Data Security - Panasonic DBS-576 Technical Manual

Section 200 general description
Hide thumbs Also See for DBS-576:
Table of Contents

Advertisement

system also offers powerful computer/phone integrations for the Attendant position (via our PC
Attendant Console ) as well as end-user phones (via our PC Phone ). For more information
about these CTI applications, see Chapter 5 - Special Applications in this document.
 " !
Enables customers to operate more efficiently by taking advantage of the latest
telephone and computer convergence. These industries are coming together to offer
a more intelligent and streamlined way to do business.
#  !
Control and pull up information on your "on-screen" phone based on caller
information
Allows computer applications to control telephone operation
   !
Data Security makes it possible to prevent interruptions on a phone. This feature is often used
when the phone is hooked up to a modem, but it could also be used for confidential or sensitive
calls. Data Security can be implemented for all phone usage, or it can apply only to outside line
use.
 " !
Ensures confidentiality on important calls.
Protects data transmissions from being interrupted or cut off.
#  !
Modem phones
Sensitive accounts (i.e., lawyers, doctors, etc.) where confidentiality is important
   !
An incoming or transferred call as well as intercom calls can be programmed to ring at a
secondary answering position if the call rings the primary answering position more than a
specified length of time. The call can be programmed to ring at one or more delay ringing
positions (including phones with BLF keys). This feature also works with Direct Inward Dialing
(DID) calls.
 " !
Ensures that a call does not go unanswered or ring for an extended period of time.
#  !
Any company that experiences short, temporary periods of high traffic and needs to
ensure that calls are answered
Backup support functions to cover void periods of the workday.
   !
Any number of CO lines can be assigned to DISA lines which after being accessed, will enable
the incoming caller to dial any extension within the system. Or, if the proper security code is
entered, the caller will be able to access outside lines. Remote programming can also be done
over these lines after entering a password.

38
Chapter 3 - System Features

Advertisement

Table of Contents
loading

Table of Contents