Better Music Builder VM-82U G3 Instruction Manual Page 155

  • Download
  • Add to my manuals
  • Print
  • Page
    / 484
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 154
MERLIN LEGEND/MAGIX toll fraud
Issue 9 May 2003
6-17
Have only system administrator transfer calls to “*10.”
The customer’s long distance carrier may:
Restrict 011 and other “hot spot” area codes.
Restrict access to your toll free area codes from areas you do not
wish to receive calls from.
Put after hours restrictions to terminate calls in the network.
Restrict third-party billing with your local carrier.
Responsibility
The customer is responsible for the security of the system. The system
administrator should read all system administration documents provided with the
system to fully understand the risk of toll fraud and the steps that can be taken to
reduce that risk. Avaya will not be responsible for any charge that result from
unauthorized use.
Programming tools to prevent fraud
Know the release of the Merlin Legend you are working with. Some earlier
releases may be incapable of performing certain functions, will later releases are
able to perform these functions.
Release 5.0 and earlier was unable to remote call forwarding using an
authorization code. Release 6.0 and later can remote call forwarding using an
authorization code.
Security of your systems: preventing toll fraud
2
As a customer of a new telephone system, you should be aware that there is an
increasing problem of telephone toll fraud. Telephone toll fraud can occur in many
forms, despite the numerous efforts of telephone companies and telephone
equipment manufacturers to control it. Some individuals use electronic devices to
prevent or falsify records of these calls. Others charge calls to someone else’s
number by illegally using lost or stolen calling cards, billing innocent parties,
clipping on to someone else’s line, and breaking into someone else’s telephone
equipment physically or electronically. In certain instances, unauthorized
individuals make connections to the telephone network through the use of the
Remote Access features of your system.
2. Published 8/31/00
Page view 154
1 2 ... 150 151 152 153 154 155 156 157 158 159 160 ... 483 484

Comments to this Manuals

No comments