Tracing malicious calls, You are using line keys, Using added features to make efficient phone calls – AASTRA Office 35IP User manual User Manual

Page 41

Advertising
background image

Using Added Features to Make Efficient Phone Calls

41

Tracing Malicious Calls

Your are being threatened or molested by a call. You want to identify the caller.

Using the MCID function ( Malicious Call Identification), the provider records the following call data:
• Your phone number
• The caller's phone number
• The date and time of the call

MCID has to be enabled by your provider. Your provider will inform you about accessing the recorded call
data.

You Are Using Line Keys

This section explains the different options provided by your phone, if your system administrator has
assigned you one or more configurable keys as Line keys. Line keys turn your phone into a key phone.

A line has a number which can be used to make an external call. One or usually several phones can be
connected to this line, for example, in a travel agent's all the staff assigned to handling Europe as a travel
destination. A Line key has an LED to indicate the line's status and lets you answer calls on that line.

If your phone has one or more Line keys, the top left-hand key on the array of configurable keys always
belongs to your personal line.

Note

MCID has to be stored under a configurable key.

During a call: Press the function key for MCID.

– or –

After the call do not hang up: press the function key for MCID while you hear
the busy tone.

Advertising