Avaya 3600 manual Copyright, Series Wireless User Guide IP Office Issue 1 1 June

Page 5
Avaya provided telecommunications systems and their interfaces
Avaya provided software applications, as well as their underlying hardware/ software platforms and interfaces Any other equipment networked to your Avaya products
Installation documents
System administration documents Security documents Hardware-/software-based security tools Shared information between you and your peers Telecommunications security experts
Utilization (of capabilities special to the accessed equipment)
Theft (such as, of intellectual property, financial assets, or toll-facility access) Eavesdropping (privacy invasions to humans)
Mischief (troubling, but apparently innocuous, tampering)
Harm (such as harmful tampering, data loss or alteration, regardless of motive or intent)

Copyright

Copyright

All efforts were made to ensure that the information in this book was complete and accurate at the time of printing. However, information is subject to change.

Avaya Web Page

The world wide web home page for Avaya is: http://www.avaya.com

Preventing Toll Fraud

Toll Fraud is the unauthorized use of your telecommunicationssystem by an unauthorized party. For example, a person who is not a corporate employee, agent, subcontractor, or working on your company s behalf. Be aware that there is a risk of toll fraud associated with your system. If toll fraud occurs, it can result in substantial additional charges for your telecommunications services.

Avaya Fraud Intervention

If you suspect that you are being victimized by toll fraud and you need technical assistance or support, call the Technical Service Center s Toll Fraud Intervention Hotline at 1.800.643.2353.

Providing Telecommunications Security

Telecommunications security of voice, data, and/or video communicationsis the prevention of any type of intrusion to, that is, either unauthorized or malicious access to or use of, your company s telecommunications equipment by some party.

Your company’s “telecommunications equipment” includes boththis Avaya product and any other voice/data/video equipment that could be accessed via this Avaya product (that is, networked equipment ).

An “outside party” is anyone who is not a corporate employee, agent, subcontractor, or a person working on your company’s behalf. Whereas, a malicious party is Anyone, including someone who may be otherwise authorized, who accesses your telecommunications equipment with either malicious or mischievous intent.

Such intrusions may be either to/through synchronous (time-multiplexed and/or circuit-based) or asynchronous (character-, message-, or

packet-based) equipment or interfaces for reasons of:

Be aware that there could be a risk of unauthorized intrusions associated with your system and/or its networked equipment. Also realize that, if such an intrusion should occur, it could result in a variety of losses to your company, including but not limited to, human/data privacy, intellectual property, material assets, financial resources, labor costs, and/or legal costs).

Your Responsibility for Your Company’s Telecommunications Security

The final responsibility for securing both this system and its networked equipment rests with you an Avaya customer s system administrator, your telecommunications peers, and your managers. Base the fulfillment of your responsibility on acquired knowledge and resources from a

variety of sources including but not limited to:

To prevent intrusions to your telecommunications equipment, you and your peers should carefully program and configure your:

Federal Communications Commission Statement

Part 15: Class A Statement. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instructions, could cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his own expense.

Industry Canada (IC) Interference Information

This digital apparatus does not exceed the Class A limits for radio noise emissions set out in the radio interference regulations of Industry Canada.

LeéPrésent Appareil Nomérique n’émet pas de bruitsé radioélectriquesé é dépassant les limites applicables aux appareils numériques de la class A pr scrites dans le reglement sur le brouillage radio lectrique dict par le Industrie Canada.

European“ ” Union Declaration of Conformity

The CE mark affixed to the equipment means that it conforms to the referenced European Union (EU) Directives listed below:

EMC Directive 89/336/EEC

Low-Voltage Directive 73/23/EEC

For more information on standards compliance, contact your local distributor.

3600 Series Wireless User Guide

Page 1

IP Office

[15-601104] Issue [1] (1 June 2006)

Image 5
Contents IP Office Table Of Contents Iii Table Of ContentsPage Copyright Series Wireless User Guide IP Office Issue 1 1 JuneAbout this Guide Wireless PhoneOverview Important Information about your Phone3616/3620 Wireless Phone Power Off/End Call Power On/Start CallBattery Select3626 Wireless Phone Push-to-Talk Radio Control Modes of Operation Active ModeModes of Operation To make a call Press Start CallStandby Mode Push-to-Talk ModeAnswering Calls Basic OperationTurning the Phone On/Off Locking/Unlocking your Phone System Feature ActivationMaking Calls To change the speaker volume whilst on a call Volume SettingsVoicemail To silence your ringing phoneConf Using the SoftkeysHold MuteConference TransferHold MuteUser Preferences Setting User PreferencesDefault setting Lock Keys NavigateRing Options To unlock the keypadTelephone Ring Phone Options Noise ModeAuxiliary Ring 1 Key TonesKeypad Autolock System InformationExtension Push to Talk Overview To select the volume levelPush to Talk To change the PTT volume Using Push to Talk PTTTo initiate a call To initiate subsequent transmissionsTo terminate incoming broadcasts To mute a PTT callTo answer an incoming PBX call during a PTT call To make a PBX call during a PTT callBattery Pack Removal and Replacement Battery PacksImportant Information on your Battery Packs and Chargers Chargers Low Battery IndicationDesktop Chargers Phone in DCE100 Desktop ChargerPhone in DCE200 Dual Charger Dual ChargersTo charge your phone with a desktop charger To charge your phone with a dual charger Indicator LightQuad Chargers To remove, charge and replace the 3620 battery packGeneral Care of your Phone and Chargers Cleaning your Phone and ChargersGeneral Care Declaration of Conformity Regulatory InformationOperational Warnings Radio Frequency InformationFacilities Electromagnetic Interference/CompatibilityMedical Devices Use While DrivingZ233 International CertificationsSpecific Absorption Rate Information Index CleaningAL7 1LZ