Citel 6000 Guía Del Usuario
PBXgateway™ & EXTender™6000 System Administrator’s Guide
5
Security of
Your System:
Preventing
Toll Fraud
Your System:
Preventing
Toll Fraud
As a customer of a new telephone system, you should be aware that there is an
increasing problem of telephone toll fraud. Telephone toll fraud can occur in many forms,
despite the concerted efforts of telephone companies and telephone equipment
manufacturers to control it. Some individuals use electronic devices to prevent or falsify
records of these calls. Others charge calls to someone else’s number by illegally using
lost or stolen calling cards, billing innocent parties, clipping on to someone else’s line, or
breaking into someone else’s telephone equipment physically or electronically. In certain
instances, unauthorized individuals make connections to the telephone network through
the use of remote access features.
Common carriers are required by law to collect their tariff charges. While these charges
are fraudulent charges made by persons with criminal intent, applicable tariffs state that
the customer of record is responsible for payment of all long-distance or other network
charges. Verso Technologies, Inc. cannot be responsible for such charges and will not
make any allowance or give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your Verso Technologies, Inc.
PBXgateway, when possible, restrict the off-network capability of off-premises callers,
using calling restrictions, Facility Restriction Levels, and Disallowed List capabilities.
When possible, block out-of-hours calling through Time-of-Day Routing. Frequently
monitor system call detail reports for quicker detection of any unauthorized or abnormal
calling patterns.
Limit out-calling to persons on a need-to-have basis.
The Verso Technologies, Inc. PBXgateway, through proper administration, can help you
reduce the risk of unauthorized persons gaining access to the network. However,
telephone numbers and authorization codes can be compromised when overheard in a
public location, lost through theft of a wallet or purse containing access information, or
when treated carelessly (writing codes on a piece of paper and improperly discarding
them).
Additionally, hackers may use a computer to dial an access code and then publish the
information to other hackers. Substantial charges can accumulate quickly. It is your
responsibility to take appropriate steps to implement the features properly, to evaluate
and administer the various restriction levels, and to protect and carefully distribute
access codes.
Under applicable tariffs, you will be responsible for payment of toll charges. Verso
Technologies, Inc. cannot be responsible for such charges and will not make any
allowance or give any credit resulting from unauthorized access.
increasing problem of telephone toll fraud. Telephone toll fraud can occur in many forms,
despite the concerted efforts of telephone companies and telephone equipment
manufacturers to control it. Some individuals use electronic devices to prevent or falsify
records of these calls. Others charge calls to someone else’s number by illegally using
lost or stolen calling cards, billing innocent parties, clipping on to someone else’s line, or
breaking into someone else’s telephone equipment physically or electronically. In certain
instances, unauthorized individuals make connections to the telephone network through
the use of remote access features.
Common carriers are required by law to collect their tariff charges. While these charges
are fraudulent charges made by persons with criminal intent, applicable tariffs state that
the customer of record is responsible for payment of all long-distance or other network
charges. Verso Technologies, Inc. cannot be responsible for such charges and will not
make any allowance or give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your Verso Technologies, Inc.
PBXgateway, when possible, restrict the off-network capability of off-premises callers,
using calling restrictions, Facility Restriction Levels, and Disallowed List capabilities.
When possible, block out-of-hours calling through Time-of-Day Routing. Frequently
monitor system call detail reports for quicker detection of any unauthorized or abnormal
calling patterns.
Limit out-calling to persons on a need-to-have basis.
The Verso Technologies, Inc. PBXgateway, through proper administration, can help you
reduce the risk of unauthorized persons gaining access to the network. However,
telephone numbers and authorization codes can be compromised when overheard in a
public location, lost through theft of a wallet or purse containing access information, or
when treated carelessly (writing codes on a piece of paper and improperly discarding
them).
Additionally, hackers may use a computer to dial an access code and then publish the
information to other hackers. Substantial charges can accumulate quickly. It is your
responsibility to take appropriate steps to implement the features properly, to evaluate
and administer the various restriction levels, and to protect and carefully distribute
access codes.
Under applicable tariffs, you will be responsible for payment of toll charges. Verso
Technologies, Inc. cannot be responsible for such charges and will not make any
allowance or give any credit resulting from unauthorized access.