Oktex Pipeline Company

Original Volume No. 1

 Contents / Previous / Next / Main Tariff Index



Effective Date: 02/01/2010, Docket: RP10-205-001, Status: Effective

First Revised Sheet No. 60F First Revised Sheet No. 60F

Superseding: Original Sheet No. 60F







1.2. Third Party Service Providers


1.2.1 Data Communications will be transmitted electronically to each

party as specified in the TPW, either directly or through any third party

service provider ("Provider") with whom either party may contract. Either

party may modify its election to use, not use or change a Provider upon 30

days prior written notice to the other party.


1.2.2 Each party shall be responsible for the costs of any Provider with

whom it contracts, unless otherwise set forth in the Exhibit. Each party

shall be responsible for services and performance needed to carry out its

responsibilities under this Agreement.


1.2.3 Notwithstanding the acts or omissions of its Provider, for

purposes of this Agreement, each party is responsible for transmitting,

receiving, storing or handling Data Communications to the extent required to

effectuate transactions pursuant to Section 2.


1.3 System Operations. Each party, at its own expense, shall provide and

maintain the equipment, software, services and testing necessary to transmit

Data Communications to, and receive Data Communications from the parties'

respective Receipt Computers.


1.4 Security Procedures


1.4.1 Each party shall use those security procedures specified in the

NAESB standards and as applied through the specifications set forth in the

TPW. The manner in which public encryption keys are to be changed and/or

exchanged will be specified in the TPW.


1.4.2 Security Key Exchanges. The parties shall maintain a public key

used to facilitate secure electronic communication. The parties shall change

their public key as set forth in the Exhibit. However, in emergency

situations in which it is necessary to change a key immediately, each party

shall provide the other party with immediate notice of the change. Each party

shall provide to the other its public key by either: (a) a certified or

receipt mail service using a diskette with the public key contained in an

ASCII text file; or, (b) an electronic simple mail transfer protocol ("SMTP")

mail message with the public key contained in the body. The public key shall

be verified by the party to whom it is sent by validating the fingerprint of

the public key by phone or by other comparable means.


1.5 Signatures. Each party shall adopt as its signature private keys which

shall be applied to each document transmitted by such party ("Digital

Signature"). Such Digital Signature, when decrypted by the receiving party,

will be used to authenticate the identity of the sender.


Section 2. Transmissions


2.1 Proper Receipt


2.1.1 The "Receipt Computer" shall be defined in this Agreement and in

the TPW as the receiving party's Uniform Resource Locator ("URL"), which

describes the protocols which are needed to access the resources and point to

the appropriate Internet locations. Where the parties employ the services of

Providers to transmit and receive Documents, the Receipt Computer shall be

defined in this Agreement and in the TPW as the receiving party's URL provided

by the receiving party's Provider.