Tennessee Gas Pipeline Company

FIFTH REVISED VOLUME NO. 1

 Contents / Previous / Next / Main Tariff Index

 

 

Effective Date: 08/01/1999, Docket: GT99- 58-000, Status: Effective

First Revised Sheet No. 669 First Revised Sheet No. 669 : Effective

Superseding: Original Sheet No. 669

 

 

EXHIBIT ___

 

ELECTRONIC DATA INTERCHANGE TRADING PARTNER AGREEMENT

 

DATED ___________________

 

TO BE EFFECTIVE ____________________ (date)

 

 

 

5. Standards and Industry Guidelines: (Specify all applicable standards, issuing

organizations, and published industry guidelines.)

 

_____________________________________________________________________________

 

_____________________________________________________________________________

 

Selected standards include, as applicable, all data dictionaries, segment

dictionaries and transmission controls referenced in those standards for the

transaction(s) contained in this Exhibit(s). The mutually agreed provisions of

this Exhibit(s) shall control in the event of any conflict with any listed

industry guidelines.

 

6. Security Procedures: (Define security procedures, including but not limited to

encryption, authentication, and PGP version.)

 

_____________________________________________________________________________

 

_____________________________________________________________________________

 

6.1 Public Encryption Key Exchange Procedures:

 

a) Contact for public encryption key exchange (emergency and scheduled)

_________________________________________________________________

 

b) Method of contact and related information (phone number and/or e-mail

address)

_________________________________________________________________

 

c) Chosen electronic method of key exchange

_________________________________________________________________

 

d) Scheduled public encryption key exchange procedures including

frequency

_________________________________________________________________

 

e) Emergency public encryption key exchange procedures

_________________________________________________________________

 

f) Verification procedures to confirm appropriate exchange of public

encryption keys

_________________________________________________________________

 

g) Other

_________________________________________________________________