Recently Updated Pages
๐ Top Features
๐ Live Call Move (Desk โ๏ธ Mobile)Start a call on the desk phone โ tap Move Call in the Connec...
How do I change between Dark and Light Windows Theme
Quick start (everything Light or Dark) โก Right-click the desktop โ Personalize ๐ผ๏ธ ย ย ...
Snom PA 1
The Snom PA1 is a simple and reliable device used for making announcements over loudspeakers in p...
Incident Management Policy
1.0 Purpose This policy defines the standard process for managing operational incidents affectin...
Change Management Policy
1.0 Purpose This policy establishes the standard process for managing all changes to client IT e...
Hardware, Media Management, and Data Destruction Policy
Note: Sections labeled [HIPAA] apply when systems/media create, receive, maintain, or transmit eP...
HIPAA_Data_Recovery_Form
HIPAA Data Recovery Request & Chain of Custody Form Instructions: Complete all sections. Store c...
HIPAA_Media_Destruction_Form
HIPAA Media Destruction Verification & Chain of Custody Form Instructions: Complete for any medi...
HIPAA Media Destruction SOP
Purpose: Ensure compliant sanitization/destruction of media with ePHI (HIPAA 45 CFR ยง164.310(d); ...
HIPPA - Precision Computer Recycling Authorization Form
Precision Computer Recycling Authorization Form Owner Information Owner Full Name: ______...
Verify Technicians on Arrival
We want to remind you of an important safety procedure, we take it seriously and ask all clients ...
Service Level Agreement (SLA) Management Policy / Framework
1.0 Purpose Service Level Agreements (SLAs) are critical commitments defining the level of servi...
Multi-Tenancy Security Policy
1.0 Purpose Precision Computer utilizes shared infrastructure and platforms (multi-tenant enviro...
Third-Party / Vendor Risk Management Policy
1.0 Purpose Precision Computer relies on various third-party vendors and service providers to su...
Wireless Communication Policy
1.0 Purpose Wireless networking (Wi-Fi) is prevalent and essential for connectivity using device...
Web Application Security Policy
1.0 Purpose Web application vulnerabilities represent a primary attack vector and pose significa...
Technology Equipment Disposal Policy
1.0 Purpose Organizational technology equipment often contains sensitive data and components req...
Software Installation Policy
1.0 Purpose The installation of unauthorized or improperly vetted software on organizational com...
Server Security Policy
1.0 Purpose Servers are critical components of the organization's IT infrastructure, hosting vit...
Router and Switch Security Policy
1.0 Purpose Routers and switches form the backbone of the organization's network infrastructure....