Privacy Policy
jpg2pdf.at - JPG to PDF Converter
Last Updated:
Table of Contents
🔒 Your Privacy is Our Priority
jpg2pdf.at is committed to protecting your privacy. Our JPG to PDF converter is designed with privacy by design principles. We process your files locally, automatically delete them after conversion, and never store your personal data unnecessarily.
1. Information We Collect
1.1 Files You Upload
When you use our JPG to PDF converter, we temporarily process:
- JPG, PNG, GIF, and other image files you upload for PDF conversion
- File metadata (file name, size, format) necessary for conversion
- Generated PDF files created from your images
1.2 Technical Information
We automatically collect limited technical information to ensure our JPG to PDF converter works properly:
- IP address (for security and abuse prevention)
- Browser type and version
- Device type (desktop, mobile, tablet)
- Operating system
- Referring website (if any)
- Pages visited on jpg2pdf.at
- Conversion statistics (anonymous)
1.3 Information We Do NOT Collect
We do not collect:
- Personal information like names, emails, or phone numbers
- Account information (no registration required)
- Payment information (our service is free)
- Content of your images or PDF files
- Detailed browsing history
2. How We Use Your Information
2.1 Primary Purposes
We use your information solely for:
- JPG to PDF Conversion: Processing your images to create PDF documents
- Service Delivery: Providing you with converted PDF files for download
- Technical Operation: Ensuring our converter works properly across different devices
- Security: Preventing abuse and protecting against malicious uploads
2.2 Service Improvement
We may use anonymous, aggregated data to:
- Improve our JPG to PDF conversion quality
- Optimize website performance
- Understand usage patterns (without identifying individuals)
- Fix technical issues and bugs
2.3 Legal Compliance
We may process information when required by law or to:
- Comply with legal obligations
- Respond to valid legal requests
- Protect our rights and interests
- Ensure user safety
3. Data Security
🛡️ Enterprise-Grade Security
Your files are protected with the same security standards used by major technology companies.
3.1 Encryption
- HTTPS Encryption: All data transfers use SSL/TLS encryption
- In-Transit Protection: Your files are encrypted during upload and download
- Secure Processing: Files are processed in a secure, isolated environment
3.2 Access Controls
- Limited access to systems handling your files
- Regular security audits and monitoring
- Automated threat detection and prevention
- Secure server infrastructure with regular updates
3.3 Data Isolation
- Each conversion session is isolated from others
- No cross-contamination between user files
- Secure temporary storage during processing
4. File Handling and Storage
⏰ Automatic File Deletion
Your privacy is protected by our automatic file deletion system. All uploaded images and generated PDFs are permanently deleted within 24 hours.
4.1 File Processing
- Files are processed locally on our secure servers
- No third-party processing or cloud storage
- Conversion happens in real-time
- Files are never analyzed for content or shared
4.2 Temporary Storage
- Upload Storage: Maximum 1 hour for processing
- PDF Generation: Immediate processing and availability
- Download Availability: PDFs available for 24 hours maximum
- Automatic Cleanup: All files deleted after 24 hours regardless of download status
4.3 File Access
- Only you have access to your converted PDF via unique download link
- No file browsing or search functionality
- Links expire automatically
- No file recovery possible after deletion
5. Cookies and Tracking
5.1 Essential Cookies
We use minimal, essential cookies for:
- Session Management: Maintaining your conversion session
- Security: CSRF protection and security features
- Functionality: Remembering your conversion preferences during your visit
5.2 Analytics (Optional)
With your consent, we may use:
- Google Analytics for anonymous usage statistics
- Performance monitoring for service improvement
- Error tracking to fix technical issues
5.3 No Tracking Cookies
We do NOT use:
- Advertising cookies
- Social media tracking
- Cross-site tracking
- Behavioral profiling cookies
6. Third-Party Services
6.1 Service Providers
We may use trusted third-party services for:
- Hosting: Secure server infrastructure
- CDN: Content delivery for faster loading
- Analytics: Anonymous usage statistics (Google Analytics)
- Security: DDoS protection and security monitoring
6.2 Data Processing Agreements
- All third-party providers sign data processing agreements
- GDPR-compliant service providers only
- Limited data access on need-to-know basis
- Regular compliance audits
6.3 No Data Sharing
We do NOT share your files or personal data with:
- Advertising companies
- Data brokers
- Social media platforms
- Marketing companies
- Other websites or services
7. Data Retention
7.1 File Retention
- Uploaded Images: Deleted within 1-24 hours
- Generated PDFs: Deleted within 24 hours
- Temporary Data: Deleted immediately after conversion
- Error Logs: Deleted within 30 days (contain no personal data)
7.2 Technical Data
- Server Logs: 30 days maximum (IP addresses anonymized after 7 days)
- Analytics Data: Anonymous, aggregated data only
- Security Logs: 90 days for abuse prevention
7.3 Legal Retention
We may retain data longer only when:
- Required by law
- Necessary for legal proceedings
- Essential for security investigations
8. Your Privacy Rights
8.1 GDPR Rights (EU Users)
Under GDPR, you have the right to:
- Access: Request information about data we process
- Rectification: Correct inaccurate personal data
- Erasure: Request deletion of your personal data
- Portability: Receive your data in a structured format
- Objection: Object to certain types of processing
- Restriction: Limit how we process your data
8.2 CCPA Rights (California Users)
Under CCPA, you have the right to:
- Know what personal information we collect
- Delete personal information we have collected
- Opt-out of sale of personal information (we don't sell data)
- Non-discrimination for exercising your rights
8.3 How to Exercise Your Rights
Contact Us
Email: privacy@jpg2pdf.at
Response Time: Within 30 days
Verification: We may ask for identity verification for security purposes
9. Children's Privacy
jpg2pdf.at is committed to protecting children's privacy:
- Our service is not directed to children under 13
- We do not knowingly collect personal information from children under 13
- If we discover we have collected information from a child under 13, we will delete it immediately
- Parents can contact us to request deletion of their child's information
10. International Data Transfers
10.1 Data Location
- Our servers are located in secure data centers
- Data processing occurs within the European Union when possible
- Appropriate safeguards in place for any international transfers
10.2 Transfer Safeguards
- Standard Contractual Clauses (SCCs) with service providers
- Adequacy decisions where applicable
- Additional security measures for sensitive data
11. Changes to This Privacy Policy
11.1 Updates
- We may update this policy to reflect service changes or legal requirements
- Material changes will be prominently posted on our website
- We will update the "Last Updated" date
- Continued use of our service constitutes acceptance of changes
11.2 Notification
- Significant changes will be announced on our homepage
- Users will have 30 days to review changes
- Previous versions available upon request
12. Contact Information
Privacy Questions & Requests
Email: privacy@jpg2pdf.at
Website: jpg2pdf.at
Response Time: We respond to privacy inquiries within 72 hours
Data Protection Officer: Available for EU users upon request
🤝 We're Here to Help
Have questions about your privacy or how we handle your data? Don't hesitate to reach out. We're committed to transparency and protecting your privacy rights.