Confidentiality of Information

Security is an issue which was addressed early in the development of EDI. If trading partners exchange messages without an intermediate Transentric, one or both will utilize a security protocol to control access, usually as part of a companywide program of data security. More commonly, messages are exchanged through Transentric. Transentric insulate the trading partners from each other and restricts access through identification codes and passwords. Transentric also offers encryption and authentication of messages.