Instruction manual
Page 1959 of 3156
Features and Services
Malicious Call Trace
Contents
The following are the topics in this section:
Feature description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1959
Enhanced Malicious Call Trace (EMCT) . .. . . . . . . . . . . . . . . . . . . 1960
Enhanced Malicious Call Trace for Saudi Arabia . . . . . . . . . . . . . . 1961
Enhanced Malicious Call Trace for Australia . . . . . . . . . . . . . . . . . 1961
Trace Number (TRC) Key Lamp Status . .. . . . . . . . . . . . . . . . . . . . 1961
Operating parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1962
Feature interactions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1963
Malicious Call Trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1963
Enhanced Malicious Call Trace . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1964
Feature packaging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1966
Feature implementation . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1967
Task summary list . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1967
Feature operation . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1974
Feature description
Malicious Call Trace (MCT) allows users of selected telephones to activate a
call trace that results in a printed report of the calling and called parties. The
report is generated on all system TTYs designated as maintenance (MTC)
terminals.
Malicious Call Trace (MCT) is activated either by Dial Access from single-
line (analog (500/2500 type) telephones), SL-1 and Meridian digital
telephones (Meridian 1 proprietary telephones), or by key access from SL-1
telephones, Meridian digital telephones, and Attendant Consoles.