Privacy

File Conversion and Privacy: What Happens to Your Files?

Learn about privacy and security when converting files online. Understand how your data is handled and what to look for in a safe converter.

February 22, 202611 min read

Convert-To Editorial Team

Editorial Policy

Converting a vacation photo from HEIC to JPG carries virtually no privacy risk. Converting a signed contract from PDF to Word, however, means uploading a legally sensitive document to a third-party server where it's processed, temporarily stored, and potentially logged. Between these two extremes lies a spectrum of risk that most people never consider when they click "Upload and Convert." The privacy implications of file conversion depend on three factors: what's in the file, where the conversion happens, and what the service does with your data during and after the process.

What Happens When You Upload a File for Conversion

Every online file conversion follows the same basic pipeline, regardless of the service:

1. Upload: Your file travels from your device to the conversion server over the internet. During transit, the file passes through your local network, your ISP, potentially multiple routing nodes, and finally the service's infrastructure. If the connection uses HTTPS (TLS encryption), the file content is encrypted during transit — but it's decrypted when it arrives at the server.

2. Processing: The server reads your file, performs the conversion (parsing the source format, transforming the data, encoding the output format), and generates the converted file. During this step, your file exists in memory and/or temporary storage on the server. The server has full access to the file contents — there's no way to convert a file without reading it.

3. Download: The converted file is sent back to your browser, again over HTTPS. The original uploaded file and the converted output both exist on the server until they're deleted.

4. Cleanup: The service deletes your files. This step varies dramatically between services — some delete within minutes, others retain files for hours or days, and some don't clearly disclose their retention policy at all.

Pipeline StagePrivacy RiskWhat Protects You
Upload (transit)Interception by ISP or network attackerHTTPS/TLS encryption
ProcessingServer operator can access file contentsService's privacy policy and architecture
Storage (temporary)Data breach, unauthorized accessEncryption at rest, short retention periods
CleanupIncomplete deletion, backup copiesVerifiable deletion policy, no backups

Where the Privacy Risks Actually Are

Risk 1: File Content Exposure

The conversion server must read your file to convert it. This means the server operator (and anyone who compromises the server) can potentially access:

  • Document text: Contracts, medical records, financial statements, personal correspondence
  • Image content: Personal photos, identification documents, confidential designs
  • Embedded data: Form field values in PDFs, track changes in Word documents, cell formulas in Excel files

For a service like Convert-To.co, files are processed by CloudConvert, a GDPR-compliant and ISO 27001 certified conversion service — no human views your files. But not all services operate this way. Some free conversion services monetize through advertising, and their privacy practices may include analyzing uploaded content for ad targeting or data harvesting.

Risk 2: Metadata Leakage

Files contain more data than what's visible on screen. This metadata can reveal:

File TypeMetadata That May Be Present
JPG/HEIC imagesGPS coordinates, camera model, timestamp, software used
PDF documentsAuthor name, organization, software, creation/modification dates, previous revision data
Word documentsAuthor, organization, revision history, tracked changes, comments, template path
Excel filesAuthor, sheet names (visible in file properties), printer name, file paths
Audio filesRecording device, GPS location, timestamps, software version

A real estate agent converting property photos from HEIC to JPG might not realize the photos contain GPS coordinates of the listed property — which is probably fine. But an attorney converting client photographs might inadvertently expose GPS data that reveals a client's location.

Risk 3: Retention and Data Persistence

After conversion, how long do your files remain on the server? This varies widely:

Service TypeTypical RetentionRisk Level
Convert-To.co (via CloudConvert)15 minutes, then auto-deletedLow
Major cloud services (Google, Microsoft)Until you delete, stored in your accountLow (your data, your control)
Free ad-supported convertersHours to days, policy unclearMedium to high
Desktop/offline toolsNever leaves your deviceMinimal

The retention period matters because the longer files exist on a server, the larger the window for potential data breaches, unauthorized access, or legal discovery requests.

Risk 4: Third-Party Processing

Some conversion services don't process files on their own servers. They route your file to third-party APIs or cloud services for the actual conversion. Your file may pass through two or more services, each with its own privacy policy and data handling practices. A service claiming to "convert PDF to Word" might actually be sending your PDF to a third-party OCR API and a separate document processing API — neither of which you agreed to share data with.

How Convert-To.co Handles Your Files

Convert-To.co uses CloudConvert, a GDPR-compliant and ISO 27001 certified conversion service, to process all file conversions. Here's how the process works:

  • Processing: When you upload a file on Convert-To.co, it is sent directly to CloudConvert for conversion. Convert-To.co does not process or store files on its own servers.
  • Automatic deletion: A background cleanup job runs continuously and deletes all finished conversions from CloudConvert after 15 minutes. There's no "file history" or account-based storage on Convert-To.co.
  • No content analysis: Convert-To.co does not analyze, index, or use file contents for any purpose beyond the requested conversion.
  • HTTPS only: All file transfers use TLS encryption in transit.
  • Compliance: CloudConvert is GDPR-compliant and ISO 27001 certified, meaning it meets rigorous European data protection and information security standards.

This doesn't mean Convert-To.co is appropriate for every file. For classified government documents, HIPAA-protected medical records, or files subject to strict data sovereignty requirements, even a 15-minute existence on a third-party server may not meet your compliance obligations.

Metadata: The Data Inside Your Data

Metadata is often more privacy-sensitive than the visible file content. A photograph of a sunset contains innocuous visual content, but its EXIF data might include the photographer's home GPS coordinates. A PDF contract contains the agreed terms, but its metadata might include the author's full name, their organization, and the software they used.

Stripping Metadata During Conversion

Some format conversions naturally strip metadata:

  • Image format conversion (e.g., JPG to PNG) may or may not preserve EXIF data depending on the tool. Convert-To.co preserves metadata by default but strips it during image compression when the option is selected.
  • PDF to image (PDF to JPG) discards PDF metadata (author, keywords, etc.) since JPG doesn't have equivalent fields. However, the JPG output will have its own minimal metadata (software used, creation date).
  • Image to PDF (JPG to PDF) typically drops EXIF data from the original image, since PDF uses different metadata fields.

When to Intentionally Strip Metadata

Before sharing files externally, consider removing metadata in these situations:

  • Sharing photographs publicly (remove GPS coordinates)
  • Distributing documents to external parties (remove author names, revision history)
  • Publishing images on a website (remove camera model, timestamp)
  • Submitting files in legal or regulatory contexts (remove tracked changes, hidden content)
Convert-To Tip

Before uploading sensitive files for conversion, check what metadata they contain. On Windows, right-click the file → Properties → Details. On Mac, open the file in Preview → Tools → Show Inspector. For PDFs, open in any PDF viewer and check File → Properties or Document Properties. If the metadata includes information you don't want to share, strip it before uploading. Our PDF compression tool can remove PDF metadata, and our image compression tool can strip EXIF data.

When Online Conversion Is Not Appropriate

Certain categories of files should not be uploaded to any online conversion service, regardless of the service's privacy practices:

Classified or government-restricted documents: Files with security classifications (Confidential, Secret, Top Secret) are subject to legal restrictions on transmission and storage. Online conversion services are not authorized storage locations.

Files under legal hold: Documents subject to litigation holds or preservation orders must maintain chain of custody. Uploading to a third-party service may violate preservation obligations.

Healthcare records (HIPAA): Protected Health Information (PHI) can only be shared with Business Associates who have signed a BAA (Business Associate Agreement). Most free conversion services have not signed BAAs and cannot legally process PHI.

Payment card data (PCI DSS): Files containing credit card numbers, CVVs, or cardholder data are subject to PCI DSS requirements. Processing these through a non-PCI-compliant service violates compliance obligations.

Files with contractual confidentiality: NDAs and confidentiality agreements may prohibit sharing covered information with third-party services, even temporarily for conversion.

For these categories, use offline conversion tools exclusively. LibreOffice, FFmpeg, ImageMagick, and similar desktop applications perform all processing locally — your files never leave your device.

What to Look for in a Privacy-Respecting Converter

When evaluating any online conversion service, check for:

CriterionGood SignRed Flag
Retention policyClear timeframe (e.g., "deleted within 15 minutes")"We may retain files for service improvement"
HTTPSAll pages and uploads use HTTPSAny HTTP pages or mixed content
Privacy policySpecific, readable, addresses file handlingGeneric policy that doesn't mention file processing
Data locationDisclosed server locationsNo disclosure
Third-party sharing"We do not share uploaded files""We use third-party processors" with no list
Account requirementNo account needed for conversionRequired account with broad permissions
Revenue modelClear (subscription, freemium)"Free" with no visible business model

A service with no visible revenue model (no subscription, no ads, no clear business) should raise questions. Server infrastructure and bandwidth cost money. If you're not paying for the service and there are no ads, consider what the service might be gaining from processing your files.

Offline Alternatives for Sensitive Files

For files that should never be uploaded, these offline tools provide local conversion:

ToolPlatformFormats SupportedNotes
LibreOfficeWindows, Mac, LinuxDocuments, spreadsheets, presentationsFree, open-source, wide format support
FFmpegWindows, Mac, LinuxAudio, videoCommand-line, extremely powerful
ImageMagickWindows, Mac, LinuxImages (100+ formats)Command-line, batch processing
PandocWindows, Mac, LinuxMarkdown, DOCX, PDF, HTMLCommand-line, document conversion
Preview (macOS)MacImages, PDFBuilt-in, basic conversion
GIMPWindows, Mac, LinuxImagesFree, open-source, full editor

These tools process files entirely on your device. No network connection is required, no data is transmitted, and no third party ever accesses your files.

Privacy Note

When you convert a file on Convert-To.co, it is processed by CloudConvert, a GDPR-compliant and ISO 27001 certified service. All files are automatically deleted within 15 minutes after conversion. Convert-To.co does not store your files on its own servers. If your files are subject to regulatory compliance requirements (HIPAA, PCI DSS, government classification), we recommend using offline conversion tools regardless of any online service's privacy practices. See our secure document handling guide for additional best practices.

Tags

privacysecuritydata protectiononline conversion
Back to Blog
Updated 2/22/2026