Privacy Policy

This Privacy Policy explains how Watermark in Word collects, uses, discloses, and safeguards your information when you use our free online watermarking tool.

Last Updated: November 18, 2025

Complete Privacy Policy

The full legal text of our Privacy Policy for Watermark in Word

1Information We Collect

Watermark in Word is a free, web-based tool for adding watermarks to Word documents. We do not require account registration or login. Depending on how you interact with our site, we may collect the following types of information:

1.1 Document Content

Important Notice About Your Documents:

  • When you upload a Word document (.doc or .docx) to add a watermark, the file is temporarily stored on our servers for processing.
  • Your document is immediately deleted from our servers once the watermarked version is generated and delivered to you (typically within seconds).
  • We do not read, analyze, store, or retain the content of your documents.
  • We do not share your documents with any third parties.
  • If you upload an image watermark, the same temporary processing and immediate deletion applies.

We do not collect sensitive personal data such as race, religion, political beliefs, health information, or government-issued identifiers from your documents.

1.2 Device & Technical Information

When you visit or use Watermark in Word (even without registering), we automatically collect certain non-personal, technical data to ensure our site runs smoothly:

  • Device type and operating system (e.g., Windows, macOS, Linux, iOS, Android)
  • Browser type and version (e.g., Chrome, Firefox, Safari)
  • Screen resolution and viewport size
  • Unique device identifiers (e.g., browser fingerprinting tokens, cookies)
  • IP address (stored only in truncated or anonymized form)

1.3 Usage Data & Interaction Logs

To improve our services, we record aggregated, non-identifiable metrics such as:

  • Timestamped page views and tool usage patterns
  • Watermark type selection (text vs. image)
  • Error and crash reports (stack traces and HTTP status codes, stripped of any document content)
  • Processing completion rates and performance metrics

1.4 User Preferences

We may store non-personal preferences in your browser (via cookies or local storage) such as:

  • Theme preference (light or dark mode)
  • Language selection
  • Last used watermark settings (for convenience)

These preferences are stored locally in your browser and not transmitted to our servers.

2How We Use Your Information

We use the information we collect for the following purposes:

2.1 To Provide & Maintain Our Services

  • Document Processing: Temporarily store and process your Word documents to apply the requested watermark (text or image).
  • Feature Delivery: Generate and deliver the watermarked document back to you for download.
  • Service Optimization: Maintain optimal processing speed and reliability for all users.
  • Security Verification: Use Cloudflare Turnstile to prevent abuse and automated attacks when necessary.

2.2 To Improve User Experience

  • Usage Analytics: Analyze aggregated logs to determine which tools are most popular, how long users spend on each page, and where improvements are needed.
  • Performance Monitoring: Track page load times, API response times, and error rates to optimize site speed and reliability.

2.3 To Communicate With You

  • Support & Inquiries: Respond to support requests and troubleshoot technical issues via email if you contact us.
  • Service Updates: Display important notices about service changes or maintenance directly on the website.

We do not send marketing emails or newsletters since we don't collect email addresses through the tool.

2.4 To Ensure Security & Prevent Abuse

  • Abuse Prevention: Monitor for unusual upload patterns or suspicious activity to protect server resources and prevent service abuse.
  • DDoS & Malicious Activity Mitigation: Use Cloudflare Turnstile, firewall rules, and rate limiting to block or throttle abusive requests.
  • Malware Scanning: Scan uploaded files for viruses or malicious code to protect our infrastructure and other users.

2.5 To Comply with Legal Obligations

  • Law Enforcement & Legal Requests: Cooperate with valid subpoenas, court orders, or other legal processes when required by law.
  • Regulatory Compliance: Maintain anonymized usage logs as needed to comply with applicable regulations.

3Data Sharing & Disclosure

We do not sell, rent, or lease your personal information to third parties. We may share your data in the following limited scenarios:

3.1 Service Providers & Subprocessors

We engage third-party vendors to perform services on our behalf. These providers are contractually obligated to process your information only for the purposes we specify and to maintain confidentiality. Examples include:

  • Hosting & Infrastructure (Cloudflare Workers)
  • Security & Bot Protection (Cloudflare Turnstile)
  • Analytics & Performance Monitoring (e.g., Google Analytics, if enabled)
  • Error Tracking (e.g., Sentry, if enabled)

Important: None of these providers have access to the content of your Word documents. Document processing happens on our secure servers and files are immediately deleted after processing.

3.2 Legal Compliance & Protection

  • Law Enforcement & Legal Requests: Watermark in Word may disclose personal information if required by a valid subpoena, court order, or other governmental request. We will notify you of such disclosures unless prohibited by law.
  • Protecting Our Rights & Safety: If we believe your actions violate our Terms of Service or pose a security threat to other users, we may share relevant data (e.g., truncated IP logs) with authorities or affected parties.

3.3 Business Transfers

In the event Watermark in Word undergoes a merger, acquisition, or asset sale, your personal information may be transferred as part of the business transaction. We will notify you of any change in ownership or use of your data prior to such transfer, and the new entity will be bound by this Privacy Policy (or a policy substantially similar).

4Data Protection & Security

We take reasonable administrative, technical, and physical precautions to protect the personal information you provide:

4.1 Encryption & Secure Storage

  • Data in Transit: All communication between your browser and our servers is encrypted using HTTPS (TLS 1.2 or higher).
  • Data at Rest: Sensitive data (e.g., passwords) are hashed with a strong algorithm (e.g., bcrypt or Argon2). Payment details are never stored on our servers; all transactions are processed directly by our third-party payment partners (e.g., Stripe).

4.2 Access Controls & Authentication

  • Least-Privilege Access: Only authorized employees and contractors have access to production systems and databases.
  • Multi-Factor Authentication (MFA): We enforce MFA for all administrative accounts with access to sensitive data.

4.3 Regular Audits & Monitoring

  • Security Audits: We perform periodic code reviews, vulnerability scans, and penetration tests.
  • Logging & Alerting: Real-time monitoring for unusual activity (e.g., multiple failed login attempts, SQL injection patterns) with automatic alerts to our security team.

4.4 Data Breach Notification

In the unlikely event of a data breach that affects your personal information, we will:

  1. Investigate and contain the breach immediately.
  2. Notify you via email within 72 hours of confirming that it impacted your personal data, as required by applicable laws (e.g., GDPR).
  3. Provide guidance on steps you can take to protect yourself (e.g., resetting your password).

5Cookies & Tracking Technologies

To enhance your experience and understand how you use our site, we employ cookies and similar tracking technologies:

5.1 Essential Cookies

  • Session Management: Remember your authenticated session (so you don't have to log in on every page).
  • Load Balancing & Security: Distribute traffic across our servers and detect malicious bots.

5.2 Analytics & Performance Cookies (Optional)

  • Google Analytics / Sentry: We collect anonymized, aggregated usage data (e.g., page views, bounce rate) to improve site performance and user flow.
  • Opt-Out: You may disable analytics cookies by clicking "Do Not Track" in your browser settings or installing a cookie-blocking extension. Note that blocking essential cookies may impair certain site functions.

6Your Rights & Choices

Depending on your jurisdiction, you may have rights regarding your personal information:

Access

Request a copy of the personal information we hold about you (e.g., account details, preferences).

Correction

Ask us to update or correct incomplete or inaccurate data (e.g., change your email address).

Deletion ("Right to be Forgotten")

Request that we delete your personal information, subject to legal and contractual requirements (e.g., retaining billing records for tax purposes).

Objection / Restriction

Object to or limit certain processing activities (e.g., analytics tracking).

Data Portability

Request a machine-readable copy of the data you provided to us (e.g., profile fields, preferences).

To exercise any of these rights, contact us at support@watermarkinword.com. We will respond to your request within 30 days. Some requests may require additional verification to protect your privacy.

7Data Retention

We retain your personal data only as long as necessary to fulfill the purposes outlined in this Privacy Policy, including:

Word Documents & Watermark Images

Immediately deleted after processing (typically within seconds). We do not retain any copies of your documents.

Usage Logs & Analytics

Aggregated, anonymized usage data may be stored for up to 12 months for service improvement purposes.

Error Logs & Performance Data

Retained for up to 90 days for debugging and optimization; then permanently deleted. No document content is included in error logs.

Security & Abuse Logs

IP addresses and security-related data retained for up to 30 days to prevent and investigate abuse.

When data is no longer needed, we either delete it or store it in anonymized, aggregated form where individual users cannot be identified.

8International Data Transfers

Watermark in Word's servers and third-party subprocessors (e.g., Cloudflare, Auth0, Stripe) may be located in the United States and other jurisdictions. By using our services, you consent to the transfer of your personal information across international borders. We implement appropriate safeguards—such as Standard Contractual Clauses (SCCs) for transfers from the European Economic Area (EEA)—to ensure adequate protection.

9Children's Privacy

Watermark in Word is intended for users aged 13 and older. We do not knowingly collect personal information from children under 13. Since our service does not require registration, we cannot verify the age of users. Parents and guardians are responsible for monitoring their children's internet usage. If we learn that we have inadvertently collected data from a child under 13, we will promptly delete that information. If you believe we might have any information from a child under 13, please contact us at support@watermarkinword.com.

10Changes to This Privacy Policy

We may update this Privacy Policy occasionally to reflect changes in our practices or legal requirements. When we make material changes:

  1. We will update the "Last Updated" date at the top of this page.
  2. If the changes are substantial (e.g., new categories of data collected or new sharing practices), we will post a prominent notice on our homepage or send an email notification to registered users.

Your continued use of Watermark in Word after any changes to this Privacy Policy constitutes acceptance of those changes.

11Contact Us

If you have any questions, concerns, or requests regarding this Privacy Policy or our data practices, please contact us:

We aim to respond to all inquiries within 30 days. Thank you for trusting Watermark in Word—we are committed to protecting your privacy and delivering a safe, efficient Markdown experience.