Instruction manual

DEFINITY® Business Communications System and GuestWorks® Issue 6
Overview
555-231-208
Issue 1
April 2000
Features
A-26Basic features
A
Listed Directory Number
Allows outside callers to access your attendant group in two ways, depending on
the type of trunk used for the incoming call. You can allow attendant group access
via incoming direct inward dial trunks, or you can allow attendant group access via
incoming central office and foreign exchange trunks.
Long Hold Recall Warning
Gives a visual or audible warning on the telephone set that the administered hold
time limit has been exceeded for the call on hold. This serves as a reminder if a
caller has been put on hold for a long time. The characters “hr” will appear on
display telephones.
Loudspeaker Paging Access
Provides attendants and telephone users dial access to voice-paging equipment.
As many as nine paging zones can be provided by the system, and one zone can
be provided that activates all zones at the same time. A zone is the location of the
loudspeakers — for example, conference rooms, warehouses, or storerooms. A
user can activate this feature by dialing the trunk access code of the desired
paging zone, or the access codes can be entered into Abbreviated Dialing Lists.
Once the user has activated this feature, the user simply speaks into the handset
to make the announcement.
Deluxe Loudspeaker Paging Access (called Deluxe Paging) provides attendants
and telephone users with integrated access to voice-paging equipment and Call
Park capabilities. When Deluxe Paging is activated, the call is automatically
parked. The parked call returns to the user that parked the call with distinctive
alerting when the time-out interval expires.
Malicious Call Trace
Allows a user to trace malicious calls. You define a group of terminal users who
can notify others in the group when they receive a malicious call. These users can
then retrieve information related to the call. Using this information, the user can
identify the malicious call source or provide information to personnel at an
adjacent system to complete the trace. It also allows the user to record the
malicious call.