Instruction manual

Product security checklists
17-4 Issue 9 May 2003
AUDIX, DEFINITY AUDIX and
I
NTUITY AUDIX voice messaging
systems
Also see the general security checklist on page 17-2, and the security checklist for
the host communications system.
HackerTracker thresholds
established
Social engineering explained
Customer is aware of
network-based toll fraud
surveillance offerings such as
netPROTECT
Customer knows how to subscribe
to ACCESS security shared folder
1. If “NO” (N), provide Note reference number and explain.
Customer: _________________________________________
PBX Type: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 17-1. General security procedures checklist — Continued
Y/N
1
Note N/A
Continued on next page