DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506 Issue 1
April 2000
Features and technical reference
1425Malicious Call Trace
20
DCS
If a telephone in a DCS network is involved in a malicious call, the
extension is recorded and displayed with the MCT information. MCT
notification passes over ISDN-PRI DCS trunks but MCT-Activate,
MCT-Control, and MCT-Deactivate must be performed by telephones
within the same DCS node.
Emergency Access to the Attendant
Ordinarily, during MCT- Contr ol n o othe r fe ature can acces s the c ontrol ling
telephone’s display. Howe ver , MCT gi ves up control of the disp lay until the
Emergency Access call has completed.
ISDN
ISDN notification of an MCT activation takes place if either the originator
of the call is an ISDN trunk group with Country Protocol 2 or any trunk on
the call is an ISDN private network trunk with Country Protocol 1 and
Protocol Version “a” or Peer Protocol q- sig. When the I SDN trunk g roup i s
Country Protocol 2, notification is sent only to the public network.
Make-Busy/Position-Busy/Send All Calls
The switch attempts to activate Make-Busy or Position-Bu sy for telephones
or consoles that activate MCT -Contr ol. If a user has a Send All Ca lls (SAC)
button administered, then SAC activates when the user activates
MCT-Control. When MCT is deactivated, the telephone resets to its
original state.
Music-On-Hold
If an agent places a malicious call on hold that is being recorded and the
call goes to music-on-hold, the music-on-hold port and the MCT Voice
Recorder port can lock. In this case, the MCT Voice Recorder continues to
record the music-on-hold and is unavailable for recording subsequent
malicious calls. You must perform a busy-out/release on the MCT Voice
Recorder port to drop the connection.
Priority Calling
A priority call to an MCT recipient is denied.
QSIG Global Networking
MCT notification passes over the following ISDN QSIG trunk groups:
tandem, tie, access, and DMI-BOS. QSIG supplementary services name
and number ID provide a malicious caller’s name and telephone number.
Transfer
If a user transfers a malicious call, the MCT information displayed on the
controlling telephone identifies the transferring party a s t he MCT r ec ipi ent .