East Tennessee Natural Gas Company
Second Revised Volume No. 1
Contents / Previous / Next / Main Tariff Index
Effective Date: 06/01/1997, Docket: RP97- 58-003, Status: Effective
Original Sheet No. 291 Original Sheet No. 291 : Superseded
ELECTRONIC DATA INTERCHANGE
TRADING PARTNER AGREEMENT (Continued)
2.2.3. Neither party controls or warrants the performance of a Provider to
the other. One party shall not be liable to the other for the acts or omissions of a
Provider while that Provider is transmitting, receiving, storing or handling Documents
or data, or performing related activities. This provision does not limit any claim of a
party against a Provider in respect to any act or omission.
2.3. System Operations. Each party, at its own expense, shall provide and
maintain equipment, software, services and testing necessary to effectively and reliably
transmit and receive Documents. Any special data retention requirements shall be set
forth in the Appendix.
2.4. Security Procedures. Each party shall properly use those security
procedures, including those specified in the GISB standards, if any, which are
reasonably sufficient to ensure that all transmissions of Documents are authorized and
to protect its business records and data from improper access. When Electronic Delivery
Mechanisms ("EDMs") on the Internet are used, both the manner in which public encryption
keys are to be changed or exchanged, and the procedures required for changing and
exchanging public encryption keys when a Provider is elected, will be specified in the
2.4.1. Security Key Exchanges. The parties shall inform each other of
the routine scheduled frequency with which they intend to change their public key. The
noticed party will make the key change within a reasonable period commencing on a date
of which the noticed party has informed the requesting party. However, in emergency
situations in which it is necessary to change a key immediately ("Emergency
Situations"), each party shall effect a key change within 24 hours from the time which
the party first receives notice of the Emergency Situation ("Emergency Notice") from the
other party. The parties agree that such Emergency Notice will only be given when
reasonably necessary to protect significant assets of the party seeking the key change.
Each party shall provide the other party with their "public key" in one of the two
manners outlined below:
a. via a certified or receipted mail service using a diskette with the
public key contained in an ASCII text file, or
b. via an SMTP mail message with the public key contained in the body.
Under either of the above options, known representatives of the party making the key
change must orally verify the public key by checking the fingerprint of the key. The
oral verification may be accomplished via phone, or by other, comparable, means.
2.5. Signatures. Each party shall adopt, as its signature, an electronic
identification consisting of symbol(s) or code(s) which are to be affixed to or
contained, where required, in the Document transmitted by such party ("Signature
Code(s)"). Such Signature Code(s) shall be specified in the Appendix. In such cases
where a Signature Code(s) is required for one or more Transaction Set(s), the
requirement shall be specified in the Appendix applicable to such Transmission Set(s).
Each party agrees that the Signature Code(s) of such party affixed to or contained in
any transmitted Document shall be sufficient to verify such party originated such
Document(s). Neither party shall disclose to any unauthorized person the Signature
Code(s) of the other party.
Section 3. Transmissions.
3.1. Proper Receipt. Documents shall not be deemed to have been properly
received, and no Document shall give rise to any obligation, until accessible to the
receiving party at such party's Receipt Computer designated in the Appendix, subject to
the exception set forth in section 4.1. Where the parties employ the services of
Providers to transmit and receive Documents, the Receipt Computer shall be defined in
the Appendix as the receiving party's electronic mailbox or URL provided by the
receiving party's Provider.