Trust & Security
Trust & Security
Trust & Security
Multiplayer is built with enterprise-grade security at its core.

*

*

*


*

*

*

We’re currently in our final stages of completing our SOC 2 Type II audit to independently validate the systems already in place.
* Certification audits are underway via Vanta.
How we protect your data
How we protect your data
We know you’re giving us access to the most sensitive parts of your workflow—your inbox, your calendar, your meetings. Here’s how we protect that trust at every step.

Secure by design
We don’t retain your content unnecessarily. Emails and meetings are processed in real-time to power your assistant, then cleared immediately. We do not store your emails or meeting recordings, and we never sell or use your data to train third-party.
Emails are processed in real-time, then cleared
No data is shared, sold, or used to train third-party AI models

Secure by design
We don’t retain your content unnecessarily. Emails and meetings are processed in real-time to power your assistant, then cleared immediately. We do not store your emails or meeting recordings, and we never sell or use your data to train third-party.
Refit completely transformed our kitchen, making it both beautiful and highly functional. The craftsmanship was outstanding, and the team was professional and communicative throughout. We couldn’t be happier with the result!

Rachel Morgan

Secure by design
We don’t retain your content unnecessarily. Emails and meetings are processed in real-time to power your assistant, then cleared immediately. We do not store your emails or meeting recordings, and we never sell or use your data to train third-party.
Emails are processed in real-time, then cleared
No data is shared, sold, or used to train third-party AI models

You stay in control
AI suggestions are surfaced for your review, and any action taken on your behalf can be easily adjusted or undone. You can always see what your assistant is doing and step in when needed.
Drafts are not sent without your review
AI actions are transparent

You stay in control
AI suggestions are surfaced for your review, and any action taken on your behalf can be easily adjusted or undone. You can always see what your assistant is doing and step in when needed.
Drafts are not sent without your review
AI actions are transparent

You stay in control
AI suggestions are surfaced for your review, and any action taken on your behalf can be easily adjusted or undone. You can always see what your assistant is doing and step in when needed.
Drafts are not sent without your review
AI actions are transparent

Secure infrastructure
Your data is encrypted in transit and at rest using industry-standard protocols. Access is scoped by role, reviewed regularly, and our infrastructure is continuously monitored to detect and respond to threats.
Encrypted in transit and at rest
Constant infrastructure monitoring and threat detection

Secure infrastructure
Your data is encrypted in transit and at rest using industry-standard protocols. Access is scoped by role, reviewed regularly, and our infrastructure is continuously monitored to detect and respond to threats.
Encrypted in transit and at rest
Constant infrastructure monitoring and threat detection

Secure infrastructure
Your data is encrypted in transit and at rest using industry-standard protocols. Access is scoped by role, reviewed regularly, and our infrastructure is continuously monitored to detect and respond to threats.
Encrypted in transit and at rest
Constant infrastructure monitoring and threat detection