Security
Data security
High-level safeguards for confidentiality, integrity and availability of datasets processed through FiveX infrastructure.
https://fivex.com/data-security
Overview of substantive technical safeguards employed by FiveX B.V.—content reflects fivex.com/data-security (May 2026). Operational runbooks maintained internally exceed this synopsis.
Introduction
FiveX invests in organisational and technological controls to uphold confidentiality, integrity and availability of platform data entrusted to its European-oriented cloud footprint.
Certified European data centres
Production databases together with ingestion / batch pipelines primarily reside inside DigitalOcean facilities located in Member States with demonstrable SSAE / ISO-aligned assurance programmes referenced in publicly published certification dossiers maintained by DigitalOcean.
Region selection purposely satisfies GDPR-aligned processing expectations absent contrary commercial instructions encoded in contractual Data Processing Agreements.
Encryption everywhere feasible
Transport encryption adheres to contemporary TLS stacks with prudent cipher deprecation policies.
Persistent volumes leverage provider-managed disk encryption regimes so offline physical compromise remains computationally arduous.
Customer browsers must negotiate HTTPS for authenticated surfaces—legacy plaintext endpoints are progressively retired.
Deletion & sanitisation
Media retirement follows partner methodologies aligned with NIST SP 800-88 sanitisation tiers appropriate to confidentiality classification.
Application-layer retention policies layer atop infrastructure schedules (see Privacy Statement).
Replication & catastrophe resilience
Scheduled backups—with encrypted off-region mirrors—preserve recoverability excluding certain personal-data buckets slated for ephemeral retention.
Disaster rehearsals periodically validate Restoration Time/Objectives negotiated with infra partners.
Anonymisation windows may remove direct identifiers from ancillary analytics stores while preserving SKU-level aggregates.
Operational integrity
Schema discipline and disciplined migration discipline underpin referential coherence across marketplace ingestion domains.
Structured audit trails capture materially sensitive actions aiding incident review.
Centralised telemetry streamlines infra anomaly alerting.
Report suspected compromises rapidly to [email protected] with UTC timestamps, correlated request IDs / tenant handles and safe-for-email indicators.
