AT&T MERLIN LEGEND Release 2.0 Equipment And Operations Manual page 161

Hide thumbs Also See for MERLIN LEGEND Release 2.0:
Table of Contents

Advertisement

Applications
CAUTION:
Your Voice Mail system permits callers to leave verbal messages for
system users or gain access to the back-up position in an emergency
as well as create and distribute voice messages among system users.
The Voice Mail system, through proper administration, can help you
reduce the risk of unauthorized persons gaining access to the network.
However, phone numbers and authorization codes can be
compromised when overheard in a public location, are lost through
theft of a wallet or purse containing access information, or through
carelessness (writing codes on a piece of paper and improperly
discarding them). Additionally, hackers may use a computer to dial an
access code and then publish the information to other hackers.
Substantial charges can accumulate quickly. It is your responsibility to
take appropriate steps to implement the features properly, evaluate
and administer the various restriction levels, protect and carefully
distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll
charges. AT& T cannot be responsible for such charges and will not
make any allowance or give any credit resulting from unauthorized
access.
To reduce the risk of unauthorized access through your Voice Mail
system, please observe the following procedures:
Employees who have voice mailboxes should be required to
The administrator should remove any unneeded voice
AUDIX Voice Power has the ability to limit transfers to
Use the system programming capability to do the following:
Monitor SMDR reports or Call Accounting System reports for
use the pass words to protect their mailboxes.
—— Have them use random sequence passwords.
— Impress upon them the importance of keeping their
passwords a secret.
— Encourage them to change their passwords regularly.
mailboxes from the system immediately.
subscribers only. You are strongly urged to limit transfers in this
manner.
— Block direct access to outgoing lines and force the use
of account codes/authorization codes.
— Disallow trunk-to-trunk transfer unless required.
— Assign toll restriction levels to all AUDIX Voice Power
ports.
— If you do not need to use the Outcalling feature,
completely restrict the outward calling capability of the
AUDIX Voice Power ports.
outgoing calls that might be originated by AUDIX Voice Power
ports.
Voice Messaging Systems 4-5

Advertisement

Table of Contents
loading

Table of Contents