DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506 Issue 1
April 2000
Features and technical reference
1425Malicious Call Trace
20
■DCS
If a telephone in a DCS network is involved in a malicious call, the
extension is recorded and displayed with the MCT information. MCT
notification passes over ISDN-PRI DCS trunks but MCT-Activate,
MCT-Control, and MCT-Deactivate must be performed by telephones
within the same DCS node.
■Emergency Access to the Attendant
Ordinarily, during MCT- Contr ol n o othe r fe ature can acces s the c ontrol ling
telephone’s display. Howe ver , MCT gi ves up control of the disp lay until the
Emergency Access call has completed.
■ISDN
ISDN notification of an MCT activation takes place if either the originator
of the call is an ISDN trunk group with Country Protocol 2 or any trunk on
the call is an ISDN private network trunk with Country Protocol 1 and
Protocol Version “a” or Peer Protocol q- sig. When the I SDN trunk g roup i s
Country Protocol 2, notification is sent only to the public network.
■Make-Busy/Position-Busy/Send All Calls
The switch attempts to activate Make-Busy or Position-Bu sy for telephones
or consoles that activate MCT -Contr ol. If a user has a Send All Ca lls (SAC)
button administered, then SAC activates when the user activates
MCT-Control. When MCT is deactivated, the telephone resets to its
original state.
■Music-On-Hold
If an agent places a malicious call on hold that is being recorded and the
call goes to music-on-hold, the music-on-hold port and the MCT Voice
Recorder port can lock. In this case, the MCT Voice Recorder continues to
record the music-on-hold and is unavailable for recording subsequent
malicious calls. You must perform a busy-out/release on the MCT Voice
Recorder port to drop the connection.
■Priority Calling
A priority call to an MCT recipient is denied.
■QSIG Global Networking
MCT notification passes over the following ISDN QSIG trunk groups:
tandem, tie, access, and DMI-BOS. QSIG supplementary services name
and number ID provide a malicious caller’s name and telephone number.
■Transfer
If a user transfers a malicious call, the MCT information displayed on the
controlling telephone identifies the transferring party a s t he MCT r ec ipi ent .