Managed Services

Compliance

COMPLIANCE enforces policies and business rules that are extracted from the following sources:

GENERAL POLICY
Identifies entitlement, authorization, procurement procedures, support procedures, ownership,
roles and responsibilities, approved vendors and approved hardware.

ACCEPTABLE USE POLICY
Identifies the scope of services, authorized use, privacy expectations, responsible use, safety,
liability, inappropriate materials, protection of intellectual property, management endorsement,
and enforcement.

PERSONAL USE POLICY
Identifies the acceptable use of corporate assets for personal use.

PROFILES
Identifies user profiles based upon organizational labels such as grades (Senior Executive,
Executive, Manager, Administration, etc.), roles (management, sales, technician, customer service,
etc.) or other company specific nomenclature. Profiles are typically defined by identifying user
groups with common needs and wireless usage patterns. The resulting profiles then are
configured with specific hardware and plan configuration standards.

PREFFERED VENDORS
Identifies the preferred vendors per telecom service for each corporate location. Different vendors
are often required due to service availability or coverage.

HARDWARE STANDARDS
Identifies the hardware configuration per telecom service for each user profile. Users with a road
warriors profile may require different services and hardware than users under the corporate
manager profile.

CONFIGURATION STANDARDS
Identifies the plan configurations per telecom service for each user profile. Users with a road
warriors profile may require different services and plan configurations than users under the
corporate manager profile. The standards also define lists of options that should be blocked
from use as per the acceptable use policy such as international calling, roaming, SMS, MMS,
pictures, etc.