Common use of Security Key Exchanges Clause in Contracts

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s). However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 6 contracts

Samples: Trading Partner Agreement, Trading Partner Agreement, Electronic Data Interchange Trading Partner Agreement

AutoNDA by SimpleDocs

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s)Exhibit. However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 5 contracts

Samples: Electronic Data Interchange Trading Partner Agreement, Electronic Data Interchange Trading Partner Agreement, Electronic Data Interchange Trading Partner Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s)TPW. However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 5 contracts

Samples: Electronic Data Interchange Trading Partner Agreement, Electronic Data Interchange Trading Partner Agreement, Electronic Data Interchange Trading Partner Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(sIncluded Trading Partner Information Sheet(s). However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 3 contracts

Samples: Electronic Data Interchange Trading Partner Agreement, Electronic Data Interchange Trading Partner Agreement, Electronic Data Interchange Trading Partner Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s)Exhibit. However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol ("SMTP") mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 1 contract

Samples: Service Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate facilitiate secure electronic communication. The parties shall change their public key as on 52 a routine schedule set forth in the Exhibit(s). However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with 54 immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained 56 in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by 58 the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 1 contract

Samples: Electronic Data Interchange Trading Partner Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s). However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol ("SMTP") mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 1 contract

Samples: Electronic Data Interchange Trading Partner Agreement

AutoNDA by SimpleDocs

Security Key Exchanges. The parties shall maintain a public key key” used to facilitate secure facilitiate private electronic communication. The parties shall change their public key as on a routine schedule set forth in the Exhibit(s)Appendix. However, in emergency situations in which it is necessary necesary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone phone, or by other comparable means. telphonic verification between designated representatives of each party.

Appears in 1 contract

Samples: Electronic Data Interchange Trading Partner Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate 52 facilitiate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s). However, in emergency situations in which it is necessary to 54 change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a 56 certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with 58 the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other 60 comparable means.

Appears in 1 contract

Samples: Electronic Data Interchange Trading Partner Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s) EDI Worksheet(s). However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 1 contract

Samples: Trading Partner Agreement

Security Key Exchanges. The parties shall maintain a public key used to facilitate secure electronic communication. The parties shall change their public key as set forth in the Exhibit(s)) TPW. However, in emergency situations in which it is necessary to change a key immediately, each party shall provide the other party with immediate notice of the change. Each party shall provide to the other its public key by either: (a) a certified or receipt mail service using a diskette with the public key contained in an ASCII text file; or, (b) an electronic simple mail transfer protocol (“SMTP”) mail message with the public key contained in the body. The public key shall be verified by the party to whom it is sent by validating the fingerprint of the public key by phone or by other comparable means.

Appears in 1 contract

Samples: Trading Partner Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!