Security of EDI Messages

Security of EDI Messages (Hella EDI Supplier Program)

Security of EDI messages procedures and measures for the verification of origin and the verification of integrity, in order, to identify the sender of any EDI message and to ascertain that any EDI message received is complete and has not been corrupted, are mandatory for any EDI message.

The parties undertake to implement and maintain security procedures and measures in order to ensure the protection of EDI messages against the risks of unauthorized access, alteration, delay, destruction or loss. If a message is rejected due to technical issues or because errors in the message have been detected, the receiver shall not process the message. The receiver will inform the sender in the agreed response time about the detected errors. Error handling procedures have to be initiated to re-send a correct message.

Confidentiality and protection of personal data

Suppliers shall ensure that information contained in EDI messages, are maintained in confidence and are not disclosed or transmitted to any unauthorized persons nor used for any purposes other that those intended by the parties. When authorized, further transmission of such confidential information shall be subject to the same degree
of confidentiality. If a party engages a Third Party Supplier to carry out EDI business, the party shall ensure that the Third Party Supplier is bound by a corresponding confidentiality agreement. EDI messages shall not be regarded as containing confidential information to the extent that such information is in the public domain. The parties may agree to use a specific form of protection for the transport layer or messages such as encryption to the extent permitted by law in either of their respective countries.

To learn more about EDI security and become a CEDIAP® (Certified EDI Academy Professional), please visit our course schedule page.

Leave a Reply

Your email address will not be published.

Post Navigation