Skip to main content

Recently Updated Pages

Incorrect Charger

Computer or Internet Issues

Incorrect Charger may be a Fire Hazard, as some safety mechanisms can fail/malfunction when its t...

Updated 1 month ago by Daniel O

Updating Phone Buttons (Speed Dials & BLF)

CloudPBX Phone System User Guide Office Manager

Introduction This short guide helps you customize the keys for your desk phone, things like Spee...

Updated 1 month ago by Daniel O

Updating Phone Buttons (Speed Dials & BLF)

CloudPBX Phone System User Guide USING THE USER WEB PORTAL

Introduction This short guide helps you customize the keys for your desk phone, things like Spee...

Updated 1 month ago by Daniel O

Rebooting a Grandstream GXP2170

CloudPBX Phone System User Guide USING YOUR DESK PHONE

This guide shows two easy ways to reboot your GXP2170: from the phone’s menu, or by power-cycling...

Updated 1 month ago by Daniel O

🏆 Top Features

Cloud PBX - Tips and Tricks

🔀 Live Call Move (Desk ↔️ Mobile)Start a call on the desk phone → tap Move Call in the Connec...

Updated 1 month ago by Daniel O

How do I change between Dark and Light Windows Theme

How to...? Change Preferences

Quick start (everything Light or Dark) ⚡ Right-click the desktop → Personalize 🖼️     ...

Updated 2 months ago by Daniel O

Snom PA 1

Cloud PBX - Tips and Tricks Connect to an Overhead Paging System / ...

The Snom PA1 is a simple and reliable device used for making announcements over loudspeakers in p...

Updated 2 months ago by Daniel O

Incident Management Policy

Daily Operating Policies

1.0 Purpose This policy defines the standard process for managing operational incidents affectin...

Updated 3 months ago by Travis Woolery

Change Management Policy

Daily Operating Policies

1.0 Purpose This policy establishes the standard process for managing all changes to client IT e...

Updated 3 months ago by Travis Woolery

Hardware, Media Management, and Data Destruction Policy

Daily Operating Policies

Note: Sections labeled [HIPAA] apply when systems/media create, receive, maintain, or transmit eP...

Updated 3 months ago by Travis Woolery

HIPAA_Data_Recovery_Form

Daily Operating Policies HIPAA_Data_Recovery_SOP

HIPAA Data Recovery Request & Chain of Custody Form Instructions: Complete all sections. Store c...

Updated 3 months ago by Travis Woolery

HIPAA_Media_Destruction_Form

Daily Operating Policies HIPAA Media Destruction SOP (Step-by-Step)

HIPAA Media Destruction Verification & Chain of Custody Form Instructions: Complete for any medi...

Updated 3 months ago by Travis Woolery

HIPAA Media Destruction SOP

Daily Operating Policies HIPAA Media Destruction SOP (Step-by-Step)

Purpose: Ensure compliant sanitization/destruction of media with ePHI (HIPAA 45 CFR §164.310(d); ...

Updated 3 months ago by Travis Woolery

HIPPA - Precision Computer Recycling Authorization Form

Daily Operating Policies

Precision Computer Recycling Authorization Form Owner Information Owner Full Name: ______...

Updated 3 months ago by Travis Woolery

Verify Technicians on Arrival

Daily Operating Policies

We want to remind you of an important safety procedure, we take it seriously and ask all clients ...

Updated 3 months ago by Daniel O

Service Level Agreement (SLA) Management Policy / Framework

Daily Operating Policies

1.0 Purpose Service Level Agreements (SLAs) are critical commitments defining the level of servi...

Updated 3 months ago by Travis Woolery

Multi-Tenancy Security Policy

Daily Operating Policies

1.0 Purpose Precision Computer utilizes shared infrastructure and platforms (multi-tenant enviro...

Updated 3 months ago by Travis Woolery

Third-Party / Vendor Risk Management Policy

Daily Operating Policies

1.0 Purpose Precision Computer relies on various third-party vendors and service providers to su...

Updated 3 months ago by Travis Woolery

Wireless Communication Policy

Daily Operating Policies

1.0 Purpose Wireless networking (Wi-Fi) is prevalent and essential for connectivity using device...

Updated 3 months ago by Travis Woolery

Web Application Security Policy

Daily Operating Policies

1.0 Purpose Web application vulnerabilities represent a primary attack vector and pose significa...

Updated 3 months ago by Travis Woolery