Technical information

Product Security Checklists
16-4 Issue 7 June 2001
AUDIX, DEFINITY AUDIX and
I
NTUITY AUDIX Voice Messaging
Systems
Also see the general security checklist on page 16-2, and the security checklist for
the host communications system.
Social Engineering explained
Customer is aware of
network-based toll fraud
surveillance offerings such as
netPROTECT
Customer knows how to subscribe
to ACCESS security shared folder
1. If NO (N), provide Note reference number and explain.
Customer: _________________________________________
PBX Type: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 16-1. General Security Procedures (Continued)
Y/N
1
Note N/A
Continued on next page