Instruction manual
FCC WARNING STATEMENT
Federal Communications Commission (FCC) Rules require that you be notified of the following:
● This equipment generates, uses, and can radiate radio frequency energy and, if not installed
and used in accordance with the instruction manual, may cause interference to radio
communications.
● It has been tested and found to comply with the limits for a Class A computing device pursuant
to Subpart J of Part 15 of FCC Rules, which are designed to provide reasonable protection
against such interference when operated in a commercial environment.
● Operation of this equipment in a residential area is likely to cause interference in which case the
user at his or her own expense will be required to take whatever measures may be required to
correct the interference.
SECURITY OF YOUR SYSTEM—PREVENTING TOLL FRAUD
As a customer of a new telephone system, you should be aware that there exists an increasing
problem of telephone toll fraud. Telephone toll fraud can occur in many forms, despite the
numerous efforts of telephone companies and telephone equipment manufacturers to control it.
Some individuals use electronic devices to prevent or falsify records of these calls. Others
charge calls to someone else’s number by illegally using lost or stolen calling cards, billing
incorrect parties, clipping on to someone else’s line, and breaking into someone else’s telephone
equipment physically or electronically.
In certain instances, unauthorized individuals make
connections to the telephone network through the use of remote access features.
The Remote Access feature of your system, if you chose to utilize it, permits off-premises callers
to access the system from a remote telephone by using an 800 number or a 7- or 10- digit
telephone number. The system returns an acknowledgement signaling the user to key in his or
her authorization code, which is selected and administered by the system manager. After the
authorization code is accepted, the system returns dial tone to the user. If you do not program
specific egress restrictions, the user will be able to place any call normally dialed from a
telephone associated with the system. Such an off-premises network call is originated at, and
will be billed from, the system location,
The Remote Access feature, as designed, helps the customer, through proper administration, to
minimize the ability of unauthorized persons to gain access to the network. Most commonly,
phone numbers and codes are compromised when overheard in a public location, through theft
of a wallet or purse containing access information, or through carelessness (writing codes on a
piece of paper and improperly discarding it). Additionally, hackers may use a computer to “dial”
an access code and then publish the information to other hackers. Enormous charges can be
run up quickly. It is the customer’s responsibility to take the appropriate steps to properly
implement the features, evaluate and administer the various restriction levels, protect access
codes, and distribute access codes only to individuals who have been fully advised of the
sensitive nature of the access information.