Avaya SAB User Manual page 2

Avaya sab speech application builder: user guide
Table of Contents

Advertisement

© 2004 Avaya Inc.
All Rights Reserved.
Notice
While reasonable efforts were made to ensure that the
information in this document was complete and accurate at the
time of printing, Avaya Inc. can assume no liability for any errors.
Changes and corrections to the information in this document
may be incorporated in future releases.
Preventing toll fraud
"Toll fraud" is the unauthorized use of your telecommunications
system by an unauthorized party (for example, anyone who is
not a corporate employee, agent, subcontractor, or person
working on your company's behalf). Be aware that there may be
a risk of toll fraud associated with your system and that, if toll
fraud occurs, it can result in substantial additional charges for
your telecommunications services.
Avaya fraud intervention
If you suspect that you are being victimized by toll fraud and you
need technical assistance or support, call Technical Service
Center Toll Fraud Intervention Hotline at +1-800-643-2353 for
the United States and Canada. For additional support telephone
numbers, see the Avaya Web site:
http://www.avaya.com
Select Support, then select Escalation Lists. This Web site
includes telephone numbers for escalation within the United
States. For escalation telephone numbers outside the United
States, select Global Escalation List.
Providing telecommunications security
Telecommunications security (of voice, data, and video
communications) is the prevention of any type of intrusion to
(that is, either unauthorized or malicious access to or use of)
your company's telecommunications equipment by some party.
Your company's "telecommunications equipment" includes both
this Avaya product and any other voice/data/video equipment
that could be accessed via this Avaya product (that is,
"networked equipment").
An "outside party" is anyone who is not a corporate employee,
agent, subcontractor, or person working on your company's
behalf. Whereas, a "malicious party" is anyone (including
someone who may be otherwise authorized) who accesses your
telecommunications equipment with either malicious or
mischievous intent.
Such intrusions may be either to/through synchronous (time-
multiplexed and/or circuit-based) or asynchronous (character-,
message-, or packet-based) equipment or interfaces for reasons
of:
Use (of capabilities special to the accessed
equipment)
Theft (such as, of intellectual property, financial
assets, or toll-facility access)
Eavesdropping (privacy invasions to humans)
Mischief (troubling, but apparently innocuous,
tampering)
Harm (such as harmful tampering, data loss or
alteration, regardless of motive or intent)
Be aware that there may be a risk of unauthorized intrusions
associated with your system and/or its networked equipment.
Also realize that, if such an intrusion should occur, it could result
in a variety of losses to your company (including, but not limited
to, human and data privacy, intellectual property, material
assets, financial resources, labor costs, and legal costs).
Your responsibility for your company's telecommunications
security
The final responsibility for securing both this system and its
networked equipment rests with you, an Avaya customer's
system administrator, your telecommunications peers, and your
managers. Base the fulfillment of your responsibility on acquired
knowledge and resources from a variety of sources, including,
but not limited to:
Installation documents
System administration documents
Security documents
Hardware-/software-based security tools
Shared information between you and your peers
Telecommunications security experts
To prevent intrusions to your telecommunications equipment,
you and your peers should carefully program and configure:
Your Avaya-provided telecommunications systems
and their interfaces
Your Avaya-provided software applications, as well as
their underlying hardware/software platforms and
interfaces
Any other equipment networked to your Avaya
products.
Part 15: Class A Statement
For the MCC1, SCC1, G600, and CMC1 Media Gateways:
Note: This equipment has been tested and found to comply with
the limits for a Class A digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is
operated in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with the instruction manual,
may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to
cause harmful interference, in which case the user will be
required to correct the interference at his own expense.
Part 15: Class B Statement
For the G700 Media Gateway:
Note: This equipment has been tested and found to comply with
the limits for a Class B digital device, pursuant to Part 15 of the
FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential
installation. This equipment generates, uses, and can radiate
radio-frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference
to radio communications. However, there is no guarantee that
interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off
and on, the user is encouraged to try to correct the interference
by one or more of the following measures:
Reorient the receiving television or radio antenna
where this may be done safely.
To the extent possible, relocate the receiver with
respect to the telephone equipment.
Where the telephone equipment requires AC power,
plug the telephone into a different AC outlet so that the
telephone equipment and receiver are on different
branch circuits.
Consult the Dealer or an experienced radio/TV
technician for help.
Speech Applications Builder Configurator User Guide • May 15, 2004 • page 2 of 116

Advertisement

Table of Contents
loading

This manual is also suitable for:

Speech applications builder configurator

Table of Contents