Logo 5FSoftware
5FSoftware | Plattform für Datenaustausch und Kommunikation
Security2026-01-30T02:33:40+01:00

Security

5F was specifically developed for professionals subject to professional secrecy and meets the highest data protection and data security standards.

Unsere Plattform wird in der Open Telekom Cloud gehostet.

  • Rechenzentren in Deutschland

  • Maximaler Ausfallschutz dank Twin-Core-Technologie

  • Zahlreiche ISO-Zertifizierungen, darunter ISO/IEC 27017 und ISO/IEC 27018

  • Erfüllt Kriterien des BSI C5-Katalogs und der Service Organisation Controls Berichte (SOC 1, SOC 2 und SOC 3)

  • DSGVO-konform, bestätigt durch das Trusted Cloud Label für vertrauenswürdige Cloud-Services

Together with our partner d.velop AG, we provide a cloud-based DMS for storing your documents.

  • Rechenzentrum mit Zertifizierung ISO/IEC 27001, Standort Deutschland

  • Standard IDW PS880: Revisionssichere Archivierung von Dokumenten nach GoBD-Standard möglich

  • Symmetrische Verschlüsselung (AES-256-bit)

  • Asymmetrische Verschlüsselung (Public/Private Key Verfahren mit einer Kombination aus AES-256-bit und RSA-4096-bit)

Kontakt

Sicherheit

sicherheit@5fsoftware.de

Datenschutz

datenschutz@5fsoftware.de

Logo Bundesverband IT-Mittelstand e.V. | Software Made in Germany
Logo Bundesverband IT-Mittelstand e.V. | Software Hosted in Germany
secjur GmbH | Datenschutz
Is 5F GDPR-compliant?2026-01-29T17:34:13+01:00

Yes. 5F is designed and operated to be GDPR-compliant. We process personal data exclusively for specific purposes and, as a standard, base the level of protection on the requirements of those subject to professional secrecy.

Is 5F suitable for persons obligated to professional secrecy (§ 203 StGB)?2026-01-29T17:34:02+01:00

Yes. 5F was designed for persons obligated to professional secrecy. Our employees and subcontractors commit themselves to secrecy—in particular according to § 203 StGB as well as the professional regulations (including §§ 50a WPO, 62a StBerG, 43e BRAO).

Who is the contact person for data protection at 5F?2026-01-30T01:40:24+01:00

For data protection matters, you can reach us at datenschutz@5fsoftware.de.

In addition, we have appointed an external data protection officer in accordance with Art. 37 GDPR:

Niklas Hanitsch
secjur GmbH
Falkensteiner Ufer 40
22587 Hamburg
Tel.: +49 40/80 90 81 146
E-mail: dsb@secjur.de

You can also contact the data protection officer directly if required.

Where is my data stored?2026-01-29T17:34:30+01:00

Your data is processed and stored in ISO-certified data centers in Germany. Our operations are consistently geared towards data sovereignty, ensuring that your data does not leave Germany.

Is 5F “Made in Germany?”2026-01-29T17:33:56+01:00

Yes. 5F is developed and maintained in-house in Germany. Development and support are located in Regensburg. Hosting and operation are carried out via operators and data centers in Germany.

How is data encrypted in 5F?2026-01-29T17:33:51+01:00

Data transmission between your web browser and 5F is encrypted via TLS. For compatibility reasons, TLS 1.2 is provided as the minimum level, with AES-128 and SHA-256. If your browser supports it, TLS 1.3 with stronger methods such as AES-256 and SHA-384 is used. Stored data is stored encrypted (AES-256). If the security assessment of procedures changes, we will adjust the configuration immediately.

How does 5F protect my data from cyberattacks?2026-01-29T17:34:41+01:00

We rely on a multi-level approach consisting of technical and organizational measures to reduce the attack surface and minimize risks. These include:

  • Frequent security updates and regular cloud releases
  • Protection in the hosting environment, for example through firewalls and DoS detection
  • Physical separation of application and data servers
  • Backups to secure data
  • Measures to protect user accounts and passwords
  • Maintenance and care by internal employees, without external service providers

We would be happy to provide you with more information about our technical and organizational measures (TOMs) upon request.

Does 5F check uploaded files for malware/viruses?2026-01-29T17:34:41+01:00

No. 5F does not perform automatic virus scans of files upon upload. When downloading, the virus protection programs used in your environment can check the files as usual. In addition, certain file formats that may potentially contain malicious code are blocked in 5F during upload (e.g. .exe).

Can I make two-factor authentication (2FA) mandatory?2026-01-29T17:34:25+01:00

Yes. Administrators can enable mandatory 2FA for the entire organization. Once this setting is enabled, all users with access to the organization must set up 2FA and then use it each time they log in.

Depending on the configuration, SMS tokens and/or an authenticator app are available for selection.

Who can access content in 5F – and how do I control permissions?2026-01-29T17:34:24+01:00

Only individuals you add as users or participants in 5F and authorize accordingly can access content. Access control is managed through roles and permissions, which you assign in the organization and project settings and can adjust at any time as needed.

How are accesses and changes made traceable (audit trail)?2026-01-29T17:34:08+01:00

5F has an integrated audit trail. It automatically logs activities within the platform in chronological order. The audit trail is visible to authorized users, can be exported for archiving, and cannot be subsequently altered. A full-text search and filter functions are available for evaluation.

Does 5F enable audit-proof archiving?2026-01-29T17:33:51+01:00

Yes. In combination with the integrated DMS of our partner d.velop AG, audit-proof archiving of documents according to GoBD is possible (according to IDW PS 880).

How can I export data (e.g. at the end of the contract)?2026-01-29T17:34:02+01:00

5F provides standardized export functions for exporting your data. This allows authorized business users to download and locally save documents and content individually or collectively per workflow, as required.

What data protection and security documents do you provide (e.g. DPA, TOMs)?2026-01-29T17:34:07+01:00

We would be happy to provide you with the usual documents for your review. These include in particular the DPA (including an overview of sub-processors) and information on the technical and organizational measures (TOMs). We provide a white paper on IT security in two versions: A general version is available to all users on the platform and can be shared or requested from us if required. A detailed, confidential version is available to licensees on request after signing a non-disclosure agreement.

On request, we can also provide you with evidence of certifications of our hosting and partner services, such as ISO certifications for Telekom/Open Telekom Cloud and d.velop.

How can I responsibly report a security vulnerability at 5F?2026-01-29T17:34:15+01:00

If you discover a potential security vulnerability in 5F, please report it confidentially by email to sicherheit@5fsoftware.de. As IT enthusiasts, we appreciate constructive feedback from the security and developer community. We are aware that security research (white-hat hacking) can also trigger legal uncertainties. If you act fairly, do not view or modify third-party data, and do not impair our systems, you do not have to fear legal action by us. Please give us reasonable time to fix the vulnerability before publishing any details.

More information can be found at 5fsoftware.de/responsible-disclosure.

Fragen zur Sicherheit bei 5F?
Sprechen Sie uns gerne an.

Go to Top