Security Overview

Last Updated: February 27, 2026

Our Commitment

Assist Mi is designed for executives and operators who manage sensitive communications daily. We recognize that trust is foundational to our product.

We are committed to protecting customer data through thoughtful architecture, least-privilege access, and secure operational practices.

Data Architecture

Assist Mi processes user-authorized content from connected systems such as:

  • Slack
  • Google Workspace
  • Email
  • Calendars
  • Documents

Content is processed through a unified ingestion pipeline that:

  • Applies structured analysis
  • Extracts tasks, commitments, and insights
  • Generates executive briefs
  • Stores derived artifacts according to user configuration

We access only the data scopes explicitly authorized by the user or organization administrator.

Data Ownership

Customers retain ownership of their underlying data.

Assist Mi processes customer data solely to provide and improve the Service. We do not sell customer data.

AI Processing

Assist Mi may process content using:

  • Third-party AI model providers
  • Customer-configured local or on-premise models

We do not use customer content to train public AI models.

AI outputs are generated automatically and should be reviewed before being relied upon for business decisions.

Encryption

  • All data in transit is encrypted using HTTPS/TLS.
  • Access to internal systems is restricted and authenticated.
  • Production infrastructure uses secure providers with industry-standard protections.

Access Controls

  • Role-based access controls are applied internally.
  • Access to production systems is limited to authorized personnel.
  • Secrets and credentials are stored securely and not hard-coded.

Data Retention

Customer data is retained while accounts remain active and as necessary to provide the Service. Customers may request deletion of their account and associated data.

Certain logs may be retained for security and operational integrity.

Subprocessors

Assist Mi relies on carefully selected subprocessors to operate the Service. See Subprocessors.

Incident Response

We maintain internal procedures for identifying, investigating, and responding to security incidents. If a material security incident affecting customer data occurs, we will notify affected customers without unreasonable delay.

Compliance Roadmap

Assist Mi is committed to aligning with industry-standard security frameworks. As the platform scales, we intend to pursue formal compliance certifications appropriate to our customer base.

Contact

For security-related inquiries: support@assistmi.net