Avaya Merlin Magix 4400D Release Note page 2

Integrated system supplemental information for release 4.0 systems
Hide thumbs Also See for Merlin Magix 4400D:
Table of Contents

Advertisement

Copyright © 2004
Avaya Inc.
All Rights Reserved
Printed in USA
Notice
Every effort has been made to ensure that the information in this guide is complete and accurate at the time of
printing. Information, however, is subject to change. See Appendix A, "Customer Support Information in Feature
Reference for important information.
Avaya Web Page
The world wide web home page for Avaya is http://www.avaya.com.
Preventing Toll Fraud
Toll Fraud is the unauthorized use of your telecommunications system by an unauthorized party (for example, a
person who is not a corporate employee, agent, subcontractor, or working on your company's behalf). Be aware
that there is a risk of toll fraud associated with your system and that, if toll fraud occurs, it can result in substantial
additional charges for your telecommunications services.
Avaya Fraud Intervention
If you suspect that you are being victimized by toll fraud and you need technical assistance or support, call
Technical Service Center's Toll Fraud Intervention Hotline at 800 643-2353.
Providing Telecommunications Security
Telecommunications security of voice, data, and/or video communications is the prevention of any type of intrusion
to, that is, either unauthorized or malicious access to or use of, your company's telecommunications equipment by
some party.
Your company's "telecommunications equipment" includes both this Avaya product and any other voice/data/video
equipment that could be accessed via this Avaya product (that is, "networked equipment").
An "outside party" is anyone who is not a corporate employee, agent, subcontractor, or working on your company's
behalf. Whereas, a "malicious party" is anyone, including someone who may be otherwise authorized, who
accesses your telecommunications equipment with either malicious or mischievous intent.
Such intrusions may be either to/through synchronous (time multiplexed and/or circuit-based) or asynchronous
(character-, message-, or packet-based) equipment or interfaces for reasons of:
• Utilization (of capabilities special to the accessed equipment)
• Theft (such as, of intellectual property, financial assets, or toll-facility access)
• Eavesdropping (privacy invasions to humans)
• Mischief (troubling, but apparently innocuous, tampering)
• Harm (such as harmful tampering, data loss or alteration, regardless of motive or intent)
Be aware that there may be a risk of unauthorized or malicious intrusions associated with your system and/or its
networked equipment. Also realize that, if such an intrusion should occur, it could result in a variety of losses to
your company, including, but not limited to, human/data privacy, intellectual property, material assets, financial
resources, labor costs, and/or legal costs.
Document 555-740-SUP
Issue 1
May 2004

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents