Instruction manual
Glossary
GL-10 Issue 9 May 2003 (draft) 
Security Violation
An event that occurs when the number of invalid access attempts (login, Remote Access, or autho-
rization code) exceeds the customer-administered threshold of the number of invalid access 
attempts permitted within a specified time interval. 
Security Violations Measurement Report 
Monitors Remote Access and administration ports for invalid login attempts and attempts to enter 
invalid barrier codes.
Security Violations Notification Feature
Detects attempts to enter barrier codes or authorization codes, as well as attempts to log in to 
Remote Access or administration ports. Alerts a designated station of threshold violations.
Service Observing
The monitoring of actual calls in progress for security purposes.
Station Message Detail Recording
Creates call records for incoming and outgoing calls.
System Manager
A person responsible for specifying and administering features and services for the PBX system.
T
TAC
Trunk Access Code
TCM
Traveling Class Mark
 TSC
Technical Service Center
TTI
Terminal Translation Initialization
Tandem Tie Trunk Network
A private network that interconnects several customer switching systems by dial repeating tie 
trunks. Access to the various systems is dictated by the codes that are individually dialed for each 
system.
Telecommunications Fraud
The unauthorized use of a company’s telecommunications system. Also called any of the following: 
telephone abuse, toll fraud, phone fraud, call fraud.
Tie Trunk
A telecommunications channel that directly connects two private switching systems.
Toll Analysis
Specifies the routing of toll calls, including numbers to be assigned to the Restricted Call List and 
the Unrestricted Call List.
Toll Restriction
Prevents the user from making toll calls unless the number is specified on an Unrestricted Call List.










