EDI Messages

EDI Messages Processing And Acknowledgement of Receipt (Hella Group Supplier EDI Integration)

EDI Messages shall be processed as soon as possible after receipt, but in any event, within the time limits. The protocol acknowledgment (e.g. the End-to-End Response EERP) is always used unless otherwise agreed. Any higher level acknowledgement of receipt should be exchanged according to the specific provisions.

The protocol acknowledgement (e.g. EERP) shall be sent immediately after receiving the data interchange. Where an additional, higher level acknowledgement is agreed, the receiver of the EDI message to be acknowledged shall ensure that the acknowledgement is sent within one business day of the time of receipt of the EDI message to be acknowledged, unless an alternative time limit has been specified by parties. A business day means any day except a Saturday, Sunday or any declared public holiday in the intended place of receipt of an EDI message. The receiver of an EDI message requiring an acknowledgment shall not act upon the content of the EDI message until such acknowledgement is sent. If the sender does not receive the acknowledgement of receipt within the time limit, he may, upon giving notification to the receiver to that effect, treat the EDI message as null and void as from the expiration of that time limit or initiate an alternative recovery procedure, to ensure effective receipt of the acknowledgement. In case of failure of the recovery procedure, within the time limit, the EDI message will definitely be treated as null and void, as from the expiration of that time limit, upon notification to the receiver.

Security of EDI messages

The suppliers and Hella Group undertake to implement and maintain security procedures and measures in order to ensure the protection of EDI messages against the risks of unauthorized access, alteration, delay, destruction or loss. Security procedures and measures include the verification of origin, the verification of integrity, the nonrepudiation of origin and receipt and the confidentiality of EDI messages. Security procedures and measures for the verification of origin and the verification of integrity, in order, to identify the sender of any EDI message and to ascertain that any EDI message received is complete and has not been corrupted, are mandatory for any EDI message.

To learn more about EDI and become a certified  EDI Professional please visit our course schedule page.

Leave a Reply

Your email address will not be published.

Post Navigation