Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
V1.1 October 23, 2024
Welcome to the privacy policy of MillPont's Environmental Trust Infrastructure (METI). This policy outlines how we collect, use, store, and protect data. MillPont is committed to maintaining the trust and confidence of our users, especially in the agricultural sector, where data sensitivity is paramount.
MillPont collects various types of data to provide and enhance our services:
Personal Contact and Billing Information: Upon registration, users provide name, address, telephone, and email address. This information may also include basic account information for billing or other purposes.
Identifiers and Classification Information: Uniquely identifies entities, projects, and activities, consolidating decentralized data for cross-verification and referenceable assertion of uniqueness.
Geospatial and Temporal Data: Details the location and timing of projects and activities, ensuring accurate representation and provenance of claims.
Attributes and Quantities: Describes specific attributes and quantities of environmental claims, ensuring accurate and reliable accounting and reporting.
Verification and Certification Information: Includes verification and certification details, maintaining credibility and trustworthiness of environmental claims through secure and confidential handling.
Direct Collection: We gather data you provide when applying to become a member of METI, using METI services, and communicating with us.
Indirect Collection: MillPont uses cookies and similar technologies to enhance user experience and service functionality. This includes the use web server logs and similar tools to help diagnose problems with the server, to administer the website, and to enhance security or authenticate users.
Third-Party Sources: We may receive data from partners and affiliates under strict privacy agreements.
MillPont will not collect or use information for purposes other than those described in this Privacy Policy without your consent. You can decline to submit personal information to any of our services, in which case MillPont may not be able to provide those services to you.
MillPont uses your data to:
Service Provision and Technical Function: Provide, maintain, and improve the METI services tailored to environmental market needs.
Data Reporting: Aggregate and anonymize data to report total number of Secure Source Identifiers (SSIDs), affiliated hectares, and outcomes tied to Environmental Attribute Certificates (EACs).
Enhance User Experience: Improve your experience of METI services ensuring relevant information and services are offered.
Communication: Communicate with you about service updates, educational content, offers, and important notifications related to METI services.
Data Security and Safety: Detect, prevent, or otherwise address fraud, security or technical issues; or protect against harm the rights, property, safety of MillPont, our users and or the public as required or permitted by law.
Compliance and Legal: Ensure compliance with Terms of Use, including investigation of potential violation thereof, legal requirements, and respond to enforceable law or governmental requests.
In aggregating data, we strip away any personally identifiable information to ensure individual data privacy while still providing valuable collective insights to market stakeholders.
We do not sell personal data. Data sharing is limited to:
Service providers under strict contractual obligations.
Legal requirements and law enforcement requests.
Business transfers, such as mergers or acquisitions.
MillPont employs robust security measures, including:
One-way encryption and secure data storage.
Regular security audits and updates.
Compliance with industry standards and regulations.
Despite our efforts, no data transmissions over the Internet can be guaranteed to be 100% secure. Consequently, we cannot ensure or warrant the security of any information you transmit to us and you do so at your own risk. In the even of a security incident, we will notify our clients or end-user customers in accordance with applicable law.
MillPont recognizes the sensitive nature of geospatial data related to agricultural activities. To ensure the utmost privacy and protection of this information, we implement the following specialized measures:
Advanced Encryption: All geospatial data is encrypted using state-of-the-art encryption techniques, both in transit and at rest, to prevent unauthorized access.
Restricted Access: Access to geospatial data is strictly controlled and limited to authorized personnel only. We employ rigorous access controls and monitoring systems to prevent unauthorized data access and breaches.
Anonymization Protocols: Before any geospatial data is used for analysis or shared with partners, it is anonymized via one-way hash algorithms to remove any identifiers that could link it back to individual farmers or specific locations.
Geospatial Data Masking: To further protect farmer privacy, we employ data masking techniques, obscuring sensitive geospatial details where necessary.
Transparency and Control: Users have full control over their geospatial data. They can access, review, update, or request deletion of their data at any time. We also provide detailed logs of data access and usage upon request.
Terms of Use: The METI Terms of Use recognizes farmer’s rights over their data. Users of METI are required to maintain, and upon request, provide detailed documentation that demonstrates their ability to manage geospatial farmer data. This is essential for maintaining trust, legal compliance, and the integrity of our platform.
By implementing these measures, MillPont ensures that market participant's geospatial data is handled with the highest level of security and confidentiality, reflecting our commitment to protecting the privacy and interests of our agricultural community.
You have the right to:
Access, update, or delete your personal data.
Opt out of non-essential data collection.
Request data portability.
We may update this policy periodically. We maintain a Changelog to keep track of updates to the document. Your continued use of METI services after any changes signifies your acceptance of these changes.
You may contact us regarding the METI Services or this Privacy Policy info@millpont.com.
Annual Subscription Plans & Fees are based on the *quantity (or anticipated quantity) of a Custodian’s Sources under management, and are structured as follows:
*If usage scales, consider upgrading plans to benefit from lower unit costs and additional features like API access and advisory support.
Explore the METI Pricing Calculator to find the tier that best fits your needs. Simply input your project's details to receive a tailored recommendation based on your expected usage.
A Source refers to the point of origin of an environmental benefit. For METI, source is considered an individual contiguous parcel that is the smallest unit of land with 1) A permanent, contiguous boundary, 2) Common land cover and land management, 3) Common ownership or group of owners/land managers, and 4) A common project administrator (i.e. Custodian).
Description
Ideal for Small Projects & Pilots
Designed for Growing Businesses
Built for High-Volume Registries & Marketplaces
Annual Subscription
$1,800
$10,750
$32,250
Includes
100 Secure Source IDs
15,000 Secure Source IDs, API Access
95,000 Secure Source IDs, API Access, Advisory Support
Additional Usage
$2.00 per source
$0.30 per source
Negotiable rates based on volumes and utilization
The METI Declaration of Agency is a required document for users registering an Omnibus Account or for adding a designated third-party data service provider to an existing account. It formalizes the relationship between a Principal (the account holder) and an Agent (a third party authorized to act on their behalf within the METI system). Key responsibilities, rights, and liabilities are outlined in this agreement to ensure compliance and transparency.
Principals: METI account holders who wish to authorize a third-party user or data service provider (Agent) to manage specific activities within their account.
Agents: Third-party users or service providers acting on behalf of a Principal within the METI system.
The form must be completed by both the Principal and the Agent. Either party may submit the completed form in the following cases:
The Principal: When adding a third-party user or data service provider to their METI account.
The Agent: When registering a new Custodian Omnibus account on behalf of a Principal.
Details of the Principal (company or individual account holder).
Details of the Agent (third party authorized to act on the Principal's behalf).
Signatures of both the Principal and the Agent, agreeing to the terms outlined in the form.
Continuing Responsibilities: The Principal retains ultimate liability for compliance with METI terms, even when delegating responsibilities to an Agent.
Confidentiality Obligations: The Agent is required to protect any confidential information accessed through the METI system and use it solely for authorized purposes.
Duty to Notify: Both the Principal and Agent must inform METI of any changes to the declarations within the form.
Download the Declaration of Agency form.
Review the METI Terms of Use and Data Privacy Policy for additional context.
Complete the form with the required information and signatures.
The Agent should submit the signed form as part of your Custodian Omnibus registration application via the Registration Portal. Principals should email completed forms to METI Administrators at membership@millpont.com.
Welcome to the METI API Documentation. This guide is designed to help you integrate with METI's cutting-edge geospatial infrastructure for managing and monitoring environmental assets. The METI API enables seamless interaction with our platform, offering tools to create, retrieve, and manage SSID data with precision and security.
Register Sources: Upload and manage geospatial and temporal data representing environmental assets.
Retrieve Data: Access detailed information on registered SSIDs.
Conflict Management: Ensure data integrity and resolve conflicts in a transparent - but confidential - system.
Scalable Interactions: Build integrations that support automated workflows and real-time analytics.
RESTful Design: Simple and intuitive endpoints using REST principles.
GeoJSON Support: Native support for GeoJSON data formats for spatial features.
Secure Authentication: Token-based authentication to ensure secure API access.
Transparent Data Management: Tools for tracking and validating geospatial data integrity.
All requests to the METI API should start with:
Start with Authentication to learn how to obtain a token and authenticate your requests.
Explore the Endpoints section for detailed API operations, including request and response examples.
Refer to Error Handling for common issues and their solutions.
To interact with the METI API, you must first authenticate and obtain an access token. This token is required for all subsequent requests and ensures secure communication with the API.
To generate an authentication token, make a POST request to the /token
endpoint.
URL: https://api.meti.millpont.com/token
Method: POST
Headers:
Content-Type: application/json
Body Parameters:
email
(string): Your registered email address.
password
(string): Your account password.
token (string): The authentication token.
expires_in (integer): Token validity period in seconds.
Once you have obtained a token, include it in the Authorization
header of all API requests. The format is:
For workflows requiring long-term or large-scale API access, ensure your system can handle token expiration and renewal automatically.
Track Token Expiration:
Use the expires_in
field from the token response to calculate the token's expiry time.
Store the token and its expiry timestamp securely.
Check Token Validity Before Each Request:
Compare the current time with the stored expiry timestamp.
If the token has expired or is close to expiring, retrieve a new token.
Automate Token Retrieval:
Implement logic to call the /token
endpoint with your credentials when the token is invalid or expired.
Prevents downtime caused by expired tokens.
Ensures smooth and continuous API access for large-scale or time-sensitive operations.
Tokens are valid for the duration specified in the expires_in
field of the response. If your token expires, you must request a new one by re-authenticating.
401 Unauthorized: This error occurs if the token is missing, invalid, or expired. Ensure you provide a valid token in the Authorization
header.
By implementing automated token management, you can maintain uninterrupted API access, even for complex workflows.
V1.1 October 30, 2024
Contents
Welcome to MillPont Environmental Trust Infrastructure ("METI"), operated and administered by MillPont, Inc. ("Administrator"). MillPont is an independent organization that offers workable, global, and practical solutions to ensure the integrity of environmental claims ownership in agricultural supply chains.
METI has been created to facilitate the connection between environmental market operators, registries, marketplaces, and government programs interested in collaborating in the development of systematized market solutions to solve shared challenges related to double-counting, greenwashing, and credibility in climate impact reporting. MillPont has developed, for this purpose, METI, a standardized electronic clearinghouse to allow for the secure exchange of sustainable data. METI is a web-based and cloud-hosted platform featuring a globally accessible public interface, along with secure user accounts that require registration and login for access.
METI users will be provided functions relevant to their specific role through their account/s in METI and will be subject to these Terms of Use ("Terms") and, if applicable, the specific METI Product Rulebook/s (“Rulebooks”) affiliated with the products and services (collectively, the "Services") subscribed to. Upon submission of the relevant Application Form, as described below, and by accessing or using our Services, you agree to be bound by these Terms.
Beneficiary: An individual, entity, or organization that receives the intangible property rights (referred to as 'Ecosystem Services Rights') and the quantified environmental benefits conveyed through Environmental Attribute Certificates. Beneficiaries can include, but are not limited to, stakeholders such as investors, public entities, private organizations, NGOs, or other parties entitled to the benefits generated by sustainable practices and interventions documented, registered, and transferred via METI.
Custodian: An individual, entity, or organization responsible for the custody, management, and administrative oversight of one or more Secure Source Identifiers. Custodians ensure the proper issuance, distribution, and tracking of these identifiers, and may also underwrite Environmental Attribute Certificates associated with the Secure Source Identifiers. Custodians must have active commercial agreements with Source owners (i.e., Landowners or Operators) or Beneficiaries with agreements tied to the Source owners. They are required to adhere to all applicable Terms of Use and Rulebook standards.
Environmental Attribute Certificates (or Claim) ("EACs"): Representing intangible property rights, EACs are tradeable market-based instruments used to quantify, verify, and track specific ecosystem service benefits resulting from climate mitigation activities or projects. EACs can operate within various chains of custody models, with traceability levels ranging from fully traceable models—where the benefits associated with the EAC remain connected throughout the value chain—to models where the EAC is traded independently of the original benefits and activities, thereby removing traceability of the initial benefits within the value chain. Trading these EACs may allow buyers to claim ownership or credit for the underlying Ecosystem Services Right(s) and/or associated benefits, while also providing financial incentives to interventions that reduce greenhouse gas emissions, promote renewable energy, or achieve other sustainability objectives. EACs offer a secure, traceable, and standardized mechanism for transferring the rights and information associated with various environmental assets—such as verified carbon credits, Scope 3 claims, low-carbon commodities, and biodiversity credits—and their affiliated benefits across platforms and between parties.
Ecosystem Services Rights: The entitlements to benefits derived from natural ecosystems, which directly contribute to human survival, economic activity, and resilience. These rights are typically held by Landowners and Operators and may be transferred or assigned, as permitted within the governing frameworks established by EAC market standards, to Beneficiaries. These rights include the ability to participate in, reserve, or transfer entitlements to ecosystem services, encompassing:
Provisioning Services: Rights to tangible products provided by ecosystems, such as food, water, timber, and genetic resources.
Regulating Services: Rights related to services that support climate mitigation and environmental balance, including carbon sequestration, water flow regulation, soil health, and pest control.
Supporting Services: Rights tied to essential ecological functions that sustain ecosystem productivity, such as nutrient cycling, soil formation, pollination, and habitat provision.
Cultural Services: Rights to non-material benefits from ecosystems that support emotional well-being, cultural identity, and recreation, such as hunting, fishing, and hiking.
Landowners and Operators: One or more related entities which owns and or operates the Source/s and Ecosystem Services Rights transferred or assigned via EACs. Landowners and Operators can be individuals, organizations, and or groups of individuals or organizations which operate under similar ownership or organizational structures, produce similar goods or services, and are located in close regional proximity to each other.
Regulated Entity: Any of the following: (i) Any Bank; (ii) Any broker or dealer that (a) is registered pursuant to Section 15 of the Securities Exchange Act of 1934, as amended; and (b) is a member of all requisite self-regulatory organizations; (iii) Any member of the National Futures Association that is registered under the Commodity Exchange Act, as amended, as a futures commission merchant, introducing broker, commodity pool operator, commodity trading advisor or floor broker; (iv) (a) Any investment company registered under the Investment Company Act of 1940, as amended; (b) Any investment adviser registered under the Investment Advisers Act of 1940, as amended; or (c) Any fund that has assets under management with an aggregate market value of no less than $100 million and that is advised or managed by an investment adviser registered under the Investment Advisers Act of 1940, as amended; (v) Any “business development company” as defined in (a) Section 2(a)(13) of the Investment Company Act of 1940, as amended, or (b) Section 202(a)(22) of the Investment Advisers Act of 1940, as amended; (vi) (a) Any plan established and maintained by a state, its political subdivisions, or any agency or instrumentality of a state or its political subdivisions, for the benefit of its employees; (b) Any employee benefit plan within the meaning of title I of the Employee Retirement Income Security Act of 1974, as amended; or (c) Any trust fund whose trustee is a Bank and whose participants are exclusively plans of the types identified in the above clause (a) or (b), except trust funds that include as participants individual retirement accounts or H.R. 10 plans.
Secure Source Identifiers ("SSIDs"): A unique and addressable digital statement that represents exclusivity over a geographic extent (i.e. Source) for a period of time for a specific type of environmental attribute. SSIDs incorporate geospatial, temporal, and attribute ownership data to ensure secure and verifiable provenance for claims. They support robust data integrity, traceability, and facilitate seamless comparison across platforms and workflows. Represented by a unique 16-character identifier, they work in tandem with Environmental Attribute Certificates (EACs) to maintain a secure chain of custody. SSIDs and their associated metadata are securely stored using advanced encryption methods, generating unique yet comparable cryptographic fingerprints of claims. This facilitates easy machine reading and comparison across various user operations, interfaces, platforms, and workflows, thereby enhancing the efficiency and reliability of underwriting, verification, trading, settlement, and clearing of environmental assets.
Source: The point of origin of an EAC, acting as an referenceable measurement point at the beginning of the EAC lifecycle, and is geographically considered an individual contiguous parcel that is the smallest unit of land with: (i) A permanent, contiguous boundary; (ii) Common land cover, management practice, or operational facility; (iii) Common ownership or group of Land Owners and Operators, and; (iv) A common project administrator (i.e. Custodian).
(a) The use by you and your Users (as defined below) of the Services and the Services' website located online at www.millpont.com (or such other website as Administrator may notify you is the location of the Services) (the “Services Site”) is subject to these Terms, which constitute a binding contract between you (“User” or "Account Holder") and MillPont as the administrator and owner of the Services (User and MillPont are individually referred to herein as a “Party,” and collectively referred to herein as “the Parties”). BY USING OR ACCESSING THE SERVICES, YOU ACCEPT AND AGREE TO BE BOUND BY THESE TERMS OF USE AS MODIFIED FROM TIME TO TIME IN ACCORDANCE WITH THE TERMS HEREOF, AND YOU AGREE TO TAKE AFFIRMATIVE RESPONSIBILITY FOR THE COMPLIANCE OF YOUR USERS WITH THESE TERMS OF USE.
(b) You can review the current version of the Terms of Use at any time on the Services Site. CONTINUED USE AND ACCESS OF THE SERVICES BY YOU AND/OR YOUR USERS AFTER MODIFICATION OF THE TERMS OF USE SIGNIFIES YOUR AGREEMENT TO BE BOUND BY THE MODIFIED TERMS OF USE, AND YOUR AGREEMENT TO TAKE AFFIRMATIVE RESPONSIBILITY FOR THE COMPLIANCE OF YOUR USERS WITH THE MODIFIED TERMS OF USE.
(c) In addition, when using the Services, you shall be subject to any rules, guidelines, and/or operating procedures, including but not limited to the applicable fee schedule, rulebook(s), and/or operating procedures, each as modified or restated from time to time (collectively, the “Operative Documents”) applicable to such use which may be posted on the Services Site from time to time. All such Operative Documents are incorporated by reference into these Terms of Use. If you do not agree to these Terms of Use, you and your Users may not access or otherwise use the Services.
METI provides digital infrastructure for the administration of environmental claims ownership via products and services tied to Secure Source Identifiers (SSIDs) and Environmental Attribute Certificates (EACs). Upon acceptance of registration by the Administrator, the Account Holder will have an Account in METI where they can create, modify and administer records related to SSIDs and EACs. Account Holders can import data from, and export to, other public or private registries not managed by the Administrator. The data comprising METI includes, but is not limited to:
SSIDs related to sustainable projects, provided to the Administrator by qualified Custodians as detailed in the METI Source Rulebook.
Meta data provided by Account Holders, their Users, or other participants in METI, such as project type, geographic location, time, and environmental benefits.
METI is an assembly of data regarding environmental project sources. Any issues or disputes arising between the Account Holder, other METI participants, and third parties from the use of METI or its data (including disputes about the validity of project data, the purchase and sale of EACs, or ownership rights to an EAC's affiliated benefits) must be resolved between the involved parties. The Administrator’s role in resolving these issues is covered in the METI Source Rulebook. The Administrator’s responsibility in resolving these issues is covered by the liability limitation and indemnification provisions of Sections 13, 14 and 15 of these Terms. The Administrator reserves the right, in accordance with procedures in the relevant Product Rulebook/s, to handle disputed SSIDs and EACS by interpleader or other suitable actions and may deposit disputed SSIDs or EACs with the relevant court or arbitral panel.
Account Holders can import and export data to and from other digital ecosystems. The Administrator may need to receive or transmit data on behalf of the Account Holder for such transfers. The Account Holder’s instruction to the Administrator to facilitate such imports or exports constitutes authorization for the Administrator to act accordingly. The Administrator’s role in these exchanges is covered by the liability limitation and indemnification provisions of Sections 13, 14 and 15 of these Terms.
The Administrator reserves the right to modify, augment, segment, reformat, reconfigure, or otherwise alter the content or methods of transmission of METI, the Operative Documents, or these Terms of Use at any time. The Administrator will report any non-compliance with Operative Documents that may have a material adverse effect on METI within thirty (30) days of occurrence. Account Holders will be given at least seven (7) days’ prior notice of significant changes to METI or these Terms, which will be effective as stated in the notice, communicated via posting on the Service Site or through electronic or conventional mail. Other changes will take effect upon posting on the Service Site. Continued use of METI by the Account Holder after changes take effect will constitute acceptance of those changes.
(a) The rights and responsibilities outlined in these Terms apply to you, the Account Holder, and your successors and authorized assigns. You must ensure that your owners, trustees, partners, members, officers, directors, employees, and agents who access the Services (collectively, the “Representatives” or “Users”) comply with these Terms and any related guidelines.
(b) If you wish to hire or contract a third-party agent to access the Services on your behalf, you are required to complete and submit a signed Declaration of Agency form to the METI Administrator. This form will be made available on the Services Site or provided upon request. Please note that only one entity may access an Account at a time. If you grant access to an agent, you will not be able to access the Account yourself unless you revoke the agent's Declaration of Agency.
(c) The rights and licenses provided under these Terms are for your benefit and are to be used only by you and your Representatives in connection with your use of the Services. You may not transfer or sublicense your rights, licenses, or Account, or any portion thereof, to any third party, except as specified in this section.
(d) Account Holder agrees to comply with all applicable laws, regulations or other legally enforceable requirements, including without limitation applicable provisions of the USA PATRIOT Act and the regulations of the Office of Foreign Assets Control of the U.S. Department of the Treasury.
(a) Account Holder acknowledges that (i) Confidential Information (as defined in Section 5.5) is and shall remain the exclusive property of the party who submitted it or on whose behalf it was submitted, and (ii) Administrator is and shall remain the sole owner of all data comprising METI, including the METI operating system and any components, modifications, adaptations, and copies thereof. All software used in providing, accessing (other than commercially available third-party internet browsers), or using the Services (“Software”) is proprietary software of Administrator. Account Holder shall not obtain, have, or retain any right, title, or interest in or to the METI Services, the Software, or any part thereof. The rights granted to Account Holder are solely defined by these Terms of Use and the Operative Documents.
(b) The data transmitted by METI is derived from proprietary and public third-party sources, including data from other participants in the Services. Account Holder will not use METI for any unlawful purpose and will prevent unauthorized use or copying of the Services and related materials by Representatives.
(c) Administrator grants Account Holder non-exclusive permission to access, retrieve, and download data from METI subject to these Terms of Use and the Operative Documents. This access is effective only after the Account Holder has: (i) accepted these Terms of Use on the Services Site, (ii) paid all applicable fees, and (iii) completed and submitted the online application, which must be accepted by Administrator. Account Holder must take appropriate steps to protect access, use, and security of METI and user access information.
(d) METI, including the selection, arrangement, and compilation of data, may include confidential, market-sensitive, and trade secret information of the Account Holder and other participants. Administrator agrees to (i) use and maintain information provided by Account Holder in accordance with METI’s Data Privacy Policy, and (ii) not use or disclose Confidential Information except as authorized by Account Holder or these Terms of Use. Account Holder agrees not to use or disclose information contained in the METI, including other participants' Confidential Information, except as authorized by the Operative Documents and these Terms of Use. Confidentiality obligations survive the termination of these Terms for as long as the information remains Confidential Information.
(e) Confidential Information includes (i) Source data, including Account Holder data, related to SSIDs and EACs; (ii) Data that can be used to reveal identify of an Account Holder’s Account and sub-accounts; (iii) The amount, timing, and counterparty identities of transaction settlement activity facilitated by METI; (iv). Communications between Account Holder and Administrators regarding METI containing any of the aforementioned information.
(f) Confidential Information does not include information that: (i) was publicly known prior to disclosure, (ii) becomes publicly known without fault of the Receiving Party, (iii) is received from a third party with the right to disclose it, (iv) is independently developed without access to the Confidential Information, (v) is common technical information, (vi) must be disclosed by law, (vii) is already known to the Receiving Party, or (viii) is otherwise permitted to be disclosed under the Operating Procedures.
(g) Confidential Information may be aggregated with other information in METI and included in public reports, provided it is sufficiently aggregated to prevent identification and misuses of the Confidential Information of a particular Account Holder or group of Account Holders.
(h) Confidential Information is the sole property of the participant who provided it and shall only be used for purposes set forth in the Operative Documents and these Terms of Use.
(i) If Account Holder accesses data in the Services that: (i) is not provided or owned by the Account Holder, (ii) is not part of a public Services report, and (iii) Account Holder is not authorized to use, then Account Holder shall: (a) immediately notify Administrator of the access, and (b) not disclose, disseminate, copy, or use such information.
Except as otherwise permitted under Sections 6.2 and 6.3 below; (i) Account Holder will only manage data for which it is the sole holder of all legal title and all Ecosystem Services Rights, and (ii) Account Holder may not hold any Accounts, or hold, transfer or manage in its Accounts, any SSIDs on behalf of one or more third parties.
An Account Holder may administer METI Services on behalf of one or more third parties, provided that: (i) Each third party has authorized the Account Holder in writing to manage the legal title to all Ecosystem Services Rights on their behalf. The Account Holder may hold or share legal title to Ecosystem Services Rights only if explicitly authorized by the third party; And (ii) Account Holder maintains an identification program that contains reasonable procedures to verify the identity of any third-party individual or organization on whose behalf Account Holder is administering METI Services and maintains records of the information used to verify such identity, which records will be made available to Administrator upon request.
An Account Holder may administer METI Services on behalf of one or more third parties, provided that: (i) Account Holder is a Regulated Person and has provided Administrator a signed Regulated Person Attestation, available at the Services Site; provided, however, that Administrator may, in its sole discretion, waive the requirements set forth in this paragraph with respect to Account Holder by providing Account Holder with written notice of such waiver; (ii) All legal title and Ecosystem Services Rights held by the Account Holder must be held by the third parties who authorize the Account Holder in writing to administer METI Services on their behalf and share any related data with the Administrator. The Account Holder may also hold or share some Ecosystem Services Rights with the one or more third parties if applicable; And (iii) Account Holder maintains an identification program that contains reasonable procedures to verify the identity of any third-party individual or organization on whose behalf Account Holder is administrating METI Services, and maintains records of the information used to verify such identity, which records will be made available to Administrator upon request.
Fees for Services are outlined in the Membership Fee Schedule available on the Services Site. Administrator may, upon thirty (30) days’ notice to Account Holder and in its sole discretion, increase or decrease any or all of the Fees at any time. All fees are non-refundable unless otherwise stated.
Invoices for Fees will be sent electronically via email. The Account Holder shall pay any Fees via ACH or wire transfer of immediately available funds in U.S. dollars to the account specified by the Administrator, no later than thirty (30) days from the invoice date (the “Due Date”). All Fees are non-refundable. The Account Holder is responsible for paying all wire transfer fees, sales, use, value-added taxes, and other consumption taxes, personal property taxes, and other charges imposed by any governmental entity (excluding taxes based on the Administrator’s net income) related to the use of METI, unless the Account Holder provides satisfactory proof of exemption. Taxes, if any, are not included in the Fees and will be added to the Account Holder’s invoices if the Administrator is required to pay them.
If the Account Holder fails to pay any Fees, Taxes, or other charges by the Due Date, the Account Holder will be responsible for paying interest at a rate of 1.5% per month, or the highest rate permitted by applicable law, whichever is lower. Additionally, the Account Holder will be responsible for any costs or expenses incurred by the Administrator in collecting overdue amounts. Acceptance of any interest, cost, or expense payments does not constitute a waiver of the Account Holder’s default or prevent the Administrator from exercising other rights or remedies.
These Terms become effective when the Account Holder accepts them on the Service Site and remain in effect until either the Administrator or the Account Holder terminates access to METI.
The Administrator may: (i) Reject the Account Holder’s registration and terminate access immediately before accepting the registration; (ii) Terminate access with five (5) days’ notice if the Account Holder is in default, with immediate termination in the event of certain defaults; And (iii) Terminate access with at least sixty (60) days’ notice for any reason. The Account Holder must pay any Fees due at the time of termination.
The Account Holder can terminate use of METI with at least sixty (60) days’ notice. The obligation to pay any Fees due at termination survives such termination.
If required by law or by an order of a court or governmental agency, either party must terminate access to METI. Sixty (60) days’ notice should be given unless a shorter notice period is required.
Upon termination, (i) the Terms of Sections 5, 8, 10, 11, 12, 13, 14, 15, 16, 17, 18, 20, and other provisions meant to survive termination or expiration of these Terms, shall survive termination of these Terms of Use; And (ii) Certain sections of the Terms with relation to the data held in the Account Holder’s Account/s will be forfeited upon termination. Before termination, the Account Holder can transfer data to another participant, consistent with the Terms.
The Administrator may reinstate access at its discretion if the Account Holder resolves the default and pays all due Fees. A reinstatement fee equal to the Fees due during the termination period must be paid. If directed by a dispute resolution outcome, the Administrator will reinstate access, with any reinstatement fee determined by the resolution.
The occurrence of any of the following shall be considered a “Default”:
(a) The Account Holder fails to abide by the Terms or perform any duties or obligations under these Terms, not cured within five (5) days after notice specifying the default.
(b) The Account Holder fails to pay any Fees, Taxes, or other charges due within five (5) days of their Due Date.
(c) The Account Holder or its Representatives tamper with, damage, or destroy METI or any data of other participants.
(d) The Account Holder uses METI in a manner that violates any applicable law.
(e) The Account Holder's assets are attached or levied under execution, a petition in bankruptcy is filed, the Account Holder becomes insolvent, or similar financial distress occurs.
(f) The Account Holder falsifies or misrepresents any data or information provided to METI.
(g) The Account Holder makes false representations in these Terms.
(h) The Account Holder violates confidentiality obligations.
(i) The Account Holder receives notice of a violation of any material term or condition of the Terms three (3) or more times in any twelve (12) month period.
Upon the occurrence of any Default, the Administrator shall have the following rights and remedies, in addition to those stated elsewhere and those allowed by law or in equity, any one or more of which may be exercised without further notice:
(a) Injunctive relief to prevent further breaches.
(b) Obligation for the Account Holder to pay all monies due, including attorney's fees incurred to enforce rights.
(c) Notification to Beneficiaries of erroneous SCIDs and EACs, suspension of the Account, administrative fines, and or prohibition of participation in METI.
Failure or delay of the Administrator in exercising any rights or remedies shall not constitute a waiver thereof or affect the right to enforce such right or remedy. No waiver of any Default shall be deemed a waiver of any other Default.
The METI name, brand, and all content and software related to METI are protected by copyright and other intellectual property laws. Unauthorized use may violate these laws. Except as expressly provided, the Administrator and its affiliates do not grant any rights or licenses under any patents, copyrights, trademarks, or trade secrets. The Account Holder may not copy, distribute, modify, publish, sell, transfer, license, transmit, display, or create derivative works of any intellectual property or information related to METI without express permission.
The Account Holder represents and warrants that it is duly organized, validly existing, and in good standing under the laws of its jurisdiction of formation or incorporation. The Account Holder further represents that it has the legal capacity to enter into and perform its obligations under these Terms and that such obligations do not violate or conflict with any laws, regulations, or contractual agreements to which the Account Holder is subject.
The Account Holder represents and warrants that it has obtained all necessary approvals, consents, licenses, and authorizations required to enter into these Terms and to perform its obligations hereunder. The Account Holder further warrants that its execution, delivery, and performance of these Terms have been duly authorized by all necessary corporate or organizational action and that it will comply with all applicable laws, regulations, and policies in connection with its use of METI.
The Account Holder represents and warrants that the individual executing these Terms on its behalf has been duly authorized to do so, and that the execution and delivery of these Terms will create legal, valid, and binding obligations enforceable against the Account Holder in accordance with their terms.
The Account Holder represents and warrants that it will use METI solely for legitimate and lawful purposes as set forth in these Terms. The Account Holder agrees to use METI in a manner consistent with all applicable laws, regulations, and policies and not to engage in any activity that would harm or interfere with the functionality or security of METI.
The Account Holder represents and warrants that all data and information provided to the Administrator or entered into METI by the Account Holder or its Representatives are accurate, complete, and truthful. The Account Holder agrees to promptly update any such data or information to ensure its continued accuracy and completeness.
The Account Holder represents and warrants that entering into and performing its obligations under these Terms do not and will not conflict with or result in a breach of any terms, conditions, or provisions of any other agreement to which the Account Holder is a party.
The Account Holder represents and warrants that it has the right to provide all data and information submitted to METI and that such submission does not violate the rights of any third party.
The Account Holder represents and warrants that its use of METI and the data and information provided therein do not infringe on any intellectual property rights, privacy rights, or other legal rights of any third party.
The Account Holder represents and warrants that it is financially solvent and capable of meeting its obligations under these Terms, including but not limited to the payment of any Fees and Taxes.
The Account Holder represents and warrants that it has read, understood, and agrees to be bound by these Terms and any Operative Documents referenced herein. The Account Holder agrees to comply with these Terms at all times during its use of METI. These representations and warranties are continuous throughout the duration of the Account Holder's use of METI and shall be deemed to be reaffirmed each time the Account Holder accesses or uses METI. The Account Holder agrees to notify the Administrator immediately if any representation or warranty is or becomes untrue or misleading.
The data contained in METI has been gathered by the Administrator from sources believed to be reliable, including but not limited to METI participants, Account Holders, and Account Holders’ Representatives. The Administrator does not warrant that the information in METI is correct, complete, current, or accurate, nor does the Administrator warrant that the software will be error-free or bug-free.
METI is provided “as is,” and the Administrator makes no representations or warranties, express or implied, with respect to these Terms, the Operative Documents, or the adequacy or performance of METI. The Administrator hereby disclaims, to the extent permitted by law, any such warranties, including but not limited to warranties of merchantability, non-infringement, title, or fitness for a particular purpose, or any implied warranties arising from any course of dealing, usage, or trade practice. The Administrator does not warrant that the services provided hereunder shall be uninterrupted, error-free, or completely secure, or that the provision of such services shall always be executed without errors or omissions.
The Administrator shall not be responsible for the acts or omissions of any METI participant or any other party who inputs data into METI or from whom data is obtained for inclusion in METI.
The Account Holder is solely responsible for the protection, security, and management of its computer network usage and security. The Administrator shall not compensate the Account Holder for damages incurred due to violations of the security of the Account Holder’s computer network, nor shall the Account Holder make deductions or set-offs of any kind for Fees resulting therefrom.
The Account Holder assumes full responsibility and risk of loss resulting from its use of METI and the METI Site.
The Administrator’s sole liability for METI, service disruption, performance or nonperformance by the Administrator, or in any way related to these Terms, regardless of whether the claim for damages is based in contract, tort, strict liability, or otherwise, is limited, to the extent permitted by law, to an aggregate amount equal to the greater of (i) the Fees paid by the Account Holder hereunder during the calendar year immediately preceding the date any such claim is made by the Account Holder and (ii) the Fees paid by the Account Holder hereunder during the calendar year in which any such claim is made by the Account Holder.
The Administrator shall not be liable for consequential, incidental, special, exemplary, or other indirect damages regardless of cause, nor for economic loss, loss of use, loss of data, loss of business, personal injuries, or property damages sustained by the Account Holder or any third parties, even if the Administrator has been advised by the Account Holder or any third party of such damages.
The Administrator disclaims any liability for errors, omissions, or other inaccuracies in any part of METI, or the reports, certificates, or other information compiled or produced by and from or input into METI.
To the maximum extent permitted by law, the Account Holder hereby releases and protects the Administrator, any subsidiaries or other corporate affiliates thereof, their successors and assigns, agents, contractors, service providers, and vendors from any and all liability with respect to any damages or injuries incurred by the Account Holder as it relates to METI.
The Account Holder is responsible for the security of its logins, passwords, and IDs issued for accessing METI. Any unauthorized use must be reported to the Administrator immediately.
The Account Holder agrees to defend, indemnify, and hold harmless the Administrator and its affiliates against any claims, losses, damages, costs, and expenses arising from the Account Holder’s use of METI, violation of the Terms, or any third-party claims related to the Account Holder’s actions. This includes, but is not limited to, inaccuracies, errors, interruptions, or delays in data or services, and any judgments, decisions, acts, or omissions based on METI data or services.
No Party shall be deemed to have breached any provision of these Terms as a result of any delay, failure in performance, or interruption of service resulting from events beyond their reasonable control, including acts of God, network failures, civil disturbances, wars, terrorism, fires, floods, strikes, and other similar events.
All notices must be in writing and delivered in person, by email, or by first-class, registered, or certified mail. Notices to the Administrator should be sent to the provided address. Notices to the Account Holder will be sent to the address provided at registration.
If to Administrator:
MillPont, Inc.
666 Grand Ave, Ste 2000
Des Moines, Iowa 50309
Attn: METI Administrator
info@millpont.com
These Terms of Use shall be governed exclusively by the laws of the State of Iowa without regard to its rules on conflicts of laws to the extent they would require the application of the laws or procedures of a different jurisdiction.
The Parties shall first attempt in good faith to settle any controversy or claim arising out of or relating to these Terms of Use, the breach thereof, or the use of METI (any such claim, a “Dispute”), by direct negotiation between the principals or a designee of the principals of each Party. Direct negotiation shall commence upon the delivery of notice by a Party of a Dispute. Direct negotiation shall conclude on or before the forty-fifth (45th) day following delivery of notice of the Dispute.
Any Dispute that has not been resolved by direct negotiation shall be finally resolved by arbitration administered by the American Arbitration Association (“AAA”). Disputes of one hundred thousand dollars ($100,000.00) or less shall be heard under the AAA Expedited Commercial Rules and Procedures (“Expedited Rules”) then in effect. Disputes that exceed one hundred thousand dollars ($100,000.00) shall be heard under the Commercial Arbitration Rules and Supplementary Procedures for Online Arbitration (“Commercial Rules”) then in effect.
(i) For Disputes pursuant to the Expedited Rules, the AAA shall appoint an arbitrator with commercial experience with contracts and/or commodities. (ii) For Disputes pursuant to the Commercial Rules, the AAA shall deliver to the Parties a list of arbitrators with commercial experience with contracts and/or commodities, including diverse persons from the AAA roster. The Parties will strike and rank the arbitrators contained on the list until they arrive at three (3) arbitrators to hear the Dispute. If the Parties cannot agree on at least one (1) or more arbitrators from the ranked list, each Party shall select one Party-appointed arbitrator from the list provided by the AAA. The Party-appointed arbitrators shall then select the third (3rd) arbitrator, who shall serve as chair of the tribunal, from a list provided by the AAA containing the names of arbitrators who meet the criteria set forth above.
(i) Limited disclosures shall be as agreed to by the Parties or, if there is no agreement, as ordered by the arbitrators after due consideration of each Party’s position at the initial preliminary hearing. (ii) The arbitrators shall have no authority to award punitive damages or any other damages not measured by a prevailing Party’s actual damages, and may not, in any event, make any ruling, finding, or award that does not conform to the terms and conditions of these Terms of Use. (iii) A standard award shall be prepared by the arbitrators unless the Parties agree otherwise in a written amendment. The award may be confirmed in a state or federal court within Polk County, Iowa (which proceeding shall be filed under seal). The arbitration and resulting award shall be deemed confidential by the Parties, their representatives, the arbitrators, and the AAA.
(i) The Party filing a demand for arbitration with the AAA regarding the Dispute shall be responsible for the AAA case administration fees. (ii) Each Party shall be responsible for one-half of the arbitrators’ fees. Other than the arbitrators’ fees, each Party is responsible for its own costs associated with the resolution of a Dispute, including but not limited to AAA or court filing fees, attorneys’ fees, and other costs incurred in prosecuting or defending a Dispute.
These Terms, along with any applicable Operative Documents, constitute the entire agreement between the Parties regarding the subject matter and supersede any prior agreements.
For any questions about these Terms, please contact us at:
Email: info@millpont.com
Website: millpont.com
This METI Source Rulebook is under its first review by the METI Governance Committee. Upon issuance, it will be Preliminary and subject to a 30-day public comment period.
Content
(a) A core document of the MillPont Environmental Trust Infrastructure ("METI") clearinghouse platform, the METI Source Rulebook (the “Rulebook”) outlines the guidelines and protocols that govern the operations of the METI Source Ledger (“MSL”). The MSL is designed to provide a verifiable and transparent means for managing Secure Source Identifiers (“SSIDs”) tied to Environmental Attribute Certificates (“EACs”) across independent attribute tracking systems and critical font- and back-office operations in various agricultural commodities and value chains.
(b) The Rulebook incorporates over two decades of best practices in environmental attribute tracking, aligned with both the International Attribute Tracking Standard (“IATS”) and the Commodity Futures Trading Commission's (“CFTC”) No Double-Counting Guidance to prevent duplicative claims and double issuances of EACs. Through the MSL, METI enables Market Participants to securely submit, verify, and manage geospatial, temporal and attribute data, ensuring each source is uniquely registered, comparable and traceable through the EAC lifecycle in compliance with global standards for data accuracy, non-duplication, and operational transparency.
This Rulebook applies to all METI Originate Members, partners, and stakeholders involved in data submission, verification, and claim management through the MSL. It covers the full data lifecycle from initial submission to claim verification, including data security measures, periodic audits, and procedures for SSID conflict resolution. The comprehensive approach ensures that MSL represents the highest industry standards for accuracy, non-duplication, and reliable reporting. This Rulebook supplements the METI Terms of Use (“Terms of Use”). In the event of any conflict, the Terms of Use provisions take precedence.
Account: A data store within METI attributed to a single Entity, used for interacting with METI clearing services and ledgers.
Beneficiary: An individual, entity, or organization that receives the intangible property rights and the quantified environmental benefits conveyed through EACs. Beneficiaries can include, but are not limited to, stakeholders such as investors, public entities, private organizations, NGOs, or other parties entitled to the benefits generated by sustainable practices and interventions documented, registered, and transferred via METI.
Custodian: An individual, entity, or organization responsible for the custody, management, and administrative oversight of one or more Secure Source Identifiers. Custodians ensure the proper issuance, distribution, and tracking of these identifiers, and may also underwrite Environmental Attribute Certificates associated with the Secure Source Identifiers. Custodians must have active commercial agreements with Source owners (i.e., Landowners or Operators) or Beneficiaries with agreements tied to the Source owners. They are required to adhere to all applicable Terms of Use and Rulebook standards related to data integrity and compliance.
Omnibus Custodian: An Omnibus Custodian is an entity, typically an MRV Provider designated by one or more primary Custodians, to manage SSIDs and underwrite EACs on their behalf. Omnibus Custodians require a Declaration of Agency with METI (See Appendix 1), indicating formal authorization to administer these assets. An Omnibus Custodian is subject to the Terms of Use, relevant Rulebook/s, and financial responsibilities for the METI clearing services it utilizes on behalf of the individual or organization it holds an Account for.
Entity: An Entity is any legally recognized organization, institution, or individual that participates in the METI Source framework. Entities may include, but are not limited to, corporations, partnerships, non-governmental organizations, governmental bodies, and individuals acting as Custodians, Market Participants, or Beneficiaries. Each Entity is accountable for adhering to the METI Source Rulebook and associated Terms of Use, and is authorized to interact with the METI Platform, manage Accounts, and engage in SSID-related transactions under METI’s compliance and verification standards.
Environmental Attribute Certificate (or Claim) (“EAC”): A tradeable instrument representing intangible property rights used to quantify, verify, and track the ecosystem service benefits of climate mitigation projects. EACs may vary in their traceability, supporting ownership claims for activities like carbon reduction and renewable energy production.
Know Your Customer (“KYC”): The “know your customer” and other counterparty evaluation criteria as implemented on the basis of applicable laws or otherwise applied in accordance with good industry practice.
Labelling Authority: An organization that sets criteria for certifying EACs against its standards, ensuring compliance with specific guidelines (e.g., Verra, Gold Standard).
Landowner or Operator: One or more related entities which owns and or operates the Source of an EAC. Landowners and Operators can be individuals, organizations, and or groups of individuals or organizations which operate under similar ownership or organizational structures, produce similar goods or services, and are located in close regional proximity to each other.
Local Working Instructions (“LWIs”): A document or set of documents maintained and adopted by the Custodian that defines the procedures and standards for the creation, issuance, management, and distribution of EACs. These instructions ensure that the quality and integrity of the EACs can be defined and assessed against best practices and leading scientific standards.
Market Participants: Entities directly involved in EAC transactions who manage METI Accounts and exercise discretionary control over their data. Market Participants may designate third parties to manage their Accounts via a Declaration of Agency. Market Participants include Land Owners and Operators, Custodians and Beneficiaries.
Members and Membership Status: Organizations or individuals affiliated with METI through the METI Originate program, recognized by the METI Administrator as compliant with the Terms of Use and relevant Rulebook(s) for the clearing service(s) they use. Membership status reflects the Administrator’s confirmation of a member’s adherence to METI’s standards for custodianship, data accuracy, and operational integrity.
METI Administrator: MillPont, Inc., the designated manager of METI, responsible for implementing the Rulebook’s principles and overseeing platform operations.
METI Originate: A program that provides Market Participants with privileged access to METI’s clearing services and rights for the creation, modification, and management of records, including the METI Source Ledger.
METI Platform: A comprehensive system that provides open market clearing services through secure ledgers to facilitate the creation, verification, and management of SSIDs and EACs. Operating independently of specific registries, MRV platforms, or programs/projects, METI Source engages directly with diverse Market Participants to enhance collaboration, transparency, and coordination across independently managed systems.
METI Source Ledger ("MSL"): An electronic accounting ledger within the METI Platform that records, stores, and tracks data submissions and claims associated with SSIDs and their linked EACs. The Source Ledger maintains a transparent chain of custody and ensures the secure, verifiable provenance of environmental claims, particularly in agricultural production systems. Serving as the foundational tool for establishing and securing the exclusivity of EAC ownership, it also prevents the duplication of EAC issuances at the point of origin, supporting the integrity and trustworthiness of environmental transactions.
MRV Platform: A Monitoring, Reporting, and Verification platform that collects, validates, and reports data related to environmental activities linked to EACs. MRV Platforms support accurate EAC issuance by integrating field data, remote sensing, and audits to maintain verified environmental impacts. MRV Platforms can integrate with the METI Source Ledger providing validated data to create and manage SSIDs, ensuring traceability and transparency.
MRV Provider: An entity that administers MRV Platforms and supports data collection and reporting tied to SSIDs and EACs. Providers verify SSID data and measure the environmental benefits being produced from climate mitigation activities and ensure ongoing auditing, compliance, and transparent environmental outcome tracking. The functions of an MRV Provider can be embedded in a Custodian’s organization (i.e., Unified Entity) and or they can operate independently as third-party auditor and verification partner.
Omnibus Custodian: The individual or organization responsible for the management, administration, and oversight of one or more SSIDs and EACs on behalf of another individual or organization. An Omnibus Custodian has a signed Declaration of Agency Form (See Appendix 1) on file with the Administration for each Omnibus Custodian Account it oversees and administers on the Source Ledger.
Registry: A database that records the ownership, issuance, transfer, and redemption of EACs. Registries may be public or private and can serve as Labeling Authorities or support multiple labels.
Resolution Period: A timeframe, designated by METI Administrator, during which any detected incompatibility or conflict between SSIDs must be resolved. This period allows for an investigation and corrective actions to be taken to ensure the accurate tracking and integrity of environmental claims tied to SSIDs.
Secure Source Identifier (“SSID”): A unique and addressable digital statement that represents exclusivity over a geographic extent for a period of time for a specific type of environmental attribute. SSIDs incorporate geospatial, temporal, and attribute ownership data to ensure secure and verifiable provenance for claims. They support data integrity, traceability, and facilitate easy comparison across different platforms and workflows. They are represented via a unique 16-character identifier which can be reference on the METI Source Ledger.
Source: For agricultural-based projects, a source is the point of origin of an EAC, an identifiable measurement point at the beginning of the EAC lifecycle, and is considered an individual contiguous parcel that is the smallest unit of land with: 1) A permanent, contiguous boundary; 2) Common land cover, management practice, or operational facility; 3) Common ownership or group of Land Owners and Operators, and; 4) A common project administrator (i.e. Custodian).
Unified Entity: A Unified Entity is a Custodian organization that holds dual roles, acting both as the administrator and verifier of SSID data within the METI Source framework. This designation allows the organization to validate SSID-related data internally rather than through an independent third-party auditor.
The Rulebook serves as an overarching governance document for METI’s Source Ledger, ensuring consistent application of the platform’s principles and procedures. The governance structure is led by the METI Governance Committee composed of industry stakeholders, METI Originate Members, and independent experts who provide strategic oversight and guidance. This committee plays a crucial role in maintaining the integrity and alignment of the Rulebook with best practices and evolving industry standards. MillPont, Inc., designated as the METI Administrator, is responsible for the practical implementation of the Rulebook’s protocols. MillPont manages the day-to-day operations, ensuring that the Rulebook’s principles, processes, and procedures are applied effectively and are continuously refined to meet the Rulebook’s requirements. This structure supports a collaborative and transparent operational framework that fosters trust and engagement among all METI Members and market participants.
These include Greenhouse Gas Protocol (“GHGP”), Science-Based Target Initiative (“SBTi”), Value Change Initiative (“VCI”) Guidance, International Attribute Tracking Standard (“IATS”), ISO 14064-1-4, and the Commodity Future Trading Commission’s (“CFTC”) Guidance on No-Double Counting.
The METI Governance Committee is comprised of METI Members, industry stakeholders, and independent experts. This governance structure ensures that METI remains aligned with the principles of transparency, integrity, and continuous improvement. This body is responsible for:
Overseeing updates to the Rulebook and approving new or revised protocols to ensure they are seamlessly integrated into platform operations.
Providing strategic guidance to align METI processes and procedures with evolving standards and best practices.
Upholding the fairness and integrity of METI operations.
METI Administrators, represented by MillPont, Inc., are tasked with maintaining the governance and oversight of METI Platform and the MSL. Their primary responsibilities include:
Monitoring member activities to ensure adherence to the METI Rulebook/s, Terms of Use, and operational protocols to maintain the platform's credibility.
2.2.2. Guiding Operational Integrity
Providing guidance to align operations with industry best practices and adapting to new environmental standards and legal frameworks.
2.2.3. Facilitating Member Engagement
Acting as a liaison between METI and its members to address questions, clarify procedures, and support continuous improvement in data submission and record management.
2.2.4. Dispute Resolution
Acting as an independent mediator in member disputes as specified by the Terms of Use, relevant Rulebook/s, and applicable contractual agreements.
METI Administrators employ various oversight mechanisms to uphold platform standards, including:
Conducting periodic audits and monitoring member activities to ensure adherence to the Rulebook.
Protecting the accuracy and reliability of data within the Source Ledger.
Members must support these administration activities by providing documentation and participating in reviews, with METI ensuring the protection of confidential information.
METI Member responsibilities include:
All members of METI, including METI Originate Members, must comply fully with the Terms of Use and this Rulebook.
Upholding confidentiality, intellectual property rights, and data privacy as outlined by Terms of Use and this Rulebook.
Submitting data that is accurate, complete, and aligned with METI’s rules and procedures to maintain a trusted clearinghouse.
Ensuring environmental claims are verifiable and contribute to sustainability goals, reinforcing trust in the platform.
(a) METI Administrators monitor member activities to ensure compliance, while respecting business-sensitive information. Members are expected to: (i) Provide necessary documentation upon request; And (ii) Facilitate reviews to confirm adherence to compliance standards.
(b) These responsibilities are integral to fostering confidence in transparent and high-integrity market operations, ensuring that all environmental claims are accurate and verifiable, and contributing to the platform’s overall mission of enhancing environmental market reliability and scale.
The METI Source Rulebook is guided by a set of principles that define its operations, governance, and member interactions. These guiding principles collectively support the MSL mission to operate as a transparent, secure, and adaptable clearinghouse for environmental assets, reinforcing MillPont's commitment to reliability and trust in the global marketplace.
Transparency is a cornerstone of MSL operations, ensuring that all participants have access to essential information:
The MSL upholds participants’ right to comprehensive information about the origin, attributes, and handling of environmental assets while balancing the protection of data sovereignty, anonymity, and trade secrets. This approach supports traceability for producers and verification confidence for end-users.
MillPont prioritizes clear, accurate, and timely communication to maintain trust and facilitate effective member participation.
Members are required to submit complete, verified data that aligns with METI’s standards.
METI Administration conducts ongoing audits and checks to ensure data quality and prevent errors.
Ownership of SSIDs and associated claims must be verifiable through documented evidence to uphold trust in the MSL.
Every EAC source is assigned a Secure Source Identifier (SSID) to prevent duplication and ensure traceability. An SSID is a unique and addressable digital statement that represents exclusivity over a geographic extent for a period of time for a specific type of environmental attribute. In EAC markets, only one SSID statement has an effect at any one point in time. When an SSID overlaps with another, then a conflict exists on the MSL until it is resolved to a distinct and exclusive claim.
The platform maintains a clear chain of possession from the Land Owner/Operator to the end-user/Beneficiary, supporting verifiable ownership and claims. It is mandatory that the possession of an SSID to be always verifiable.
METI’s framework integrates with member-managed systems to align data and avoid duplication, enhancing the overall traceability of environmental assets.
METI employs robust encryption and secure infrastructure to protect data at rest and during transfer.
Access to data is restricted to authorized members, ensuring secure data handling.
Infrastructure is designed to provide reliable and continuous service that meets market needs.
METI adapts to changes in technology, regulatory frameworks, and market requirements:
METI fosters the implementation and exploration of new governance models and environmental accounting frameworks.
The platform applies a principle of proportionality to ensure that operations remain fair, effective, and equitable across different scenarios.
Practices and technologies are regularly updated to remain in alignment with market needs and harmonized standards.
Ensuring fairness and impartiality in market operations is fundamental. To achieve this, METI Administration takes several measures to maintain the integrity of the MSL, aiming to remove conflicts of interests from operational decision making and incentive structures. These include, but are not limited to:
METI Administration maintains independence by not participating in the markets it oversees and or interacts with, ensuring an unbiased approach and avoiding conflicts of interest.
METI Administration is committed to preventing discrimination and reducing barriers to market access, ensuring broad and fair participation.
METI Administration actively involves stakeholders to align its processes with industry standards and best practices, including:
Designing, maintaining, and updating regular processes and procedures for soliciting feedback from members and key stakeholders to refine procedures and enhance platform functionality.
Actively seeking engagement with industry leaders and complementary systems to strengthen the market’s overall reliability and cohesion.
The Source Ledger ensures adherence to all relevant legal and regulatory requirements:
All operations are conducted in accordance with applicable laws and standards across jurisdictions to maintain legal integrity and market trust.
The main responsibility of a Custodian is to facilitate the registration of SSIDs and underwrite and manage EACs for which the Custodian maintains contractual rights to administer. A Custodian may be any form of a legally recognizable entity, including a government authority, non-governmental organization, and or commercial enterprise.
The registration and management of SSIDs on the METI Source Ledger requires auditable commercial agreements between the Custodian and the underlying Landowner/s and Operator/s, and or, between the Custodian and Beneficiary/s who may hold the commercial relationship and agreements with the Land Owner/s and Operator/s. The commercial agreements should clearly define the services provided and ensure that the registration and management of SSIDs is aligned with those services. A Custodian may not request and manage any SSID they are not authorized to do so by a commercial agreement. Any deviations from commercial terms that would alter or remove the rights to administer SSIDs by the Custodian should be discussed with METI Administration to ensure adherence to the Principle of Data Integrity and Accuracy.
Custodians are required to have appropriate training, staff, and a degree of professionalism consistent with good industry practice and shall demonstrate competence to operate in the capacity for which they are serving Market Participants. This includes complying with METI’s KYC requirements and proper registration, accreditation, and licensing in compliance with the legislation in the geographies and countries wherever Custodians provide services.
Only a registered Custodian may request, manage and modify an SSID issued by METI. SSID requests can only be made when a Custodian has satisfied the commercial agreements required to evidence that an SSID issued on the METI Source Ledger is a unique and exclusive representation of the relevant Source for a given time period and environmental attribute. SSID requests may not be made in speculation, or prior to the effective date of administration as evidenced by the relevant commercial agreement/s.
Custodians shall demonstrate competence to operate in the capacity for which they are required by the METI Source Rulebook. The Administration has sole authority to assess the adequacy of adherence to the Rulebook’s requirements and grant or revoke any resulting Membership. The Administration may grant conditional or limited Membership where there are concerns related to competition, legislative implementation, or other requirements related to adherence to best practice. Unless explicitly stated, the following requirements shall apply to all Custodial Members and evidence of ongoing compliance with these requirements shall form part of the annual membership accreditation and verification process outlined in Section 7.
Consistent with good industry practice and to comply with applicable law relating to anti-money laundering and prevention of fraud, illicit proceeds from crimes or sanctioned activities, METI Administrators shall verify:
(a) Identity of any natural person with controlling ownership, and or, at least one officer of the Custodian;
(b) Legal Address of the Custodian;
(c) Appropriate legal and fiscal registration of the Custodian;
(d) Appropriate Local Working Instructions (LWIs).
(a) Custodians have a responsibility to act legally and in accordance with any agreed contracts. Where the actions of Custodians raise concerns that the integrity of METI Source Ledger may be compromised, whether by malicious intent or through poor practice, METI Administration may take appropriate actions permitted under law to maintain the integrity of the METI Source Ledger and reputation and operations of its collective Members.
(b) Any Custodian that suspects fraudulent activity, money laundering, tax evasion, or other illegal activity should report such a suspicion confidentially to METI Administration and the relevant authorities for review. Custodians may at any time contact relevant authorities in relation to suspicious activity or concerns related to fraud.
Custodians shall create, maintain, and operate Local Working Instructions (“LWIs”) that must comply with METI’s Terms of Use and Rulebook/s. METI Administration may review LWIs as part of the onboarding and Know Your Customer process. LWIs must clearly document how Custodians guarantee unique issuance of each EAC and exclusive chain of custody using SSIDs. The steps or checks made to ensure this unique issuance and exclusive chain of custody must be documented in a manner that is easily understood by external stakeholders. Defined aspects of LWIs include:
(a) Geographical and Temporal Restrictions: A Custodian shall request, manage, and administer the registration of Sources, and any affiliated temporal and attribute data, solely within the geographical and temporal scope for which it is authorized and engaged as a Custodian by the Market Participants.
(b) Commercial Restrictions: Custodians shall only request the registration of Sources, and manage and administer SSIDs, for which they have established commercial agreements. Custodians may act in this capacity only when formally engaged as a Custodian by Market Participants.
(c) Records Management: A Custodian must define how it maintains records to ensure:
(i) The Custodian satisfies KYC requirements of this Rulebook;
(ii) The Land Owners and Operators satisfy the KYC requirements of the Custodian;
(iii) The Custodian is legally able to contract on behalf of Land Owners and Operators, and or Beneficiaries, for the administration of SSIDs;
(iv) The Custodian is not or has not engaged in fraudulent activities;
(v) The Land Owners and Operators are not or have not engaged in fraudulent activities;
(iv) All supporting documents submitted in support of establishing the unique and exclusive characteristics of a SSID;
(iiv) These documents and records must be maintained throughout the lifecycle of a SSID and for at least three years after expiration.
(d) Process Outlines: The prospective Custodian must clearly define, in its LWIs, the process by which it will enroll Land Owners’ and Operators’ Sources and manage EACs produced. The Custodian must also outline how the specific steps related to registering the Sources/requesting SSIDs are completed on the METI Source Ledger.
(e) Data Maintenance: A Custodian must establish and document protocols to ensure that all registration data associated with Sources and affiliated SSIDs remains current and accurate. The registration of a Source may expire after a defined period from the date of its initial registration, as specified in the commercial agreement/s between a Custodian and Land Owner and Operator. Registration can be renewed or extended by the Custodian upon renewal or extension of the commercial agreements between the parties.
(f) Change Management for Registered Sources: After a Source has been registered and an SSID issued on the Source Ledger, the Custodians must implement procedures to identify, review, and validate any modifications to the Source that may impact the validity of the information the Source Ledger. These procedures should ensure that all changes are assessed to maintain the integrity and accuracy of METI’s services.
(g) Supporting Evidence Requirements: LWIs shall detail how SSIDs are issued based on verifiable evidence they represent a unique and exclusive Source. Evidence supporting the issuance of SSID must include for a specified time:
(i) A permanent, contiguous boundary;
(ii) Common land cover, management practice, or operational facility;
(iii) Common ownership or group of Landowners and Operators, and;
(iv) A common project administrator (i.e. Custodian).
Custodians shall not conduct verification of SSIDs for which they are the Custodian unless recognized as a Unified Entity by METI Administration. Custodians may engage independent third-party auditors or verification bodies to confirm SSID-related data as per Rulebook requirements. Custodians shall submit verification documentation to Administration upon request and maintain these records for a minimum period of three years following SSID expiration. This documentation must be readily accessible for METI’s audit and compliance reviews.
A Unified Entity is a Custodian organization that holds dual roles, acting both as the administrator and verifier of SSID data within the METI Source framework. This designation allows the organization to validate SSID-related data internally rather than through an independent third-party auditor. This status is typically reserved for Custodians with advanced verification infrastructure and proven adherence to METI’s transparency, traceability, and data integrity protocols. To qualify as a Unified Entity, the Custodian must receive formal recognition from METI Administration during Account onboarding and continue to meet the following conditions:
(a) Approval and Oversight: The designation as a Unified Entity is granted by METI Administration, contingent on the Custodian’s demonstrated capacity to maintain unbiased, rigorous data validation protocols and adhere to METI’s principles for data integrity, security and traceability.
(b) Third-Party Audit Requirement: Despite internal verification capabilities, Unified Entities are subject to periodic third-party audits by METI Administration to ensure ongoing compliance with Rulebook requirements. This additional oversight maintains data integrity and impartiality, preventing conflicts of interest within Unified Entity operations.
(c) Conditions for Internal Verification: As a Unified Entity, the Custodian must document robust internal processes for data validation, which must meet or exceed the requirements typically applied to independent verification bodies. These processes are outlined in the Custodian’s Local Working Instructions (LWI) and are reviewed periodically by METI.
Each year, METI Administrators will distribute certification mailings electronically to all Custodians. This process allows Custodians to review and verify the accuracy of the data they have provided, ensuring it remains current and correct. Custodians must provide feedback and revisions if discrepancies or missing information are identified.
Once reviewed and updated data is approved, METI registers the Custodian’s data as “Certified by the Member,” signaling to market participants and third-party verifiers that the data has been actively verified and certified by the Custodian.
Custodians shall notify METI Administrators of any significant data changes or corporate actions throughout the year to maintain the accuracy and reliability of data between annual certification periods.
The annual METI Originate membership fee covers the review, modification, maintenance, and certification process.
As outlined in Section 10 and Section 11 of the Terms of Use, METI Administration may suspend or terminate the provision of service to any Custodian, if the Custodian is in default, or suspected of being in default, as defined under Section 11 Terms of Use.
Defaults that may result in suspension or termination include, but are not limited to, the following:
(a) Non-compliance: Failure to comply with the Rulebook standards, Terms of Use, or KYC requirements.
(b) Fraudulent Activity or Tampering: Fraudulent actions, intentional misrepresentation, or tampering with METI data or systems.
(c) Falsification and Misrepresentation: Intentional or grossly negligent misrepresentation.
(d) Any attempt to compromise the proper functioning of METI and the Source Ledger.
(a) METI Administration will issue a written notification of suspension to any Custodian found non-compliant with the METI Source Rulebook’s standards, KYC requirements, or other obligations. This notification shall:
(i) Clearly specify the reason for suspension;
(ii) Outline the actions required for reinstatement of services;
(iii) Provide a five (5) business day period for the Custodian to respond and take corrective action, unless otherwise required under the Terms of Use or outlined in the notification.
(b) Certain Defaults, as defined in Section 11 of the Terms of Use, may result in immediate termination without prior notification. These include, but are not limited to:
(i) Fraudulent, illicit, or illegal activity;
(ii) Tampering with or damaging METI systems or participant data;
(iii) Violations of applicable laws.
In such cases, METI Administration reserves the right to terminate services immediately, consistent with Section 10 and Section 11 of the Terms of Use.
If the Custodian fails to respond or address the issue within this period, METI reserves the right to terminate provision of services according to the Terms of Use and Rulebook. METI Administration shall act fairly and in a non-discriminatory manner, allowing any suspended or terminated Custodian to reapply for Membership. Reapplication will be permitted provided that the Custodian demonstrates it has remedied all issues that led to the suspension or termination.
This section outlines procedures and requirements for using the Source Ledger and submitting data within the METI Platform. This section ensures that all data submissions meet METI’s standards for accuracy, traceability, and compliance, supporting the overall integrity and reliability of the platform.
(a) Application Review: Prospective members must submit an application, which METI Administrators review to assess eligibility based on the Terms of Use and compliance standards.
(b) Onboarding Process: Approved members undergo an onboarding process that includes training on data submission protocols, the use of the MSL, and adherence to METI’s Rulebook.
(c) Account Setup: New members receive a METI Account, providing them with the ability to securely create, track and monitor SSIDs and associated EACs.
(a) Notice of Withdrawal: Members who wish to withdraw must comply with the procedures outlined in Section 10 of the Terms of Use, which specifies the requirements for providing formal notification of their intent to exit the METI platform.
(b) Reconciliation of Data: METI Administrators will conduct a review of all active SSIDs and associated data to reconcile and validate information before the member’s exit.
(c) Data Archiving and Transfer: Following the reconciliation process, members' data will be securely archived or, if appropriate, transferred according to the Terms of Use and member agreements to maintain the integrity of the platform.
(d) Final Audit: As part of the exit procedure, a final compliance audit may be conducted to ensure all member obligations have been met, as required by METI Administrators and in accordance with Section 10 of the Terms of Use.
(a) File Type: GeoJSON format as per IETF RFC 7946 standards
(b) Type: Must be “FeatureCollection”.
(c) Geometry: Must be Polygon. METI's use of polygons rather than multipolygons for SSID requests aligns with the need to represent each source as a single, continuous parcel that meets all the defined criteria for uniformity, ownership, and management. This requirement supports the integrity and transparency of the data submission and tracking process within METI’s environmental attribute system.
(d) Internal Identifier: Each SSID request must include an ID parameter that corresponds to the Custodian's identifier used to track polygons (i.e. Sources). The ID provided must be accurate to ensure accurate mapping of sources to each Custodian's internal data and chain of custody documentation.
(e) Properties:
(i) Contract Start and End: Dates in ISO 8601 format.
(ii) Optional Attribute: Type of environmental attribute (e.g., “carbon”).
5.2.2. Example JSON Structure
(a) Detailed Reporting: Must identify Source/s and establish chain of custody.
(b) Auditable Records: Data must be inherently reliable and traceable to field- or facility-level for projects in the process of generating and or issuing EACs.
Data can be submitted, managed and updated through the METI Platform using a Custodian’s login credentials and access through:
(a) APIs
(b) Front-End
Includes checks for data format, spatial integrity, and attribute consistency.
Status updates provided to Account Holders regarding the validation of their submissions.
Data validation and handling by METI systems includes, but is not limited to:
(a) Entity Validation: Confirms the reporting Custodian is authorized to submit data.
(b) Data Format Compliance: Ensures data consistency and scalability.
(c) Spatial, Temporal, and Attribute Integrity: Validates non-duplication and complete coverage.
(d) Aggregation Handling: Processes shared ownership data accurately.
METI will ensure compliance with applicable sanctions laws, restricting access to sanctioned parties or jurisdictions as defined by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) and other relevant bodies.
Custodians must confirm that no data is maintained on behalf of any party subject to sanctions. Any identified violation must result in immediate action, including cancellation of access and written notification to METI.
All data must be submitted in good faith for legitimate purposes and should not disrupt the orderly conduct of the platform.
Submission of data with the intent to mislead or overload METI’s systems or those of participants is forbidden. Reckless or intentional practices that could disrupt METI’s operations or clearing services are prohibited.
The Chain of Custody Documentation section outlines the essential practices and requirements for maintaining verifiable records and audit trails for data associated with Secure Source Identifiers (SSIDs) and Environmental Attribute Certificates (EACs). These practices ensure the integrity of data submissions, support compliance with METI standards, and promote transparency and trust within the platform. Members, including Custodians and Market Participants, are obligated to follow these protocols to demonstrate clear data provenance and comply with regulatory and platform-specific guidelines.
Each data submission must be verifiable to, upon request from METI Administrator, confirm its authenticity and alignment with its designated SSID.
Custodians must submit, upon request, supporting documentation that evidences a clear chain of custody and legal entitlement for administration and creation of SSIDs on METI’s Source Ledger.
Custodians and Market Participants must maintain comprehensive records of all data submissions, transactions, and modifications, ensuring these records align with affiliated data on METI.
Proprietary data or personal information collected for compliance purposes shall ONLY be used to the extent they are required to verify compliance with Terms of Use and relevant Rulebook protocols. Records must be made available to METI Administrators or upon request by relevant authorities for compliance and audit purposes.
Maintaining a reliable audit trail requires both electronic and physical documentation to support the integrity of data related to SSIDs.
Logs must capture essential data such as timestamps, identifiers, details of involved parties, and any modifications or cancellations to submissions or claims.
Original documents such as contracts, agreements, and proof of ownership or entitlement related to EACs must be retained. These documents should support the data recorded in the electronic logs.
(a) Electronic Records: Electronic records should be securely stored to prevent unauthorized access and prevent tampering, ensuring data integrity and protection.
(b) Physical Records: Physical records must be stored in a secure, accessible location and made available for inspection upon request by METI Administrators or relevant authorities. Custodians must implement practices to protect physical records from damage, loss, or unauthorized access, ensuring they remain intact for at least three (3) years or as required by applicable regulations.
(c) Confidentiality: Records related to environmental claims must be protected to ensure proprietary and personal information is not publicly disclosed, except in an aggregated or anonymized manner or when legally mandated.
(d) Compliance with Regulations: Both electronic and physical records must comply with regulatory requirements, ensuring comprehensive audit trails are maintained to support transparency and traceability.
Section 7 outlines the annual compliance verification standards that Custodians must adhere to, ensuring the integrity and reliability of data submissions and operations. These standards align with METI’s commitment to transparency, accuracy, and adherence to the leading standards.
METI Administration will conduct regular annual audits to ensure that members uphold Rulebook standards and comply with the framework. This process verifies the accuracy and legitimacy of data and member activities according to Section 4 , Section 5, and Section 6.
METI Administrators will perform audits based on a randomized selection process to create a statistically significant sample of SSID claims and Member operations. This method helps monitor platform activity effectively and ensures that the Rulebook’s standards are being met consistently across all member operations.
Custodians selected for audits are required to submit supporting records and cooperate with METI Administrators, providing additional documentation as needed.
The results of these audits will be communicated back to the Custodian. Custodians identified as non-compliant may be issued a corrective action plan, which must be addressed within thirty (30) days to maintain Membership accreditation.
Specific triggers for additional compliance checks include, but are not limited to:
(a) Changes in Source ownership or management;
(b) Significant modifications to SSID data;
(c) Periodic intervals based on previous audit outcomes or known risk factors.
This section outlines the security protocols and operational measures necessary for maintaining the confidentiality, integrity, and availability of data managed within the METI Platform. These guidelines support platform resilience and the protection of sensitive information related to SSIDs and EACs through best-practice industry standards.
All data within the METI Platform is protected using advanced encryption protocols, both at rest and in transit, to prevent unauthorized access and tampering. These include but are not limited to:
(a) Encryption: All sensitive data within METI is encrypted at rest and in transit using advanced encryption protocols to protect against unauthorized access and data tampering.
(b) Access Controls: Data access is restricted to authorized members based on role-specific permissions. Multi-factor authentication is required for members accessing confidential information related to SSIDs.
(c) Confidentiality of Environmental Claims: Proprietary data related to environmental claims will be anonymized or aggregated for public reporting unless specific disclosure is legally mandated.
Personal and proprietary data collected for regulatory and operational purposes is anonymized or aggregated before public disclosure, except when legally mandated, to maintain confidentiality and compliance.
Data access is restricted to authorized members based on their roles. METI Administrators manage access controls to ensure only approved users can interact with sensitive data.
Strong authentication protocols, such as multi-factor authentication, are employed to reinforce security.
The METI Platform architecture ensures data redundancy and supports automatic failover to secondary and tertiary systems for minimal disruptions. If a primary node fails, a secondary node is automatically promoted to maintain service continuity.
The platform uses a distributed architecture to spread data across multiple servers, enhancing scalability and continuous availability.
Cross-region data replication is used to withstand regional outages, supporting consistent service availability.
Backup and disaster recovery measures of METI include, but are not limited to:
(a) Automated Backups: Scheduled, automated backups are conducted to enable quick data restoration in case of loss or corruption.
(b) Point-in-Time Recovery: This feature allows data to be restored to a specific moment in time, protecting against unintended data loss.
(c) Data Snapshot Capabilities: The platform supports secure data snapshots to create recovery points for reliable backup solutions.
The platform includes monitoring tools that provide real-time oversight of database health, including logging and alerting for potential issues.
The SSID Conflict Resolution Process is a structured approach to resolving disputes involving SSIDs. Steps include:
(a) Pre-Dispute Communication: Encourage members to resolve potential conflicts through prompt internal discussions.
(b) Formal METI Review: Submit a conflict resolution request to METI, which will acknowledge and review the submission within five (5) business days.
(c) Investigation and Resolution Timeline: METI aims to resolve conflicts within forty-five (45) business days. Parties dissatisfied with initial outcomes may enter mediation or proceed to arbitration under METI’s Terms of Use.
Since the MSL permits conflicting SSIDs to exist in an encumbered state until the parties resolve the overlap, Members are encouraged but not obligated to proceed through each of these stages. This flexible, non-binding process allows members to manage their conflicts efficiently while ensuring fairness and transparency within the METI ecosystem.
Before a conflict arises, members are encouraged to conduct regular assessments of their data submissions and understand their obligations and potential risk areas. This proactive approach allows members to anticipate issues, and in cases where a conflict may arise, METI recommends these initial steps:
Members should immediately discuss potential conflicts with their internal teams and, where relevant, with land stewards or operators. Prompt action can prevent escalation and the loss of critical information.
When a potential conflict is identified, members should reach out to involved farm partners or MRV providers to clarify any discrepancies. Many conflicts can be quickly resolved at this stage by allowing these parties the chance to review and correct data.
If direct discussions do not resolve the issue, members may proceed voluntarily to METI’s formal conflict resolution process as outlined below.
If members choose to use METI’s structured conflict resolution process, METI Administrators oversee the following steps:
Members submit a formal SSID conflict resolution request via METI’s designated electronic form (See Appendix 1). The request should detail the conflict, SSID identifiers, involved parties, and relevant evidence as outlined in Section 6. METI reserves the right to evaluate and respond to the conflict submission as appropriate.
METI will acknowledge receipt of the conflict submission within five (5) business days and conduct an initial review to assess whether the conflict is eligible for METI’s resolution process or requires a different approach.
METI Administrators conduct an investigation to assess the validity of the conflict, which may involve reviewing relevant data and records and requesting further information from members.
METI aims to provide an initial resolution within forty-five (45) business days of acknowledgment. If additional time is needed, METI will inform the parties of an updated timeline.
If the initial METI review does not resolve the conflict to the parties' satisfaction, members may voluntarily move to the Negotiation phase, a direct, collaborative approach aimed at reaching a mutually agreeable solution.
By mutual agreement, METI Administrators may introduce members to engage directly in discussions to explore resolutions. This stage encourages parties to exchange ideas, explore solutions, and work toward a compromise that addresses both parties’ interests.
If negotiation is unsuccessful within thirty (30) business days, or the parties prefer an alternative approach, they may proceed to mediation or arbitration.
Mediation can be facilitated by METI Administrator, a member of the METI Governance Committee (not involved in the dispute), another METI Member (not involved in the dispute), or a qualified third-party mediator approved by METI Administrators. All costs of mediation, including fees, are borne by the disputing parties.
The mediator facilitates discussions to help parties reach a collaborative, non-binding solution. Mediation remains voluntary throughout, allowing parties to opt out if preferred.
9.4.3. Confidentiality
All information shared during mediation remains confidential to protect member privacy and encourage open dialogue. Neither MillPont nor the mediator will disclose details unless legally mandated.
If mediation does not yield a resolution or the parties opt to proceed without mediation, Members may voluntarily elect to move to arbitration in accordance with the procedures described in METI’s Terms of Use Section 20.
Arbitration is administered by the American Arbitration Association (AAA), with options tailored to the size of the dispute:
(a) Expedited Commercial Rules for disputes up to $100,000.
(b) Commercial Arbitration Rules for disputes exceeding $100,000.
(a) Limited Disclosures: Disclosure is restricted and managed by agreement or as ordered by the arbitrator.
(b) Confidentiality and Finality: Arbitration proceedings and awards are confidential. A final award may be confirmed in an appropriate court, ensuring the privacy and finality of the process.
All stages of conflict resolution, from initial METI review to negotiation, mediation, and arbitration, will be documented. Records will be securely stored and disclosed only when legally required or to parties directly involved.
METI ensures that all dispute-related records remain confidential and only disclosed to the extent legally mandated.
For conflicts that remain unresolved, METI allows conflicting SSIDs to exist in an encumbered Conflict status on the Source Ledger.
9.7.1. Encumbered Conflict Status
Unresolved SSID conflicts will maintain an encumbered status on the Source Ledger until the conflict is resolved.
9.8. Final Authority
METI Administration reserves the right to determine the handling of unresolved SSIDs in Conflict status.
The METI Governance Committee (The “Governance Committee”) plays a crucial role in overseeing the development and implementation of operating governance procedures outlined in the METI Rulebook. This committee ensures the integrity, effectiveness, and transparency of METI's operations, guiding the organization towards achieving its mission and vision.
The Governance Committee’ mission is to establish and maintain robust governance structures that support METI's commitment to sustainability, transparency, and innovation in environmental markets. The Governance Committee will oversee the creation and implementation of policies and procedures that ensure the credibility and reliability of METI's services and products.
The METI Governance Committee will meet regularly with METI Administration to review the development of METI's programs and address strategic and major operational issues. The committee members fulfill the following tasks:
Oversee the development, implementation and refinement of the METI Rulebook and its operational procedures, including but not limited to formation of an industry accepted dispute resolution mechanism, core principles of governance, and the orientation of procedures and processes to meet an evolving regulatory landscape.
Support strategic, future-oriented developments of METI with professional expertise and scientific background.
Regularly review the progress and development of METI's programs.
Participate in strategic and major operational issues and their respective implementation measures.
Network and communicate with relevant stakeholders, including researchers, civil society, and private sector entities, to enhance the publicity and credibility of METI's programs.
The METI Governance Committee will comprise a minimum of three and up to eight Market Participants, and or, experts industry stakeholders. Key stakeholder groups, such as regulators, carbon accountants, traders, CPGs, retailers, researchers, NGOs, and civil society organizations, will be represented in the committee. The composition of the external members will be equally distributed among different stakeholder groups, with an emphasis on representation and experience.
Members will hold individual positions, not representing their companies.
The committee will be chaired by an independent Chairperson, supported by a Vice Chairperson. These positions will be elected by the committee members immediately after its formation, with each term lasting three years.
New members are elected to the Governance Committee by a simple majority vote of the current members. Abstaining from a vote is counted as a no-vote. Nominations for the Governance Committee are for a term of three years, with the possibility of re-nomination for subsequent terms.
Governance Committee members may resign at any time by submitting written notice to the Chairperson. Members are expected to uphold and act in alignment with the mission and objectives of the METI. A member can only be dismissed for a valid reason and requires two-thirds majority of existing Governance Members for removal. Valid reasons include, but are not limited to:
(a) Breach of Fiduciary Duty: Failure to act in METI's best interests, including neglect of duties, misuse of METI information, or personal gain at METI’s expense.
(b) Conflict of Interest: Engaging in activities that directly compete with or undermine METI’s mission or create an unresolved conflict of interest.
(c) Unethical Conduct or Reputational Risk: Actions that compromise METI's reputation or conflict with its values, such as violations of legal or ethical standards.
(d) Failure to Participate: Repeated failure to participate in committee activities or fulfill agreed-upon responsibilities, impacting the committee's function.
The Governance Committee is required to meet in person at least once a year. Additional quarterly meetings are held virtually (e.g., via telephone conference or shared screen session) with specific thematic focuses, coordinated with Governance Committee members.
Each Advisory Board member holds one seat and one vote. Voting is conducted by a show of hands with an abstaining vote considered a no-vote.
The METI Rulebook is updated quarterly to incorporate minor adjustments, clarifications, and non-substantive changes. These updates are intended to enhance clarity, ensure compliance, and support efficient operations.
Once a year, METI Administration conducts a comprehensive review of the Rulebook to incorporate substantial updates, strategic improvements, and necessary regulatory changes. This annual update serves as a broader opportunity to address significant policy changes and refine the Rulebook to align with METI’s long-term goals and evolving standards in the environmental markets sector.
METI Administration collects proposed updates from a variety of sources, including regulatory changes, internal audits, member feedback, and operational reviews. Each proposal is documented in a Change Proposal Document, detailing the rationale, anticipated impact, and any regulatory or operational requirements. Administration presents the compiled proposals and feedback to the Governance Committee for review and prioritization thirty (30) days prior to scheduled quarterly meetings.
The Governance Committee, consisting of legal, compliance, METI members, and subject matter experts, reviews each proposal to ensure alignment with METI’s mission, regulatory standards, and the Rulebook’s objectives.
The Committee conducts a preliminary assessment of each proposal to determine its relevance and potential impact. Proposals that receive a simple majority in a preliminary vote proceed to the next stage, the public comment period.
METI Administration posts the proposed updates on the Service Site under “Notice of Proposed Rulebook Updates for Public Comment.” A 30-day comment period allows members and stakeholders to review and provide feedback. During the public comment period, METI facilitates engagement opportunities, such as Q&A sessions, to provide members with clarity on proposed changes and gather stakeholder insights on potential impacts.
The Governance Committee reviews feedback from the public comment period and incorporates relevant adjustments into the proposed updates to improve clarity, address operational concerns, or refine compliance measures. The Governance Committee holds a final vote on the adjusted updates. A two-thirds majority is required for approval, and significant updates require endorsement by the METI Executive Board to ensure strategic alignment.
Following implementation, the METI Administrator initiates a 60-day Cure Period to monitor the effectiveness of the updates, ensuring that they meet their intended objectives without unintended impacts. During this Cure Period, METI Administration gathers additional feedback from members regarding any challenges or unforeseen issues. If necessary, METI Administration will make adjustments to ensure compliance and support alignment with the Rulebook’s standards.
Quarterly updates take effect on the first day of the following quarter. Annual updates are implemented at the beginning of the second quarter of the calendar year, allowing adequate time for members to prepare.
Approved updates are recorded in the METI Rulebook Changelog, accessible on the Service Site. Each entry includes the effective date, rationale, and a summary of feedback responses.
METI Administration sends a formal notification to all members via email, detailing the approved updates and providing any necessary.
The METI API uses standard HTTP status codes to indicate the success or failure of API requests. This section explains the common errors you might encounter and how to resolve them.
200 OK: The request was successful.
201 Created: The resource was successfully created.
Errors in this category indicate issues with the request made by the client.
400 Bad Request
The server could not process the request due to invalid syntax or missing/invalid parameters.
Possible Causes:
Invalid GeoJSON structure in a POST /sources
request.
Missing required fields such as email
or password
.
How to Fix:
Ensure all required parameters are included and properly formatted.
401 Unauthorized
Authentication is missing, invalid, or expired.
Possible Causes:
Missing or incorrect Authorization
header.
Expired token.
How to Fix:
Include a valid Authorization: Bearer <token>
header in the request.
If the token has expired, reauthenticate by calling POST /token
.
403 Forbidden
The client is authenticated but does not have permission to access the resource.
Possible Causes:
Attempting to delete or modify a resource without appropriate permissions.
How to Fix:
Contact your administrator to ensure your account has the necessary permissions.
404 Not Found
The requested resource does not exist.
Possible Causes:
Using an incorrect or nonexistent source ID in a GET
or DELETE
request.
How to Fix:
Verify the resource ID and try again.
422 Unprocessable Entity
The server understands the request, but the data provided is invalid.
Possible Causes:
Dates are outside the acceptable range.
How to Fix:
Validate the data before making the request, ensuring all inputs meet API requirements.
Errors in this category indicate issues on the server side. If you encounter these errors, contact the METI support team.
500 Internal Server Error
An unexpected error occurred on the server.
Possible Causes:
API service issues or a bug in the system.
How to Fix:
Retry the request after some time or contact support.
503 Service Unavailable
The API service is temporarily unavailable.
Possible Causes:
Server maintenance or unexpected downtime.
How to Fix:
Wait for a while and try again.
When an error occurs, the response typically includes:
status: HTTP status code.
message: A short description of the error.
Validate Inputs: Ensure all parameters meet the API's requirements before making a request.
Retry Logic: For 5xx
errors, implement exponential backoff to retry requests after a delay.
Monitor Responses: Log error responses to identify recurring issues.
For additional support, contact the METI team at membership@millpont.com
Description of a Source in the METI framework
A Source refers to the point of origin of an environmental benefit. For METI, a Source is considered an individual contiguous parcel or facility that is the smallest unit of land with the following characteristics:
A permanent, contiguous boundary Example: A 40-acre field used for regenerative grazing, surrounded by roads or fences that clearly define its edges.
A common land cover and land management Example: A corn field with cover cropping and no-till practices applied across the entire parcel.
Common ownership or group of owners/land managers Example: A pasture owned by a farming cooperative or managed jointly by a family under a single operational agreement.
A common project administrator or project proponent (i.e., Custodian) Example: A reforestation project led by a local conservation NGO overseeing multiple parcels within a watershed program.
These criteria ensure that each Source is distinctly identifiable, manageable, and accurately linked to its environmental outcomes.
Below is an example of three fields that meet METI’s definition of a Source. Each field represents a distinct, contiguous parcel of land with a defined boundary, consistent land cover and management practices, and shared oversight by a common project administrator (i.e. Custodian). These fields demonstrate how Sources are clearly delineated and aligned with METI’s standards for secure environmental asset tracking.
Field ID: 1 Crop Type: Corn Management Practices: No-Till
Field ID: 2 Crop Type: Soybeans Management Practices: No-Till & Cover Crops
Field ID: 3 Crop Type: Wheat Management Practices: No-Till & Cover Crops
This example highlights how Sources are identified and differentiated based on specific attributes, ensuring accurate and consistent tracking of environmental outcomes.
The process for embedding verifiable trust in sustainable exchange
METI™ (MillPont Environmental Trust Infrastructure) operates as a geospatial clearinghouse, transforming environmental asset management in agricultural supply chains by embedding verifiable trust into sustainable exchanges. At its core, METI Source introduces Secure Source IDs (SSIDs)—digital deeds linked to of environmental outcomes. These digital deeds provide a secure, dynamic, and interoperable framework to connect agricultural value chains with environmental markets.
SSIDs are digital deeds that transform how environmental outcomes are tracked, verified, and managed. By linking each Source to an SSID, METI enables:
Ownership Verification & Validation: Each SSID is tied to a specific Source and its environmental outcomes, ensuring accurate claims and compliance with market standards - mitigating double-counting and greenwashing.
Security: Encrypted identifiers protect data integrity and ownership while safeguarding against fraud or duplication.
Interoperability: SSIDs are designed to integrate seamlessly with multiple platforms, markets, and regulatory frameworks, reducing friction across supply chains, registries, and marketplaces.
Dynamic Functionality: SSIDs evolve over time, capturing updates to claims, monitoring status changes, and ensuring outcomes remain relevant and actionable.
Submission of Sources
METI Members (e.g., ARVA Intelligence) submit Sources from agricultural projects to METI’s Clearinghouse. These Sources include:
Geospatial boundaries of project fields.
Management timelines specifying the duration of claims (Valid From – Valid To).
Data Processing in the Clearinghouse
The Clearinghouse:
Compares the submitted information against existing network claims and public data sources (e.g. geographically referenceable Voluntary Carbon Market projects on Verra, CAR, ACR, Gold Standard, etc.) to validate exclusivity.
Issuance of Encrypted Deeds
After validation, METI issues SSIDs as digital deeds for each Source. These SSIDs are stored in the Source Ledger along with:
Metadata about the Source’s origin, ownership, and current status.
Verification and encryption protocols ensuring right-to-claim ownership and traceability.
Linking SSIDs to Verified Outcomes
METI Members link SSIDs to specific environmental outcomes, such as carbon credits, Scope 3 claims, and or CI-certificates. This approach ensures:
Transparency and Integrity: Outcome claims are clearly documented, with traceable and verifiable ownership for buyers and stakeholders.
Conflict Mitigation: Double-counting is prevented, and ownership claims are clearly established, with mechanisms in place to resolve disputes when conflicts arise.
Authentication and Ongoing Monitoring
Buyers (e.g., Nestlé Purina) or third-party auditors authenticate claims via the METI Source Ledger.
SSIDs are continuously monitored to:
Ensure exclusivity and prevent double-counting.
Trust and Transparency: SSIDs provide verifiable and traceable assurance of environmental claims ownership.
Scalable Market Integration: Interoperability ensures compatibility across platforms, registries, and value chains.
Dynamic Accountability: SSIDs adapt to updates in environmental outcomes and ownership, ensuring continuous relevance and detection of conflicts - historically and on an ongoing basis.
Efficient Ownership Management: SSIDs simplify complex transactions by creating a secure, traceable link between Sources and outcomes, ensuring claims are unique, exclusive, and readily auditable.
METI empowers stakeholders to connect agricultural value chains with climate markets, fostering a sustainable future. By leveraging SSIDs as digital deeds, METI ensures that environmental claims are not just credible but also verifiable, authentic, and traceable at scale.
METI is an agricultural industry-first digital claims clearinghouse, utilizing techniques to assign unique identifiers, or “thumbprints,” to data. This ensures data confidentiality while enabling third-party verification, making environmental claims in agricultural supply chains and landscapes credible, comparable, and traceable - while privacy preserving. Additionally, METI integrates a strong governance framework and efficient conflict resolution process, reducing duplication of claims across platforms, projects, and registries allowing members to trust the integrity and exclusivity of their environmental claims without compromise.
METI offers foundational services to support secure environmental claims in agricultural supply chains and landscapes:
Data Transparency and Management: A digital ledger that enables access to reliable, privacy-preserving data.
Conflict Resolution: A streamlined process to resolve overlapping claims, reducing duplicated assets across projects, programs, and registries.
Verification and Auditing: Comprehensive tools to track and make agricultural climate project data reviewable by third parties and regulatory bodies.
Integration with Financial Processes: Connection to financial systems to facilitate project financing and provide a trusted foundation for climate markets.
MillPont operates a membership-based program, METI Originate, with suited for a range of organizational structures and scales:
Basic: Ideal for small projects and pilots, offering 100 secure sources per year, with an option to add more at a per-source fee.
Standard: For growing businesses, including 15,000 secure sources and API access with scalable fees for additional sources.
Enterprise: Designed for high-volume marketplaces and registries, offering 95,000 secure sources, API access, and advisory support, with customizable fees based on usage.
Additionally, MillPont’s pursuit of SOC 2 compliance underscores its commitment to industry-leading standards in data security and privacy management.
Blockchain tokenization can be powerful but does not inherently prevent double-counting. Only tokens with cryptographically-linked MRV (Monitoring, Reporting, and Verification) audit trails provide full claims integrity. METI Originate complements blockchain by offering a cryptographic bridge across diverse on- and off-chain solutions, providing a unified checkpoint for data verification across protocols, platforms, and systems, enhancing the security and reliability of existing blockchain applications.
A Custodian holds ownership and or administrative authority over the data required to produce, and or underwrite, an environmental asset connected to Secure Source IDs (SSIDs) and Environmental Attribute Certificates (EACs). Custodians, typically project developers or program administrators, are responsible for the management of SSIDs and issuance of EACs, ensuring claims data is governed with the highest standards of accountability and exclusivity.
SSIDs are unique 16-character identifiers embedded in digital certificates for sustainable projects. As digital identifiers, SSIDs create unique, comparable claim fingerprints, blending geospatial, temporal, and environmental data. These identifiers enable efficient underwriting, verification, and secure data comparison across platforms and data systems.
EACs are market instruments that represent the intangible property rights to claim the quantified environmental benefits generated by sustainable practices and ecosystem services connected to water, carbon, and biodiversity. Issued and managed by Custodians, they can includes one or more SSIDs, providing integrity, exclusivity and traceability. EACs are mediums of exchange for the transfer of environmental assets across platforms and between counterparties.
MillPont is building resilient infrastructure designed to attract institutional investment, drive market innovation, and enable scalable, regulation-ready environments. By proactively engaging with agricultural market participants and regulators, METI is developing a system that can evolve to support the scale and rigor of regulated markets like commodities, equities, and interest rates. This adaptable, scalable infrastructure uniquely positions METI to meet the rising accountability standards in global agricultural climate markets, including insets, biofuels, climate-smart commodities, and offsets.
To achieve global climate goals, companies need to reduce emissions quickly and effectively. However, decarbonizing at the necessary pace remains challenging, and climate markets are essential for directing capital toward projects that reduce and remove emissions worldwide. These markets—driven by insetting, offsetting, low-carbon biofuels and climate-smart —can scale to remove billions of tons of carbon annually, far beyond current trading levels.
GeoJSON polygons are invalid. Validation can be checked with .
Handle Expired Tokens: Implement token refresh logic to avoid interruptions (see ).
Reformats and processes submitted data leveraging algorithms, ensuring comparable consistency while preserving privacy and identifiable information.
Verify ongoing compliance with standards until the claim’s expiration.
METI stores essential metadata related to the of environmental benefits, such as the geospatial and temporal extent of a project claim (e.g., a field from an agricultural project from 2020 to 2030). Each source is unique per environmental attribute (e.g., carbon, biodiversity), mitigating duplicated assets. METI only stores data needed for uniqueness and provenance, preserving privacy and competitive information, while promoting transparency with easy validation and verification.
To safeguard and handle data, MillPont has developed proprietary applications of , an advanced encryption technology allowing computations on encrypted data without exposing . This means that METI can securely process and validate environmental claims without compromising individual privacy or disclosing sensitive project information. By using advanced encryption, METI maintains data integrity and transparency for verification while ensuring that personal and location-specific details remain protected and private.
This section describes the available endpoints for the METI API. Each endpoint includes details on its usage, parameters, and examples to help you interact seamlessly with the API.
All API requests should start with the following base URL:
GET /sources/?id={id}: Retrieve details of a single source by its ID.
POST /sources: Create a new source using GeoJSON data.
DELETE /sources/?id={id}: Delete a source by its ID.
POST /token: Generate an authentication token.
Retrieve details of a source by its unique ID.
URL: https://api.meti.millpont.com/sources/
?id={id}
Method: GET
Headers:
Authorization: <token>
Path Parameters:
{id}
(string): The unique ID of the source starting with 'src_'.
Example Request
Create a new source using GeoJSON data.
URL: https://api.meti.millpont.com/sources
Method: POST
Headers:
Content-Type: application/json
Authorization: <token>
Body:
A valid GeoJSON FeatureCollection with:
id (string): Your internal ID (a SSID will also be assigned).
properties (object): Includes start_at
and end_at
dates in ISO 8601 format.
geometry (object): Must contain a valid Polygon.
Example Request
Example Response
Delete a source by its unique ID.
URL: https://api.meti.millpont.com/sources/
?id={id}
Method: DELETE
Headers:
Authorization: <token>
Path Parameters:
{id}
(string): The unique ID of the source to delete.
Response:
message
(string): Confirmation of deletion.
Example Request
Example Response
Generate an authentication token.
URL: https://api.meti.millpont.com/token
Method: POST
Headers:
Content-Type: application/json
Body Parameters:
email
(string): Your registered email address.
password
(string): Your account password.
Response:
token
(string): The authentication token.
expires_in
(integer): Token validity period in seconds.
Example Request
Refer to the Error Handling section for details on common errors and their solutions.
The 2024 METI Launch Introduction Presentation