Mobile Bay Pipeline Company

Second Revised Volume No. 1

 Contents / Previous / Next / Main Tariff Index

 

 

Effective Date: 06/01/1997, Docket: RP97-155-003, Status: Effective

Original Sheet No. 361 Original Sheet No. 361 : Effective

 

 

ELECTRONIC DATA INTERCHANGE TRADING PARTNER AGREEMENT

(Continued)

 

uniform resource locator, as applicable. Each party shall be liable for the

acts or omissions of its Provider while transmitting, retrieving, receiving,

storing or handling Documents, or performing related activities, for such

party; provided, if both parties use the same Provider to effect the

transmission, retrieval and receipt of a Document, Sender shall be liable

for the acts or omissions of such Provider related to activities associated

with the transmission of the Document and Receiver shall be liable for the

acts or omissions of such Provider related to activities associated with the

retrieval and receipt of the Document. This provision does not limit any

claim of a party against any Provider in respect of any act or omission.

 

1.3. System Operations and Security Procedures. The equipment, software,

services and testing necessary to transmit, retrieve and receive Documents

shall be at each party's sole expense. Each party shall properly use those

security procedures set forth in the Appendix.

 

1.4. Digital Codes. Each party may adopt as its signature a digital

signature identification ("Digital Code") consisting of symbols or codes which

are to be affixed to or contained in the Document transmitted by such party

where required by the Standards or as may be otherwise agreed by the parties.

In cases where a Digital Code is required for a Document, the requirement

shall be specified in the applicable EDI Exhibit. Each party agrees that the

Digital Code of such party affixed to or contained in any Document shall be

sufficient to verify such party originated such Document. Neither party shall

disclose to any unauthorized person the Digital Code of the other party.

 

1.5. Keys. When the parties are utilizing the Internet electronic delivery

mechanism, each party shall maintain a "public key," an encryption algorithm

utilized to facilitate private electronic communication which may be changed

from time to time, all in accordance with this Section 1.5 and applicable

procedures set forth in the Appendix. Each party shall provide to the other

party its public key by either (a) a certified or receipted mail service using

a diskette with the public key contained in an ASCII text file, (b) an

electronic simple mail transfer protocol mail message with the public key

contained in the body, or (c) as otherwise agreed. The public key shall be

verified by the party to whom it is sent by validating the fingerprint of the

public key, which validation may be made by telephonic verification between

designated representatives of each party. As mutually agreed in the Appendix,

each party shall provide to the other party a written schedule of the

frequency it intends to change its public key. If a party desires to change

its public key at a time other than that scheduled, or does not desire to

change its public key as scheduled, such party shall provide at least five

business days prior written notice thereof to the other party; provided, under

emergency circumstances a prior written notice of one business day may be

given.