Citel 6000 Guía Del Usuario

Descargar
Página de 281
 
PBXgateway™ & EXTender™6000 System Administrator’s Guide
 
5
 
 
Security of 
Your System:  
Preventing 
Toll Fraud 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
As a customer of a new telephone system, you should be aware that there is an 
increasing problem of telephone toll fraud. Telephone toll fraud can occur in many forms, 
despite the concerted efforts of telephone companies and telephone equipment 
manufacturers to control it. Some individuals use electronic devices to prevent or falsify 
records of these calls. Others charge calls to someone else’s number by illegally using 
lost or stolen calling cards, billing innocent parties, clipping on to someone else’s line, or 
breaking into someone else’s telephone equipment physically or electronically. In certain 
instances, unauthorized individuals make connections to the telephone network through 
the use of remote access features. 
 
Common carriers are required by law to collect their tariff charges. While these charges 
are fraudulent charges made by persons with criminal intent, applicable tariffs state that 
the customer of record is responsible for payment of all long-distance or other network 
charges. Verso Technologies, Inc. cannot be responsible for such charges and will not 
make any allowance or give any credit for charges that result from unauthorized access. 
 
To minimize the risk of unauthorized access to your Verso Technologies, Inc. 
PBXgateway, when possible, restrict the off-network capability of off-premises callers, 
using calling restrictions, Facility Restriction Levels, and Disallowed List capabilities. 
When possible, block out-of-hours calling through Time-of-Day Routing. Frequently 
monitor system call detail reports for quicker detection of any unauthorized or abnormal 
calling patterns. 
 
Limit out-calling to persons on a need-to-have basis. 
The Verso Technologies, Inc. PBXgateway, through proper administration, can help you 
reduce the risk of unauthorized persons gaining access to the network. However, 
telephone numbers and authorization codes can be compromised when overheard in a 
public location, lost through theft of a wallet or purse containing access information, or 
when treated carelessly (writing codes on a piece of paper and improperly discarding 
them).  
 
Additionally, hackers may use a computer to dial an access code and then publish the 
information to other hackers. Substantial charges can accumulate quickly. It is your 
responsibility to take appropriate steps to implement the features properly, to evaluate 
and administer the various restriction levels, and to protect and carefully distribute 
access codes.  
 
Under applicable tariffs, you will be responsible for payment of toll charges. Verso 
Technologies, Inc. cannot be responsible for such charges and will not make any 
allowance or give any credit resulting from unauthorized access.