Security Overview
Last Updated: February 27, 2026
Our Commitment
Assist Mi is designed for executives and operators who manage sensitive communications daily. We recognize that trust is foundational to our product.
We are committed to protecting customer data through thoughtful architecture, least-privilege access, and secure operational practices.
Data Architecture
Assist Mi processes user-authorized content from connected systems such as:
- Slack
- Google Workspace
- Calendars
- Documents
Content is processed through a unified ingestion pipeline that:
- Applies structured analysis
- Extracts tasks, commitments, and insights
- Generates executive briefs
- Stores derived artifacts according to user configuration
We access only the data scopes explicitly authorized by the user or organization administrator.
Data Ownership
Customers retain ownership of their underlying data.
Assist Mi processes customer data solely to provide and improve the Service. We do not sell customer data.
AI Processing
Assist Mi may process content using:
- Third-party AI model providers
- Customer-configured local or on-premise models
We do not use customer content to train public AI models.
AI outputs are generated automatically and should be reviewed before being relied upon for business decisions.
Encryption
- All data in transit is encrypted using HTTPS/TLS.
- Access to internal systems is restricted and authenticated.
- Production infrastructure uses secure providers with industry-standard protections.
Access Controls
- Role-based access controls are applied internally.
- Access to production systems is limited to authorized personnel.
- Secrets and credentials are stored securely and not hard-coded.
Data Retention
Customer data is retained while accounts remain active and as necessary to provide the Service. Customers may request deletion of their account and associated data.
Certain logs may be retained for security and operational integrity.
Subprocessors
Assist Mi relies on carefully selected subprocessors to operate the Service. See Subprocessors.
Incident Response
We maintain internal procedures for identifying, investigating, and responding to security incidents. If a material security incident affecting customer data occurs, we will notify affected customers without unreasonable delay.
Compliance Roadmap
Assist Mi is committed to aligning with industry-standard security frameworks. As the platform scales, we intend to pursue formal compliance certifications appropriate to our customer base.
Contact
For security-related inquiries: support@assistmi.net