East Tennessee Natural Gas Company

Second Revised Volume No. 1

 Contents / Previous / Next / Main Tariff Index

 

 

Effective Date: 06/01/1997, Docket: RP97- 58-003, Status: Effective

Original Sheet No. 291 Original Sheet No. 291 : Superseded

 

 

ELECTRONIC DATA INTERCHANGE

TRADING PARTNER AGREEMENT (Continued)

 

2.2.3. Neither party controls or warrants the performance of a Provider to

the other. One party shall not be liable to the other for the acts or omissions of a

Provider while that Provider is transmitting, receiving, storing or handling Documents

or data, or performing related activities. This provision does not limit any claim of a

party against a Provider in respect to any act or omission.

 

2.3. System Operations. Each party, at its own expense, shall provide and

maintain equipment, software, services and testing necessary to effectively and reliably

transmit and receive Documents. Any special data retention requirements shall be set

forth in the Appendix.

 

2.4. Security Procedures. Each party shall properly use those security

procedures, including those specified in the GISB standards, if any, which are

reasonably sufficient to ensure that all transmissions of Documents are authorized and

to protect its business records and data from improper access. When Electronic Delivery

Mechanisms ("EDMs") on the Internet are used, both the manner in which public encryption

keys are to be changed or exchanged, and the procedures required for changing and

exchanging public encryption keys when a Provider is elected, will be specified in the

Appendix.

 

2.4.1. Security Key Exchanges. The parties shall inform each other of

the routine scheduled frequency with which they intend to change their public key. The

noticed party will make the key change within a reasonable period commencing on a date

of which the noticed party has informed the requesting party. However, in emergency

situations in which it is necessary to change a key immediately ("Emergency

Situations"), each party shall effect a key change within 24 hours from the time which

the party first receives notice of the Emergency Situation ("Emergency Notice") from the

other party. The parties agree that such Emergency Notice will only be given when

reasonably necessary to protect significant assets of the party seeking the key change.

Each party shall provide the other party with their "public key" in one of the two

manners outlined below:

 

a. via a certified or receipted mail service using a diskette with the

public key contained in an ASCII text file, or

 

b. via an SMTP mail message with the public key contained in the body.

 

Under either of the above options, known representatives of the party making the key

change must orally verify the public key by checking the fingerprint of the key. The

oral verification may be accomplished via phone, or by other, comparable, means.

 

2.5. Signatures. Each party shall adopt, as its signature, an electronic

identification consisting of symbol(s) or code(s) which are to be affixed to or

contained, where required, in the Document transmitted by such party ("Signature

Code(s)"). Such Signature Code(s) shall be specified in the Appendix. In such cases

where a Signature Code(s) is required for one or more Transaction Set(s), the

requirement shall be specified in the Appendix applicable to such Transmission Set(s).

Each party agrees that the Signature Code(s) of such party affixed to or contained in

any transmitted Document shall be sufficient to verify such party originated such

Document(s). Neither party shall disclose to any unauthorized person the Signature

Code(s) of the other party.

 

Section 3. Transmissions.

 

3.1. Proper Receipt. Documents shall not be deemed to have been properly

received, and no Document shall give rise to any obligation, until accessible to the

receiving party at such party's Receipt Computer designated in the Appendix, subject to

the exception set forth in section 4.1. Where the parties employ the services of

Providers to transmit and receive Documents, the Receipt Computer shall be defined in

the Appendix as the receiving party's electronic mailbox or URL provided by the

receiving party's Provider.