SUPPLY CHAIN SECURITY IN THE 21 st CENTURY

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "SUPPLY CHAIN SECURITY IN THE 21 st CENTURY"

Transcription

1 SUPPLY CHAIN SECURITY IN THE 21 st CENTURY

2 INTRODUCTION Overview of the Supply Chain Recent Supply Chain Security Issues Standards: World Customs Organization (WCO) Framework U.S. Customs and Border Protection s C-TPAT Program ISO Series Security Management Systems for the Supply Chain Other Supply Chain Security Approaches Risk-Based Supply Chain Security Approach Supply Chain Security Management Best Practices

3 DEFINITION The term Supply Chain Security can be defined as a process encompassing the: Programs Procedures Systems Technology and, especially, the People applied to addressing threats to the supply chain and the related threats to the economic, social and physical well-being of citizens and organized society.

4 SUPPLY CHAIN SECURITY ISSUES CUSTOMS AND BORDER PROTECTION, TAPA AND PINKERTON EXPERIENCE IS BASICALLY THE SAME: 60% of all supply chain security problems involved poor transportation related security 20%+ involved poor security at the manufacturing site, including poor access controls and poor security practices within the shipping and receiving departments 90% of the time, the security weaknesses were well known internally by staff 75% of the incidents had an internal connection

5 SUPPLY CHAIN SECURITY ISSUES CUSTOMS AND BORDER PROTECTION, TAPA AND PINKERTON EXPERIENCE IS BASICALLY THE SAME (cont): In spite of the pop culture that drivers and staff are intimidated and coerced into helping with theft and smuggling, less than 5% of the incidents investigated had that linkage 15% involved bribes and kickbacks Main motivation money and greed

6 SUPPLY CHAIN SECURITY ISSUES In Asia and Latin America: Both smuggling and theft are serious problems; can involve violence but usually focused on pay-offs Major issues revolve around transportation from the factory to a distribution center or customs clearance area Another major source of problems is transportation from the distribution center, truck yard or customs clearance area to an international port or border crossing Sophisticated modus operandi involves compromising transportation companies and/or drivers; multiple surveillance teams, and use of stolen duplicate rigs with hidden compartments; transloaders include wreckers or repair vehicles and box trucks

7 SUPPLY CHAIN SECURITY ISSUES In Asia and Latin America (cont.): Trailers/containers can be unloaded/transloaded in less than 30 minutes Criminal groups have experts who can get into the trailer or container without breaking the high security seal; have special racks to hold the doors and keep the seal in place Have experts who can duplicate the seal and replace it

8 SUPPLY CHAIN SECURITY ISSUES In Europe: Truck/trailer theft is increasing 20%+ a year Violent hijacking is extremely popular modus operandi Drivers are threatened and turn over their rigs/loads to avoid being shot or beaten; Eastern European, especially Russian, Albanian and Bulgarian organized crime often involved Drivers are often overpowered when sleeping along the way or at rest stops Drivers are oblivious to the threats and are not trained on how to avoid or respond to threats

9 SUPPLY CHAIN SECURITY ISSUES In the United States: Truck theft is a major issue Sophisticated organized crime groups are targeting manufacturers, distribution centers, truck stops, rest stops, etc. Ethnic Cubans, El Salvadorians (MS-13), working in conjunction with Eastern European (Albanian, Bulgarian and Russian) organized crime elements steal trucks/trailers, remove the property and ship it out of the country or sell it on E-Bay or to fences Trucks, heavy equipment and parts are also targets and go to Latin America/Europe Tactics include recruiting or inserting individuals inside a business with high value goods ; sometimes as employees, sometimes as temps Surveillance groups in vans and SUV s follow trucks or stake out truck stops, rest stops or other identified areas where trucks are parked (e.g. Wal-Mart or shopping center parking lot) Drivers are involved or are oblivious to threats; are untrained in how to detect surveillance and avoid problems; security officers equally oblivious and untrained

10 SUPPLY CHAIN SECURITY ISSUES So What Can We Do???

11 SUPPLY CHAIN SECURITY ISSUES It is VERY much a global business: Organized crime (even Italian) Mexican cartels Latin American gangs Cuban gangs Chinese triads And they will work together and share resources and expertise!

12 Supply Chain Security Use good, tested Supply Chain Security Programs!! Evaluate your situation; know the threats and modus operandi Know the supply chain security programs you can borrow from Select one as a starting point, or combine several, and move forward with a standard to evaluate against

13 WCO Guidelines World Customs Organization (WCO) 174 member nations Standardize worldwide customs policies and procedures (including supply chain security) WCO SAFE Framework of Standards Provide security and facilitate world trade Built upon joint customs and business pillars Authorized Economic Operator (AEO) is the name of the WCO supply chain security program

14 C-TPAT Program CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT) The United States implementation of the WCO Framework of Standards AEO program U.S. Customs and Border Protection (CBP) and the Trade Community working together in a voluntary program first of its kind in the world Joint, voluntary commitment to secure the supply chain

15 C-TPAT Program C-TPAT PROGRAM ELEMENTS: General Security Business Partner Requirements Conveyance Security Physical Access Control Personnel Security Physical Security IT Security Security Training and Threat Awareness

16 Other Supply Programs OTHER INTERNATIONAL SUPPLY CHAIN SECURITY RELATED APPROACHES: Authorized Economic Operators (AEO) e.g. European Union AEO or Japan AEO program, etc. ISO Transported Asset Protection Association (TAPA) Business Alliance for Secure Commerce (BASC)

17 Risk-Based Supply Chain RiskSecurity Programs How do you get Risk-Based security solutions from C-TPAT, AEO or ISO 28000? RISK is a Widely Mis-used Term!! US government (Department of Homeland Security and Department of Defense), the British CCTA Risk Analysis and Management Method (CRAMM) or the French Marion methodology, and most recently the ISO series, all basically break the Risk Assessment Methodology down to this formula: Risk = Threats X Vulnerabilities X Consequences If you want a Risk-Based Approach Use an Established Methodology and Use the Terms Properly

18 Risk-Based Supply Chain RiskSecurity Programs (cont) (Risk = Threats X Vulnerabilities X Consequences) Threats (T) considered should be holistic and can include: Terrorism Cargo Theft Hijacking Drug, Contraband Smuggling People Smuggling Undeclared Hazardous Goods Government Instability Labor or Health Issues IP/Brand Protection General Integrity of People Rated: Severe, High, Moderate, Low or None

19 Risk-Based Supply Chain RiskSecurity Programs (cont) (Risk = Threats X Vulnerabilities X Consequences) Vulnerability (V) (effectiveness of security) based on ability to deter, detect, delay and respond in, as a minimum, the following categories: General Security Procedural Security Business Partner Requirements Physical Access Controls Physical Security Container and Trailer Security IT Security Security Training and Threat Awareness Rated: High, Moderate, Low or None

20 Risk-Based Supply Chain RiskSecurity Programs (cont) (Risk = Threats X Vulnerabilities X Consequences) Consequences (C) is determined based on a Business Impact rating. Issues to consider include: Volume of Business Percentage of Particular Components/Services Provided Timeliness Cost/Value of Goods Impact on Business if Lost Quality Performance Rated: High, Moderate, Low or None

21 Risk-Based Supply Chain RiskSecurity Programs (cont) (Risk = Threats X Vulnerabilities X Consequences) IS THIS RISK? Excerpt from Congressional Research Service Report on Air Cargo Security, January 2005 Air Cargo Security Risks Potential risks associated with air cargo security include introduction of explosive and incendiary devices in cargo placed aboard aircraft; shipment of undeclared or undetected hazardous materials aboard aircraft; cargo crime including theft and smuggling; and aircraft hijackings and sabotage by individuals with access to aircraft.

22 Supply Chain Security Management So How can we manage the Risk and reduce the Risk? Lower the Threats? How? Lower the Vulnerabilities? Lower the Consequences? How? How?

23 Supply Chain Security Management Supply Chain Security Management (SCSM): Cannot eliminate most Threats; work with law enforcement Instead, the goal is to minimize the impact of any type of threat within the supply chain Threats can be of minor or major nature Threats can consist of removing cargo (theft) or adding to cargo (smuggling) Threats include: theft, terrorism, sabotage, extortion, accidents, etc. - Also can include counterfeit, product diversion, parallel trade, loss of reputation, etc. Note: Good SCSM can help companies to deal with all types of supply chain Threats, including bad weather, natural disasters etc.

24 Supply Chain Security Management Supply Chain Security Management (SCSM) (cont): Focuses on how to make security measures more effective and, hence, lower the Vulnerability Individual security measures typically have one or more of the following goals: Deter/Prevent Detect Delay Respond/Recover But all must be present to have effective security Identify security gaps and close them How can the enterprise do better at this? (Supply chain security action plans!) The biggest vulnerabilities seem to focus around PEOPLE which is why security education and awareness and personnel security are so important!! As is, having a reporting mechanism

25 Supply Chain Security Management Supply Chain Security Management (SCSM) (cont): Companies can certainly reduce the impact of adverse Consequences on their business. Not all consequence related actions are security actions It might involve broadening the supply base or changing processes It definitely involves business continuity and recovery planning This can play a major role in reducing Risk!!

26 Supply Chain Security Management Analysis Framework BASC Security Management Concept

27 Supply Chain Security Best Practices General Supply Chain Security Related Best Practices (CBP/ISO/TAPA/BASC/Pinkerton): Make your solutions Risk-Based (but properly determine your Risk) Use qualified third parties to assist; they don t have your blind spots Conduct Self Assessments of your Supply Chain Business Partners, document the gaps and develop a Corrective Action Plan; monitor the implementation of improvements or lack thereof Conduct On-Site Assessments of the Highest Risk Business Partner Sites; document the gaps and develop a Corrective Action Plan; monitor the implementation of improvements Follow-up and re-audit the Highest Risk Sites, if they do not score well (high vulnerability scores) but claim implementation of improvements Build security into your Business Partner selection and retention process as a factor Track, and require tracking, of all shipments -- and immediately respond to any anomalies

28 Supply Chain Security Best Practices (cont) Access Control Documented policies and procedures Advanced visitor approval Real-time monitored systems that document entry, exit and movement Check IDs of all visitors, vendors, drivers, etc. and keep a record of everyone who enters, when they entered and when they exited Require escorts for visitors and vendors Don t tolerate tailgating Work Area Restrictions (identifiable badges, color coded uniforms, further physical/electronic restrictions) Controlled driver waiting area

29 Supply Chain Security Best Practices (cont) Security Related Policies and Procedures Comprehensive and integrated Include special policies and procedures for information/data security Include special policies and procedures for shipping/receiving Include special policies and procedures for purchasing/contracting Integrated with security guard post orders

30 Supply Chain Security Best Practices (cont) Personnel Security Have a Code of Conduct that addresses supply chain security and integrity Include documented special policies and procedures for personnel/hr Have detailed policies and checklists for timely termination and return of IDs, keys, equipment and restriction for IT and other access Conduct detailed BI s, in accordance with the law, and check all references, including developed references, documents, education and qualifications; do re-checks!! Consistent enforcement of policy violations, etc.

31 Supply Chain Security Best Practices (cont) Physical Security Routine and random facility inspections and ensure compliance to established standards Well trained and equipped personnel, following documented procedures, and doing detailed reporting Monitored access control, CCTV and alarm systems that are integrated, (monitored) and allow for immediate real-time response Conduct tests (e.g. penetration tests) and audits of compliance Review and analyze systems and information Document what you do; guard patrols should be producing detailed reports on every shift!! Ensure security is looking for surveillance or suspicious activities and is reporting it

32 Supply Chain Security Best Practices (cont) Shipping and Receiving Specialized packing material Specialized shipping markings Segregated and controlled areas (ID badges, uniforms) High Security Seals controlled, secured and randomly issued CCTV and still photography of loading/unloading process, entry and exit Anonymous reporting of issues or conspiracies Rotate employees including supervisors and security System for tracking shipments and reporting/responding to anomalies

33 Supply Chain Security Best Practices (cont) Highway Carrier or Transportation Provider Establish standards for contracting/purchasing; require this of all transportation service providers Require notification of any subcontractor use and make it clear they must adhere to the same requirements as the primary Ensure all drivers are screened for licensing and criminal records Documented education and awareness training required including: Training on detecting surveillance Trailer security Reporting procedures Responses to different scenarios Establish communications methods and emergency signals

34 Supply Chain Security Best Practices (cont) Highway Carrier or Transportation Provider (cont) Know the transportation carriers security procedures and ensure they include no stops in designated red zones Allow stops only at authorized, pre-cleared trucks stops, etc. Require GPS tracking for both the tractor and trailer; GPS must be actively monitored and require regular check-ins and communication with the driver A response should be available that can be dispatched if there are any suspicious activities or stops Use automatic and/or remote cut-off and remote locking capabilities Consider light sensitive alarms linked to GPS Require high security locking devices/seals, spot weld hinges and tamper tape

35 Supply Chain Security Best Practices (cont) Security Education and Awareness Training All training well-documented Have a documented method for determining effectiveness of training Orientation and recurring general security training Specialized training for: Shipping/Receiving Drivers Mail and package handling Security and reception HR Internal conspiracies Outreach to Business Partners Focus on the NQR (Not Quite Right) approach Make sure reporting and response is addressed

36 Supply Chain Security Conclusion Supply chain security is an important facet of doing business Supply chain security can be improved by using RiskBased Security Management C-TPAT, AEO, ISO can all be a part of enhancing supply chain security Effective supply chain security can save the enterprise money, preserve reputation and protect brand name It s not James Bond stuff!!

37 Thank You!! QUESTIONS?

Risk Assessments and Risk Based Supply Chain Security. March, 2010

Risk Assessments and Risk Based Supply Chain Security. March, 2010 Risk Assessments and Risk Based Supply Chain Security March, 2010 What is Risk? What a Risk Assessment Isn t What a Risk Assessment Is How does the Risk Assessment fit into the C-TPAT program? How can

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

C-TPAT Validation/Revalidation Results

C-TPAT Validation/Revalidation Results C-TPAT Validation/Revalidation Results September 2014 Wayne Kornmann Director, Los Angeles C-TPAT Field Office Bryant Van Buskirk Supervisor, Los Angeles C-TPAT Office Agenda Methodology Core Criteria

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

Rail Carrier Security Criteria

Rail Carrier Security Criteria Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers

More information

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

SECURITY IN TRUCKING

SECURITY IN TRUCKING SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas

More information

Appropriate security measures, as listed throughout this document, must be implemented and maintained throughout the consolidator s supply chains.

Appropriate security measures, as listed throughout this document, must be implemented and maintained throughout the consolidator s supply chains. Page 1 of 5 Print this Page Close this Window Printer Friendly Version Of: http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/security_guideline/guideline_air_freight.xml Printed: Thu Feb 16 21:13:43

More information

C-TPAT Highway Carrier Security Criteria

C-TPAT Highway Carrier Security Criteria C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

OTI, Consolidator and Customs Broker. Security Questionnaire Customs-Trade Partnership against Terrorism

OTI, Consolidator and Customs Broker. Security Questionnaire Customs-Trade Partnership against Terrorism OTI, Consolidator and Customs Broker Security Questionnaire Customs-Trade Partnership against Terrorism Introduction and General Instructions The Customs-Trade Partnership against Terrorism (C-TPAT) is

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

Security Policies and Procedures

Security Policies and Procedures Security Policies and Procedures April 26, 2012 Kristen Whelan Transportation Consultant kwhelan@libertyint.com www.libertyint.com Customs-Trade Partnership Against Terrorism What is C-TPAT? CBP and Industry

More information

What is C-TPAT? Customs Trade Partnership Against Terrorism

What is C-TPAT? Customs Trade Partnership Against Terrorism Learning Objectives What is C-TPAT? Terrorist Awareness Supply Chain Security Container Security Program 7 Point Inspection Seal Program Locks, Keys & Access Control / Visitor Controls Pre-Employment Verifications

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks

More information

C-TPAT Customs Trade Partnership Against Terrorism

C-TPAT Customs Trade Partnership Against Terrorism Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Trucker) Please answer the following questions about your company s cargo security processes and participation

More information

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards September 2010 SURGE logistics- GSProgress Inc. 1000 Potomac Street NW The Flour Mill Building Washington,

More information

C-TPAT Security Criteria Sea Carriers

C-TPAT Security Criteria Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and

More information

C-TPAT Executive Summary

C-TPAT Executive Summary C-TPAT Executive Summary Customs and Border Protection (CBP) established the Customs-Trade Partnership against Terrorism (C-TPAT) as part of a comprehensive strategy designed to enhance national security

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

Best Practices For. Supply Chain Security

Best Practices For. Supply Chain Security Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Partners in Protection / C-TPAT Supply Chain Security Questionnaire Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

FAST. Highway Carrier Application Process. BSF5106(E) Rev. 09

FAST. Highway Carrier Application Process. BSF5106(E) Rev. 09 FAST Highway Carrier Application Process BSF5106(E) Rev. 09 Available on-line only. La version française de cette publication est intitulée EXPRES Processus de traitement des demandes de participation

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

THE BENEFIT OF ADOPTING SECURITY MEASURES

THE BENEFIT OF ADOPTING SECURITY MEASURES HOW C-TPAT IDENTIFIES BEST PRACTICES Best practices in a general sense are innovative security measures that exceed the C-TPAT minimum security criteria and industry standards. In order for best practices

More information

Best Practices C-TPAT 5-Step Risk Assessment Process

Best Practices C-TPAT 5-Step Risk Assessment Process Best Practices C-TPAT 5-Step Risk Assessment Process 17 th Annual T&T Conference April 3, 2013 Karen Lobdell Director Global Solutions Integration Point 1 Is This Your Current Process? 2 CBP s Approach

More information

Costs and Benefits of Investing in Supply Chain Security Measures: Case Studies of Successful Experiences by Private Sector

Costs and Benefits of Investing in Supply Chain Security Measures: Case Studies of Successful Experiences by Private Sector 2008/SOM3/CTTF/STAR/010 Session: 10 Costs and Benefits of Investing in Supply Chain Security Measures: Case Studies of Successful Experiences by Private Sector Submitted by: World BASC Organization 6 th

More information

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen

More information

Developing a Security Training and Awareness Program

Developing a Security Training and Awareness Program Developing a Security Training and Awareness Program Text Slide DEVELOPING AND ENHANCING SECURITY TRAINING AND AWARENESS PROGRAMS One Way of Enhancing Supply Chain Security Efficiency is Through Security

More information

TKMNA Carrier/Forwarder C-TPAT Security Questionnaire

TKMNA Carrier/Forwarder C-TPAT Security Questionnaire Carrier/Forwarder: Address: Address: Intent: TKMNA has committed to participation in the Customs Trade Partnership Against Terrorism (CTPAT) Program administered by Customs. CTPAT is a supply chain security

More information

Corporate Basel, 2015. Panalpina Security. "Adding value, while ensuring our customers' products are safe and secure"

Corporate Basel, 2015. Panalpina Security. Adding value, while ensuring our customers' products are safe and secure Corporate Panalpina Security "Adding value, while ensuring our customers' products are safe and secure" 2 Corporate security mission & objective Panalpina Corporate Security has the primary goal to provide

More information

Customs & Trade Partnership Against Terrorism (C TPAT)

Customs & Trade Partnership Against Terrorism (C TPAT) Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

The Authorized Economic Operator and the Small and Medium Enterprise FAQ

The Authorized Economic Operator and the Small and Medium Enterprise FAQ The Authorized Economic Operator and the Small and Medium Enterprise FAQ May 2010 Copyright 2010 World Customs Organization. All rights reserved. Requests and inquiries concerning translation, reproduction

More information

Risk-Based Approach to Managing Supply Chain Security and Compliance

Risk-Based Approach to Managing Supply Chain Security and Compliance Risk-Based Approach to Managing Supply Chain Security and Compliance Supply chain security remains a U.S. policy priority, and the U.S. Government continues to work closely with the trade community to

More information

MSC Security Program Security in the Logistics Supply Chain

MSC Security Program Security in the Logistics Supply Chain Maritime Security Council L MSC Security Program Security in the Logistics Supply Chain First Hemispheric Convention on Port Logistics and Competitiveness Ixtapa-Zihuatanejo November 3-5, 2010 Talking

More information

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE

DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE DEFENSE SUPPLY CHAIN SECURITY & RISK MANAGEMENT: PRINCIPLES & PRACTICE Lisa Harrington President, lharrington group llc Associate Director Supply Chain Management Center Robert H. Smith School of Business

More information

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers CVS Pharmacy C-TPAT Requirements For Import Product Suppliers To Our Import Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with

More information

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012 Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012 This template is a tool that was developed In order to assist manufacturer clients with the application

More information

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various

More information

Supply Chain Security Best Practices Catalog. Customs-Trade Partnership Against Terrorism (C-TPAT)

Supply Chain Security Best Practices Catalog. Customs-Trade Partnership Against Terrorism (C-TPAT) Supply Chain Security Best Practices Catalog Customs-Trade Partnership Against Terrorism (C-TPAT) c o n t e n t S Prologue............................................................. iii Introduction...........................................................

More information

Supply Chain Security. Greg Stein Global Trade Compliance

Supply Chain Security. Greg Stein Global Trade Compliance Supply Chain Security Greg Stein Global Trade Compliance November 12, 2015 Agenda Brand Protection & Supply Chain Security Risks Points Common issues to the industry SanDisk Supply Chain Security and Risks

More information

World Customs Organization

World Customs Organization World Customs Organization The Authorised Economic Operator, the Authorised Person and the Authorised Operator ADB- WCO National Workshop on RKC implementation Thimphu, Bhutan, 10 June 2014 The SAFE Framework

More information

CVS Pharmacy C-TPAT Requirements For Product Suppliers

CVS Pharmacy C-TPAT Requirements For Product Suppliers CVS Pharmacy C-TPAT Requirements For Product Suppliers To Our Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with Customs-Trade

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS The requirements of these Oracle Global Supply Chain and High Value Asset Physical Security Standards apply to all geographical

More information

Hazardous Materials Transportation Security Planning

Hazardous Materials Transportation Security Planning Objectives To better understand security threats; To detail new security requirements; and To provide guidance and resources to assist in developing and adhering to a security plan. PART I Understanding

More information

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile October, 2012 Program Content Certified Company and New Certified Company Program (NEEC) Background General

More information

Contents. Global Security Verification (GSV) Standard. Introduction... 2. The Global Security Verification Criteria Implementation Guidance...

Contents. Global Security Verification (GSV) Standard. Introduction... 2. The Global Security Verification Criteria Implementation Guidance... Global Security Verification (GSV) Standard Contents Introduction.................................... 2 The Global Security Verification Criteria Implementation Guidance......................................

More information

Hazardous Materials Security Awareness

Hazardous Materials Security Awareness Hazardous Materials Security Awareness Security Awareness Objectives Provide employees with skills to: Identify hazardous materials (hazmat) security risks Improve transportation security Recognize and

More information

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.

More information

Key Small Parcel Requirements

Key Small Parcel Requirements Key RECIPIENT INFORMATION Enter the KLX facility address or destination location. PACKAGE WEIGHT & SIZE Individual package weight up to 150 lbs. (pounds) Maximum dimensions 180 in length, 165 in length

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached.

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached. A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached. (Including: Highway / Sea / Air / Rail Carriers, Carrier-Forwarders, Consolidators, NVOCCs, and Others.)

More information

AEO SELF ASSESSMENT. Mauro Giffoni

AEO SELF ASSESSMENT. Mauro Giffoni AEO SELF ASSESSMENT Mauro Giffoni AEO Self Assessment is a practical tool to enable an economic operator to perform a self-assessment Questionnaire developed by the WCO Provide the appropriate information

More information

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody Banks are normally sought out by importers who need financing. Traditionally the financing has usually been through

More information

UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS

UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS A discussion about the challenges, impacts and opportunities for the security of supply chain management systems MARCH 2010 AUTHORS Chris

More information

Jordan s electronic transit monitoring and facilitation system

Jordan s electronic transit monitoring and facilitation system World Customs Journal Jordan s electronic transit monitoring and facilitation system Abstract Arif A Alfitiani Like most countries with numerous international borders, Jordan has adopted a number of different

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: 16 March 2010 Table of Contents Topic Introduction 1. Plan administration a. Plan management b. Roles and responsibilities c. Reporting procedures d. Self assessments

More information

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the

More information

Managing Risk in the Global Supply Chain

Managing Risk in the Global Supply Chain Managing Risk in the Global Supply Chain Introduction As supply chains grow more complex, they become more vulnerable to disruptions. Questionable supplier performance, natural disasters, in-transit risks,

More information

With Satellite Technology

With Satellite Technology Containing Cargo Theft... With Satellite Technology author: Anu Sood, SkyWave Mobile Communications Cargo theft is an international phenomenon. While no definitive statistics are available as to how much

More information

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing

Cyber Security through Education & Awareness. KSU Police Converged Security: A holistic approach to cyber safety and security. Community Policing KSU Police Converged Security: A holistic approach to cyber safety and security Cyber Security through Education & Awareness by Community Policing Community Policing Community Policing Initial meeting

More information

C-TPAT: What Every Security Executive Should Know

C-TPAT: What Every Security Executive Should Know C-TPAT: What Every Security Executive Should Know Barry Brandman President Danbee Investigations Fair Lawn, NJ SPONSOR LOGO C-TPAT: What Every Security Executive Should Know In this session, you will learn:

More information

C-TPAT Expectations for Agents, Vendors & Manufactures

C-TPAT Expectations for Agents, Vendors & Manufactures C-TPAT Expectations for Agents, Vendors & Manufactures For Distribution to all new and existing Fred s Incorporated Import related Business Partners Published October, 2012 Version: 1.3 Revised: 06-27-2013

More information

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.

More information

C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM

C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM Valued Customer; Elements International has recently joined with Customs Border Patrol (CBP) through the C-TPAT program in attempt to strengthen our supply

More information

Click to edit Master title style. Columbus Importer & Broker Association Jul 17 th

Click to edit Master title style. Columbus Importer & Broker Association Jul 17 th Click to edit Master title style Columbus Importer & Broker Association Jul 17 th 2012 www.jacobsonco.com Click Agenda to edit Master title style Introduction What is C-TPAT? Participants Requirements

More information

C-TPAT: Customs Trade Partnership Against Terrorism. A New Environment

C-TPAT: Customs Trade Partnership Against Terrorism. A New Environment C-TPAT: Customs Trade Partnership Against Terrorism A New Environment Outline Mallory Alexander Introduction Initiatives to Improve Security What is C-TPAT? 3-Tiered Benefits Concerns for non-participants

More information

Seals Security & Best Practices

Seals Security & Best Practices Seals Security & Best Practices Presented by Raymond Monzon Supply Chain Security Specialist Miami C-TPAT Field Office What Will Be Covered Intro This presentation will cover: C-TPAT Criteria ISO Seals

More information

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721

Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Sierra College ADMINISTRATIVE PROCEDURE No. AP 3721 Electronic Information Security and Data Backup Procedures Date Adopted: 4/13/2012 Date Revised: Date Reviewed: References: Health Insurance Portability

More information

Jordan customs Electronic Transit Monitoring and Facilitation System (Jordan model)

Jordan customs Electronic Transit Monitoring and Facilitation System (Jordan model) Jordan customs Electronic Transit Monitoring and Facilitation System (Jordan model) Supply chain Security and Facilitations measures taken by Jordan customs To ensure its move towards effective and efficient

More information

CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE

CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE PRESENTER BACKGROUND Sgt. Ken Huerta 25 Years, Port of Los Angeles Police Cargo Theft Interdiction Program Cargo Criminal Apprehension Team Criminal Investigations

More information

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM

Business. Security Tips. Smarter Ways To Help Protect Your Business. Safer. Smarter. Tyco. TM Business Security Tips Smarter Ways To Help Protect Your Business / Deterrence / is smarter deterrence external threats Make It Difficult For Criminals To Get Into Your Business. Locks, Lighting And Landscaping

More information

September 25, 2013. Dear Mr. Lewis:

September 25, 2013. Dear Mr. Lewis: 1300 Pennsylvania Ave. NW, Rm. 2.2A Washington, DC 20229 September 25, 2013 Mr. Bruce C Lewis Manager, Global Security Compliance & Corporate Security Fairchild Semiconductor Corporation 82 Running Hill

More information

Amgen GLOBAL CORPORATE COMPLIANCE POLICY

Amgen GLOBAL CORPORATE COMPLIANCE POLICY 1. Scope Applicable to all Amgen Inc. and subsidiary or affiliated company staff members, consultants, contract workers and temporary staff worldwide ( Covered Persons ). Consultants, contract workers,

More information

Each time a driver crosses the international border, the driver must clear, or be released by, the customs agency of the country they are entering.

Each time a driver crosses the international border, the driver must clear, or be released by, the customs agency of the country they are entering. U.S.-CANADA CUSTOMS Falcon does a lot of business in Canada, both picking up and delivering. The company often runs loads across Canada between Buffalo, NY, and Detroit, MI, as Canadian routes are approximately

More information

Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper

Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield,

More information

Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling

Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling Linkages Between Terrorist and Organized Crime Groups in Nuclear Smuggling A Case Study of Chelyabinsk Oblast PONARS Policy Memo No. 392 Robert Orttung and Louise Shelley American University December 2005

More information

AEO Template Introduction

AEO Template Introduction AEO Template Introduction WCO Members recognize that global consistency of the approval process and enhanced benefits are essential to encouraging broad trade participation and realization of the mutual

More information

Cargo Theft Prevention and Risk Mitigation for the Holiday Season

Cargo Theft Prevention and Risk Mitigation for the Holiday Season Hanover Risk Solutions Cargo Theft Prevention and Risk Mitigation for the Holiday Season As the holiday season approaches, manufacturers warehouses are packed to capacity as high-season inventory begins

More information

CONTENTS. Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination...

CONTENTS. Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination... 1 CONTENTS Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination...Page 17 Topic 4:Disciplinary Practices...Page 18 Topic 5: Health and

More information

Certifying the Industrial Athlete of the Future. 2014 Edition

Certifying the Industrial Athlete of the Future. 2014 Edition Certifying the Industrial Athlete of the Future Work Standards Logistics 2014 Edition Manufacturing Skill Standards Council 1410 King St. Alexandria, VA 22314 www.msscusa.org Background The Manufacturing

More information