Outline for the CEN Supply chain security (SCS) Good Practices guidebook

Size: px
Start display at page:

Download "Outline for the CEN Supply chain security (SCS) Good Practices guidebook"

Transcription

1 Outline for the CEN Supply chain security (SCS) Good Practices guidebook Foreword: The purpose of this 7 page outline document is to provide a concrete basis for kicking off the development of the SCS Good Practices guidebook, as a collaborative effort between supply chain operators and experts in the field. Cross border Research Association (CBRA) research team would also like to thank all the CEN/TC 379 members who answered the survey (Sep Oct. 2010) helping to set priorities for the upcoming content. We are looking forward to having you and all other experts interested in the topic to work with us to develop the first draft book during Nov.2010 April All potential contributors, please contact us by cenbook@cross border.org, to get involved in the process! Preliminary table of content for the SCS guidebook Chapter 1. Introduction Scope and objectives for the good practices guidebook Chapter 2. Supply chain security management and crime prevention overview Chapter 3. Good SCS practices Set 1: Application of a holistic security management approach Chapter 4. Good SCS practices Set 2: Anecdotes/ short stories on crime incidents and security responses in Europe Chapter 5. Good SCS practices Set 3: Complying with SCS programs/standards/regulations in Europe Chapter 6. Good SCS practices Set 4: Any SCS management and crime prevention anecdotes from anywhere in the world Chapter 7. Summary and conclusions Bibliography, recommended readings Annexes

2 Chapter 1. Introduction Scope and objectives for the SCS Good Practices guidebook This SCS good practices book is aimed at collecting and presenting practical approaches enabling companies to manage risks related to supply chain crime in a cost efficient way. As stated by Menzer et al (2008), Supply Chain encompasses the planning and management of all activities involved in sourcing and procurement, conversion, demand creation and fulfillment, and all logistics activities. 1 The aim of security and operational management is to create and maintain systematic, coordinated, and cost effective activities and practices in order to prevent exploitation of supply chains for criminal purposes, and to enable quick response in case of a security breach. Crimes of interest include (among others): theft, counterfeiting, customs law violations, organized immigration crime, terrorism, and sabotage. Crimes can have intra and/or inter organizational impacts. The content of the good practices book is collected by means of comprehensive literature and standard reviews, and case company / supply chain interviews and written replies. The SCS standard review follows recommendations by the members and observers of CEN TC 379. The semi structured interviews aim at collecting experiences related to implemented security measures, contributing or preventing factors during the process and attained results. Due to the fact that connections between implemented security measures and their outcomes are contextdependent, part of the experiences are collected in the form of anecdotes, which include descriptions of the conditions under which the outcomes were achieved. Findings are compressed into the form of crime problem solving processes following continuous improvement principles. This should facilitate exploiting presented practices and processes inside normal quality improvement programs, decision making processes, and operational practices in companies. This should also help to fill traditional communication gaps between supply chain managers, risk managers, compliance managers, and security managers, amongst others. The good practices book considers existing standards, including EU AEO; ISO28000 Security in the Supply Chain, ISO31000 Guidance on Risk Management and ISO/PAS28002: Resilience in the Supply Chain, and other relevant security standards (EN, BS, and DIN standards) as potential sources for good practices, and the book provides examples on how to comply with such requirements for those interested in doing so (and, what the consequential benefits may be if such data is available). 1 Menzer, J.T. et al. (2001), Defining Supply Chain Management Journal of Business Logistics, 22(2), 1-25.

3 Chapter 2. Supply chain security (SCS) management and crime prevention overview The objective of this chapter is to inform readers about the most relevant frameworks, models, and reference standards of managing security of the supply chain. Risk management forms an important part of this overview chapter. Below, initial references are made to SARA approach and SCS management layers. During the book s development, this chapter will be expanded to cover other relevant aspects of SCS management and crime prevention in supply chains. For example, good practices discovered during ISO implementations 2 will be highlighted (subject to access to the data). Also, references to several annexes (preliminary list of annexes can be found at the end of this overview paper) will be made. SARA approach SARA presents good practices in crime prevention commonly used by police agencies in the United States, the United Kingdom, Canada, Scandinavia, Australia, and New Zealand. Early experiments can be traced back to the early 1980s. SARA is a problem solving approach, which uses the data to establish the existence and extent of a problem, analyze its nature and source, plan intervention measures to reduce it, and monitor and evaluate the effectiveness of the selected measures (Read and Tilley, ). It emphasizes the transfer and sharing of crime prevention knowledge. SARA is a generic problem solving tool, which enables one to connect specific crime types, specific contexts, appropriate security measures, and observed outcomes. SARA resembles the risk management principles of ISO 31000, Total Quality Management (TQM), and Continuous Improvement, and exploits opportunity reducing crime preventive techniques. SARA consists of four phases (Clarke and Eck, ): 1. Carefully defining the specific problems (Scan) 2. Conducting an in depth analyses to understand their generative mechanisms (Analysis) 3. Undertaking broad searches for solutions to disable causes (Response) 4. Evaluation of the result (Assessment) 2 ISO 28000:2007, Specification for security management systems for the supply chain; ISO 28001:2007, Security management systems for the supply chain Best practices for implementing supply chain security Assessments and plans Requirements and guidance; ISO 28004:2007, Security management systems for the supply chain Guidelines for the implementation of ISO Read T., Tilley N. Not Rocket Science? Problem Solving and Crime Reduction (2000) London: Home Office. Crime Reduction Research Series Paper 6 4 Clarke, R.V.and Eck, J. (2003) Becoming a problem solving crime analyst in 55 small steps. London: UCL Jill Dando Institute

4 SCS management layers Regarding the SARA Step 3 explained above, the following 7 layer SCS management model is applied as a reference in this good practices guidebook (adapted from Hintsa J., ): 1. Design and planning layer: designing sourcing (countries) and transport (routes) to minimize risks; creating and updating security, disaster recovery, training, and audit plans. 2. Process control layer: managing key business processes, creating visibility into them, monitoring for deviations, and providing stability/minimizing variations (in time, quality, etc.) 3. Supply chain assets layer: securing facilities, vehicles, shipments, products, data systems, and data by exploiting a broad set of security procedures, technologies, and solutions. 4. Human resources layer: checking backgrounds, training, and motivating personnel; protecting them against blackmail, kidnapping, etc.; minimizing the risk of insider crime. 5. Business partners layer: selection process for business partners; requirements for SCS certifications; and monitoring and audit activities. 6. Aftermath capabilities layer: ensuring post incident recovery with minimum supply chain disruptions; developing competences for investigations, evidence collection, and court procedures. 7. Disrupting criminal activities layer: causing problems in the illicit supply chains, by influencing supply (e.g., counterfeit factories), production, logistics operations, and distribution (e.g., awareness campaigns) 5 Hintsa J. Post-2001 Supply chain security private sector implication. Doctoral thesis manuscript submitted to the thesis jury. Oct.2010

5 Chapter 3. Good SCS practices Set 1: Application of a holistic security management approach This data is collected by means of semi structured interviews. Interview questions confine the whole security management process starting from (a) identification and defining of the problem, (b) analysis of the nature and extent of the problem, (c) generations of alternative security measures and evaluation of trade offs, and (d) assessing costs and benefits. The following list of questions may be regarded as an example: 1. What did your company do to enhance security in the supply chain? 2. Why did your company take the action (specific crime incident in own organization; specific crime incident in other organization; crimes exceeded the acceptable level; management interest to secure supply chains against potential crime incidents; systematic management process to identify deviations which revealed a possible vulnerability; increased risk level because of entering new sourcing or manufacturing countries, or transport routes; pressure to comply with an existing SCS standard or regulation, etc.)? 3. Did you have practices which contributed to or exacerbated the problem(s) or otherwise made it more difficult to solve the problem(s) (organizational barriers; lack of management commitment; reluctance to follow security requirements on every organizational level; inadequate audit methods, etc.)? If yes, how did you manage to overcome them? 4. What kind of targets and measurements were set (e.g., declined specific crime incident level; better facility and asset utilization; compliance with governmental regulations or programs; lower insurance fees, etc.)? How were such positive effects measured? 5. What kind of alternative security measures were generated and how did you select the implemented security measures? How were the selected security measures expected to work (make it harder to commit a crime; increase a perceived risk of being caught; reduce the anticipated rewards from the crime related activity; remove reasons to commit crime, etc.)? 6. How did the security measures work in practice (fully eliminated the problem; substantially reduced the problem; reduced the consequences caused by the problem; dealt with a problem more efficiently; transferred the problem to other areas of the supply chain or onto others, etc.)? 7. What type of costs were experienced during and after the implementation of new measure(s) (Investment costs; operational costs; maintenance costs, etc.)? Can you quantify any of them? 8. Did the security measures have any positive side effects (better visibility and operational control; better customer satisfaction; fewer governmental inspections; reduced insurance premiums, etc.)? How were these effects measured? 9. Did the security measures have any negative or reverse effects (impact on employee morale; negative impact on environment; displacement of crime to other areas, types, etc.)?

6 Chapter 4. Good SCS practices Set 2: Anecdotes/ short stories on crime incidents and security responses in Europe This chapter presents a collection of short stories regarding crime incidents and security responses in European supply chains, with the following basic structure: - What happened, what was the trigger (the incident; management attention, etc.)? - Why was it important to act (to do something about it)? - What was done (the security response)? - How was it done when by whom? - What were the outcomes (both positive and negative ones)? Chapter 5. Good SCS practices Set 3: Complying with SCS programs/standards/regulations in Europe Existing SCS initiatives, including the EU AEO program and ISO2800 series, are not selfexplanatory and self executing programs. On the contrary, they often present a framework where compliance with requirements can be attained in several ways. These initiatives often introduce new tasks involving many people at different levels of the organisation. For example, the EU AEO program relates to manufacturing, logistics, financial administration, legal affairs and agreements, social responsibilities and governmental relationships, human resources, supplier relationship, security, and risk management. In this chapter, examples are presented on how different types of companies have managed EU AEO, ISO28000, and other relevant SCS implementation processes, highlighting problems and solutions of potential broader interest and relevance. Chapter 6. Good SCS practices Set 4: Any SCS management and crime prevention anecdotes from anywhere in the world (this chapter is optional, tbd later)

7 Chapter 7. Summary and conclusions The actual summary and conclusions can be written only towards the end of the book development project. This good practices guidebook helps companies operating in supply chains to enhance their SCS management processes, methods, and techniques: - All actors in supply chains, including companies with cargo interest/ownership and logistics service providers. - All sizes of companies, especially small and medium sized enterprises (SMEs) (this is based on the quick survey in Sep Oct.2010) The good practices presented in this book have helped (the case) companies in the past to 6 : - reduce opportunities for crime and/or actual crime incidents in the supply chain (as the main priority based on the quick survey in Sep Oct.2010); and/or - comply with existing SCS initiatives (standards, regulations, etc.) The good SCS practices shared in this guidebook were not invented by experts in the domain (including security consultants or academics), but they were real implementations of various SCS management approaches in real supply chains. 7 Risk management has played an important role throughout the guidebook. Bibliography, recommended readings To be added later Annexes Preliminary list of annexes for the book Annex 1. Template/questionnaire for collecting SCS good practice cases and anecdotes Annex 2. Crime in supply chains, taxonomy and definitions Annex 3. Security measures in supply chains, taxonomy and examples Annex 4. Selected SCS programs and standards, overview and requirements Annex 5. Technical norms in security management; EN, DIN, BSI, etc. 6 One should note that all the good practices described in this guidebook are context dependent (at least to some extent), thus there is no guarantee that they produce similar results in a new situation (time, mode, location, commodity type etc.). 7 One should note that subjective aspects of many of the good practices could not be avoided, due to the complexities in measuring (and verifying) the actual implications (or benefits) of SCS measures implemented.

Keywitness: Towards illicit <> security @ crossborder supply chains -research frameworkto support assessment of research gaps and setting up of

Keywitness: Towards illicit <> security @ crossborder supply chains -research frameworkto support assessment of research gaps and setting up of Keywitness: Towards illicit security @ crossborder supply chains -research frameworkto support assessment of research gaps and setting up of priorities, in the context of customs risk management & future

More information

Supply Chain Security Training Needs for Law Enforcement Agencies

Supply Chain Security Training Needs for Law Enforcement Agencies Supply Chain Security Training Needs for Law Enforcement Agencies Presented by Dr. Juha Hintsa, CBRA 1st CORE SUPPLY CHAIN FORUM, Transport & Logistics Fair September 24, 2015, Antwerp. HICL2015 Authors:

More information

Risk-Based Approach to Managing Supply Chain Security and Compliance

Risk-Based Approach to Managing Supply Chain Security and Compliance Risk-Based Approach to Managing Supply Chain Security and Compliance Supply chain security remains a U.S. policy priority, and the U.S. Government continues to work closely with the trade community to

More information

TECHNICAL BOARD BT N 9776. Draft BT C135/2014. CEN/BT by correspondence. For vote Issue date: 2014-11-19

TECHNICAL BOARD BT N 9776. Draft BT C135/2014. CEN/BT by correspondence. For vote Issue date: 2014-11-19 BT N 9776 Draft BT C135/2014 TECHNICAL BOARD CEN/BT by correspondence For vote Issue date: 2014-11-19 Simultaneous circulation to CENELEC/BT Deadline: 2015-02-17 SUBJECT Creation of a new CEN/TC Private

More information

This is a free 9 page sample. Access the full version online. AS/NZS ISO 31000:2009 Risk management Principles and guidelines

This is a free 9 page sample. Access the full version online. AS/NZS ISO 31000:2009 Risk management Principles and guidelines AS/NZS ISO 31000:2009 Risk management Principles and guidelines AS/NZS ISO 31000:2009 This Joint Australian/New Zealand Standard was prepared by Joint Technical Committee OB-007, Risk Management. It was

More information

Costs and Benefits of Investing in Supply Chain Security Measures: Case Studies of Successful Experiences by Private Sector

Costs and Benefits of Investing in Supply Chain Security Measures: Case Studies of Successful Experiences by Private Sector 2008/SOM3/CTTF/STAR/010 Session: 10 Costs and Benefits of Investing in Supply Chain Security Measures: Case Studies of Successful Experiences by Private Sector Submitted by: World BASC Organization 6 th

More information

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards September 2010 SURGE logistics- GSProgress Inc. 1000 Potomac Street NW The Flour Mill Building Washington,

More information

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015 Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.

More information

The Authorized Economic Operator and the Small and Medium Enterprise FAQ

The Authorized Economic Operator and the Small and Medium Enterprise FAQ The Authorized Economic Operator and the Small and Medium Enterprise FAQ May 2010 Copyright 2010 World Customs Organization. All rights reserved. Requests and inquiries concerning translation, reproduction

More information

Information for Schools and Colleges. So you want to. Know more about the BS EN ISO 9000:2000 family of quality management system standards

Information for Schools and Colleges. So you want to. Know more about the BS EN ISO 9000:2000 family of quality management system standards Information for Schools and Colleges So you want to Know more about the BS EN ISO 9000:2000 family of quality management system standards A brief history of BS EN ISO 9000:2000 From the 1920 s to the 1940

More information

Reputation. Further excellence. business continuity. risk management. Data security

Reputation. Further excellence. business continuity. risk management. Data security Reputation competitive advantage speed to market safety Further excellence trust Data security risk management business continuity HOW CAN YOU CREATE AND SECURE SUSTAINABLE BUSINESS? SOLUTIONS FOR MANAGING

More information

BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI

BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI BS EN 16001 Energy Management Systems VICTORIA BARRON, PRODUCT MARKETING MANAGER, BSI Agenda Energy Management in context Why Energy Management? Business Needs How BS EN 16001 helps organisations meet

More information

Survey report on Nordic initiative for social responsibility using ISO 26000

Survey report on Nordic initiative for social responsibility using ISO 26000 Survey report on Nordic initiative for social responsibility using ISO 26000 2013 Contents SUMMARY... 3 1. INTRODUCTION... 4 1.1 Objective of the survey... 4 1.2 Basic information about the respondents...

More information

Infusing Technology to Mitigate Risk in the Supply Chain

Infusing Technology to Mitigate Risk in the Supply Chain W H I T E P A P E R Infusing Technology to Mitigate Risk in the Supply Chain Lean, efficient, and secure supply chains are the lifeblood of most retail organizations. Supply chain management key tasks

More information

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody Banks are normally sought out by importers who need financing. Traditionally the financing has usually been through

More information

SCOTTISH CHILDREN S REPORTER ADMINISTRATION

SCOTTISH CHILDREN S REPORTER ADMINISTRATION Part 1 - Policy for Fraud Prevention, Detection and Investigation 1. Introduction 1.1 SCRA like other public bodies, has a duty to conduct its affairs in a responsible and transparent way and to take into

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Australian Standard. Information technology Service management. Part 2: Guidance on the application of service management systems

Australian Standard. Information technology Service management. Part 2: Guidance on the application of service management systems ISO/IEC 20000-2:2012 AS ISO/IEC 20000.2 2013 Australian Standard Information technology Service Part 2: Guidance on the application of service systems This Australian Standard was prepared by Committee

More information

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN

5957/1/10 REV 1 GS/np 1 DG H 2 B LIMITE EN COUNCIL OF THE EUROPEAN UNION Brussels, 8 March 2010 5957/1/10 REV 1 LIMITE CRIMORG 22 ENFOPOL 32 NOTE from: to: Subject: Presidency Multidisciplinary Group on Organised Crime (MDG) Draft Council Conclusions

More information

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY BRIEFING 1083.4 Supply Chain Integrity and Security. A new series of general informational chapters describing various aspects of the pharmaceutical supply chain replaces Good Distribution Practices Supply

More information

Audit summary of Security of Infrastructure Control Systems for Water and Transport

Audit summary of Security of Infrastructure Control Systems for Water and Transport V I C T O R I A Victorian Auditor-General Audit summary of Security of Infrastructure Control Systems for Water and Transport Tabled in Parliament 6 October 2010 Background Infrastructure critical to the

More information

Security Risk Assessment Tool

Security Risk Assessment Tool Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of

More information

The Proposed Quality Competency Framework for the Future Quality Professional

The Proposed Quality Competency Framework for the Future Quality Professional The Proposed Quality Competency Framework for the Future Quality Professional Ian R McKay FCQI CQP CQI Competency Project Lead 1 The CQI Definition of Quality 2 The CQI Competency Project 2012 The CQI

More information

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES

APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES APICS INSIGHTS AND INNOVATIONS SUPPLY CHAIN RISK CHALLENGES AND PRACTICES APICS INSIGHTS AND INNOVATIONS ABOUT THIS REPORT This report examines the role that supply chain risk management plays in organizations

More information

Is securing personal information a priority? Reassure clients and achieve data protection compliance with BS 10012

Is securing personal information a priority? Reassure clients and achieve data protection compliance with BS 10012 Is securing personal information a priority? Reassure clients and achieve data protection compliance with BS 10012 Make protection of personal information your priority and safeguard your reputation. Comply

More information

GFMAM Competency Specification for an ISO 55001 Asset Management System Auditor/Assessor First Edition, Version 2

GFMAM Competency Specification for an ISO 55001 Asset Management System Auditor/Assessor First Edition, Version 2 GFMAM Competency Specification for an ISO 55001 Asset Management System Auditor/Assessor First Edition, Version 2 English Version PDF format only ISBN 978-0-9871799-5-1 Published April 2014 www.gfmam.org

More information

TEAM PRODUCTIVITY DEVELOPMENT PROPOSAL

TEAM PRODUCTIVITY DEVELOPMENT PROPOSAL DRAFT TEAM PRODUCTIVITY DEVELOPMENT PROPOSAL An initial draft proposal to determine the scale, scope and requirements of a team productivity development improvement program for a potential client Team

More information

C-TPAT Customs Trade Partnership Against Terrorism

C-TPAT Customs Trade Partnership Against Terrorism Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers

More information

European Code for Export Compliance

European Code for Export Compliance European Code for Export Compliance EU-CEC European Institute For Export Compliance EU-ECF EU Export Compliance Framework: EU Export Compliance Charter The European Code for Export Compliance EU-CEC 1.

More information

Global framework. Safety, health and security for work-related international travel and assignments

Global framework. Safety, health and security for work-related international travel and assignments Global framework Safety, health and security for work-related international travel and assignments 3 Global framework Safety, health and security for work-related international travel and assignments International

More information

How companies leverage quality and quality certifications to achieve competitive advantage

How companies leverage quality and quality certifications to achieve competitive advantage How companies leverage quality and quality certifications to achieve competitive advantage Eize de Boer Systems & Services Certification International Business Development Manager Pharma Supply Chain for

More information

ROADMAP. A. Context and problem definition

ROADMAP. A. Context and problem definition TITLE OF THE INITIATIVE ROADMAP Commission Communication on EU Risk management and supply chain security LEAD DG RESPONSIBLE UNIT TAXUD B2 DATE OF ROADMAP 10 / 2012 This indicative roadmap is provided

More information

Invoice Only PROFILE DESCRIPTION

Invoice Only PROFILE DESCRIPTION CEN/ISSS WS/BII04 Invoice Only PROFILE DESCRIPTION Business Domain: Post award procurement Business Process: Billing Document Identification: CEN/ISSS WS/Profile BII04 Version: 1.0 Release: 2009-11-05

More information

ISO/IEC/IEEE 29119 The New International Software Testing Standards

ISO/IEC/IEEE 29119 The New International Software Testing Standards ISO/IEC/IEEE 29119 The New International Software Testing Standards Stuart Reid Testing Solutions Group 117 Houndsditch London EC3 UK Tel: 0207 469 1500 Fax: 0207 623 8459 www.testing-solutions.com 1 Stuart

More information

Information Security Team

Information Security Team Title Document number Add document Document status number Draft Owner Approver(s) CISO Information Security Team Version Version history Version date 0.01-0.05 Initial drafts of handbook 26 Oct 2015 Preface

More information

Information Security Program CHARTER

Information Security Program CHARTER State of Louisiana Information Security Program CHARTER Date Published: 12, 09, 2015 Contents Executive Sponsors... 3 Program Owner... 3 Introduction... 4 Statewide Information Security Strategy... 4 Information

More information

Moving from BS 25999-2 to ISO 22301. The new international standard for business continuity management systems. Transition Guide

Moving from BS 25999-2 to ISO 22301. The new international standard for business continuity management systems. Transition Guide Transition Guide Moving from BS 25999-2 to ISO 22301 The new international standard for business continuity management systems Extract from The Route Map to Business Continuity Management: Meeting the

More information

The World Economic Forum: Non-profit community of leaders from business, government and civil society

The World Economic Forum: Non-profit community of leaders from business, government and civil society Trade & Risk The World Economic Forum: Non-profit community of leaders from business, government and civil society Communities Impact Interaction Insight Recent supply chain-related initiatives Humanitarian

More information

Social Media: A Platform to Increase Sales and Visibility

Social Media: A Platform to Increase Sales and Visibility www.niit-tech.com Social Media: A Platform to Increase Sales and Visibility Prachee Gupta NIIT Technologies White Paper CONTENTS Introduction 3 What is Social Media for Insurers 3 Engaging on Social Media

More information

Procurement Policy Note Use of Cyber Essentials Scheme certification

Procurement Policy Note Use of Cyber Essentials Scheme certification Procurement Policy Note Use of Cyber Essentials Scheme certification Action Note 09/14 25 September 2014 Issue 1. Government is taking steps to further reduce the levels of cyber security risk in its supply

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

Computer Security Lecture 13

Computer Security Lecture 13 Computer Security Lecture 13 Risk Analysis Erland Jonsson (based on material from Lawrie Brown) Department of Computer Science and Engineering Chalmers University of Technology Sweden Security Management

More information

The Asset Management Landscape

The Asset Management Landscape The Asset Management Landscape ISBN 978-0-9871799-1-3 Issued November 2011 www.gfmam.org The Asset Management Landscape www.gfmam.org ISBN 978-0-9871799-1-3 Published November 2011 This version replaces

More information

I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L

I S O I E C 2 7 0 0 2 2 0 1 3 I N F O R M A T I O N S E C U R I T Y A U D I T T O O L 15.1 ESTABLISH SECURITY AGREEMENTS WITH SUPPLIERS 15.1.1 EXPECT SUPPLIERS TO COMPLY WITH RISK MITIGATION AGREEMENTS Do you clarify the information security risks that exist whenever your suppliers have

More information

Security Management of Government Buildings

Security Management of Government Buildings GUIDELINE Security Management of Government Buildings The Queensland Government has a responsibility to ensure its services are resilient to all foreseeable risks. In the context of security management,

More information

16) QUALITY MANAGEMENT SYSTEMS

16) QUALITY MANAGEMENT SYSTEMS INTRODUCTION 16) QUALITY MANAGEMENT SYSTEMS The aim of this paper is to give a brief introduction to the idea of a quality management system and specifically in ISO 9001:2000: Quality Management System.

More information

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT

CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14

More information

This is a free 9 page sample. Access the full version online. AS/NZS ISO 31000:2009 Risk management Principles and guidelines

This is a free 9 page sample. Access the full version online. AS/NZS ISO 31000:2009 Risk management Principles and guidelines AS/NZS ISO 31000:2009 Risk management Principles and guidelines AS/NZS ISO 31000:2009 This Joint Australian/New Zealand Standard was prepared by Joint Technical Committee OB-007, Risk Management. It was

More information

Chapter 10 Transportation Managing the Flow of the Supply Chain

Chapter 10 Transportation Managing the Flow of the Supply Chain Chapter 10 Transportation Managing the Flow of the Supply Chain Transportation involves the physical movement of goods between origin and destination points. The transportation system links geographically

More information

HKCS RESPONSE COMMONLY ACCEPTED AUDIT OR ASSESSMENT MECHANISM TO CERTIFY INFORMATION SECURITY STANDARDS

HKCS RESPONSE COMMONLY ACCEPTED AUDIT OR ASSESSMENT MECHANISM TO CERTIFY INFORMATION SECURITY STANDARDS Hong Kong Computer Society Room 1915, 19/F, China Merchants Tower, Shun Tak Centre, 168 Connaught Road Central, Hong Kong Tel: 2834 2228 Fax: 2834 3003 URL: http://www.hkcs.org.hk Email: hkcs@hkcs.org.hk

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

Title: Rio Tinto management system

Title: Rio Tinto management system Standard Rio Tinto management system December 2014 Group Title: Rio Tinto management system Document No: HSEC-B-01 Standard Function: Health, Safety, Environment and Communities (HSEC) No. of pages: 23

More information

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence

EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...

More information

How to gain and maintain ISO 27001 certification

How to gain and maintain ISO 27001 certification Public How to gain and maintain ISO 27001 certification Urpo Kaila, Head of Security CSC IT Center for Science ltd. urpo.kaila@csc.fi, security@csc.fi GÉANT SIG ISM 1 st Workshop, 2015-05-12, imperial.ac.uk

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit

Walton Centre. Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt. Monitoring & Audit Page 1 Walton Centre Monitoring & Audit Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt Page 2 Table of Contents Section Contents 1 Introduction 2 Responsibilities Within This

More information

Bedfordshire Fire and Rescue Authority Corporate Services Policy and Challenge Group 9 September 2014 Item No. 6

Bedfordshire Fire and Rescue Authority Corporate Services Policy and Challenge Group 9 September 2014 Item No. 6 For Publication Bedfordshire Fire Rescue Authority Corporate Services Policy Challenge Group 9 September 2014 Item No. 6 REPORT AUTHOR: SUBJECT: ASSISTANT CHIEF OFFICER (HUMAN RESOURCES AND ORGANISATIONAL

More information

Preparing yourself for ISO/IEC 27001 2013

Preparing yourself for ISO/IEC 27001 2013 Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys (edwardj7@msn.com) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,

More information

MANAGEMENT SYSTEMS CERTIFICATION

MANAGEMENT SYSTEMS CERTIFICATION MANAGEMENT SYSTEMS CERTIFICATION VCA - Delivering a Safer Environment VCA - Delivering a Safer Environment 1 Contents Pg 2 Formal Certification - Burden or Benefit? 4 Why VCA? 6 ISO 14001 8 Acorn (A Phased

More information

Critical Infrastructure Private Guarding Company Requirements Checklist

Critical Infrastructure Private Guarding Company Requirements Checklist Critical Infrastructure Private Guarding Company Requirements Checklist Introduction 1. Secure and protected critical infrastructure sites are vital to the security and stability of each EU Member State

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

COMPANY PROFILE REV 4.0

COMPANY PROFILE REV 4.0 COMPANY PROFILE REV 4.0 Company Background and Core Values Secor is a highly innovative company based in Lebanon and Dubai, focusing on the exploding market of the information security in the Middle East

More information

Part I Assessing the Economic Impact, Comments on the Coordination and Strategic Planning of the Federal Effort

Part I Assessing the Economic Impact, Comments on the Coordination and Strategic Planning of the Federal Effort To: Re: Office of Management and Budget, Executive Office of the President, Intellectual Property Rights Enforcement Coordinator, Victoria A. Espinel Intellectualproperty@omb.eop.gov Part I Assessing the

More information

Risk Assessments and Risk Based Supply Chain Security. March, 2010

Risk Assessments and Risk Based Supply Chain Security. March, 2010 Risk Assessments and Risk Based Supply Chain Security March, 2010 What is Risk? What a Risk Assessment Isn t What a Risk Assessment Is How does the Risk Assessment fit into the C-TPAT program? How can

More information

For the Design, Installation, Commissioning & Maintenance of Fixed Gaseous Fire Suppression Systems

For the Design, Installation, Commissioning & Maintenance of Fixed Gaseous Fire Suppression Systems BAFE Scheme: SP203-3 Version 1: July 2008 Amendment No: 1 Fire Protection Industry Scheme, Reference SP203 Part 3 For the Design, Installation, Commissioning & Maintenance of Fixed Gaseous Fire Suppression

More information

UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS

UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS UNDERSTANDING THE SUPPLY CHAIN SECURITY CERTIFICATION STANDARDS A discussion about the challenges, impacts and opportunities for the security of supply chain management systems MARCH 2010 AUTHORS Chris

More information

ICH guideline Q10 on pharmaceutical quality system

ICH guideline Q10 on pharmaceutical quality system September 2015 EMA/CHMP/ICH/214732/2007 Committee for Human Medicinal Products Step 5 Transmission to CHMP May 2007 Transmission to interested parties May 2007 Deadline for comments November 2007 Final

More information

BUSINESS CONTINUITY POLICY

BUSINESS CONTINUITY POLICY BUSINESS CONTINUITY POLICY Document Type Corporate Policy Unique Identifier CO-038 Document Purpose To provide a structure through which: i. A comprehensive business continuity management system (BCMS)

More information

Supply Chain Security Compliance Programs and Third Party Support

Supply Chain Security Compliance Programs and Third Party Support Supply Chain Security Compliance Programs and Third Party Support presented to the The 1st National Conference on SAFE TRADE & AEO International Security Initiatives and their Impact on Philippine Trade

More information

Navigating ISO 14001:2015

Navigating ISO 14001:2015 Navigating ISO 14001:2015 Why the new ISO 14001 revision matters to everyone White paper Abstract This white paper takes a concise, yet detailed look at the upcoming ISO 14001:2015 revision. The revision

More information

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015

Maritime Insurance Cyber Security Framing the Exposure. Tony Cowie May 2015 Maritime Insurance Cyber Security Framing the Exposure Tony Cowie May 2015 Table of Contents / Agenda What is cyber risk? Exposures - Should we be concerned about "Cyber"? Is Cyber covered under a Marine

More information

Office for Nuclear Regulation

Office for Nuclear Regulation ONR GUIDE LC17 Management Systems Document Type: ONR Nuclear Safety Technical Inspection Guide Unique Document ID and Revision No: NS-INSP-GD-017 Revision 2 Date Issued: November 2012 Review Date: November

More information

Accenture Risk Management. Industry Report. Life Sciences

Accenture Risk Management. Industry Report. Life Sciences Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive

More information

BS 25999 BUSINESS CONTINUITY MANAGEMENT

BS 25999 BUSINESS CONTINUITY MANAGEMENT BS 25999 BUSINESS CONTINUITY MANAGEMENT AUDIT, CERTIFICATION & training services HOW CAN YOU ENSURE BUSINESS CONTINUITY? BS 25999 AUDITS & CERTIFICATION FROM SGS Most organisations will, at some point,

More information

IRIS International Railway Industry Standard

IRIS International Railway Industry Standard English Addendum, 19th June 2008 IRIS International Railway Industry Standard Hier kann ein kleiner Text stehen Hier kann ein kleiner Text stehen Hier kann ein kleiner Text stehen Chapter 1 3 IRIS Certification

More information

BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012

BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012 To: From: Subject: Status: Date of Meeting: BSO Board Director of Human Resources & Corporate Services Business Continuity Policy For Approval 28 February 2012 The Board is asked to agree the attached

More information

Business Continuity Management Policy

Business Continuity Management Policy Business Continuity Management Policy Business Continuity Policy Version 1.0 1 Version control Version Date Changes Author 0.1 April 13 1 st draft PH 0.2 June 13 Amendments in line with guidance PH 0.3

More information

New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01)

New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01) Safeguarding public health New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01) Tony Orme, Senior GDP Inspector Inspection, Enforcement and Standards Division

More information

Systems and software engineering Lifecycle profiles for Very Small Entities (VSEs) Part 5-6-2:

Systems and software engineering Lifecycle profiles for Very Small Entities (VSEs) Part 5-6-2: TECHNICAL REPORT ISO/IEC TR 29110-5-6-2 First edition 2014-08-15 Systems and software engineering Lifecycle profiles for Very Small Entities (VSEs) Part 5-6-2: Systems engineering Management and engineering

More information

Unilever Supplier Qualification System (USQS) PI Supplier Information Pack SQA Audit

Unilever Supplier Qualification System (USQS) PI Supplier Information Pack SQA Audit Unilever Supplier Qualification System (USQS) PI Supplier Information Pack SQA Audit July 2013 Table of Contents Introduction... 2 Booking Your Quality Audit... 3 Step 1. Selecting your Audit House...

More information

How To Understand The Benefits Of A Supply Chain Security Program

How To Understand The Benefits Of A Supply Chain Security Program World Customs Journal VOLUNTARY SUPPLY CHAIN SECURITY PROGRAM IMPACTS: AN EMPIRICAL STUDY WITH BASC MEMBER COMPANIES Ximena Gutiérrez, Juha Hintsa, Philippe Wieser and Ari-Pekka Hameri This paper is an

More information

Supply Chain Security. Greg Stein Global Trade Compliance

Supply Chain Security. Greg Stein Global Trade Compliance Supply Chain Security Greg Stein Global Trade Compliance November 12, 2015 Agenda Brand Protection & Supply Chain Security Risks Points Common issues to the industry SanDisk Supply Chain Security and Risks

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

National Cyber Security Strategies

National Cyber Security Strategies May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

Implementing ISO 9000 Quality Management System

Implementing ISO 9000 Quality Management System Implementing ISO 9000 Quality Management System Implementation of ISO 9000 affects the entire organization right from the start. If pursued with total dedication, it results in 'cultural transition' to

More information

World Customs Organization

World Customs Organization World Customs Organization The Authorised Economic Operator, the Authorised Person and the Authorised Operator ADB- WCO National Workshop on RKC implementation Thimphu, Bhutan, 10 June 2014 The SAFE Framework

More information

Business Continuity Policy and Business Continuity Management System

Business Continuity Policy and Business Continuity Management System Business Continuity Policy and Business Continuity Management System Summary: This policy sets out the structure for ensuring that the PCT has effective Business Continuity Plans in place in order to maintain

More information

Sector Development Ageing, Disability and Home Care Department of Family and Community Services (02) 8270 2218

Sector Development Ageing, Disability and Home Care Department of Family and Community Services (02) 8270 2218 Copyright in the material is owned by the State of New South Wales. Apart from any use as permitted under the Copyright Act 1968 and/or as explicitly permitted below, all other rights are reserved. You

More information

Quality Management System

Quality Management System Chapter j 38 Self Assessment 739 Quality Management System 1. Is your system thought of as a set of documents or a set of interacting processes that deliver the organization s objectives? 2. Is your system

More information

LOGISTICS, SECURITY AND COMPLIANCE: THE PART TO BE PLAYED BY AUTHORISED ECONOMIC OPERATORS (AEOs) AND DATA MANAGEMENT

LOGISTICS, SECURITY AND COMPLIANCE: THE PART TO BE PLAYED BY AUTHORISED ECONOMIC OPERATORS (AEOs) AND DATA MANAGEMENT LOGISTICS, SECURITY AND COMPLIANCE: THE PART TO BE PLAYED BY AUTHORISED ECONOMIC OPERATORS (AEOs) AND DATA MANAGEMENT Abstract Doug Tweddle Enhanced security, compliance and logistics management in both

More information

Sector Led Improvement Peer Challenge. of the. London Borough of Haringey Direct Payments Support Services. May 2013

Sector Led Improvement Peer Challenge. of the. London Borough of Haringey Direct Payments Support Services. May 2013 Sector Led Improvement Peer Challenge of the London Borough of Haringey Direct Payments Support Services May 2013 Peer Challenge Authors Barry Holland Justin Walker December 2013 Document Control Version

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

Managing Growth, Risk and the Cloud

Managing Growth, Risk and the Cloud Managing Growth, Risk and the Cloud Executive Summary of Independent Market Research Commissioned by Zenium Data Centers Spring 2015 Foreword Rising data volumes combined with the always on approach to

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Standard Operating Procedure Notice: This document has been made available through the Police Service of Scotland Freedom of Information Publication Scheme. It should not

More information

ELA Standards of Competence on the Supervisory/Operational Management Level

ELA Standards of Competence on the Supervisory/Operational Management Level ELA Standards of Competence on the Supervisory/Operational Management Level 2.0 Basic Supply Chain Concepts 2.0.01 Explain the scope and role of component activities within the supply chain 2.0.02 Map

More information

Western Australian Auditor General s Report. Information Systems Audit Report

Western Australian Auditor General s Report. Information Systems Audit Report Western Australian Auditor General s Report Information Systems Audit Report Report 10 June 2012 Auditor General s Overview The Information Systems Audit Report is tabled each year by my Office. It summarises

More information

MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS

MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS MANAGEMENT SYSTEMS CERTIFICATION FROM AUTOMOTIVE SPECIALISTS VCA - Delivering a Safer Environment VCA - Delivering a Safer Environment 1 Contents Pg 2 Formal Certification Burden or Benefit? 3 Why VCA?

More information