When you use Adobe PDF Pack, your information is protected by server authentication and data encryption through a Secure Sockets Layer (SSL) connection.
Adobe uses industry-leading security engineering processes in building its products. With services at Acrobat.com, security is considered at every level, from applications to networks to physical facilities. In addition to the latest technologies, world-class security requires ongoing adherence to best-practices policies.
Services at Acrobat.com uses some of the latest technology available for Internet security. When you access the services, Secure Sockets Layer (SSL) technology is used for both server authentication and data encryption, helping to ensure that your data and documents are available only to you and the users you authorize. All services at Acrobat.com are scanned regularly by static code analysis and dynamic web application analysis security scanning tools.
Services at Acrobat.com issues a session cookie only to record authentication information for the duration of a specific session. The session cookie does not include the username (Adobe ID) or password of the user.
Services at Acrobat.com leverages firewall protection, intrusion detection systems, SSL encryption, and proprietary protocols to help protect your important information. In addition, Acrobat.com regularly contracts independent third-party firms to perform audits and security assessments on the service, helping to ensure that best practices and industry standards are followed.
Physical facilities security
Services at Acrobat.com is hosted in a protected server environment that uses a firewall and other advanced technology to prevent interference or access from outside intruders.
The services at Acrobat.com hosting facilities are protected by multiple layers of physical security, and only authorized personnel may access the facilities and servers. In addition, all access is logged, and logs are regularly reviewed and protected from outside access. All data center equipment has physical protections in place to prevent data theft and environmental hazards in order to prevent assets from being lost, damaged, or compromised and to prevent interruption in business activities.