Security Settings (Menu 4-3) - Samsung SGH-R220 Owner's Manual

Dual band gsm telephone
Hide thumbs Also See for SGH-R220:
Table of Contents

Advertisement

S e t t i n g s
CLIR (Calling Line Identification Restriction) /
COLR (Connected Line Identification Restriction)
If these network functions are active, your phone
number is not displayed on the called person's phone.
Closed User Group (CUG)
This network service allows incoming and outgoing
calls to be restricted to a selected user group. You
may be a member of up to 10 user groups.
For details on how to create, activate and use a
closed user group, contact your service provider.
Example: A company lends SIM cards to its
employees and wants to restrict outgoing
calls to members of the same team.
Activating a Closed User Group
If you select the Closed User Group menu, you are
asked if you wish to activate the CUG function. Press
the Yes soft key. You can now access the following
options.
Deactivate: deactivates the CUG function.
Index List: lets you list, add or delete CUG index
numbers. The list of cur rent CUG indexes appears.
Add a new CUG index (as advised by your service
provider) or delete a selected group.
88
To...
Then press the...
Scroll through the
existing CUG indexes
Add a new CUG index
Options soft key, select
Add and enter the index.
Delete a CUG index
the index to be deleted,
press the Options soft key
and select Delete.
Outside Access: enables you to allow or prohibit
calls to numbers other than those nominated for the
Closed User Group. This feature depends on the
nature of your CUG subscription. Please check with
your service provider.
Default Group: you may communicate a default
CUG to your service provider. If you have done so,
you can enable the Default Group option on your
phone. When making a call, you will be given the
option of using your default CUG, instead of
selecting one from the list.
Security Settings
The Security feature enables you to restrict the use
of your phone to:
• The people of your choice
• The types of calls of your choice
Various codes and passwords are used to protect the
features of your phone. They are described in the
following sections (also see page 114).
S e t t i n g s
or
key.
or
key to select
Menu 4-3
89

Advertisement

Table of Contents
loading

Table of Contents