|
Remote System Programming. As a customer of a new communications
system, you should be aware that telephone toll fraud is an increasing
problem. Telephone toll fraud can occur in many forms, despite the numerous
efforts of telephone companies and telephone equipment manufacturers to
control it. Some individuals use electronic devices to prevent or falsify
records of these calls. Others charge calls to someone else's number by
illegally using lost or stolen calling cards, billing innocent parties,
clipping on to someone else's line, and breaking into someone else's telephone
equipment physically or electronically. In certain instances, unauthorized
individuals make connections to the telephone network through the use
of Remote Access features.
The Remote Access feature of your system, if you choose to use it, permits
off-premises callers to access the system from a remote location by using
an 800 number or a 7- or 10-digit telephone number. The system returns
an acknowledgment signaling the user to key in his or her barrier code,
which is selected and programmed by the System Manager. After the barrier
code is accepted, the system returns dial tone to the user. If you do
not program specific egress restrictions, the user can place any call
normally dialed from an extension associated with the system. Such an
off-premises network call is originated at, and will be billed from, the
system location.
The Remote Access feature, as designed, helps the customer, through proper
programming, to minimize the ability of unauthorized persons to gain access
to the network. Most commonly, telephone numbers and codes are compromised
when overheard in a public location, through theft of a wallet or purse
containing access information, or through carelessness (writing codes
on a piece of paper and improperly discarding it). Additionally, hackers
may use a computer to dial an access code and then publish the information
to other hackers. Enormous charges can be run up quickly. It is the customer's
responsibility to take the appropriate steps to properly implement the
features, evaluate and program the various restriction levels, protect
access codes, and distribute access codes only to individuals who have
been fully advised of the sensitive nature of the access information.
Common carriers are required by law to collect their tariffed charges.
While these charges are fraudulent charges made by persons with criminal
intent, applicable tariffs state that the customer of record is responsible
for payment of all long-distance or other network charges. Ayava
cannot be responsible for such charges and will not make any allowance
or give any credit for charges that result from unauthorized access.
To minimize the risk of unauthorized access to your communications system:
- Use an unpublished Remote Access number.
- Assign barrier codes randomly to users on a need-to-have basis, keeping
a log of ALL authorized users and assigning one code to one person.
- Use random-sequence barrier codes, which are less likely to be easily
broken.
- Deactivate all unassigned codes promptly.
- Ensure that Remote Access users are aware of their responsibility
to keep the telephone number and any barrier codes secure.
- When possible, restrict the off-network capability of off-premises
callers through use of calling restrictions and Disallowed List capabilities.
- When possible, block out-of-hours calling.
- Frequently monitor system call detail reports for quicker detection
of any unauthorized or abnormal calling patterns.
- Limit Remote Call Forwarding to persons on a need-to-have basis.
|