Lucent Technologies 555-230-796 manual Security of Your System Preventing Toll Fraud

Page 13

Customer Support Information

Security of Your System:

Preventing Toll Fraud

As a customer of a new telephone system, you should be aware that there is an increasing problem of telephone toll fraud. Telephone toll fraud can occur in many forms, despite the numerous efforts of telephone companies and telephone equipment manufacturers to control it. Some individuals use electronic devices to prevent or falsify records of these calls. Others charge calls to someone else’s number by illegally using lost or stolen calling cards, billing innocent parties, clipping on to someone else’s line, or breaking into someone else’s telephone equipment physically or electronically. In certain instances, unauthorized individuals make connections to the telephone network through the use of remote access features.

Common carriers are required by law to collect their tariffed charges. While these charges are fraudulent charges made by persons with criminal intent, applicable tariffs state that the customer of record is responsible for payment of all long-distance or other network charges. Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit for charges that result from unauthorized access.

To minimize the risk of unauthorized access to your DEFINITY ECS:

When possible, restrict the off-network capability of off- premises callers, using calling restrictions, Facility Restriction Levels, and Disallowed List capabilities.

When possible, block out-of-hours calling.

Frequently monitor system call detail reports for quicker detection of any unauthorized or abnormal calling patterns.

xIssue 2 July 1997

Image 13
Contents Definity Extender Your Responsibility for Your System’s Security Trademarks Contents Connections for Data Transmission Ii Issue 2 July Using the Telephone for Programming GL-1 Figures Tables TroubleshootingImportant Safety Instructions Viii Issue 2 July Customer Support Information Support Telephone Number Security of Your System Preventing Toll Fraud Lucent Technologies Fraud Intervention Limited Warranty FCC Notification Repair Information Installation and Operational Procedures Customer Support Information Xvi Issue 2 July Intended Audience About This BookSecurity Alert Terms and ConventionsTypographical Conventions How to Use This BookProduct Safety Labels Call Related DocumentsDefinity Enterprise How to Comment on This Document Feedback Form This Form MAY be Photocopied Introduction1 System Configuration System Operation ConfigurationEquipment List Page Compatibility Specifications Remote Module Specifications Considerations Security Alert How to install the Definity Extender Remote Module Installation2Electrical Requirements Location RequirementsRemote Module Back Panel Connecting the Remote ModuleInstallation Procedure DIP Switch Configuration Connections for Data Transmission RS-232 Cable Pin Connections Programming3 Telephone Keys Used in Programming Using the Telephone for ProgrammingSetting the Telephone Number Setting Pulse Dialing Setting the Mode of DialingSetting Tone Dialing Setting the Connect Rate Issue 2 July 1997 Setting the COM Port Baud Rate Exiting Programming Operating the Remote Module of the Definity Extender Operating the Remote ModuleStarting the Operation Connect Sequence for the Remote Module Disconnecting Operating the Remote Module Changing a Password Page Security Alert Checking System Software Page Troubleshooting, LED Activity, and Error Messages Troubleshooting5Troubleshooting LED Sequences Error MessagesOn next Error Messages Dedicated Subscriber Lines GlossaryGL-2Issue 2 July Issue 2 July 1997 GL-3