PDFs often contain sensitive information. Here's how to protect them properly.
Understanding PDF Security
What Can Be Protected?
PDF security can control:
- Opening - Require password to view
- Printing - Prevent or allow printing
- Editing - Prevent content changes
- Copying - Prevent text/image extraction
- Form filling - Control form access
- Signing - Restrict signature capabilities
Security Levels
No Security
- Anyone can open, edit, copy, print
- Default for most PDFs
Permission Password
- Document opens freely
- Certain actions restricted
- Restrictions can be removed with tools
Open Password
- Password required to view
- Strong protection when password is strong
- Can combine with permission restrictions
Encryption
- 128-bit AES: Good security
- 256-bit AES: Strong security
- Password strength still matters
Setting Password Protection
Adding an Open Password
Requires password to view the document:
- Go to lexosign.com/protect-pdf
- Upload your PDF
- Enter password
- Choose encryption level
- Download protected PDF
Important: Store password securely. No recovery without it.
Adding Permission Restrictions
Control actions without blocking viewing:
- Same process as above
- Set a permissions password
- Choose what to restrict:
- Printing
- Content copying
- Editing/modification
- Form filling
Password Best Practices
Strong Passwords
Create passwords that are:
- At least 12 characters
- Mix of letters, numbers, symbols
- Not based on dictionary words
- Unique to this document
Example: Qj7#mK9$xL2@nP4 or passphrase correct-horse-battery-staple
Password Management
Don't lose your passwords:
- Use a password manager
- Document passwords securely (not in email!)
- Share passwords separately from documents
Different Passwords for Different Documents
Don't reuse passwords:
- One compromise doesn't affect all documents
- Track which password goes with which document
- Consider document-specific passphrases
Digital Signatures
What Digital Signatures Do
More than just an image of your signature:
- Authentication - Verifies signer identity
- Integrity - Detects any changes
- Non-repudiation - Signer can't deny signing
Types of Digital Signatures
Simple Electronic Signature
- Image or typed name
- Legal for most purposes
- Limited verification
Advanced Electronic Signature
- Cryptographic signature
- Linked to certificate
- Detects tampering
Qualified Electronic Signature
- Government-issued certificate
- Highest legal standing
- Required for some documents
Adding Digital Signatures
For basic signatures:
1. lexosign.com/sign-pdf
2. Upload document
3. Add your signature
4. Download signed PDF
For certificate-based signatures:
- Adobe Acrobat with digital ID
- Hardware token or smart card
- Qualified signature services
Redaction: Permanent Removal
When to Redact
Use redaction for:
- Social Security numbers
- Financial account details
- Personal addresses
- Confidential business info
- Protected health information
Proper Redaction
Important: Simple black boxes don't redact!
True redaction:
1. Use proper redaction tools
2. Mark areas to redact
3. Apply redaction
4. Verify content is gone
Secure Sharing
Don't Email Sensitive PDFs
Email is not secure:
- Can be intercepted
- Stays on multiple servers
- Often forwarded unexpectedly
Better Alternatives
Secure File Sharing Services
- ShareFile
- Box
- Secure Dropbox links (with expiration)
Encrypted Email
- ProtonMail
- Outlook encryption
- S/MIME or PGP
Secure Portals
- Client portals
- Document management systems
- Secure upload links
When You Must Email
If email is necessary:
1. Password protect the PDF
2. Send password separately (text message, phone call)
3. Avoid including sensitive details in subject/body
4. Delete from sent folder after confirmation
Watermarking
Deterring Misuse
Watermarks can:
- Show ownership
- Indicate confidentiality
- Track document distribution
- Discourage screenshots
Dynamic Watermarks
Advanced systems add:
- Viewer's name/email
- Date and time viewed
- IP address
This makes leak tracking possible.
Adding Watermarks
DRM (Digital Rights Management)
What DRM Does
Advanced protection:
- Controls who can access
- Limits number of views/prints
- Sets expiration dates
- Revokes access remotely
DRM Limitations
Considerations:
- Requires special software/plugin
- Can frustrate legitimate users
- Adds cost
- Not foolproof
When to Consider DRM
Appropriate for:
- High-value intellectual property
- Time-sensitive documents
- Strictly controlled distribution
- Regulatory requirements
Metadata and Hidden Data
What Metadata Contains
PDFs store:
- Author name
- Creation/modification dates
- Software used
- Previous versions
- Comments and markup
- Deleted content traces
Cleaning Metadata
Before sharing sensitive documents:
Adobe Acrobat:
- File > Properties > Remove Hidden Information
- Or Tools > Protect > Sanitize Document
Online tools:
- Look for "sanitize" or "clean metadata" features
Physical Security
Screen Privacy
When viewing sensitive PDFs:
- Privacy screens on monitors
- Don't view in public
- Lock screen when away
Printing Considerations
Printed documents need protection too:
- Secure printer (print-to-me)
- Don't leave at shared printer
- Shred when done
- Mark physical copies confidential
Security Audit Checklist
Before Sharing Sensitive PDFs
- [ ] Appropriate password protection set
- [ ] Permissions restrict unnecessary actions
- [ ] Sensitive data redacted (if needed)
- [ ] Metadata cleaned
- [ ] Secure sharing method chosen
- [ ] Password shared separately
- [ ] Watermark added (if appropriate)
- [ ] Recipients verified
Regularly
- [ ] Review who has access to sensitive documents
- [ ] Update passwords periodically
- [ ] Check for unauthorized copies
- [ ] Verify security settings working
Common Mistakes
Mistake 1: Assuming Permission Passwords Are Strong
Permission passwords can be removed:
- Only deters casual users
- Tools exist to remove restrictions
- Use open password for real security
Mistake 2: Emailing Password with Document
Never send password in same email:
- If email is compromised, so is document
- Always use separate channel
Mistake 3: Not Verifying Redaction
Black boxes ≠ redaction:
- Always verify with proper tools
- Test copy-paste from redacted areas
- Search for redacted terms
Mistake 4: Forgetting Metadata
Metadata can reveal:
- Previous authors
- Edit history
- Confidential information
- Always clean before sharing
Conclusion
PDF security requires multiple layers:
- Password protection for access control
- Digital signatures for integrity and authentication
- Redaction for permanent removal
- Secure sharing methods
- Metadata cleaning before distribution
Protect your PDF now - add passwords and encryption to keep your documents secure.
No single measure is perfect. Combine approaches based on your sensitivity level and threat model.