Customer Support Information
To minimize the risk of unauthorized access to your communications system:
■Use a nonpublished Remote Access number.
■Assign authorization codes randomly to users on a
■Use random sequence authorization codes, which are less likely to be easily broken.
■Deactivate all unassigned codes promptly.
■Ensure that Remote Access users are aware of their responsibility to keep the telephone number and any authorization codes secure.
■When possible, restrict the
■When possible, block
■Frequently monitor system call detail reports for quicker detection of any unauthorized or abnormal calling patterns.
■Limit Remote Call Forward to persons on a
Limited Warranty and Limitation of Liability
AT&T warrants to you, the customer, that your MERLIN LEGEND Communications System will be in good working order on the date AT&T or its authorized reseller delivers or installs the system, whichever is later (“Warranty Date”). If you notify AT&T or its authorized reseller within one year of the Warranty Date that your system is not in good working order, AT&T will without charge to you repair or replace, at its option, the system components that are not in good working order. Repair or replacement parts may be new or refurbished and will be provided on an exchange basis. If AT&T determines that your system cannot be repaired or replaced, AT&T will remove the system and, at your option, refund the purchase price of your system, or apply the purchase price towards the purchase of another AT&T system.
Voice Mail Systems
Your Voice Mail system permits callers to leave verbal messages for system users or gain access to the
The Voice Mail system, through proper administration, can help you reduce the risk of unauthorized persons gaining access to the network. However, phone numbers and authorization codes can be compromised when overheard in a public location, are lost through theft of a wallet or purse containing access information, or through carelessness (writing codes on a piece of paper and improperly discarding them). Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Substantial charges can accumulate quickly. It is your