Security & Trust at Mayday

Built for teams. Secured for complex organisations

We take security seriously. Our controls and engineering practices meet the standards your IT team expects

Trust Mayday to keep your data safe

Regular independent penetration testing

Encryption in transit and at rest

SSO and MFA support via Xero and Intuit

24/7 infrastructure monitoring and alerting

Secure development lifecycle with code reviews

We only work with trusted third party providers

Trusted by 12,000 organisations with 300+ five star reviews

Uptime & Reliability

Built for 24/7 availability and business continuity

Current Uptime (Rolling 12 Month average)

99.99%

View Status Page

Real-time system status and incident history [status.getmayday.com]

Data & Flows

Transparency on where data goes and who touches it

What We Read

Chart of accounts, transactions, invoices, contacts, and other accounting data from Xero/Intuit. See full list.

What We Write

Journal entries, invoices, bills, contacts, chart of accounts back to Xero or Intuit.

Data Ownership

You retain full ownership of all data processed through Mayday.

Data Retention

Data is retained for the duration of your subscription and deleted after account closure

We work with industry-leading suppliers

CLOUD SERVICE PROVIDER
AWS
CRM
Hubspot
SUPPORT
Intercom
Subscription management
Paddle
Analytics service
Mixpanel

Security Practices & Controls

Comprehensive security measures across every layer. Read more.

Access Control & Authentication

  • SSO support via Xero and Intuit
  • Multi-factor authentication (MFA) required by accounting platforms
  • Role-based access controls

Infrastructure Security

  • Hosted on enterprise cloud infrastructure (AWS)
  • VPC isolation
  • Web Application Firewall

Data Security

  • Encryption in transit (TLS 1.2+)
  • Encryption at rest for all stored data
  • Data segregation between customers

Monitoring & Incident Response

  • 24/7 infrastructure monitoring and alerting
  • Centralised logging and audit trails
  • Incident response playbooks and procedures

Compliance & Legal

Meeting regulatory requirements across jurisdictions

UK/EU Data Protection

Full compliance with GDPR requirements for data privacy and protection.

Australian Privacy Principles (APPs)

Privacy and local data protection practices aligned with the Australian Privacy Principles.