Advanced Search
Search Results
139 total results found
Client System Access Control Policy
1.0 Purpose This policy defines the mandatory requirements and procedures governing access to client information systems, networks, and data by Precision Computer personnel and systems. Unauthorized or excessive access to client environments represents a sign...
Multi-Tenancy Security Policy
1.0 Purpose Precision Computer utilizes shared infrastructure and platforms (multi-tenant environments) to efficiently deliver services to multiple clients. While offering scalability and cost-effectiveness, multi-tenancy introduces risks related to data segr...
Service Level Agreement (SLA) Management Policy / Framework
1.0 Purpose Service Level Agreements (SLAs) are critical commitments defining the level of service clients can expect from Precision Computer. This policy establishes the framework and mandatory procedures for defining, documenting, implementing, monitoring, ...
Ineligible Use Cases
Sharing of end-user information The sharing and selling of end-user information with third parties for marketing purposes violates both the our policy and our peers’ messaging policies and is therefore ineligible for verification. Ineligible Use Cases The ...
Why Carrier Filtering Matters for SMS Marketing — and How to Avoid It
Consumers check their text messages more than 11 times a day—more than any other app. That’s why SMS marketing is such a powerful tool for businesses. You can reach individual customers, groups, or your entire contact list with a message that’s almost guarante...
Website not working right?⚡ Targeted Clear Site Data via DevTools (Right-Click Method)
Website not loading correctly? You may need to clear saved site data on your computer, you probably heard some say just clear your cookies, well here is how to do targeted site data clearing without affect ALL the websites and having to relogging in to every s...
Login to Company Laptop?
This guide walks you through logging into a corporate Azure AD-joined or AD Joined Windows Laptop from a remote location using your Microsoft work credentials. You'll connect to Wi-Fi, select the right login option, and authenticate securely. 🖥️ Step 1: Power...
Privacy Policy
The privacy policy is a non-negotiable requirement for all brands to ensure compliance with 10DLC regulations. Businesses are required to clearly state how consumer data is collected, used, and protected. The privacy policy must explicitly state that the brand...
TCR Brand Registration Requirements Guide
Due to the ever-changing nature of the 10DLC Messaging Initiative, this guide may quickly be outdated, however you will be updated on the information when trying to register your Brand. Information Needed Note: If a system message is sent to recipients ...
10DLC Key Attributes to get your Campaign Approved
Pre-Registration Guidelines These factors are critical for a successful registration process, so addressing them thoroughly can help avoid rejections: Prohibited Content: Including content that falls under ineligible use cases will result in denial. Le...
Snom PA 1
The Snom PA1 is a simple and reliable device used for making announcements over loudspeakers in places like schools, offices, and stores. It connects to modern phone systems, so you can make announcements from your phone using the internet. It’s easy to set up...
Verify Technicians on Arrival
We want to remind you of an important safety procedure, we take it seriously and ask all clients to follow our established identity verification protocol. 🔒 Please remember: Every technician from Precision Computer is required to carry a company-issued ...
Sample Call Flow
*Click on photo to make it larger
Basic - Precision Computer Recycling Authorization Form
Precision Computer Recycling Authorization Form Owner Information Owner Full Name: ___________________________________________________________ Address: _________________________________________________________________ City/State/ZIP: ___________________...
HIPPA - Precision Computer Recycling Authorization Form
Precision Computer Recycling Authorization Form Owner Information Owner Full Name: ___________________________________________________________ Address: _________________________________________________________________ City/State/ZIP: ____________...
HIPAA Media Destruction SOP
Purpose: Ensure compliant sanitization/destruction of media with ePHI (HIPAA 45 CFR §164.310(d); NIST SP 800-88). Section A: Authorization[ ] Complete Media Destruction Form; obtain required approvals. Section B: Method Selection[ ] Determine Clear/Purge/Des...
HIPAA_Data_Recovery_SOP
HIPAA Data Recovery SOP (Printable Checklist) Purpose: Ensure compliant, timely restoration of ePHI systems (HIPAA 45 CFR §164.308(a)(7)). Section A: Triage & Authorization[ ] Validate incident/change request and business impact.[ ] Confirm data classificati...
HIPAA_Media_Destruction_Form
HIPAA Media Destruction Verification & Chain of Custody Form Instructions: Complete for any media/device containing ePHI. Retain for 6 years. Section 1: Media Details- Media Type (HDD/SSD/Tape/USB/Optical/Mobile): _______________________________________- Ass...
HIPAA_Data_Recovery_Form
HIPAA Data Recovery Request & Chain of Custody Form Instructions: Complete all sections. Store completed forms for 6 years per HIPAA retention. Section 1: Request Details- Request ID: _______________________________________- Request Date/Time: ______________...
Hardware, Media Management, and Data Destruction Policy
Note: Sections labeled [HIPAA] apply when systems/media create, receive, maintain, or transmit ePHI. Otherwise, follow the baseline requirements. **1.0 Purpose** Define secure lifecycle requirements for hardware and removable media and the standards for data...