We are dedicated to keeping your data private, safe, and secure across Lucidchart, Lucidspark, and Lucidscale.
Get the answers you need
Lucid maintains up-to-date security documentation, certifications, and answers to commonly asked questions in our trust center so you can get answers to your security questions in an instant. Our trust center includes our SOC 2, CAIQ, and SIG documentation, in addition to 30+ more documents.
Lucid’s approach to security
Lucid recognizes that your data is a valuable asset that must be protected. Read our white paper for more details about how our security policies, practices, and procedures safeguard customer data in Lucidchart, Lucidspark, and Lucidscale.
Lucid claims no ownership over any document data. You retain all intellectual property and other rights to your documents and the information contained therein. We respect your privacy and will never make your documents publicly available without permission.
To ensure the privacy of your information, all data is transferred between user devices and Lucid servers using up to 256-bit encrypted connection via TLS 1.2 and a world-class certificate provider. Lucid also employs encryption at rest (AES-256) to protect the secrecy of all data persisted by the application. The cryptographic keys used to secure Lucid are protected by Amazon’s Key Management Services.
Lucid is committed to CCPA and GDPR compliance and ensures that it uses an approved framework (e.g., Standard Contractual Clauses or a successor to Privacy Shield) to transfer customers’ personal data from the EEA, UK, or Switzerland to the U.S. In addition, all of Lucid’s sub-processors utilize either the SCCs or Binding Corporate Rules to transfer personal data from the EEA, UK, or Switzerland to the US. Lucid is EU-US Privacy Shield certified.
For more information, see these resources:
We know that cloud storage requires extra effort to protect your data. Lucidscale security includes processes to keep your data secure and accessible to the right people. We use best practices for security for all three cloud providers that integrate with Lucidscale: AWS, Azure, and GCP.
Security and availability
Security for your data is one of our top priorities, and we have a team dedicated to securing Lucid’s systems, processes, and controls. Lucid is powered by Amazon Web Services (AWS), the industry’s leading provider of secure computing infrastructure.
We choose AWS because of their stringent security measures, which include:
- SOC 2 audits
- Level 1 service provider under the Payment Card Industry (PCI) Data Security Standard (DSS)
- ISO 27001 certification
- U.S. General Services Administration FISMA-Moderate level operation authorization
- FedRAMP Authorized at the Moderate security impact level
You can securely access Lucid products at any time and from any device or location. Lucid offers a 99.9% uptime guarantee to enterprise customers. We do this by replicating documents, account information, access control lists, and other persistent data across multiple availability zones using industry-standard database management systems, and failover solutions.
Visibility and control
Lucid enterprise features allow you to maintain governance of your accounts so you can better adhere to compliance requirements. These features include document sharing restrictions, allowed IP restrictions, and allowed domains. We offer Key Management Service (KMS), which allows customers to control their own unique encryption keys to add an additional level of security.
We follow security best practices and protect your data by using the principle of least privilege access. A simple role-based permissions system allows administrators to manage access to documents owned by the account. The account management tools allow account and team admins to integrate with their identity management platform and control collaboration settings.
Lucid enables third-party researchers to find and report security bugs in our products through our bug bounty program, hosted by HackerOne. If you would like to join our program, please send your HackerOne username to email@example.com.
If you believe you have found a security bug in our products, you are also welcome to send the details directly to firstname.lastname@example.org rather than making your report through HackerOne. However, bounties will only be awarded through our HackerOne program.