Customer Support Information

To minimize the risk of unauthorized access to your communications system:

Use a nonpublished Remote Access number.

Assign authorization codes randomly to users on a need-to-have basis, keeping a log of ALL authorized users and assigning one code to one person.

Use random sequence authorization codes, which are less likely to be easily broken.

Deactivate all unassigned codes promptly.

Ensure that Remote Access users are aware of their responsibility to keep the telephone number and any authorization codes secure.

When possible, restrict the off-network capability of off-premises callers, via use of Call Restrictions and Disallowed List capabilities.

When possible, block out-of-hours calling.

Frequently monitor system call detail reports for quicker detection of any unauthorized or abnormal calling patterns.

Limit Remote Call Forward to persons on a need-to-have basis.

Limited Warranty and Limitation of Liability

AT&T warrants to you, the customer, that your MERLIN LEGEND Communications System will be in good working order on the date AT&T or its authorized reseller delivers or installs the system, whichever is later (“Warranty Date”). If you notify AT&T or its authorized reseller within one year of the Warranty Date that your system is not in good working order, AT&T will without charge to you repair or replace, at its option, the system components that are not in good working order. Repair or replacement parts may be new or refurbished and will be provided on an exchange basis. If AT&T determines that your system cannot be repaired or replaced, AT&T will remove the system and, at your option, refund the purchase price of your system, or apply the purchase price towards the purchase of another AT&T system.

Voice Mail Systems

Your Voice Mail system permits callers to leave verbal messages for system users or gain access to the back-up position in an emergency as well as create and distribute voice messages among system users.

The Voice Mail system, through proper administration, can help you reduce the risk of unauthorized persons gaining access to the network. However, phone numbers and authorization codes can be compromised when overheard in a public location, are lost through theft of a wallet or purse containing access information, or through carelessness (writing codes on a piece of paper and improperly discarding them). Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Substantial charges can accumulate quickly. It is your

xxivCustomer Support Information

Page 26
Image 26
AT&T Release 2.0 manual Xxiv Customer Support Information