
iii
Fraudulent Usage Advisory
Although the Amanda software is designed to resist fraudulent usage, including
unauthorized access to a long distance network, no product, including the Amanda
software, is able to prevent such unauthorized usage. The Amanda software is likewise
unable to prevent such uses as may constitute an invasion of privacy or other tort. THE
AMANDA COMPANY MAKES NO EXPRESS OR IMPLIED WARRANTY AGAINST
UNLAWFUL OR UNAUTHORIZED USE OF YOUR Amanda SYSTEM OR ITS
CAPABILITIES AND HEREBY DISCLAIMS ALL LIABILITY ARISING FROM
SUCH USE. YOU AGREE TO INDEMNIFY, DEFEND, AND HOLD THE AMANDA
COMPANY HARMLESS FOR ANY UNAUTHORIZED OR FRAUDULENT USE OF
YOUR LICENSED Amanda SOFTWARE.
THE AMANDA COMPANY
13765 ALTON PARKWAY, UNIT F
IRVINE, CA 92618
TELEPHONE (949) 859–6279 FAX (949) 859–4380
Conventions
This manual uses the following terminology and conventions:
Amanda
The name by which this manual refers to the Amanda sys-
tem to make reading about the system easier. Because of
the name Amanda, the system is also referred to as “she.”
caller
Someone who calls into Amanda. A caller often obtains in-
formation, leaves a message for someone, and/or provides
information. Because Amanda is referred to as “she,” call-
ers and users are referred to as “he.”
user
Someone with an extension that Amanda transfers calls to
and/or stores messages for. A user can access Amanda to
play, delete, and send messages as well as set personal op-
tions such as Do Not Disturb.
Indicates that you must log into Amanda and identify your-
self.
Indicates that you must listen to the message before you
process it. For example, you can forward the message you
have just heard.
Kommentare zu diesen Handbüchern