most call recording i've seen, including the SilentMonitoring that comes with IPCC, uses port-mirroring or full port captures. this prevents the users from determining which calls to record since all VOICE data sent to the ethernet port is recorded.
the legal issue your company should have is "PRIVACY IS NOT TO BE EXPECTED" on company resources. this is pretty common. (just like surfing the net for porn on a company computer. there should be no privacy expected and the company has every right to monitor and act on abuses of their systems/resources)
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...