38 Chapter 3 - System Featuressystem also offers powerful computer/phone integrations for the Attendant position (via ourPCAttendant Console) as well as end-user phones (via ourPC Phone). For more informationabout these CTI applications, seeChapter 5 - Special Applications in this document. " !• Enables customers to operate more efficiently by taking advantage of the latesttelephone and computer convergence. These industries are coming together to offera more intelligent and streamlined way to do business.# !• Control and pull up information on your “on-screen” phone based on callerinformation• Allows computer applications to control telephone operation5?? 8:9 !Data Security makes it possible to prevent interruptions on a phone. This feature is often usedwhen the phone is hooked up to a modem, but it could also be used for confidential or sensitivecalls. Data Security can be implemented for all phone usage, or it can apply only to outside lineuse. " !• Ensures confidentiality on important calls.• Protects data transmissions from being interrupted or cut off.# !• Modem phones• Sensitive accounts (i.e., lawyers, doctors, etc.) where confidentiality is important54?95 :6<6< !An incoming or transferred call as well as intercom calls can be programmed to ring at asecondary answering position if the call rings the primary answering position more than aspecified length of time. The call can be programmed to ring at one or more delay ringingpositions (including phones with BLF keys). This feature also works with Direct Inward Dialing(DID) calls. " !• Ensures that a call does not go unanswered or ring for an extended period of time.# !• Any company that experiences short, temporary periods of high traffic and needs toensure that calls are answered• Backup support functions to cover void periods of the workday.5? 5: 61?:5 9 ?% !Any number of CO lines can be assigned to DISA lines which after being accessed, will enablethe incoming caller to dial any extension within the system. Or, if the proper security code isentered, the caller will be able to access outside lines. Remote programming can also be doneover these lines after entering a password.