Procurement
Trust Center
RevivalOps_Trust_Center.pdf
This file is a forwardable procurement summary. It excludes personal phone, home address, and public org number fields.
Legal operator
- Trading name: RevivalOps
- Legal operator: MN Ventures (Sweden)
- Public operator line: RevivalOps (operated by MN Ventures — Sweden)
- Contact: hello@revivalops.com
- Full legal details: Provided on invoice + signed agreement pack, or on request for procurement.
Security overview
- Access to client data is role-limited and need-to-know.
- Data is handled via approved tools listed on the subprocessors page.
- Transport security is enforced by hosted providers and TLS in transit.
- No outcome claims are made from security posture. We publish controls and response process.
- Primary reference: security.html.
Subprocessors
We maintain a current subprocessor list with purpose and location. Any additions or changes are reflected on the public subprocessor register.
Data retention windows
- Raw CRM exports: delete or return within 30 days after pack delivery.
- Pack artifacts: retained up to 90 days for support, then deleted.
- Billing records: retained as required by law.
- Earlier deletion: available on request.
DPA request path
- DPA template is public at dpa.html before contract signature.
- Signed DPA accompanies contracted engagements when personal data processing applies.
- Requests and legal review can be sent to hello@revivalops.com.
Incident communication stance
- We publish current operating status and major incidents on the status page.
- In case of material disruption, affected clients are notified through agreed channels.
- Post-incident communication focuses on facts, timeline, impact, and corrective actions.
Process commitments (non-outcome)
- Audit delivery target: 48–72h from intake completion.
- Pilot operating target: first response within 2h during business hours, median time-to-invoice within 60 minutes after green-light call.
- No outcome guarantees (replies, bookings, revenue).
Evidence available on request
- Operator identity verification for procurement and contracting.
- Incident communication template excerpt (facts, timeline, impact, corrective actions).
- Access model evidence (role-limited handling examples and account controls).
- Retention/deletion closeout procedure and receipt template.
- Public system-test receipts (headers, endpoint tests, DNT, network, and cookie checks).