Instruction manual

Applications
!
SECURITY ALERT:
Your Voice Messaging System permits callers to leave verbal messages
for system users or gain access to the backup position in an emergency
as well as create and distribute voice messages among system users.
The Voice Messaging System, through proper programming, can help you
reduce the risk of unauthorized persons gaining access to the network.
However, phone numbers and passwords can be compromised when
overheard in a public location, are lost through theft of a wallet or purse
containing access information, or through carelessness (writing codes on
a piece of paper and improperly discarding them). Additionally, hackers
may use a computer to dial a password and then publish the information
to other hackers. Substantial charges can accumulate quickly. It is your
responsibility to take appropriate steps to implement the features
properly, evaluate and program the various restriction levels, protect and
carefully distribute access codes.
Under applicable tariffs, you will be responsible for payment of toll
charges. AT&T cannot be responsible for such charges and will not make
any allowance or give any credit resulting from unauthorized access.
To reduce the risk of unauthorized access through your Voice Messaging
System, please observe the following procedures:
Employees who have voice mailboxes should be required to use the
passwords to protect their mailboxes.
Have them use random sequence passwords.
Impress upon them the importance of keeping their passwords a
secret.
Encourage them to change their passwords regularly.
The administrator should remove any unneeded voice mailboxes from
the system immediately.
AT&T Voice Messaging Systems have the ability to limit transfers to
subscribers only. You are strongly urged to limit transfers in this
manner.
Use the system programming capability to do the following:
Block direct access to outgoing lines and force the use of account
codes/barrier codes.
Disallow trunk-to-trunk transfer unless required (in Release 3.1 and
later systems, trunk-to-transfer is disallowed by default and can
only be permitted through system programming).
Features and Applications 4–57