Intuity AUDIX Traffic Reports
The Intuity AUDIX system tracks traffic data over various timespans. Reviewing these reports on a regular basis helps to establish traffic trends. If increased activity or unusual usage patterns occur, such as heavy call volume on ports assigned to outcalling, they can be investigated immediately. In addition, the AUDIX Data Acquisition Package (ADAP) uses an external PC (running
AT&T’s Statement of Direction
The telecommunications industry is faced with a significant and growing problem of theft of customer services. To aid in combating these crimes, AT&T intends to strengthen relationships with its customers and its support of law enforcement officials in apprehending and successfully prosecuting those responsible.
No telecommunications system can be entirely free from risk of unauthorized use. But diligent attention to system management and to security can reduce that risk considerably. Often a tradeoff is required between reduced risk and ease of use and flexibility. Customers who use and administer their systems make this tradeoff decision. They know best how to tailor the system to meet their unique needs and, necessarily, are in the best position to protect the system from unauthorized use.
Because the customer has ultimate control over the configuration and use of AT&T services and products it purchases, the customer properly bears responsibility for fraudulent uses of those services and products.
To help customers use and manage their systems in light of the tradeoff decisions they make and to ensure the greatest security possible, AT&T commits to the following:
■AT&T products and services will offer the widest range of options available in the industry to help customers secure their communications systems in ways consistent with their telecommunications needs.
■AT&T is committed to develop and offer services that, for a fee, reduce or eliminate customer liability for PBX toll fraud, provided the customer implements prescribed security requirements in its telecommunications systems.
■AT&T’s product and service literature, marketing information and contractual documents will address, wherever practical, the security features of our offerings and their limitations, and the responsibility our customers have for preventing fraudulent use of their AT&T products and services.