ascom ascotel office terminals-features Manuale Utente

Pagina di 40
Using Supplementary Features for More Efficiency
 
18
Tracing Malicious Calls 
You feel threatened or molested by a call and want the caller to be traced.
With the MCID function, the provider is able to record the following call data:
• Your phone number
• The caller's phone number
• The date and time of the call
MCID has to be enabled by your provider. Your provider will inform you about accessing the recorded call 
data.
Calls you did not answer can be recorded automatically.
Deactivating Active Services
You have set up a number of services on your phone and would like to deactivate all the active services 
with a single command.
You can deactivate all the active services (except for night service, user group, and appointment calls) with 
a single procedure.
This applies to the following services:
• Do not disturb
• Follow me
• Call diversion
• Call forwarding
• Callback
• Protect against call forwarding
• Protect against intrusion
• Protect against announcements
• Protect against call waiting
Intruding in a Call
You want to call an internal subscriber who is busy. Nonetheless, you urgently need to speak to the per-
son.
Providing you have been authorized to do so by the system administrator, you can intrude on the internal 
subscriber's current call. You can then speak to the person and hear his call partner.
The person can respond to your intrusion request in the following ways:
• By accepting with "Answer": the person's call partner goes on hold. – you are now through to the per-
son.
• By accepting with "End": the person's call partner is disconnected. – you are now through to the per-
son.
• By rejecting with "Reject": the person stays connected with the call partner. – you are not connected.
If conference tone is deactivated in the system configuration, the person you wanted to intrude on will 
not hear an attention tone. Make sure you comply with the applicable national data protection regula-
tions.
You can use */# procedures to allow intrusion on your own set and to protect yourself against intrusion.
LM_Ascom_Jun01_25.06.01.fm Page 18 Thursday, July 12, 2001 5:01 PM