Skip to main content
4.8(1.2K ratings)
100% Private
2.1s avg
No install
Trusted by 100K+ users in 143 countries
Priya SharmaMarch 202613 min read
Compliance13 min read

Compliance Guide: GDPR, HIPAA & SOC 2 for File Processing

Complete compliance guide for file processing: GDPR, HIPAA, SOC 2, FERPA, and CCPA requirements for document tools. How client-side processing eliminates compliance burden.

2,700 words

Try it free — no signup required

Process files privately in your browser. Nothing is uploaded to any server.

Open ToolFiles never leave your browser

Why Compliance Matters for File Processing

Every time you upload a document to an online tool, you create a data processing event. That event has regulatory implications. A hospital uploading patient records to a PDF compressor creates a HIPAA obligation. A school scanning student transcripts with a cloud-based app creates a FERPA obligation. A European company compressing employee contracts online creates a GDPR obligation.

Most organizations do not think about their document processing tools as compliance risks. They should. The file you compress, convert, scan, or edit contains data -- often highly sensitive data. The tool you use determines whether that data stays under your control or passes through third-party infrastructure.

This guide covers five major compliance frameworks -- GDPR, HIPAA, SOC 2, FERPA, and CCPA -- and explains exactly how each applies to file processing tools. We compare the compliance implications of server-side processing versus client-side processing, and explain why browser-based tools like MiOffice eliminate entire categories of compliance burden.

GDPR: The European Data Protection Standard

What GDPR Requires

The General Data Protection Regulation (GDPR) applies to any organization that processes personal data of EU/EEA residents. It defines two key roles:

  • Data Controller -- The entity that determines the purposes and means of processing personal data (your organization)
  • Data Processor -- The entity that processes personal data on behalf of the controller (the tool/service provider)

When you upload a document containing personal data (names, addresses, IDs, financial information) to an online PDF tool, that tool becomes a Data Processor. Under GDPR Article 28, this requires:

  1. Data Processing Agreement (DPA) -- A binding contract specifying what data is processed, how it is protected, and when it is deleted.
  2. Lawful basis for processing -- The controller must have a lawful basis (consent, legitimate interest, etc.) for sharing data with the processor.
  3. Data minimization -- Only data necessary for the processing purpose should be shared.
  4. Right to erasure -- The processor must be able to delete all personal data on request.
  5. Breach notification -- The processor must notify the controller within 72 hours of a data breach.
  6. Cross-border transfer safeguards -- If the processor is outside the EU, Standard Contractual Clauses (SCCs) or adequacy decisions are required.

How Client-Side Processing Eliminates GDPR Burden

When a tool processes files entirely in the browser, no personal data reaches the service provider. The tool never becomes a Data Processor because it never processes personal data. This means:

  • No DPA required
  • No cross-border transfer concerns (data never leaves the user device)
  • No breach notification obligations (no data to breach)
  • No data retention questions (no data is retained)
  • No right-to-erasure requests to manage (nothing to erase)

This is not a loophole -- it is architecturally correct. The GDPR was designed to regulate data processing. If no data processing occurs on the service provider side, the regulation does not apply to the service provider relationship.

HIPAA: Healthcare Data Protection

What HIPAA Requires

HIPAA (Health Insurance Portability and Accountability Act) protects Protected Health Information (PHI) -- any individually identifiable health information. This includes patient names, medical record numbers, diagnoses, treatment plans, insurance information, and Social Security numbers in medical contexts.

Under HIPAA, any entity that handles PHI on behalf of a Covered Entity (healthcare provider, health plan, clearinghouse) is a Business Associate. Business Associates must:

  • Sign a Business Associate Agreement (BAA) -- A legally binding contract outlining PHI safeguards
  • Implement administrative, physical, and technical safeguards -- Encryption, access controls, audit logs
  • Report breaches -- Notify the Covered Entity within 60 days of discovering a breach
  • Restrict PHI use -- Only use PHI for the specific purpose authorized by the BAA

The penalties for HIPAA violations are severe: $100 to $50,000 per violation (per affected record), with annual maximums up to $2.067 million per violation category. Criminal penalties can include up to 10 years imprisonment.

HIPAA and File Processing Tools

When a healthcare organization uploads a patient document to an online PDF tool, that tool receives PHI. The tool becomes a Business Associate. Most free online tools -- iLovePDF, Smallpdf, PDF24 -- do not offer BAAs. Using them for PHI is a HIPAA violation, regardless of how briefly the file is stored on their servers.

MiOffice processes files entirely in the browser. PHI never leaves the healthcare organization device. Since no PHI reaches MiOffice, MiOffice does not meet the HIPAA definition of a Business Associate. No BAA is needed. For a detailed analysis, see our HIPAA-compliant PDF converter guide and our HIPAA compliance page.

SOC 2: Enterprise Security Framework

What SOC 2 Requires

SOC 2 (System and Organization Controls 2) is an audit framework developed by the AICPA. It evaluates service providers based on five Trust Service Criteria:

  1. Security -- Protection against unauthorized access (the only required criterion)
  2. Availability -- System is available for operation as committed
  3. Processing Integrity -- System processing is complete, valid, accurate, and timely
  4. Confidentiality -- Information designated as confidential is protected
  5. Privacy -- Personal information is collected, used, retained, and disclosed in conformity with commitments

When your organization uses a server-based document tool, that tool enters your SOC 2 audit scope as a subservice organization. This means your auditor must evaluate the tool vendor or you must obtain their SOC 2 report. This adds cost, complexity, and risk to your audit.

How Zero-Upload Architecture Removes Audit Scope

If a tool never receives customer data, it cannot be a subservice organization for SOC 2 purposes. Client-side processing removes the tool from audit scope entirely. Your auditor does not need the vendor SOC 2 report, does not need to assess their controls, and does not need to document the relationship in your system description.

For a deep dive into how zero-upload architecture simplifies SOC 2 compliance, see our guide on zero-upload SOC 2 compliance and our SOC 2 compliance page.

FERPA: Education Data Protection

FERPA (Family Educational Rights and Privacy Act) protects student education records. It applies to all educational institutions that receive federal funding -- virtually every public school and most private institutions in the United States.

Student education records include: grades, transcripts, class schedules, disciplinary records, IEPs (Individualized Education Programs), attendance records, and financial aid information. When a school uses an online tool to process any document containing this information, the tool vendor becomes a "school official" under FERPA and must have a legitimate educational interest.

Most schools handle FERPA compliance through vendor agreements. But with client-side tools, there is nothing to agree on -- no student data reaches the vendor. Teachers and administrators can compress, convert, scan, and edit student documents using MiOffice without creating any FERPA obligations.

For a comprehensive FERPA guide, see our FERPA compliance guide for school IT administrators and our FERPA-compliant tools page.

CCPA: California Consumer Privacy

The California Consumer Privacy Act (CCPA), amended by the CPRA, gives California residents rights over their personal information. Businesses that collect personal information from California residents must:

  • Disclose what personal information is collected and why
  • Allow consumers to opt out of the sale of their personal information
  • Delete personal information on request
  • Provide equal service regardless of whether a consumer exercises their rights

When a file processing tool uploads documents containing personal information (names, addresses, SSNs, financial data) to its servers, it collects personal information under CCPA. The tool must be disclosed in the business privacy policy, honor deletion requests, and potentially offer opt-out mechanisms.

Client-side tools never collect personal information from the files they process. The personal information stays on the user device, never reaching the service provider. CCPA obligations related to file processing are eliminated. For details, see our CCPA-compliant file converter page.

Server-Side vs. Client-Side: Compliance Impact Matrix

Compliance RequirementServer-Side ToolsClient-Side (MiOffice)
GDPR Data Processing AgreementRequiredNot applicable
HIPAA Business Associate AgreementRequiredNot applicable
SOC 2 subservice auditIn scopeOut of scope
FERPA vendor agreementRequiredNot applicable
CCPA disclosureRequiredNot applicable
Cross-border data transferSCCs requiredNo transfer occurs
Breach notificationVendor obligationNo data to breach
Data retention policyVaries (1-24 hrs)Zero (never stored)
Vendor risk assessmentAnnual reviewNot applicable

The pattern is clear across all five frameworks: client-side processing eliminates the compliance obligations that server-side processing creates. This is not about avoiding compliance -- it is about achieving compliance by design. When sensitive data never leaves the user device, the entire category of third-party data processing risk disappears.

Real-World Compliance Scenarios

Scenario 1: Hospital Compressing Patient Records

A hospital needs to compress patient discharge summaries (containing PHI) before emailing them to referring physicians. Using iLovePDF or Smallpdf uploads PHI to their servers -- a HIPAA violation without a BAA. Using MiOffice keeps the PHI on the hospital workstation. Compliance achieved with zero vendor paperwork.

Scenario 2: School Scanning Student Transcripts

A school registrar needs to scan and digitize student transcripts. Using CamScanner or Adobe Scan uploads student records to cloud servers -- requiring FERPA vendor agreements. Using MiOffice Scanner processes the scans in the browser. Student records stay on the school device. FERPA compliance maintained without vendor negotiations.

Scenario 3: Law Firm Converting Contracts to Word

A law firm needs to convert a client contract from PDF to Word for redlining. The contract contains privileged information and financial terms. Using an online converter uploads the contract to a third-party server -- creating confidentiality risk and SOC 2 audit scope. Using MiOffice PDF to Word converts in the browser. Client privilege is preserved.

Scenario 4: EU Company Processing Employee Data

A German company needs to merge employee performance reviews into a single PDF. The reviews contain personal data (names, salaries, evaluations) of EU residents. Using a US-based PDF merger requires SCCs for cross-border transfer under GDPR. Using MiOffice keeps the data on the company device within the EU. No transfer, no SCCs, no DPA.

How to Evaluate File Processing Tools for Compliance

When selecting document processing tools for a regulated organization, ask these questions:

  1. Where is the file processed? Client-side (browser) or server-side (cloud)? This is the most important question. If the answer is client-side, most compliance concerns are eliminated.
  2. What data does the service provider access? Even if files are processed server-side, does the provider access file contents, or just metadata?
  3. What agreements are available? Does the provider offer BAAs (HIPAA), DPAs (GDPR), vendor agreements (FERPA)?
  4. Where are servers located? Relevant for GDPR cross-border transfers and data sovereignty requirements.
  5. What is the data retention policy? How long are files stored after processing? Is deletion automatic?
  6. Has the provider had security incidents? Check breach disclosures and security audit reports.
  7. Does the provider have a SOC 2 report? For enterprise tools, a SOC 2 Type II report demonstrates audited controls.

MiOffice Compliance Architecture

MiOffice is built on a zero-upload architecture. All file processing -- PDF compression, image conversion, document scanning, video processing, AI operations -- happens in the browser using WebAssembly, Canvas API, and Web Workers. The architecture has several compliance-relevant properties:

  • No file upload -- Files are read from the local filesystem using the File API. They are processed in browser memory. Results are downloaded via Blob URLs. No file data is transmitted over the network.
  • No server-side processing -- The server delivers static HTML, CSS, JavaScript, and WASM files. It does not process user files. The API endpoints handle analytics and engagement tracking only -- never file content.
  • No persistent storage of file data -- File data exists only in browser memory during processing. Closing the tab releases all memory. No file content is written to localStorage, IndexedDB, or cookies.
  • Verifiable by the user -- Users can verify the zero-upload claim by opening browser DevTools > Network tab while processing a file. No file data requests appear.

For more details on MiOffice security and compliance certifications, visit our certifications hub.

Framework-Specific Compliance Pages

For detailed guidance on individual frameworks, see these dedicated resources:

Related Blog Posts

Conclusion

Compliance for file processing is not optional -- it is a legal requirement for any organization handling regulated data. GDPR, HIPAA, SOC 2, FERPA, and CCPA all create obligations when sensitive data passes through third-party services. The penalties for non-compliance range from regulatory fines to criminal prosecution.

The simplest path to compliance is eliminating the data flow that creates the obligation. When your file processing tool runs entirely in the browser, no sensitive data reaches any third party. No BAAs, no DPAs, no vendor assessments, no audit scope expansion. Compliance by architecture, not by paperwork.

MiOffice processes PDFs, images, video, and documents 100% client-side. Your files never leave your browser. For regulated organizations, this is the most straightforward path to compliant document processing.

Frequently Asked Questions

Does using online PDF tools violate HIPAA?
It depends on the tool. If a PDF tool uploads your file to a server, it becomes a "business associate" under HIPAA and must sign a BAA (Business Associate Agreement). Most free online tools do not offer BAAs, making their use with PHI a HIPAA violation. Client-side tools like MiOffice never access your files, so they do not meet the definition of a business associate -- no BAA is needed.
Is it safe to use free PDF tools for GDPR-protected data?
Under GDPR, any service that processes personal data is a "data processor" and must comply with Article 28 requirements: Data Processing Agreements, lawful basis for processing, data minimization, and right to erasure. If the tool processes files on a server (even temporarily), it is a data processor. MiOffice processes files in the browser only, never accessing personal data, so it falls outside the data processor definition.
What is SOC 2 Type II and why does it matter for file tools?
SOC 2 Type II is an audit framework that evaluates how a service provider handles customer data over time (typically 6-12 months). It covers five trust principles: Security, Availability, Processing Integrity, Confidentiality, and Privacy. If your organization uses a server-based PDF tool, that tool is in your SOC 2 audit scope. Client-side tools like MiOffice are out of scope because no customer data reaches the service provider.
Do schools need FERPA compliance for document scanning?
Yes. FERPA protects student education records, including scanned transcripts, grade reports, IEPs, and disciplinary records. If a school uses a scanner app that uploads to cloud servers, those servers must comply with FERPA. MiOffice Scanner processes scans entirely in the browser, keeping student records on the school device and out of third-party servers.
What is a Data Processing Agreement (DPA)?
A DPA is a legally binding contract between a data controller (your organization) and a data processor (the service provider). Required under GDPR Article 28, it specifies what data is processed, how it is protected, breach notification procedures, and data deletion terms. Any online tool that touches personal data requires a DPA. Client-side tools that never access your data do not require one.
Can I use MiOffice for processing medical documents?
Yes. Because MiOffice processes files 100% in the browser, your medical documents (PHI) never leave your device. No server receives, stores, or processes the data. This means MiOffice does not meet the HIPAA definition of a business associate, and no BAA is required. This is the simplest path to HIPAA-compliant document processing.
What is the CCPA and how does it affect file processing?
The California Consumer Privacy Act (CCPA) gives California residents rights over their personal information, including the right to know what data is collected and the right to delete it. If an online tool collects personal information from files (names, SSNs, addresses processed on servers), it must comply with CCPA. Client-side tools never collect this information, so CCPA obligations do not apply.

Share this article

Works on all your devicesChromeSafariFirefoxEdgeiPhoneAndroidMacWindowsLinuxChromebook

Priya Sharma

Technical Writer

Writes step-by-step guides and tutorials that make complex file processing simple.

View all posts by Priya Sharma