AT&T Network Adapter 25 Installation And Maintenance Manual page 8

Adtran network adapter product manual
Hide thumbs Also See for Network Adapter 25:
Table of Contents

Advertisement

FCC WARNING STATEMENT
Federal Communicatlons Commission (FCC) Rules require that you be notified of
the following:
This equipment generates, uses, and can radiate radio frequency energy and, if
not installed and used in accordance with the instruction manual, may cause
interference to radio communications.
It has been tested and found to comply with the limits for a Class A computing
device pursuant to Subpart J of Part 15 of FCC Rules, which are designed to
provide reasonable protection against such interference when operated in a
commercial environment.
Operation of this equipment in a residential area is likely to cause interference
in which case the user at his or her own expense will be required to take
whatever measures may be required to correct the interference.
SECURITY OF YOUR SYSTEM-PREVENTING TOLL FRAUD
As a customer of a new telephone system, you should be aware that there exists
an increasing problem of telephone toll fraud. Telephone toll fraud can occur in
many forms, despite the numerous efforts of telephone companies and telephone
equipment manufacturers to control it. Some individuals use electronic devices
to prevent or falsify records of these calls. Others charge calls to someone else's
number by illegally using lost or stolen calling cards, billing incorrect parties,
clipping on to someone else's line, and breaking into someone else's telephone
equipment physically or electronically.
individuals make connections to the telephone network through the use of remote
access features.
The Remote Access feature of your system, if you chose to utilize it, permits off-
premises callers to access the system from a remote telephone by using an 800
number or a 7- or 10- digit telephone number.
acknowledgement signaling the user to key in his or her authorization code,
which is selected and administered by the system manager. After the
authorization code is accepted, the system returns dial tone to the user. If you do
not program specific egress restrictions, the user will be able to place any call
In certain instances, unauthorized
The system returns an

Advertisement

Table of Contents
loading

Table of Contents