Williston Basin Interstate Pipeline Co.

Second Revised Volume No. 1

 Contents / Previous / Next / Main Tariff Index

 

 

Effective Date: 03/21/1999, Docket: RP99-230-000, Status: Effective

Second Revised Sheet No. 764 Second Revised Sheet No. 764 : Effective

Superseding: First Sheet No. 764

EXHIBIT____

ELECTRONIC DATA INTERCHANGE TRADING PARTNER AGREEMENT

DATED________

TO BE EFFECTIVE______________________(date)

 

5. Standards and Industry Guidelines: (Specify all applicable standards,

issuing organizations, and published industry guidelines.)

___________________________________________________________________

___________________________________________________________________

 

Selected standards include, as applicable, all data dictionaries,

segment dictionaries and transmission controls referenced in those

standards for the transaction(s) contained in this Exhibit(s). The

mutually agreed provisions of this Exhibit(s) shall control in the

event of any conflict with any listed industry guidelines.

 

6. Security Procedures: (Define security procedures, including but not

limited to encryption, authentication, and PGP version.)

___________________________________________________________________

___________________________________________________________________

 

6.1 Public Encryption Key Exchange Procedures:

 

a) Contact for public encryption key exchange (emergency and scheduled)

_____________________________________________________________________

 

b) Method of contact and related information (phone number and/or e-mail

address)

_____________________________________________________________________

 

c) Chosen electronic method of key exchange

_____________________________________________________________________

 

d) Scheduled public encryption key exchange procedures including

frequency

_____________________________________________________________________

 

e) Emergency public encryption key exchange procedures

_____________________________________________________________________

 

f) Verification procedures to confirm appropriate exchange of public

encryption keys

_____________________________________________________________________

 

g) Other________________________________________________________________