Abstract
An electronic data interchange (EDI) system must be accompanied by appropriate controls to protect the system from individuals who could commit fraud against their organization's trading partners, typically through the unauthorized use of the system to create counterfeit documents to accomplish personal goals. This article summarizes the controls necessary to prevent, detect, and fix fraudulent attempts against an EDI system, to help ensure trust between trading partners.