Customer Support Information

Security of

Your

System:

Preventing

Toll Fraud

continued

To minimize the risk of unauthorized access to your Lucent DEFINITY â Extender Model 3000 and Model 3100:

When possible, restrict the off-network capability of off- premises callers, using calling restrictions, Facility Restriction Levels, and Disallowed List capabilities. When possible, block out-of-hours calling through Time-of-Day Routing. Frequently monitor system call detail reports for quicker detection of any unauthorized or abnormal calling patterns.

Limit Outcalling to persons on a need-to-have basis. Lucent DEFINITY â Extender Model 3000 and Model 3100 , through proper administration, can help you reduce the risk of unauthorized persons gaining access to the network. However, telephone numbers and authorization codes can be compromised when overheard in a public location, lost through theft of a wallet or purse containing access information, or when treated carelessly (writing codes on a piece of paper and improperly discarding them).

Additionally, hackers may use a computer to dial an access code and then publish the information to other hackers. Substantial charges can accumulate quickly. It is your responsibility to take appropriate steps to implement the features properly, to evaluate and administer the various restriction levels, and to protect and carefully distribute access codes.

Under applicable tariffs, you will be responsible for payment of toll charges. Lucent Technologies cannot be responsible for such charges and will not make any allowance or give any credit resulting from unauthorized access.

Issue 1 October 1998 ix

Page 13
Image 13
Lucent Technologies 3100, 3000 manual Security Your System Preventing Toll Fraud