Bates Numbering Security: Why Client-Side Processing Matters
When handling confidential legal documents, security isn't optional. This guide explains why client-side Bates numbering is the only truly secure option for attorney-client privileged materials, medical records, and sensitive business documents.

Table of Contents
Understanding Security Models
The security of your Bates numbering process depends entirely on where document processing occurs. This fundamental architectural decision determines whether your confidential documents remain private or become vulnerable to breaches, unauthorized access, and compliance violations.
Critical Security Warning
Most online PDF tools (including many popular services) use server-side processing, requiring you to upload confidential documents to their servers. This creates unacceptable security risks for legal materials, medical records, and sensitive business documents. BatesFast is one of the few tools that uses true client-side processing - your documents never leave your computer. Always verify a tool's architecture before processing confidential files.
The Two Processing Models
Client-Side (Secure)
Processing happens in your browser. Documents never leave your device.
Server-Side (Risky)
Documents uploaded to remote servers for processing.
Client-Side Processing Explained
How It Works
Client-side Bates numbering uses WebAssembly or JavaScript to process documents entirely within your web browser:
- You load the web page: The application code downloads to your browser
- You select documents: Files are read directly from your computer into browser memory
- Processing occurs locally: Your browser applies Bates numbers using local computing power
- You download results: Stamped PDFs are saved directly to your computer
- No transmission: At no point are documents sent to any server
🔒 Security Guarantee
With client-side processing, your documents physically cannot leave your computer. The application has no mechanism to upload files. Even if the service provider wanted to access your documents, they technically cannot.
Security Benefits
- Zero upload risk: Documents never transmitted over internet
- No server storage: No copies retained anywhere
- Complete privacy: Provider never sees document contents
- No access logs: No record of what you processed
- Offline capable: Works without internet after initial page load
- No accounts needed: No personal information collected
Verifying Client-Side Processing
You can verify a tool uses client-side processing:
- Open browser Developer Tools (F12)
- Go to Network tab
- Process a document
- Check for file uploads - client-side tools show none
- Alternatively, disconnect internet after page loads - client-side tools continue working
Server-Side Processing Risks
The Upload Problem
Server-side Bates numbering requires uploading your documents to the provider's servers. This creates multiple security vulnerabilities:
Data Breach Exposure
Your documents become part of the provider's data. If their servers are breached, your confidential documents are exposed. Major data breaches occur regularly, affecting millions of users.
Unauthorized Access
Provider employees may access your documents for "quality assurance," "debugging," or other purposes. You have no way to verify who views your files or when.
Permanent Records
Even if providers claim to delete files after processing, server logs, backups, and caches may retain copies indefinitely. You cannot verify deletion.
Legal Process Vulnerability
Documents stored on provider servers can be subpoenaed, searched by law enforcement, or accessed by government agencies. Your confidential materials become subject to third-party legal process.
Privilege Waiver Risk
Uploading attorney-client privileged documents to third-party servers may constitute a waiver of privilege. Courts have found that sharing privileged materials with third parties without proper safeguards destroys confidentiality.
Real Breach Examples
Major document processing services have experienced breaches:
- Cloud storage providers: Millions of documents exposed
- PDF processing services: User files accessed by unauthorized parties
- Document management systems: Customer data stolen in ransomware attacks
- Legal tech platforms: Confidential case files compromised
Compliance and Legal Requirements
Attorney-Client Privilege
Attorneys have a duty to protect client confidences. Using server-side processing for privileged documents creates risks:
- Inadvertent disclosure: Uploading to third parties may waive privilege
- Reasonable precautions: Ethical rules require reasonable security measures
- Client consent: Sharing privileged materials requires informed client consent
- Professional responsibility: Bar associations increasingly scrutinize cloud security
HIPAA Compliance
For medical records and Protected Health Information (PHI):
| Requirement | Client-Side | Server-Side |
|---|---|---|
| Business Associate Agreement | Not Required | Required |
| PHI Transmission | None | Yes |
| Third-Party Access | Impossible | Possible |
| Breach Notification Risk | Zero | High |
GDPR and Data Protection
European data protection laws require strict controls on personal data processing. Client-side processing avoids GDPR complications because data never leaves the user's device - no cross-border transfer, no third-party processing, no data controller obligations.
Real-World Security Scenarios
Scenario 1: Litigation Discovery
Situation: You need to Bates number 10,000 pages of discovery documents containing attorney-client privileged communications.
Server-Side Risk: Uploading privileged documents to third-party servers may waive privilege. If the provider is breached, opposing counsel could potentially access your privileged materials.

Client-Side Solution: Documents never leave your computer. Privilege remains intact. Zero breach risk.
Scenario 2: Medical Records
Situation: Personal injury case requiring Bates numbering of patient medical records.
Server-Side Risk: HIPAA violation if provider lacks proper BAA. PHI exposure in case of breach. Potential regulatory fines.
Client-Side Solution: No PHI transmission. No BAA required. Full HIPAA compliance.
Scenario 3: Trade Secrets
Situation: Corporate litigation involving confidential business information and trade secrets.
Server-Side Risk: Trade secret protection requires reasonable security measures. Uploading to third parties may destroy trade secret status.
Client-Side Solution: Trade secrets never exposed to third parties. Protection maintained.
Security Best Practices
Choosing Secure Tools
- Verify client-side processing: Test with browser developer tools
- Check privacy policy: Ensure no data collection or storage
- Avoid account requirements: Tools requiring accounts may track usage
- Test offline: True client-side tools work without internet
- Review source code: Open-source tools allow security audits
Document Handling
- Use client-side tools for all confidential documents
- Never upload privileged materials to server-side services
- Maintain original un-numbered documents securely
- Use encrypted storage for sensitive files
- Follow your organization's data security policies
Professional Responsibility
- Understand your ethical obligations regarding client confidentiality
- Document your security measures and tool selection
- Obtain client consent for any third-party processing
- Stay informed about data security best practices
- Review and update security procedures regularly
Frequently Asked Questions
How can I tell if a tool uses client-side processing?
Open your browser's Network tab (F12 → Network) and process a document. Client-side tools show no file uploads. You can also disconnect your internet after the page loads - client-side tools continue working offline.
Is client-side processing as fast as server-side?
Yes, often faster. Modern WebAssembly technology allows browser-based processing to match or exceed server-side speeds, without the delays of uploading and downloading large files.
Can server-side tools be made secure?
While server-side tools can implement security measures (encryption, access controls, etc.), they fundamentally require trusting a third party with your confidential documents. Client-side processing eliminates this trust requirement entirely.
What about encrypted uploads?
Encryption protects data in transit, but server-side tools must decrypt files to process them. Once decrypted on their servers, documents are vulnerable to the same risks: breaches, unauthorized access, and retention.
Which tool should I use for confidential documents?
Use BatesFast or other verified client-side tools. BatesFast processes documents entirely in your browser using WebAssembly, ensuring your confidential materials never leave your computer. It's fast, secure, and provides maximum privacy — $170 one-time purchase with a 10-day free trial.
Conclusion
For confidential legal documents, medical records, and sensitive business materials, security isn't negotiable. Client-side Bates numbering provides absolute security by ensuring your documents never leave your computer.
Server-side processing creates unacceptable risks: data breaches, unauthorized access, compliance violations, and potential privilege waiver. The convenience of online tools doesn't require sacrificing security - client-side processing offers both. Choose tools that protect your clients' confidences and your professional obligations.
Use the Most Secure Bates Numbering Tool
BatesFast uses client-side processing — your documents never leave your computer. Zero upload risk. Start with a 10-day free trial, then $170 one-time purchase.
Try BatesFast Now