DEFINITY ECS Release 8.2
Administrator’s Guide
555-233-506
Issue 1
April 2000
Features and technical reference
1425Malicious Call Trace
20
■ DCS
If a telephone in a DCS network is involved in a malicious call, the
extension is recorded and displayed with the MCT information. MCT
notification passes over ISDN-PRI DCS trunks but MCT-Activate,
MCT-Control, and MCT-Deactivate must be performed by telephones
within the same DCS node.
■ Emergency Access to the Attendant
Ordinarily, during MCT-Control no other feature can access the controlling
telephone’s display. However, MCT gives up control of the display until the
Emergency Access call has completed.
■ ISDN
ISDN notification of an MCT activation takes place if either the originator
of the call is an ISDN trunk group with Country Protocol 2 or any trunk on
the call is an ISDN private network trunk with Country Protocol 1 and
Protocol Version “a” or Peer Protocol q-sig. When the ISDN trunk group is
Country Protocol 2, notification is sent only to the public network.
■ Make-Busy/Position-Busy/Send All Calls
The switch attempts to activate Make-Busy or Position-Busy for telephones
or consoles that activate MCT-Control. If a user has a Send All Calls (SAC)
button administered, then SAC activates when the user activates
MCT-Control. When MCT is deactivated, the telephone resets to its
original state.
■ Music-On-Hold
If an agent places a malicious call on hold that is being recorded and the
call goes to music-on-hold, the music-on-hold port and the MCT Voice
Recorder port can lock. In this case, the MCT Voice Recorder continues to
record the music-on-hold and is unavailable for recording subsequent
malicious calls. You must perform a busy-out/release on the MCT Voice
Recorder port to drop the connection.
■ Priority Calling
A priority call to an MCT recipient is denied.
■ QSIG Global Networking
MCT notification passes over the following ISDN QSIG trunk groups:
tandem, tie, access, and DMI-BOS. QSIG supplementary services name
and number ID provide a malicious caller’s name and telephone number.
■ Transfer
If a user transfers a malicious call, the MCT information displayed on the
controlling telephone identifies the transferring party as the MCT recipient.