep your data safe and secure.

We do not use 3rd party API to process your documents, except for the following API functions:

  • PDF Translation API: plain text extracted from your PDF is translated via AWS Translate. Your plain text data may be the subject of the Terms of Use of Amazon Translate (AWS Translate).

Data Encryption

Your connections to application and API require Transport Layer Security Secure (TLS) and Secure Sockets Layer (SSL), cryptographic protocols designed to provide communications security over a computer network. Encryption is used to ensure a high level of security and privacy.  When you upload documents and files, they are transmitted via encrypted connections.

Your files are stored behind a firewall and authenticated against the sender’s session every time a request for that file is made. We enforce the use of industry best practices for the transmission of data to our platform (Transport Layer Security TLS) and data is stored in SOC 1 Type II, SOC 2 Type I, and ISO 27001 certified data centers. Your documents are stored and encrypted at rest using AES 256-bit encryption.

When a file is generated by our server, it is stored under a random name and is permanently removed after 1 hour (until you set a longer storage period explicitly). Generated files can also be removed permanently using /file/delete API method at any time.


Data Security

Servers and data are hosted and managed within Amazon’s secure data centers (US West 2 region) and utilize the Amazon Web Service (AWS) technology. Amazon continually manages risk and undergoes recurring assessments to ensure compliance with industry standards. Amazon’s data center operations have been accredited under:

  • ISO 27001
  • SOC 1 and SOC 2/SSAE 16/ISAE 3402 (Previously SAS 70 Type II)
  • PCI Level 1
  • FISMA Moderate
  • Sarbanes-Oxley (SOX)
  • AWS also provides an environment that enables businesses to comply with HIPAA regulations

Physical Security utilizes ISO 27001, FISMA, HIPAA certified data centers managed by Amazon. Amazon has many years of experience in designing, constructing, and operating large-scale data centers. This experience has been applied to the AWS platform and infrastructure. AWS data centers are housed in nondescript facilities, and critical facilities have extensive setback and military grade perimeter control berms as well as other natural boundary protection. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, state-of-the-art intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication no fewer than three times to access data center floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff.

Amazon only provides data center access and information to employees who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical and electronic access to data centers by Amazon employees is logged and audited routinely.

For additional information see:

Credit Card Information does not store your credit card information. When you submit your credit card information, it is passed to our payments processor Stripe, a PCI Service Provider Level 1 service, or to FastSpring (BrightMarket LCC, USA), our authorized reseller.

Data Deletion

Upon request, will work to expunge all customer data and solely owned documents from our systems. You can always delete your account from your profile page. Contact us if you need assistance with data deletion.

last updated October 30, 2021