Security Practices

Last Updated: 21 November 2019


Aspose Apps uses Amazon EC2 apps servers. Using an industry standard like Amazon helps guarantee the security and resilience of the service. Amazon has attained a number of certifications that affirm that they have stringent, working internal controls.

Physical Security

Amazon safeguards the physical security of their servers. Servers are located in non-descript facilities, and critical facilities have extensive setback and military grade perimeter control. Access to data centers requires two-factor authentication at three points.

Data Security

The host operating system is kept secure by internal processes and procedures. The guest operating system is entirely controlled by Aspose Apps. Amazon administrators do not have access to it. By default, an inbound firewall denies all traffic to the host servers.


Amazon systems are built with extensive redundancy. Aspose Apps backs up data on a daily basis. All access is logged and tracked for auditing purposes.

Maintaining Privacy

Account passwords are encrypted and filtered out from all application and system logs. Passwords are not visible to anyone.

After 30 minutes of inactivity, you are automatically signed out of your user account.

Sign out from your account to prevent someone from using your computer to access your account without your authorization. Keep your user name and password secure and not to disclose it to any third-party. In case a third-party gains unauthorized access to your account due to any act or omission on your part, you are solely responsible for any loss caused.

Aspose may collect from you at your discretion and only when authorized by you, your password to third party accounts with the purpose of linking these accounts in Aspose App. Any such password is used only in accordance with the intended use that is explained before the password is requested from you. Any password you provide is secured in line with our security policies and is not stored on Aspose servers.

Credit Card Safety

Aspose Apps does not retain any credit card information provided by you. When we charge, such information is transferred directly to, and processed by, our payment gateway.

To protect user information, Aspose Apps’s payment gateway uses the latest 256-bit Secure Socket Layer (SSL) technology for secure transactions. The payment gateway is certified as compliant with card association security initiatives including Payment Card Industry (PCI) and Cardholder Information Security Program (CISP) standards for data protection.

File Retention Policy

Aspose Apps allows customers to optionally upload files to Aspose Apps’s own storage. None of these files are accessible to any person other than the customer himself. The rules behind how long files are retained is explained in the File Retention Policy.

Concerned About Security?

Read more about Terms of Service and Privacy Policy. Do you have a question, concern, or comment about Aspose Apps security that’s not covered here? Ask on the support forums.