AT&T Release 2.0 Telephone User Manual


 
Customer Support Information
To minimize the risk of unauthorized access to your communications system:
Use a nonpublished Remote Access number.
Assign authorization codes randomly to users on a need-to-have basis,
keeping a log of ALL authorized users and assigning one code to one person.
Use random sequence authorization codes, which are less likely to be easily
broken.
Deactivate all unassigned codes promptly.
Ensure that Remote Access users are aware of their responsibility to keep the
telephone number and any authorization codes secure.
When possible, restrict the off-network capability of off-premises callers, via
use of Call Restrictions and Disallowed List capabilities.
When possible, block out-of-hours calling.
Frequently monitor system call detail reports for quicker detection of any
unauthorized or abnormal calling patterns.
Limit Remote Call Forward to persons on a need-to-have basis.
Limited Warranty and Limitation of Liability
AT&T warrants to you, the customer, that your MERLIN LEGEND Communications
System will be in good working order on the date AT&T or its authorized reseller
delivers or installs the system, whichever is later (“Warranty Date”). If you notify AT&T
or its authorized reseller within one year of the Warranty Date that your system is not in
good working order, AT&T will without charge to you repair or replace, at its option, the
system components that are not in good working order. Repair or replacement parts
may be new or refurbished and will be provided on an exchange basis. If AT&T
determines that your system cannot be repaired or replaced, AT&T will remove the
system and, at your option, refund the purchase price of your system, or apply the
purchase price towards the purchase of another AT&T system.
Voice Mail Systems
Your Voice Mail system permits callers to leave verbal messages for system users or
gain access to the back-up position in an emergency as well as create and distribute
voice messages among system users.
The Voice Mail system, through proper administration, can help you reduce the risk of
unauthorized persons gaining access to the network. However, phone numbers and
authorization codes can be compromised when overheard in a public location, are lost
through theft of a wallet or purse containing access information, or through
carelessness (writing codes on a piece of paper and improperly discarding them).
Additionally, hackers may use a computer to dial an access code and then publish the
information to other hackers. Substantial charges can accumulate quickly. It is your
xxiv
Customer Support Information