Instruction manual

Features
carelessness (writing codes on a piece of paper and improperly discarding it).
Additionally, hackers may use a computer to dial an access code and then
publish the information to other hackers. Enormous charges can be run up
quickly. It is the customer’s responsibility to take the appropriate steps to
properly implement the features, evaluate and administer the various restriction
levels, protect access codes, and distribute access codes only to individuals
who have been fully advised of the sensitive nature of the access information.
Common carriers are required by law to collect their tariffed charges. While
these charges are fraudulent charges made by persons with criminal intent,
applicable tariffs state that the customer of record is responsible for payment of
all long-distance or other network charges. AT&T cannot be responsible for
such charges and will not make any allowance or give any credit for charges
that result from unauthorized access.
To minimize the risk of unauthorized access to your communications system:
Use a nonpublished Remote Access number.
Assign authorization codes randomly to users on a need-to-have basis,
keeping a log of ALL authorized users and assigning one code to one
person.
Use random sequence authorization codes, which are less likely to be
easily broken.
Deactivate all unassigned codes promptly.
Ensure that Remote Access users are aware of their responsibility to
keep the telephone number and any authorization codes secure.
When possible, restrict the off-net work capability of off-premises callers,
via use of Call Restrictions and Disallowed List capabilities.
When possible, block out-of-hours calling.
Frequently monitor system call detail reports for quicker detection of any
unauthorized or abnormal calling patterns.
Limit Remote Call Forward to persons on a need-to-have basis.
Description
Programming allows you to customize and update your system and provides
telephone users and operators with a wide range of features. There are three
types of programming:
system programming
centralized telephone programming
extension programming
The tables in Appendix C provide complete lists of system operator and
telephone features, their programming codes, and the telephones on which the
features can be programmed. The tables also show which features can be
assigned only through centralized telephone programming.
Programming 377