Logo 5FSoftware
5FSoftware | Plattform für Datenaustausch und Kommunikation
Security2026-02-23T19:43:37+01:00

Flag Germany/EU This page applies to Germany/the EU.

Information for Switzerland/Liechtenstein can be found here. Flag Switzerland

Security

5F was developed specifically for professionals bound by confidentiality and meets the highest data protection and data security standards.

Our platform is hosted on the Open Telekom Cloud.

  • Data centers in Germany

  • Maximum protection from failure thanks to twin-core technology

  • Numerous ISO certifications, including ISO/IEC 27017 and ISO/IEC 27018

  • Meets criteria of the BSI C5 catalog and the Service Organisation Controls reports (SOC 1, SOC 2 and SOC 3)

  • GDPR-compliant, confirmed by the Trusted Cloud Label for trustworthy cloud services

Logo d.velop postbox

Together with our partner d.velop AG, we provide a cloud-based DMS for storing your documents.

  • Data center with ISO/IEC 27001 certification, location Germany

  • Standard IDW PS880: Audit-proof archiving of documents according to GoBD standard possible

  • Symmetric encryption (AES-256-bit)

  • Asymmetric encryption (public/private key method using a combination of AES-256-bit and RSA-4096-bit)

Contact

Security

sicherheit@5fsoftware.de

Data protection

datenschutz@5fsoftware.de

Logo Bundesverband IT-Mittelstand e.V. | Software Made in Germany
Logo Bundesverband IT-Mittelstand e.V. | Software Hosted in Germany
secjur GmbH | Datenschutz
Is 5F GDPR-compliant?2026-02-23T19:38:35+01:00

Yes. 5F is designed and operated to be GDPR-compliant. We process personal data exclusively for specific purposes and, by default, apply a level of protection based on the requirements for persons subject to professional secrecy.

Is 5F suitable for professionals bound by confidentiality (§ 203 StGB)?2026-02-23T19:38:35+01:00

Yes. 5F was designed for professionals bound by confidentiality. Our employees and subprocessors are committed to confidentiality—particularly in accordance with § 203 StGB and professional regulations (including §§ 50a WPO, 62a StBerG, 43e BRAO).

Who is the contact person for data protection at 5F?2026-02-23T19:38:30+01:00

For data protection matters, you can reach us at datenschutz@5fsoftware.de.

In addition, we have appointed an external data protection officer in accordance with Art. 37 GDPR:

Niklas Hanitsch
secjur GmbH
Falkensteiner Ufer 40
22587 Hamburg
Tel.: +49 40/80 90 81 146
E-mail: dsb@secjur.de

You can also contact the data protection officer directly if required.

Where is my data stored?2026-01-29T17:34:30+01:00

Your data is processed and stored in ISO-certified data centers in Germany. Our operations are consistently geared towards data sovereignty, ensuring that your data does not leave Germany.

Is 5F “Made in Germany”?2026-02-23T19:38:28+01:00

Yes. 5F is developed and maintained in-house in Germany. Development and support are based in Regensburg. Hosting and operations are provided by operators and data centers in Germany.

How is data encrypted in 5F?2026-02-23T19:38:26+01:00

Data transmission between your web browser and 5F is encrypted via TLS. For compatibility reasons, TLS 1.2 is set as the minimum level, with AES-128 and SHA-256. If your browser supports it, TLS 1.3 with stronger methods such as AES-256 and SHA-384 is used. Stored data is encrypted (AES-256). If the security assessment of methods changes, we adjust the configuration immediately.

How does 5F protect my data from cyberattacks?2026-02-23T19:38:46+01:00

We rely on a multi-level approach consisting of technical and organizational measures to reduce the attack surface and minimize risks. These include:

  • Frequent security updates and regular cloud releases
  • Protection in the hosting environment, for example through firewalls and DoS detection
  • Physical separation of application and data servers
  • Backups to secure data
  • Measures to protect user accounts and passwords
  • Maintenance and care by internal employees, without external service providers

We would be happy to provide you with more information about our technical and organizational measures (TOMs) upon request.

Does 5F scan uploaded files for malware/viruses?2026-02-23T19:38:50+01:00

No. 5F does not perform automatic virus scanning of files during upload. When downloading, the antivirus programs deployed in your environment can scan the files as usual. Additionally, certain file formats that could potentially contain malicious code are blocked during upload in 5F (e.g., .exe).

Can I make two-factor authentication (2FA) mandatory?2026-01-29T17:34:25+01:00

Yes. Administrators can enable mandatory 2FA for the entire organization. Once this setting is enabled, all users with access to the organization must set up 2FA and then use it each time they log in.

Depending on the configuration, SMS tokens and/or an authenticator app are available for selection.

Who can access content in 5F – and how do I control permissions?2026-02-23T19:38:43+01:00

Only people you add as users or participants in 5F and authorize accordingly can access content. Access control is managed through roles and permissions that you assign in the organization and project settings and can adjust at any time as needed.

How are accesses and changes made traceable (audit trail)?2026-02-23T19:38:49+01:00

5F features an integrated audit trail. It automatically logs activities within the platform in chronological order. The audit trail is accessible to authorized users, can be exported for archiving purposes, and cannot be modified retroactively. Full-text search and filter functions are available for evaluation.

Does 5F enable audit-proof archiving?2026-02-23T19:38:23+01:00

Yes. In combination with the integrated DMS of our partner d.velop AG, audit-proof archiving of documents according to GoBD is possible (according to IDW PS 880).

How can I export data (e.g. at the end of the contract)?2026-02-23T19:38:38+01:00

For exporting your data, 5F provides standardized export functions. This allows authorized business users to download and save documents and content locally, either individually or collectively per workflow, as needed.

What data protection and security documents do you provide (e.g. DPA, TOMs)?2026-01-29T17:34:07+01:00

We would be happy to provide you with the usual documents for your review. These include in particular the DPA (including an overview of sub-processors) and information on the technical and organizational measures (TOMs). We provide a white paper on IT security in two versions: A general version is available to all users on the platform and can be shared or requested from us if required. A detailed, confidential version is available to licensees on request after signing a non-disclosure agreement.

On request, we can also provide you with evidence of certifications of our hosting and partner services, such as ISO certifications for Telekom/Open Telekom Cloud and d.velop.

How can I responsibly report a security vulnerability at 5F?2026-02-23T19:38:45+01:00

If you discover a potential security vulnerability in 5F, please report it confidentially via email to sicherheit@5fsoftware.de. As IT enthusiasts, we appreciate constructive feedback from the security and developer community. We are aware that security research (white-hat hacking) can also lead to legal uncertainties. If you act fairly, do not access or alter third-party data, and do not impair our systems, you will not have to fear legal action from us. Please allow us a reasonable amount of time to fix the issue before publishing any details.

More information can be found at 5fsoftware.de/responsible-disclosure.

Questions about security at 5F?
Please do not hesitate to contact us.

Go to Top