Download the European e-Invoicing Guide for SMEs - Celeris Ltd.
Download the European e-Invoicing Guide for SMEs - Celeris Ltd.
Download the European e-Invoicing Guide for SMEs - Celeris Ltd.
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>European</strong> E-<strong>Invoicing</strong> <strong>Guide</strong> <strong>for</strong> <strong>SMEs</strong><br />
E-mail: A generally unencrypted method of exchanging messages and attachments within or across networks<br />
including <strong>the</strong> Internet. Based on SMTP (Simple Mail Transfer Protocol) and MIME (Multi-purpose Internet<br />
Mail Extensions).<br />
S-HTTP: Secure Hypertext Transfer Protocol is a message-oriented communications protocol to protect<br />
sensitive data. It is used commonly <strong>for</strong> e-<strong>Invoicing</strong> web applications.<br />
NOTE: The term EDI is often associated with <strong>the</strong> exchange of structured files over value added networks<br />
while <strong>the</strong> term XML is often associated with file transfer protocols over <strong>the</strong> Internet. These associations are<br />
historical and have become increasingly invalid. The method of file transfer that you choose is entirely<br />
unrelated and separate from <strong>the</strong> decision to use structured files based on EDI or XML standards (<strong>for</strong><br />
clarification, please see <strong>the</strong> legal definition of ‘EDI’ in Section 4 of this <strong>Guide</strong>).<br />
EBL INSIGHT<br />
Individual businesses need to decide which method of file transfer fits best with <strong>the</strong>ir activities.<br />
Companies who exchange data with large numbers of trading partners often opt <strong>for</strong> software or services<br />
that organise, track, and report on all activities, including non-events such as ‘files not received’ from a<br />
customer within a given time frame. Companies with more manageable levels of activity may choose to<br />
use more cost effective or simpler methods.<br />
In ei<strong>the</strong>r case, <strong>the</strong>re are varying levels of security available whe<strong>the</strong>r within <strong>the</strong> file transfer method itself<br />
or as an additional step in <strong>the</strong> file transfer process (see Section 2: Electronic Signatures).<br />
Businesses first must decide whe<strong>the</strong>r <strong>the</strong>y consider <strong>the</strong>ir data:<br />
A) to be at low risk because <strong>the</strong>y and <strong>the</strong>ir partners have <strong>the</strong> appropriate business controls in place;<br />
B) to be extremely sensitive or confidential (<strong>for</strong> example if <strong>the</strong>ir pricing is not published in <strong>the</strong><br />
public domain), in which case, <strong>the</strong>y may want to consider using a ‘closed network’ solution.<br />
55<br />
STANDARDS