COMPLIANCE enforces policies and business rules that are extracted from the following sources:
Identifies entitlement, authorization, procurement procedures, support procedures, ownership,
roles and responsibilities, approved vendors and approved hardware.
ACCEPTABLE USE POLICY
Identifies the scope of services, authorized use, privacy expectations, responsible use, safety,
liability, inappropriate materials, protection of intellectual property, management endorsement,
PERSONAL USE POLICY
Identifies the acceptable use of corporate assets for personal use.
Identifies user profiles based upon organizational labels such as grades (Senior Executive,
Executive, Manager, Administration, etc.), roles (management, sales, technician, customer service,
etc.) or other company specific nomenclature. Profiles are typically defined by identifying user
groups with common needs and wireless usage patterns. The resulting profiles then are
configured with specific hardware and plan configuration standards.
Identifies the preferred vendors per telecom service for each corporate location. Different vendors
are often required due to service availability or coverage.
Identifies the hardware configuration per telecom service for each user profile. Users with a road
warriors profile may require different services and hardware than users under the corporate
Identifies the plan configurations per telecom service for each user profile. Users with a road
warriors profile may require different services and plan configurations than users under the
corporate manager profile. The standards also define lists of options that should be blocked
from use as per the acceptable use policy such as international calling, roaming, SMS, MMS,