05.05.2013 Views

Download the European e-Invoicing Guide for SMEs - Celeris Ltd.

Download the European e-Invoicing Guide for SMEs - Celeris Ltd.

Download the European e-Invoicing Guide for SMEs - Celeris Ltd.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>European</strong> E-<strong>Invoicing</strong> <strong>Guide</strong> <strong>for</strong> <strong>SMEs</strong><br />

E-mail: A generally unencrypted method of exchanging messages and attachments within or across networks<br />

including <strong>the</strong> Internet. Based on SMTP (Simple Mail Transfer Protocol) and MIME (Multi-purpose Internet<br />

Mail Extensions).<br />

S-HTTP: Secure Hypertext Transfer Protocol is a message-oriented communications protocol to protect<br />

sensitive data. It is used commonly <strong>for</strong> e-<strong>Invoicing</strong> web applications.<br />

NOTE: The term EDI is often associated with <strong>the</strong> exchange of structured files over value added networks<br />

while <strong>the</strong> term XML is often associated with file transfer protocols over <strong>the</strong> Internet. These associations are<br />

historical and have become increasingly invalid. The method of file transfer that you choose is entirely<br />

unrelated and separate from <strong>the</strong> decision to use structured files based on EDI or XML standards (<strong>for</strong><br />

clarification, please see <strong>the</strong> legal definition of ‘EDI’ in Section 4 of this <strong>Guide</strong>).<br />

EBL INSIGHT<br />

Individual businesses need to decide which method of file transfer fits best with <strong>the</strong>ir activities.<br />

Companies who exchange data with large numbers of trading partners often opt <strong>for</strong> software or services<br />

that organise, track, and report on all activities, including non-events such as ‘files not received’ from a<br />

customer within a given time frame. Companies with more manageable levels of activity may choose to<br />

use more cost effective or simpler methods.<br />

In ei<strong>the</strong>r case, <strong>the</strong>re are varying levels of security available whe<strong>the</strong>r within <strong>the</strong> file transfer method itself<br />

or as an additional step in <strong>the</strong> file transfer process (see Section 2: Electronic Signatures).<br />

Businesses first must decide whe<strong>the</strong>r <strong>the</strong>y consider <strong>the</strong>ir data:<br />

A) to be at low risk because <strong>the</strong>y and <strong>the</strong>ir partners have <strong>the</strong> appropriate business controls in place;<br />

B) to be extremely sensitive or confidential (<strong>for</strong> example if <strong>the</strong>ir pricing is not published in <strong>the</strong><br />

public domain), in which case, <strong>the</strong>y may want to consider using a ‘closed network’ solution.<br />

55<br />

STANDARDS

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!