T 2.37 Uncontrolled usage of communications lines

When using communication cards within an IT system (fax, modem, or ISDN cards), it is not always possible for the user to determine what information was transmitted along with his usage and protocol information. After enabling a communication card, it is possible in principle for the card to open lines of communication to undesired devices without any user interaction or for third parties to communicate with the card using the remote functionality offered by the card (but which the user was not even aware of).

Examples: