AT&T Release 2.0 Telephone User Manual


 
Customer Support Information
responsibility to take appropriate steps to implement the features properly, evaluate
and administer the various restriction levels, protect and carefully distribute access
codes.
Under applicable tariffs, you will be responsible for payment of toll charges. AT&T
cannot be responsible for such charges and will not make any allowance or give any
credit resulting from unauthorized access.
To reduce the risk of unauthorized access through your Voice Mail system, please
observe the following procedures:
Employees who have voice mailboxes should be required to use the
passwords to protect their mailboxes.
— Have them use random sequence passwords.
— Impress upon them the importance of keeping their passwords a
secret.
— Encourage them to change their passwords regularly.
The administrator should remove any unneeded voice mailboxes from the
system immediately.
.
AUDIX Voice Power™ has the ability to limit transfers to subscribers only. You
are strongly urged to limit transfers in this manner.
Use the PBX or Key system administration capability to do the following:
— Block direct access to outgoing lines and force the use of account
codes/authorization codes.
— Disallow trunk-to-trunk transfer unless required.
— Assign toll restriction levels to all AUDIX Voice Power ports.
— If you do not need to use the Outcalling feature, completely restrict the
outward calling capability of the AUDIX Voice Power ports.
Monitor SMDR reports or Call Accounting System reports for outgoing calls that
might be originated by AUDIX Voice Power ports.
Remote Administration and Maintenance
The Remote Administration and Maintenance feature of your telecommunications
system, if you choose to use it, permits users to change the system features and
capabilities from a remote location.
The Remote Administration and Maintenance feature, through proper administration,
can help you reduce the risk of unauthorized persons gaining access to the network.
However, telephone numbers and authorization codes can be compromised when
overheard in a public location, are lost through theft of a wallet or purse containing
access information, or through carelessness (writing codes on a piece of paper and
improperly discarding them). Additionally, hackers may use a computer to dial an
access code and then publish the information to other hackers. Substantial charges
Customer Support Information xxv