(ADP) Understanding US Data Privacy Laws
Unlike other regions of the world, the United States does not have a single set of data privacy regulations. Instead, multiple laws focus on data privacy and the expectation is
State of the Technology Management Industry event registration is now open!
April Technology Management Leadership Summit registration is now open!
Unlike other regions of the world, the United States does not have a single set of data privacy regulations. Instead, multiple laws focus on data privacy and the expectation is
Auditing fixed telecom invoices may uncover billing errors that negatively impact the telecom expense management plan. This course demonstrates how to audit invoices for fixed voice and data telecom services.
This course teaches best practices that help IT professionals transform their approaches to financial planning, cost management, and risk assessment in technology environments. As artificial intelligence (AI) continues to reshape
Organizations can gain significant benefits from an auditing program. In this course, explore examples of process improvement and cost savings and review AOTMP® recommendations and components of a successful auditing
Auditing mobile telecom invoices may uncover billing errors that negatively impact the enterprise mobility management plan. This course uses sample invoices to show the learner what components to expect in
To be well-prepared for an invoice-to-contract or invoice-to-tariff audit, it is important to build a catalog of supporting materials to validate billing and service accuracy. You also need to understand
Packet-switched services such as frame relay and MPLS have taken the place of their circuit-switched alternatives in many telecom environments. The biggest pros include flexibility and network scalability, while the
This course will help an auditor understand the requirements of a security audit comprising a telecom security plan, policies, and procedures.
Explore ways to use the results of a telecom audit to improve performance in your environment. This course explains how to use the results of the audit to illustrate how
An organization’s telecom options increase every day. From landlines or mobile calls to online forums or chat bots, options are multiplying—and each option provides its own opportunity for inefficiency. These
In order to gain organizational buy-in to create an ongoing audit program, you will need to prepare a compelling business case. This course helps participants understand what such a business
Nearly one-third of organizations indicate that one of their top challenges in establishing a Telecom Expense Management (TEM) program is creating a business justification. This course provides an overview of
This course explores the business systems that support a technology expense management (TEM) program and is ideal for all technology management practitioners and leaders. Throughout this course subject matter expert
As corporate telecom requirements continue to grow, so does the need to contain and avoid unnecessary expenses. Shifts in technology and technology applications are driving the demand for more efficient
Contracts are the foundation of your organization’s business relationship with vendors. Comprehensive contract management activities should be part of every fixed and mobile telecom environment. This course examines the benefits
This course provides an overview of the California Consumer Privacy Act and how it might impact your organization. Upon completion of the course, your organization will be better equipped to
This course focuses on the next step of Change Management–the execution and monitoring of the change. Learners will be introduced to a process lifecycle, which is always in need of
Telecom service moves, adds, changes and disconnects (MACDs) are common activities that can have a major impact on a telecom budget. However, changes in the telecom environment are not just
Identifying billing errors on telecom invoices is a vital management task. Correcting errors and obtaining credits for overcharges completes the process.
Migrating an enterprise’s technology to the cloud is an important transition that requires detailed decision making and organization. This course will provide participants with a better understanding of what cloud
The cloud environment is a complex place that requires organizations to examine what their business needs are. This course will provide participants with a detailed breakdown of this environment, along
Using knowledge gained from prior cloud management courses, this audit and optimization course shows learners the optimal cloud environment and teaches them fundamental roles and tasks within that environment. It
This course will provide learners with an overview of potential savings associated with implementing cloud technology and guidance on how to write a business case for organizational leaders that will
Expanding on the lessons learned in (CLM102) Audit & Optimization for Cloud, this course provides learners with technical steps required to complete a cloud audit. Utilizing real-world scenarios, this course
This course focuses on how to manage telecom contracts. It is geared towards someone who needs to manage telecom contracts or wants to understand telecom contract management in general. This
This course focuses on how to manage mobile contracts specifically. It is geared toward someone who needs to manage mobile contracts or understand the management of mobile contracts in general.
The first, and arguably the most important, phase of change management is preparation. In this course, you will be introduced to what change management is, the underlying principle, and what
This course, a primer on cloud optimization practices, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter
This course, a primer on Telecom, Mobility, and IT Management Center of Excellence (CoE) purpose, principles, and performance, is ideal for all technology management practitioners and leaders. Throughout this course
This change management course provides you with an in-depth look into the project planning process. You will become familiar with the process for creating a robust, holistic project plan draft
This course provides an advanced look at security concerns within cloud environments and offers AOTMP® recommendations for mitigating risk.
Customer Service Records (CSRs) provide valuable configuration details regarding local exchange carrier services. The information contained on a CSR assists telecom/IT professionals as they build service inventories, audit monthly recurring
Numerous organizations across the globe are exploring Anything as-a-Service (XaaS) models for cloud. However, few are prepared to support these cloud services XaaS initiatives because they lack a clear plan
Wireless devices are continuing to grow in popularity. As a result, wireless device spend is increasing in many enterprises. This course addresses the successes and challenges of managing wireless devices
This course, a primer on internal service delivery customer experience practices, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices
This course will provide common steps to implement and manage a disaster recovery based on a disaster recovery plan. This will help managers implement a comprehensive plan to help manage
This course explores the challenges relating to vendor dispute management and suggests a standard process to follow for all types of disputes. Additionally, you will learn the types of questions
This introductory course provides an overview of Data Protection Impact Assessments. It includes a brief overview of where they originated along with step-by-step instructions on how to complete, implement, and
Data Protection Officers have become more prevalent since the adoption of the European Union’s General Data Protection Regulation. Recent estimates suggest that, worldwide, more than 75,000 Data Protection Officers are
Understanding how to plan for and implement a disaster recovery and business continuity plan is key to successfully regaining voice and data services after network downtime; whether caused by a
The second in a two-part series (DRP1 is the first part), this course augments your knowledge on a 10 step process for disaster recovery and business continuity planning. First, you
Traffic studies are useful tools to provide information when performing optimization, network design, auditing, and other activities. This course discusses traffic study benefits and sources for gathering traffic study information.
This course will provide a history of 9-1-1, detail the process flow for emergency telephone calls, and introduce some of the legislation that currently governs emergency telephone calls. Although this
This course is for professionals seeking to learn about Enterprise Mobility Management (EMM). As the volume of enterprise mobile users grows, knowing EMM’s scope and benefits helps organizations enable services
This course reviews what should be included in an RFP and why vendor responses to these criteria are crucial to the vendor evaluation process.
The General Data Protection Regulation, or GDPR, is a set of rules designed to give European Union (EU) citizens more control over their personal data. Compliance with the GDPR is
This course helps you distinguish between steps to take when performing an invoice audit in EMEA from the steps to take when performing an invoice audit in the U.S.
This course will provide common considerations to manage a help desk, implement best practices, identify common challenges, and provide considerations to mitigate those challenges for level 1, 2 and 3
As enterprises try to keep pace with demands of increasing network traffic, they are searching for cost-effective options to provide secure and reliable connections across the organization. Enterprises with multiple
Many organizations today already have some form of a Bring Your Own Device (BYOD) program, while many others are investigating BYOD for their organization. For those looking to evaluate and
The development of an inventory is the foundational concept of telecom environment management. The biggest challenge is knowing how and where to begin. This course shares the steps required to
The cornerstone of any Telecom Expense Management (TEM) or Enterprise Mobility Management (EMM) program is the presence of an accurate and valid service and invoice inventory. You cannot contain costs
This introductory course provides a foundational understanding of data privacy. Beyond introducing you to personally identifiable information, and the regional laws which protect it, this lesson covers Data Protection Officers
This course provides an overview of iOS mobility security benefits; MDM security; the benefits of standardizing devices; iOS mobility policies; and best practices.
IP Multimedia Subsystem (IMS) is a generic architecture for offering Voice over Internet Protocol (VoIP) and multimedia applications. What does IMS mean for you and your enterprise? This course outlines
International business is a complicated topic when you consider diversity in languages, currencies, cultures, market structure, geography, political climates, development, regulations, and standards, along with the organizations and governments involved.
This course will provide enterprises with an understanding of Internet of things (IoT) and how it can benefit enterprises by increasing business opportunities and productivity, along with gathering massive amounts
The process of identifying, selecting, and evaluating the right telecom vendor for your organization is a daunting and difficult task. This course examines the first step of the process: identifying
This course will provide an understanding of security for international telecommunications, and show the differences in regulations and governance across countries. It will also explore the risks and provide ways
Many enterprises are choosing to implement Software-Defined Wide Area Network (SD-WAN) to reduce costs, increase bandwidth, and improve security. This course provides a plan for implementation, including pre- and post-implementation
This introduction reviews fixed and mobile terminology and introduces you to common invoice errors and sample invoices. By the end of this course, you will be able to identify common
An organization’s IT asset disposition policy asks, “How many working devices do I have and how many do I need to dispose?” With a focus on mobile devices, this course
A Request For Proposal (RFP) allows a service provider the opportunity to tell their story in a focused manner that is beneficial to the requestor. When trying to determine how
In this course, you will gain an understanding of what telecom invoices are, which products and services are considered billable, and who will be receiving invoices. This will help you
A complete and accurate inventory is the cornerstone of any successful telecom management practice. Telecom inventories provide essential information about your telecom environment and drive decision-making. This course provides a
Global telecom and IT management programs present unique challenges beyond language barriers, cultural obstacles, regulatory considerations, and differences in currency. This course explores how to structure international telecom management teams,
Ever feel like you need a telecom dictionary? The telecom industry is full of acronyms as well as technology, billing, contract, and regulatory terms. Understanding industry terminology directly influences your
Key Performance Indicators (KPIs) are an essential part of the Efficiency First® Framework. In this course, you will be introduced to instructions on how to create an effective KPI, how
This course outlines how to establish and sustain a successful Technology Expense Management Program. This course is ideal for all technology management practitioners and leaders. Throughout this course subject matter
This course, a non-technical primer covering UCaaS / CCaaS license management practices, is ideal for all technology management practitioners and leaders. Learn from subject matter expert Mark Bellingham, Vice President
MPLS technology provides a fast, efficient technology for enterprises to utilize when routing data across networks. This course provides the learner both a background of how MPLS technology operates and
This course will discuss change control of mobile assets such as smartphones, laptops and tablets, and provide the information and overall process for managing them.
This course covers inventory validation, change control, and other telecom expense management activities. Telecom Expense Management (TEM) is frequently discussed in terms of hard and soft dollar savings. However, TEM
We live in a world that allows us to be constantly connected. Mobile Device Management (MDM) recognizes that telecom managers must learn to balance the benefits of mobility with the
This interactive course on mobile device management (MDM) business practices explores organizational concerns, required infrastructures, internal policies, your organization’s MDM success, and key stakeholders for implementing a mobile device management
This interactive course on mobile device management (MDM) business strategies will help you develop a business strategy for mobile device management and learn the best practices for implementing these strategies.
As enterprises begin to leverage technology more fully into their telecom and IT departments, Internet of things (IoT) devices are being integrated. The unique characteristics of these devices requires vigilance.
Machine-to-Machine (M2M) and Internet of Things (IoT) are utilized in business and personal life in unique ways. Companies need to be aware of techniques that may apply to internet-connected device
The use of Machine-to-Machine (M2M) solutions continues to grow with the advancements in connectivity technology, mobile device capability, and cloud computing. Before deciding if M2M is the best way to
Is your department challenged to keep up with ongoing Moves, Adds, Changes, and Disconnects (MACDs)? For many organizations, the constant activity around service changes encompasses a variety of technical, financial,
This course will provide the fundamentals of mobile asset management — end of life. This includes cell phones, laptops, tablets, iPads, etc. Learn foundational information for this final phase in
This course will provide the fundamentals of mobile asset management. This includes mobile phones, laptops, tablets, iPads, etc.
This course will provide information for provisioning and tracking of mobile assets. This includes mobile phones, laptops, tablets, iPads, etc.
Subject matter experts Abdul Elantably, Product Manager at Motus, and Chuck Serapilio, VP of Sales at Motus, share insights and best practices throughout this course that will help you gain
This course shows how to create, manage, and audit a mobile policy. It explains common components of the mobile policy, how to create a mobile policy, and what is important
Validating mobile invoice accuracy, correcting exceptions, and recovering overcharges are necessary mobility management activities. This course explores foundational principles that support mobile service analysis practices.
The use of mobile devices for everyday business is increasing. This means that organizations need to take a new look at their data security policies. Specifically, those that allow the
This course is an overview of managing a telecom security plan implementation. It walks the project manager through how to manage a project plan and what the phases are for
Mobile devices are extremely important to your telecom environment. Whether your company implements a Bring Your Own Device (BYOD) program or not, chances are most, if not all, employees in
Successful relationships with TEM vendors require a proactive management plan. Outsourced TEM program activities can be complex in implementation, cost, and scope, requiring a strong approach to building and maintaining
There are four stages of vendor relationship management: pre-contract, new service, mid-term, and separation. During this course, you will be able to develop a plan, consider all facets of your
Managing network performance is an important function within any IT department. Previously, network performance management consisted of verifying that devices were up and running and monitoring packet loss. Today, due
This course provides learners an overview of the EMEA region. It also explores the governing bodies in EMEA, to ensure learners can successfully conduct business in the region. Major carrier/operators
This course explores mobile environment components including equipment, coverage, and applications as well as different types of plans that can be implemented within your mobile environment. Optimal cost per minute
Pandemics can affect all departments of all types or organizations, so it’s important to plan for your telecom, mobility, and IT needs in the event of a pandemic. This course
In this course, you will learn about the countries in the Asia-Pacific region and the fundamental characteristics that affect telecommunications markets, their regulatory structures, consumer protections, and international cooperation between
This course, a primer on POTS-in-a-Box solutions, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject matter expert Greg Herman,
In this course, you will learn about the characteristics of countries in the Europe region that affect telecommunications. The first section covers the region’s fundamentals, followed by specifics in the
The Personal Information Protection and Electronic Documents Act, or PIPEDA, is a set of rules designed to promote trust of electronic commerce among Canadian citizens. Compliance with PIPEDA is not
The Personal Information Security Specification, or PIS Specification, is a systematic, national standard set by the People’s Republic of China in order to protect personal information and how it is
Moving to any new technology, services and systems requires careful project planning before, during, and after the change. Successful projects require both technical and financial validation. In this new course,
Implementing a new telecom service contract — even when performed with the same provider — can be burdensome and challenging. You need to give special consideration to the many telecom
This course will provide an overview of what Public Switched Telephone Network (PSTN) transitioning is, what enterprises need to know and how they should prepare for it. The Federal Communications
This course shares a proven process for creating an effective Statement of Work (SOW) for telecom, mobility and IT projects. Gain an in-depth understanding of what the SOW should represent
This course is an overview of how to plan a Unified Communications (UC) migration. As UC adoptions increase, the IT/telecom teams within enterprises need a detailed guide for migrating from
Organizations that migrate to Voice over IP (VoIP) often rely on vendors to manage all aspects of the migration, however, developing an internal project plan provides visibility into dependencies and
This course will provide knowledge into the remote technologies of telecom. It will cover challenges of remote technologies and mitigations to those challenges. It will give an overview of each
Although data breaches are a routine part of the 24-hour news cycle, there is a misunderstanding of what they are. In addition, because each state (and nation) has different criteria
Historically, fixed and mobile services have been managed as utilities. This course presents learners with five, high-level Key Performance Indicators (KPIs) they can begin implementing within their organizations immediately to
Robotic Process Automation is a rules-based procedure that guides a software “robot” in completing the steps a worker would perform when completing the same task. Now that you know what
Taxes, surcharges, and fees are a normal part of operating as a business and can account for a significant portion of an average telecom invoice. In this course, you will
Have you ever wondered what the difference is between a Request for Proposal (RFI), Request for Quotation (RFQ), and Request for Proposal (RFP)? In this course, you will learn what
This course focuses on establishing a solid foundation for effective SaaS management. You’ll learn how to create and maintain a comprehensive inventory of all SaaS applications within your organization, ensuring
This course, a non-technical primer on secure access service edge (<span class="NormalTextRun
As cloud use increases, having a greater understanding of options beyond Multiprotocol Label Switching (MPLS) – based connectivity is imperative to making sure your enterprise optimizes the telecom environment. There
In this course, you will learn the four main stages of inventory management as well as their sub steps. The importance of and differences between each stage of management are
Unlike traditional telephony where bundles of physical wires are delivered from telecom service providers to enterprises, Session Initiation Protocol (SIP) trunks allow organizations to replace fixed Public Switched Telephone Network
Service Level Agreements (SLAs) help improve relationships between service providers and customers by protecting enterprise network integrity and financial interests. Understanding SLAs and how to monitor them is necessary for
The course includes a brief description of a RFP and the five phases of the TEM vendor selection process; preparing for a TEM vendor/solution; RFP preparation; RFP scope; evaluating TEM
Telecom Expense Management (TEM) technology and professional services providers can deliver expertise to enhance telecom environment management. The technology systems and professional services available are broad and meet a variety
Budgeting is an integral part of telecom management. Understanding current and future financial telecom requirements enables professionals to meet the service needs and financial objectives of the organization. This course
In order to have a completely thorough and up-to-date inventory for your organization, it is necessary to include several types of collateral materials. This course covers these different types of
The cloud is becoming increasingly important in telecom strategy. This course identifies the characteristics of the cloud, introduces the three types of cloud infrastructures, and reviews the benefits of implementing
Data services have reached a tipping point as more travel across service provider networks. The ability of an organization to adapt to the everchanging telecom industry is critical to technical,
This course provides a high-level overview of Voice over Internet Protocol (VoIP), including a brief history of telephone systems, an exploration of computer networking, introduction to terms and technologies used
This course provides a high-level overview of session initiation protocol (SIP). This overview includes a brief history, benefits, applications, features, how this technology relates to Efficiency First ® Framework, and
This course provides a high-level overview of The Internet of Things (IoT). This overview includes definitions, technology trends, and the key components of IoT.
The Telecom Expense Management (TEM) market space is occupied by a myriad of service and software providers as well as consultants all proposing solutions to the customer’s desire to control
This course describes Toll-Free service components and features that may cause billing errors. Learn how to identify billing errors and calculate the cost of them.
This course, an overview of the Technology Expense Management Industry, is ideal for all technology management practitioners and leaders. Throughout this course subject matter expert Timothy C. Colwell will share
This course, a primer on technology expense management (TEM) implementation readiness, is ideal for all technology management practitioners and leaders. Throughout this course you will learn best practices from subject
Telecom management encompasses a variety of technical, financial, and operational activities. This course delivers a 10-point checklist to gauge the overall health of your telecom management practice. Activities supporting telecom
Technology support staff roles can be varied. Having knowledge of the right tools for any job can make the difference between working smarter and working harder. This course identifies common
This course explores technology expense management (TEM) program design and is ideal for all technology management practitioners and leaders. Throughout this course subject matter expert Timothy C. Colwell will share
The management of telecom projects can be complex. Although there are many different types of telecom projects, the methodology remains the same. This course defines a standardized project management process
In many organizations, technology planning and selection occurs as the result of a top-down approach. This can result in an organization moving to a new technology that does not fully
In an enterprise, most functions are categorized as either cost centers or profit centers. Telecom Expense Management (TEM) produces a more tangible ROI than many other technology projects, yet 66%
How long should you maintain telecom invoice records? Do you need to keep call transaction records? How long should you keep service order records? These questions are top of the
Cloud computing represents one of the largest and fastest-growing technologies in telecom. More and more enterprises are moving to a cloud model to save money, improve efficiency, and gain access
This course is an overview of environmental and physical security. Environmental security covers environmental threats to telecom equipment. Physical security covers the protection of telecom personnel and equipment. This course
Valuable, detailed information about service provider pricing and services is available to organizations – the key is knowing where to look. This course demonstrates how to find provider documentation that
While telecom data is not specifically named in all regulations, it is advisable to treat the data in the same regard as other data required to be secured and kept
This course is an overview of telecom security. There are three main parts to telecom security: information, environmental/physical, and systems. This course will provide security considerations for non-security personnel as
Systems security covers any threat that usually results in data leakage or data forgery that allows for unauthorized access, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks,
Ever feel like you need a telecom dictionary? The telecom industry is full of acronyms and technology, billing, contract and regulatory terms. Understanding industry terminology directly influences your ability to
This course shares a host of strategies, considerations, tools, and templates to support the creation of telecom usage policies to meet your departmental and organizational goals.
With the exponential growth in cloud utilization, it is imperative for an enterprise’s telecom team to understand the key components of cloud architecture. There are multiple levels of functionality, potential
This course enables a telecom manager or planner to understand the specific needs of mobility in Unified Communications (UC), as well as the best practices for implementing and managing the
This course provides a high-level overview of Unified Communications, including a brief history of the communication solution. The course touches on the benefits, applications, and features of Unified Communications as
All enterprises that migrate to Unified Communications (UC) should have a clear policy for managing its functions. There are multiple ways in which the lack of clear policy can lead
This course provides an overview of enterprise telecom security plan requirements and helps a telecom or program manager understand those requirements. It walks the project manager through the aspects of
Auditing telecom invoices may uncover billing errors that negatively impact the telecom expense management plan. This course explains some of the nuances of auditing Voice over Internet Protocol (VoIP)/Session Initiation
An accurate inventory is essential to have full visibility into the telecom environment. The second step in the inventory auditing process is Analyze and Catalog. One important technique in this
Wireless service was once projected to be a niche market. However, in today’s business environment nothing could be further from reality. With the advent of text messaging, downloads, internet access,
There are 276.6 million wireless subscribers in the US, representing an 89% wireless penetration rate. Associated with this overall rise in wireless usage is the increase in wireless security challenges
Wireless usage can vary dramatically from month to month across an organization, and wireless services that are not managed can lead to budget waste. This course focuses on two key