Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

139 total results found

Client System Access Control Policy

Daily Operating Policies

1.0 Purpose This policy defines the mandatory requirements and procedures governing access to client information systems, networks, and data by Precision Computer personnel and systems. Unauthorized or excessive access to client environments represents a sign...

Multi-Tenancy Security Policy

Daily Operating Policies

1.0 Purpose Precision Computer utilizes shared infrastructure and platforms (multi-tenant environments) to efficiently deliver services to multiple clients. While offering scalability and cost-effectiveness, multi-tenancy introduces risks related to data segr...

Service Level Agreement (SLA) Management Policy / Framework

Daily Operating Policies

1.0 Purpose Service Level Agreements (SLAs) are critical commitments defining the level of service clients can expect from Precision Computer. This policy establishes the framework and mandatory procedures for defining, documenting, implementing, monitoring, ...

Ineligible Use Cases

BulkSMS

Sharing of end-user information The sharing and selling of end-user information with third parties for marketing purposes violates both the our policy and our peers’ messaging policies and is therefore ineligible for verification.  Ineligible Use Cases The ...

Why Carrier Filtering Matters for SMS Marketing — and How to Avoid It

BulkSMS

Consumers check their text messages more than 11 times a day—more than any other app. That’s why SMS marketing is such a powerful tool for businesses. You can reach individual customers, groups, or your entire contact list with a message that’s almost guarante...

Website not working right?⚡ Targeted Clear Site Data via DevTools (Right-Click Method)

Computer or Internet Issues

Website not loading correctly? You may need to clear saved site data on your computer, you probably heard some say just clear your cookies, well here is how to do targeted site data clearing without affect ALL the websites and having to relogging in to every s...

Login to Company Laptop?

How to...?

This guide walks you through logging into a corporate Azure AD-joined or AD Joined Windows Laptop from a remote location using your Microsoft work credentials. You'll connect to Wi-Fi, select the right login option, and authenticate securely. 🖥️ Step 1: Power...

Privacy Policy

SMS - 10DLC Documentation Brand and Campaign Registration

The privacy policy is a non-negotiable requirement for all brands to ensure compliance with 10DLC regulations. Businesses are required to clearly state how consumer data is collected, used, and protected. The privacy policy must explicitly state that the brand...

TCR Brand Registration Requirements Guide

SMS - 10DLC Documentation Brand and Campaign Registration

Due to the ever-changing nature of the 10DLC Messaging Initiative, this guide may quickly be outdated, however you will be updated on the information when trying to register your Brand. Information Needed Note:  If a system message is sent to recipients ...

10DLC Key Attributes to get your Campaign Approved

SMS - 10DLC Documentation Brand and Campaign Registration

Pre-Registration Guidelines  These factors are critical for a successful registration process, so addressing them thoroughly can help avoid rejections:  Prohibited Content: Including content that falls under ineligible use cases will result in denial.  Le...

Snom PA 1

Cloud PBX - Tips and Tricks Connect to an Overhead Paging System / ...

The Snom PA1 is a simple and reliable device used for making announcements over loudspeakers in places like schools, offices, and stores. It connects to modern phone systems, so you can make announcements from your phone using the internet. It’s easy to set up...

Verify Technicians on Arrival

Daily Operating Policies

We want to remind you of an important safety procedure, we take it seriously and ask all clients to follow our established identity verification protocol.   🔒 Please remember: Every technician from Precision Computer is required to carry a company-issued ...

Sample Call Flow

Cloud PBX - Tips and Tricks

*Click on photo to make it larger

Basic - Precision Computer Recycling Authorization Form

Daily Operating Policies

Precision Computer Recycling Authorization Form   Owner Information Owner Full Name: ___________________________________________________________ Address: _________________________________________________________________ City/State/ZIP: ___________________...

HIPPA - Precision Computer Recycling Authorization Form

Daily Operating Policies

Precision Computer Recycling Authorization Form Owner Information Owner Full Name: ___________________________________________________________ Address: _________________________________________________________________ City/State/ZIP: ____________...

HIPAA Media Destruction SOP

Daily Operating Policies HIPAA Media Destruction SOP (Step-by-Step)

Purpose: Ensure compliant sanitization/destruction of media with ePHI (HIPAA 45 CFR §164.310(d); NIST SP 800-88). Section A: Authorization[ ] Complete Media Destruction Form; obtain required approvals. Section B: Method Selection[ ] Determine Clear/Purge/Des...

HIPAA_Data_Recovery_SOP

Daily Operating Policies HIPAA_Data_Recovery_SOP

HIPAA Data Recovery SOP (Printable Checklist) Purpose: Ensure compliant, timely restoration of ePHI systems (HIPAA 45 CFR §164.308(a)(7)). Section A: Triage & Authorization[ ] Validate incident/change request and business impact.[ ] Confirm data classificati...

HIPAA_Media_Destruction_Form

Daily Operating Policies HIPAA Media Destruction SOP (Step-by-Step)

HIPAA Media Destruction Verification & Chain of Custody Form Instructions: Complete for any media/device containing ePHI. Retain for 6 years. Section 1: Media Details- Media Type (HDD/SSD/Tape/USB/Optical/Mobile): _______________________________________- Ass...

HIPAA_Data_Recovery_Form

Daily Operating Policies HIPAA_Data_Recovery_SOP

HIPAA Data Recovery Request & Chain of Custody Form Instructions: Complete all sections. Store completed forms for 6 years per HIPAA retention. Section 1: Request Details- Request ID: _______________________________________- Request Date/Time: ______________...

Hardware, Media Management, and Data Destruction Policy

Daily Operating Policies

Note: Sections labeled [HIPAA] apply when systems/media create, receive, maintain, or transmit ePHI. Otherwise, follow the baseline requirements. **1.0 Purpose** Define secure lifecycle requirements for hardware and removable media and the standards for data...