Lucent Technologies 3100 Carrying Case User Manual


 
Customer Support Information
Issue 1 October 1998
ix
Security of
Your
System:
Preventing
Toll Fraud
continued
To minimize the risk of unauthorized access to your
Lucent DEFINITY
Extender Model 3000 and Model
3100:
When possible, restrict the off-network capability of off-
premises callers, using calling restrictions, Facility
Restriction Levels, and Disallowed List capabilities.
When possible, block out-of-hours calling through
Time-of-Day Routing. Frequently monitor system call
detail reports for quicker detection of any unauthorized
or abnormal calling patterns.
Limit Outcalling to persons on a need-to-have basis.
Lucent DEFINITY
Extender Model 3000 and Model
3100 , through proper administration, can help you
reduce the risk of unauthorized persons gaining access
to the network. However, telephone numbers and
authorization codes can be compromised when
overheard in a public location, lost through theft of a
wallet or purse containing access information, or when
treated carelessly (writing codes on a piece of paper and
improperly discarding them).
Additionally, hackers may use a computer to dial an
access code and then publish the information to other
hackers. Substantial charges can accumulate quickly. It
is your responsibility to take appropriate steps to
implement the features properly, to evaluate and
administer the various restriction levels, and to protect
and carefully distribute access codes.
Under applicable tariffs, you will be responsible for
payment of toll charges. Lucent Technologies cannot be
responsible for such charges and will not make any
allowance or give any credit resulting from unauthorized
access.