Mobile App Overview and App Setup
The ComplyAssistant Mobile app is a convenient tool for supporting an audit walkthrough statement.
Prerequisite: Create an Audit Definition in the Web App
To use ComplyAssistant Mobile, you must have an audit definition defined with walk-through statements. You can create an audit definition in the web application.
Free trial accounts will come prepackaged with our "Random Facility Walkthrough Audit."
Get the Mobile App and login
Follow these steps to get the app and login:
In either the Apple App Store or Google Play, search for “ComplyAssistantMobile” and then download the ComplyAssistant app to your mobile device.
Tap to open the app.
Enter your Account subdomain of your account. The subdomain is provided to you in your sign up confirmation email message. It is also shown in the URL when you login to the desktop app:
Enter your Username and Password.
Setup the Audit
New trial audit accounts are set up with a facility for your organization and an audit template for random facility walkthrough audits. You can add Departments and Facilities in the mobile app. To add new audit definitions, you must log in to the ...
Conduct a Mobile Walkthrough Audit
Conduct the Audit Follow these steps to perform the audit: The walkthrough list is broken down by statement type. By default, the statement types are: Administrative Building Electronic Hardcopy Physical Verbal Tap a statement you'd like to mark ...
Setup and assign assessments
If at least one assessment definition is available, you can locate that definition and then set up and assign the assessment. Filter the assessment list On the right-side of the Assessments page, use the drop-down menus to filter the assessment list ...
DocuSign Integration Setup Guide
Requirements before connecting your DocuSign account A ComplyAssistant user with administrator permissions must add your DocuSign: API Account ID Connect Key. Note: this is used to verify the integrity and authenticity of any messages sent from your ...
Overview of Risk Map
The Risk Map charts your Registered Threats based on their Inherent Risk factors: Likelihood and Impact. The Y axis represents Impact. The X axis represents Likelihood. For example, below are 3 Registered Threats with High Impact that are expected to ...