ascom ascotel office terminals-features Manuale Utente
Using Supplementary Features for More Efficiency
18
Tracing Malicious Calls
You feel threatened or molested by a call and want the caller to be traced.
With the MCID function, the provider is able to record the following call data:
• Your phone number
• The caller's phone number
• The date and time of the call
• Your phone number
• The caller's phone number
• The date and time of the call
MCID has to be enabled by your provider. Your provider will inform you about accessing the recorded call
data.
data.
Calls you did not answer can be recorded automatically.
Deactivating Active Services
You have set up a number of services on your phone and would like to deactivate all the active services
with a single command.
with a single command.
You can deactivate all the active services (except for night service, user group, and appointment calls) with
a single procedure.
a single procedure.
This applies to the following services:
• Do not disturb
• Follow me
• Call diversion
• Call forwarding
• Callback
• Protect against call forwarding
• Protect against intrusion
• Protect against announcements
• Protect against call waiting
• Do not disturb
• Follow me
• Call diversion
• Call forwarding
• Callback
• Protect against call forwarding
• Protect against intrusion
• Protect against announcements
• Protect against call waiting
Intruding in a Call
You want to call an internal subscriber who is busy. Nonetheless, you urgently need to speak to the per-
son.
son.
Providing you have been authorized to do so by the system administrator, you can intrude on the internal
subscriber's current call. You can then speak to the person and hear his call partner.
subscriber's current call. You can then speak to the person and hear his call partner.
The person can respond to your intrusion request in the following ways:
• By accepting with "Answer": the person's call partner goes on hold. – you are now through to the per-
• By accepting with "Answer": the person's call partner goes on hold. – you are now through to the per-
son.
• By accepting with "End": the person's call partner is disconnected. – you are now through to the per-
son.
• By rejecting with "Reject": the person stays connected with the call partner. – you are not connected.
If conference tone is deactivated in the system configuration, the person you wanted to intrude on will
not hear an attention tone. Make sure you comply with the applicable national data protection regula-
tions.
not hear an attention tone. Make sure you comply with the applicable national data protection regula-
tions.
You can use */# procedures to allow intrusion on your own set and to protect yourself against intrusion.
LM_Ascom_Jun01_25.06.01.fm Page 18 Thursday, July 12, 2001 5:01 PM