Is it safe to sign PDFs online? A practical privacy checklist

Most online PDF signers ask you to upload sensitive documents to their servers. Sometimes that's fine; sometimes it isn't. Here's how to tell the difference, how to verify a tool's claims, and what to look out for in privacy policies and account requirements.

Online PDF signers exist on a wide spectrum of safety. The polished, well-funded ones at the top end have audited security, certified data centres, and a meaningful commitment to deleting your file after some period. The dodgy ones at the bottom have surprising terms buried in their privacy policies, ad networks injecting things into your session, and no clear accountability for what happens to your data.

Most are somewhere in between. This guide gives you a way to evaluate any of them, plus the practical knowledge to verify the claims they make.

Two kinds of safety

"Is this safe?" splits into two different questions:

Data privacy. What happens to your document after you upload it? Is it stored? For how long? Who can access it? What if their servers are breached?

Signature validity. Is the signature produced by the tool legally enforceable? Will it stand up to challenge? Does it meet jurisdictional requirements for the document type?

These are independent. A signer can produce legally robust signatures while being privacy-hostile, and vice versa. This guide focuses on the first — data privacy. For validity questions, see our legal validity guide.

Ad space — pending AdSense approval

What the upload actually exposes

When you upload a PDF to an online signer, several things happen that you may not have thought about:

The file lives on their server. For some period of time, your document exists on a machine you don't control. Even if the service deletes it later, that period creates exposure to whatever happens to that server.

Multiple staff or services may have access. The signer's engineering team, their support staff, third-party services they integrate with (logging, analytics, monitoring, sometimes virus scanning) — any of these can potentially see your file. Most legitimate operators have access controls, but the trust is institutional, not technical.

The file is included in their backups. Even after they delete it from their primary storage, it can persist in encrypted backups for weeks or months. Their retention policy for backups is rarely the same as for primary data.

The file may travel through CDNs and load balancers. Modern services are distributed across many servers. Your file may briefly exist on machines you'd never have heard of, in countries you didn't know they operated in.

Government subpoenas can compel disclosure. Files in possession of a service are subject to subpoena and similar legal processes. If a counterparty or regulator wants your document, they can ask the signing service rather than you.

Breaches happen. Even well-run companies suffer breaches. The bigger the service, the more attractive a target. Some breaches expose users' documents directly.

None of this is unique to PDF signers — it applies to any service that holds your files. The question is whether the convenience of an online signer is worth the exposure for your specific document.

Client-side vs server-side

There's a third option that's been increasingly available since browsers got more powerful: tools that run entirely on your device, with no upload at all.

A server-side signer works like this: your browser uploads the PDF to their backend, the backend processes it (rendering pages, accepting your edits, baking annotations), and the backend sends back the signed copy. The file lives temporarily on a server. Most online signers work this way because it's easier to build — you can do the heavy lifting in well-understood server tooling.

A client-side signer works like this: your browser loads the JavaScript and libraries needed to process PDFs, reads your file directly from your disk (after you pick it), processes everything in your browser's memory, and saves the signed copy back to your disk. No network round-trip carries your file. The signing tool at esignmypdf.com/sign works this way, using PDF.js for rendering and PDFLib for editing.

The trade-offs:

  • Client-side: better privacy, works offline, slower on very large files, can't easily route documents to a counter-signer.
  • Server-side: can offer additional features (signature requests, audit trails, multi-party flows), but creates the exposure described above.

For single-party signing of your own documents, client-side has clear privacy advantages. For multi-party signing with formal audit requirements, server-side is often necessary.

How to verify a tool is actually local

A tool can claim to process files locally and still upload them. There's a simple way to check: your browser's developer tools.

  1. Open the signer's page in Chrome, Edge, or Firefox.
  2. Press F12 (or right-click and choose Inspect) to open developer tools.
  3. Switch to the Network tab.
  4. Clear the existing log.
  5. Now upload or pick a PDF in the tool.
  6. Watch the Network tab for any requests that include the file's data.

If the tool is genuinely client-side, you'll see no requests that carry your file. You may see requests for the tool's own scripts (the PDF rendering and editing libraries), tracker pixels, or font files — but nothing whose request body contains your document.

If the tool uploads despite claiming local processing, you'll see a POST or PUT request to their backend with a large payload — that's your file going up.

This check takes about a minute and gives you direct, technical evidence rather than relying on what their marketing page says.

The ten-point checklist

Run any online signer through these questions before trusting it with a document that matters:

  1. Does it require an account? Account-less signers have less data to lose. Account-required signers have your email and usage history.
  2. What's the upload policy? Is the file stored? For how long? Who can access it? Search the privacy policy for "upload", "retention", and "delete".
  3. Does it process files locally? If they claim so, verify with developer tools (above). If they don't claim so, assume it's uploaded.
  4. Where are they based? The jurisdiction matters for what laws apply to your data — GDPR for EU, CCPA for California, etc.
  5. What's the privacy policy say about third-party sharing? Some services share data with analytics, advertising, or "partners" in ways that put your file in places you didn't expect.
  6. Are there ads on the signing page? Ads pull in third-party scripts. Even reputable ad networks can be a vector for tracking or — rarely — malicious injection. Sites that show ads only on supporting pages (not the signing tool itself) are more careful.
  7. Is the connection HTTPS? Modern minimum. If a tool is on http:// in 2026, walk away.
  8. Are the libraries used reputable? View page source: are they pulling from cdnjs, jsdelivr, unpkg (well-known CDNs)? Or from obscure infrastructure?
  9. What does the company look like outside this page? Is there a real business behind it? An "About" page with actual people? Or is it a single-page operation with no context?
  10. What happens if you close the tab mid-signing? Server-side tools may keep your half-uploaded file. Client-side tools just lose your work locally.

Use a tool you can verify locally.

esignmypdf processes everything in your browser. Check with DevTools — no request carries your file.

✎ Open the tool

Reading the privacy policy

Most privacy policies are written defensively — broadly enough that the operator has flexibility for whatever they want to do later. A few specific things to look for:

  • "We may share your data with..." The list that follows tells you who can see your files. Some policies say "service providers" or "third parties" without naming them.
  • Retention period. "We retain uploaded files for 24 hours" is reasonable. "We may retain files as long as necessary" is open-ended.
  • Right to use your content. Watch for any phrase like "you grant us a worldwide royalty-free license to..." — most signers shouldn't need this, but some have it in their boilerplate.
  • Analytics and tracking. The list of analytics services tells you how much your behaviour is being recorded. Some operations include heatmap tools and session recorders that can capture form contents.
  • Children's data. Required disclosure in many jurisdictions. The presence of detailed COPPA/GDPR-K language is a sign of a more carefully-built operation.
  • Subpoena policy. Some policies explicitly say they will challenge overbroad requests; most don't comment.

When uploading to a server is actually fine

Client-side isn't always the right answer. There are legitimate reasons to use a server-based signer:

  • Multi-party signing with workflow. Routing a document through several signers, with reminders and audit trails, generally requires a server.
  • Qualified signatures with PKI. The most legally robust signatures often require certificate authorities and signing services that operate server-side.
  • Mass signing programmes. Sending the same NDA to hundreds of contractors is most efficient through a workflow tool.
  • Long-term archive with audit access. Some industries require signed documents to be stored with audit trails for years — a service is the practical way.

For these cases, pick a server-side service with a strong privacy posture, certifications you can verify (SOC 2, ISO 27001), and a track record. Treat the document as having been disclosed to the service — and pick one you'd trust with that disclosure.

Common questions

Is HTTPS enough to keep my file safe during upload?

HTTPS protects the file in transit, so an attacker on the network can't see it. It doesn't protect the file once it arrives at the destination server. The risk we're discussing is what happens to the file at the other end.

Doesn't every signer use HTTPS now?

Yes, modern signers do. If you find one that doesn't, that's a strong signal to stop using it.

Are paid signers safer than free ones?

Sometimes. Paid services have a business model that doesn't depend on selling data or showing ads, which tends to align incentives. But there are scrupulous free services and unscrupulous paid ones. The architecture (client-side vs server-side) matters more than the price.

What about signing services my employer uses?

Enterprise signing services (DocuSign, Adobe Sign at enterprise tiers) typically have strong security and compliance posture. They're designed for the workflow needs of organisations, not single-document signing. Use what your organisation provides; for personal documents, a different choice may make sense.

How private is esignmypdf?

The signing tool itself loads no analytics or tracking scripts. The libraries used (PDF.js, PDFLib) are loaded from public CDNs and cached on first load — those CDN operators may log the request but they don't see your file. Our hosting provider (Cloudflare) sees the request to load the page but does not see your file (because the file is never uploaded). For full detail see our privacy policy.

For the cases where client-side is what you want, give it a try — and verify the claim with your browser's developer tools while you're at it.

Ad space — pending AdSense approval