Remote Administration And Maintenance - Lucent Technologies MERLIN LEGEND Release 6.0 Maintenance And Troubleshooting Manual

Communications system
Hide thumbs Also See for MERLIN LEGEND Release 6.0:
Table of Contents

Advertisement

MERLIN LEGEND Communications System Release 6.0
Maintenance and Troubleshooting 555-660-140
Customer Support Information

Remote Administration and Maintenance

whatsoever (including acts or omissions of third parties), regardless of the form
of action, whether in contract, tort, or otherwise, shall not exceed the lesser of:
(1) the direct damages proven; or (2) the repair cost, replacement cost, license
fee, annual rental charge, or purchase price, as the case may be, of the
equipment that gives rise to the claim. Except as provided below, Lucent
Technologies and its affiliates and suppliers shall not be liable for any incidental,
special, reliance, consequential, or indirect loss or damage incurred in
connection with the equipment. As used in this paragraph, consequential
damages include, but are not limited to, the following: lost profits, lost revenues,
and losses arising out of unauthorized use (or charges for such use) of common
carrier telecommunications services or facilities accessed through or connected
to the equipment. For personal injury caused by Lucent Technologies'
negligence, Lucent Technologies' liability shall be limited to proven damages to
person. No action or proceeding against Lucent Technologies or its
affiliates or suppliers may be commenced more than twenty-four (24)
months after the cause of action accrues. THIS PARAGRAPH SHALL
SURVIVE FAILURE OF AN EXCLUSIVE REMEDY.
Remote Administration
and Maintenance
The Remote Administration and Maintenance feature of your
telecommunications system, if you choose to use it, permits users to change the
system features and capabilities from a remote location.
The Remote Administration and Maintenance feature, through proper
administration, can help you reduce the risk of unauthorized persons gaining
access to the network. However, telephone numbers and access codes can be
compromised when overheard in a public location, are lost through theft of a
wallet or purse containing access information, or through carelessness (for
example, writing codes on a piece of paper and improperly discarding them).
Additionally, hackers may use a computer to dial an access code and then
publish the information to other hackers. Substantial charges can accumulate
quickly. It is your responsibility to take appropriate steps to implement the
features properly, evaluate and administer the various restriction levels, and
protect and carefully distribute access codes.
Issue 1
February 1998
Page A-26

Advertisement

Table of Contents
loading

Table of Contents