Lucid security

We are dedicated to keeping your data private, safe, and secure.

Contact sales
  • Privacy

    Lucid claims no ownership over any document data. You retain all intellectual property and other rights to your documents and the information contained therein. We respect your privacy and will never make your documents publicly available without permission.

    To ensure the privacy of your information, all data is transferred between user devices and Lucid servers using up to 256-bit encrypted connection via TLS 1.2 and a world-class certificate provider. Lucid also employs encryption at rest (AES-256) to protect the secrecy of all data persisted by the application. The cryptographic keys used to secure Lucid are protected by Amazon’s Key Management Services.

    Lucid is committed to CCPA and GDPR compliance and ensures that it uses an approved framework (e.g., Standard Contractual Clauses or a successor to Privacy Shield) to transfer customer’s personal data from the EEA, UK, or Switzerland to the U.S. In addition, all of Lucid’s sub-processors utilize either the SCCs or Binding Corporate Rules to transfer personal data from the EEA, UK, or Switzerland to the US.

    For more information, see our Privacy PolicyTerms of Service and FAQ.

  • Compliance certifications

    Lucid complies with applicable local and international requirements and maintains compliance certifications, including:

    • PCI
    • Privacy Shield (Lucid maintains its Privacy Shield certification with the U.S. Department of Commerce because that certification is likely to be incorporated into any framework that ultimately replaces Privacy Shield).
    • SOC 2

    Lucidchart is SOC 2 Type II audited, which represents an external verification of Lucidchart's internal processes and controls.

  • Security and availability

    Security for your data is one of our top priorities, and we have a team dedicated to securing Lucidspark’s systems, processes, and controls. Lucidspark is powered by Amazon Web Services (AWS), the industry’s leading provider of secure computing infrastructure.

    We choose AWS because of their stringent security measures, which include the following certifications: 

    • SOC 2 audits  
    • Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS)
    • ISO 27001 certification    
    • U.S. General Services Administration FISMA-Moderate level operation authorization

    To learn more about the security procedures employed by AWS, please review their documentation.

    You can securely access Lucid products at any time and from any device or location, and we offer a 99.9% uptime guarantee to enterprise customers. Documents, account information, access control lists, and other persistent data is replicated across multiple availability zones using industry-standard database management systems, replication, and failover solutions.

  • Visibility and control

    Lucid enterprise features allow you to maintain governance of your accounts so you can better adhere to compliance requirements. These features include document sharing restrictions, allowed IP restrictions, and allowed domains. We offer Key Management Service (KMS), which allows customers to control their own unique encryption keys to add an additional level of security.

    We follow security best practices and protect your data by using the principle of least privilege access. A simple role-based permissions system allows administrators to manage access to documents owned by the account. The account management tools allow account and team admins to integrate with their identity management platform and control collaboration settings.


Lucid Security Whitepaper

Get Started

  • Contact Sales


  • Lucidspark
  • Lucidchart
  • Lucidscale
  • facebook
  • Instagram
  • linkedIn
  • Glassdoor

© 2022 Lucid Software Inc.