Customs & Trade Partnership Against Terrorism (C TPAT)

Size: px
Start display at page:

Download "Customs & Trade Partnership Against Terrorism (C TPAT)"

Transcription

1 Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments

2 As a result of the events of September 11, 2001, the United States Customs and Border Protection (Customs) introduced several new security initiatives, one of which is the Customs Trade Partnership Against Terrorism (C TPAT). This program is a joint government business initiative focusing on strengthening supply chain and border security. Bristol Myers Squibb (BMS) is an active certified and validated participant in this program. BMS is a strong advocate of the C TPAT program. Our commitment to C TPAT continues with our request that your company as a key business partner be actively engaged in this undertaking with us. Your cooperation is essential to the success of BMS participation in C TPAT. As a key business partner, you are requested to ensure the integrity of your security practices by meeting the criteria set forth by C TPAT and to establish procedures to support those security practices on an ongoing basis. Our goal is to enhance and maintain effective security processes and safeguards throughout the global supply chain to ensure the timely delivery of incoming cargo. As a valued supplier to BMS, your support of and participation in the C TPAT program is critical. Better security and safeguards for our products and supplies is an ongoing effort. Your participation and/or membership in this program are a necessity so we therefore request our domestic service providers (carriers, freight forwarders, and brokers) to join C TPAT and request to the extent possible our foreign suppliers and service providers participate in similar security programs sponsored by your respective government agencies. C TPAT Security Criteria BMS expects its suppliers and service providers to evaluate, scrutinize, and develop sufficient security measures within their own supply chain. It is expected that each of our suppliers will notify their plants, offices, and subsidiaries of the C TPAT program and of BMS s participation in it and assess themselves against security criteria established by C TPAT (provided in Appendix I) as well as share these criteria with these other parties. BMS encourages its suppliers to utilize C TPAT assessments, and review procedures with their own suppliers so that there is a trickle down affect of these best practices. Memorandum of Understanding To Our International Business Partners and Service Providers: An executed Memorandum of Understanding (MOU) between BMS and your company is requested (see Appendix II.) If your company has not signed a MOU with BMS with regards to C TPAT, please review and sign the MOU and electronically scan/ it to BMS primary designates for C TPAT: Frank Biviano Director, Corporate Security frank.biviano@bms.com Kaye Mortensen Director, Custom & Trade kaye.mortensen@bms.com

3 Supply Chain Security Questionnaire As an integral part of BMS international supply chain, we are asking that you complete the Supply Chain Security Questionnaire (see Appendix III) that is based upon Customs' current security recommendations for C TPAT. We request you complete the questionnaire for each facility shipping product to BMS or BMS designated location(s) in the U.S. If your facility has not previously filled out and submitted a response to BMS Supply Chain Security Questionnaire, please do so. We would appreciate your questionnaire response electronically. Please return it to Frank and Kaye at the above e mail addresses. Your input will be consolidated with that of the rest of the BMS supply chain to form the BMS supply chain security profile to be submitted to Customs. Please note that the questions asked require simple yes/no responses. All existing written documentation supporting your current procedures and your responses should be available upon request. BMS C TPAT Team comprised of Corporate Security and Customs & Trade may visit your site in the future to validate the responses provided. This information regarding the C TPAT program is provided as part of the Company s efforts to provide timely and effective information concerning the program and our supports our efforts to strengthen our International Supply Chain Security. Please see below the names, addresses, and contact telephone numbers for BMS personnel who are the Company leads for this initiative. Please feel free to contact these individuals to discuss any of the criteria set forth by C TPAT. BMS C TPAT Contacts Frank Biviano Daniel Beaudette Director, Corporate Security Regional Manager, Corporate Security frank.biviano@bms.com daniel.beaudette@bms.com Kaye Mortensen Ann Marie Macchia Director, Custom & Trade Associate Director, Customs & Trade kaye.mortensen@bms.com annmarie.macchia@bms.com

4 Appendix I C TPAT Security Criteria Business Partner Requirement Security procedures Business partners eligible for C TPAT certification (domestic carriers, ports, terminals, brokers, consolidators, etc.) should provide documentation (e.g., C TPAT certificate, SVI number, etc.) indicating whether they are or are not C TPAT certified to BMS. Point of Origin Business partners should develop security processes and procedures consistent with the C TPAT security criteria to enhance the integrity of the shipment at point of origin. Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Business partners who have obtained a certification in a supply chain security program being administered by foreign Customs Administration should provide their status of participation to BMS. Container Security Container integrity must be maintained to protect against the introduction of unauthorized material and/or persons. At point of stuffing, procedures must be in place to properly seal and maintain the integrity of the shipping containers. A high security seal must be affixed to all loaded containers bound for the U.S. All seals must meet or exceed the current PAS ISO standards for high security seals. Container Inspection Procedures must be in place to verify the physical integrity of the container structure prior to stuffing, to include the reliability of the locking mechanisms of the doors. A seven point inspection process is recommended for all containers: Front wall Left side Right side Floor Ceiling/Roof Inside/outside doors Outside/Undercarriage Container Seals Written procedures must stipulate how seals are to be controlled and affixed to loaded containers to include procedures for recognizing and reporting compromised seals and/or containers to US Customs and Border Protection or the appropriate foreign authority. Only designated employees should distribute container seals for integrity purposes. Container Storage Containers must be stored in a secure area to prevent unauthorized access and/or manipulation. Procedures must be in place for reporting and neutralizing unauthorized entry into containers or container storage areas.

5 Physical Access Controls Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets. Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry. Employees An employee identification system must be in place for positive identification and access control purposes. Employees should only be given access to those secure areas needed for the performance of their duties. Company management or security personnel must adequately control the issuance and removal of employee, visitor and vendor identification badges. Procedures for the issuance, removal and changing of access devices (e.g. keys, key cards, etc.) must be documented. Visitors Visitors must present photo identification for documentation purposes upon arrival. All visitors should be escorted and visibly display temporary identification. Deliveries (including mail) Proper vendor ID and/or photo identification must be presented for documentation purposes upon arrival by all vendors. Arriving packages and mail should be periodically screened before being disseminated. Challenging and Removing Unauthorized Persons Procedures must be in place to identify, challenge and address unauthorized/unidentified persons. Personnel Security Processes must be in place to screen prospective employees and to periodically check current employees. Pre Employment Verification Application information, such as employment history and references must be verified prior to employment. Background checks / investigations Consistent with foreign, federal, state, and local regulations, background checks and investigations should be conducted for prospective employees. Once employed, periodic checks and reinvestigations should be performed based on cause, and/or the sensitivity of the employee s position. Personnel Termination Procedures Companies must have procedures in place to remove identification, facility, and system access for terminated employees. Procedural Security Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo in the supply chain. Documentation Processing Procedures must be in place to ensure that all information used in the clearing of merchandise/cargo, is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information. Documentation control must include safeguarding computer access and information.

6 Manifesting Procedures To help ensure the integrity of cargo received from abroad, procedures must be in place to ensure that information received from business partners is reported accurately and timely. Shipping & Receiving Arriving cargo should be reconciled against information on the cargo manifest. The cargo should be accurately described, and the weights, labels, marks and piece count indicated and verified. Departing cargo should be verified against purchase or delivery orders. Drivers delivering or receiving cargo must be positively identified before cargo is received or released. Cargo Discrepancies All shortages, overages, and other significant discrepancies or anomalies must be resolved and/or investigated appropriately. Customs and/or other appropriate law enforcement agencies must be notified if illegal or suspicious activities are detected as appropriate. Security Training and Threat Awareness A threat awareness program should be established and maintained by security personnel to recognize and foster awareness of the threat posed by terrorists at each point in the supply chain. Employees must be made aware of the procedures the company has in place to address a situation and how to report it. Additional training should be provided to employees in the shipping and receiving areas, as well as those receiving and opening mail. Additionally, specific training should be offered to assist employees in maintaining cargo integrity, recognizing internal conspiracies, and protecting access controls. These programs should offer incentives for active employee participation. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Importers should incorporate the following C TPAT physical security criteria throughout their supply chains as applicable. Fencing Perimeter fencing should enclose the areas around cargo handling and storage facilities. Interior fencing within a cargo handling structure should be used to segregate domestic, international, high value, and hazardous cargo. All fencing must be regularly inspected for integrity and damage. Gates and Gate Houses Gates through which vehicles and/or personnel enter or exit must be manned and/or monitored. The number of gates should be kept to the minimum necessary for proper access and safety. Parking Private passenger vehicles should be prohibited from parking in or adjacent to cargo handling and storage areas. Building Structure Buildings must be constructed of materials that resist unlawful entry. The integrity of structures must be maintained by periodic inspection and repair. Locking Devices and Key Controls All external and internal windows, gates and fences must be secured with locking devices. Management or security personnel must control the issuance of all locks and keys. Lighting Adequate lighting must be provided inside and outside the facility including the following areas: entrances and exits, cargo handling and storage areas, fence lines and parking areas.

7 Alarms Systems & Video Surveillance Cameras Alarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling and storage areas. Information Technology Security Password Protection Automated systems must use individually assigned accounts that require a periodic change of password. IT security policies, procedures and standards must be in place and provided to employees in the form of training. Accountability A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data. All system violators must be subject to appropriate disciplinary actions for abuse.

8 Appendix II BRISTOL MYERS SQUIBB COMPANY CUSTOMS & TRADE PARTNERSHIP AGAINST TERRORISM (C TPAT) AGREEMENT BETWEEN BRISTOL MYERS SQUIBB COMPANY AND [INSERT BMS BUSINESS PARTNER NAME] TO VOLUNTARILY PARTICIPATE IN C TPAT This Agreement is made between [INSERT BMS BUSINESS PARTNER NAME] and Bristol Myers Squibb Company (hereinafter referred to as BMS ). This Agreement between [INSERT BMS BUSINESS PARTNER NAME] and BMS is intended to enhance the joint efforts of each of these entities to develop a more secure global supply chain environment by focusing on the physical security of the production, transportation, and importation of BMS merchandise. [INSERT BMS BUSINESS PARTNER NAME] and BMS recognize the need to address these security issues in order to maintain an efficient and compliant import and export process. [INSERT BMS BUSINESS PARTNER NAME] and BMS agree to review and identify necessary security enhancements, and to develop and implement a verifiable, documented program to maintain a secure global supply chain for BMS. Specifically, [INSERT BMS BUSINESS PARTNER NAME] agrees to: 1. Sign and return this agreement to BMS Corporate Security with copy to BMS Customs & Trade: Frank Biviano Director, Corporate Security frank.biviano@bms.com Kaye Mortensen Director, Customs & Trade kaye.mortensen@bms.com 2. Complete and electronically return to the above referenced individuals a completed and signed Confidential Security Profile Questionnaire within thirty (30) days of receipt. 3. Implement security and/or trade compliance improvement programs as determined by BMS and/or the U.S. Customs and Border Protection. [VP, Corporate Security] Bristol Myers Squibb Company [Name and Title] [Company Name] [Date] [Date]

9 Appendix III C TPAT Supply Chain Security Questionnaire 1.0 SECURITY PROCEDURES Yes No N/A 1.1 Point of Origin Does your facility utilize one of BMS's preferred freight forwarders (UTi or DHL/Danzas) for shipments to BMS or BMS' designated location in the US? If not, does your facility utilize a C TPAT certified freight forwarder, NVOCC or carrier to manage your shipments to BMS in the US? Does your facility have written security procedures? Do the written security procedures address how security problems are reported should they occur? Do the written security procedures address how security problems are corrected should they occur? 1.2 Participation/Certification in Foreign Customs Administrations Supply Chain Security Programs Does Customs or other regulatory agency in the country from which your facility ships goods to the United States support or sponsor any supply chain security or anti terrorism programs that your facility is eligible to participate in? [If yes, please type the name of the program and support or sponsor agency name in this space.] Is your facility certified in this program? 2.0 CONTAINER SECURITY 2.1 Container Inspection Does your facility ship full containers, trailers or rail car tanks to BMS or BMS's designated location in the United States? If "no," proceed to Section Do you ship full containers via ocean? Do you ship full truck loads via truck? Do you ship full tanker cars via rail?

10 2.1.2 Does your facility have written procedures that require verification of the container's physical integrity before it is loaded? Does your facility perform a seven point inspection process for all incoming and outbound containers before unloading or loading? (front wall, left side, right side, ceiling, inside/outside doors, outside/undercarriage) Does your facility have written procedures that require the verification of the reliability of the locking mechanisms of the doors of outbound containers? 2.2 Container Seals Does your facility have written procedures that address the sealing of containers, trailers or rail cars (hereinafter "containers")? Do the procedures address affixing seals to the container? Do the procedures address replacing container seals? Do the procedures address recording seals? Do the procedures address the tracking of the seals? Do the procedures address reporting of compromised seals to the appropriate authorities? Do the procedures require the seals exceed the PAS ISO high security seal standards? Do the procedures limit the employees who can distribute container seals? 2.3 Container Storage Does your facility have written procedures that address how empty and loaded containers are to be stored on your facility? Do the procedures address reporting of compromised containers to the appropriate authorities? 3.0 PHYSICAL ACCESS CONTROLS 3.1 Employees Are there restricted access locations on your facility? Is access to offices restricted?

11 Is access to warehouses restricted? (Answer "n/a" if your facility does not have a warehouse.) Is access to manufacturing restricted? (Answer "n/a" if your facility does not have manufacturing facilities.) Does your facility have procedures that require all personnel on the premises to be positively identified? Are facility employees required to wear identification badges? Are contractors required to wear identification badges identifying the individual as a contractor? Does your facility have written procedures for the issuance, removal and changing of access devices (e.g. badge access cards, etc)? 3.2 Visitor Controls Are visitors required to present photo identification upon arrival? Are visitors required to wear identification badges identifying the individuals as visitors? Are visitors required to sign in upon entering the facility? Are visitors required to sign out upon leaving the facility? Are visitors required to be escorted while at the facility? 3.3 Deliveries (including mail) Does your facility have written procedures that address how incoming and outgoing cargo is to be protected from unauthorized access? Does your facility have written procedures that restrict unauthorized persons from accessing the facility's premises? Does your facility have procedures that require proper vendor ID and or photo identification for deliveries? Does your facility have procedures that require vehicles to check in when accessing the premises? Does your facility record vehicles' entrance times? Does your facilty record vehicles' exit times?

12 3.3.4 Does your facility direct delivery vehicles through entrances and exits that separate from the primary entrance(s) and exit(s) used by employees, contractors and visitors? May vehicles be searched upon entering the premises? May vehicles be searched upon exiting the premises? Does your facility periodically screen arriving packages and mail before distribution? Does your facility x ray incoming mail? 3.4 Challenging and Removing Unauthorized Persons Does your facility have written procedures in place to identify, challenge and address unauthorized/undentified persons on the premises? Does your facility have written procedures requiring employees to report unauthorized persons to Company officials? 4.0 PERSONNEL SECURITY 4.1 Pre Employment Verification Are written procedures in place that direct how prospective employees will be screened? Is application information such as employment history and references verified prior to employment? 4.2 Background Checks / Investigations Are background checks permitted in your country? Are background checks conducted on potential employees? Are background checks conducted on current employees for cause and/or sensitivity of employees position? Are employees required to account for their attendance? Does your facility have an internal code of conduct for employee behavior? Does your facility have written procedures for reporting and managing employee security issues? 4.3 Personnel Termination Procedures

13 4.3.1 Identification badges and access devices Are written procedures in place that control the issuance and retrieval of identification badges and access devices upon hire, termination and change in job position? 4.4 Computer System Access Are written procedures in place that control the issuance and revocation of access to your facilities computer systems upon hire, termination and change in job position? 5.0 PROCEDURAL SECURITY 5.1 Manifesting Procedures Does your Shipping department receive an advance notice of what will be shipped each day from your facility? Does your facility provide BMS, BMS' designated location, the foreign carrier or freight forwarder copies of shipping documentation (e.g, invoices, packing lists) as prior notice at least twenty four hours in advance of the freight shipping from your facility? 5.2 Shipping & Receiving Are written procedures in place to ensure that the correct cargo is shipped to BMS or BMS's designated location? Do the procedures require verification that the product shipped matches the description(s) on the shipping documents? Do the procedures require verification that the quantities shipped match the quantities on the shipping documents? 5.3 Cargo Discrepancies Are written procedures in place that direct, as appropriate, your facility to notify the customs broker, carrier, shipper or law enforcement of any discrepancies between what was shipped and what is received by BMS or BMS's designated location? 6.0 SECURITY TRAINING AND THREAT AWARENESS 6.1 Does your facility provide security training and threat awareness training for employees? If "no," proceed to Section 7.0.

14 6.1.1 Indicate which of the following topics are included in the program: Internal conspiracies? Product integrity? Unauthorized access to the premises? Are all new employees required to attend the program? Are current employees required to attend ongoing security awareness training? Are attendance records maintained for employees that attended the training? 7.0 PHYSICAL SECURITY 7.1 Fencing Does your facility have perimeter fencing which at the minimum encloses the areas around cargo handling and storage facilities? Does your facility have interior fencing within the cargo handling structure used to segregate domestic, international, high value and hazardous cargo? Is the fencing regularly inspected for integrity and damage? 7.2 Gates and Gate Houses Does your facility have gates which restrict vehicle and/or personnel access to the premises? Are the gates manned and/or monitored by cameras? hours per day? During operational hours? During non operational hours? 7.3 Parking Does the facility have designated parking areas for visitors that is separate from employee parking? Are the parking areas separate from any place where cargo may be: Stored?

15 Staged? Loaded? Unloaded? 7.4 Building Structure Are your facility buildings constructed of materials that resist unlawful entry? Is the integrity of your structures maintained by periodic inspection and repair? 7.5 Locking Devices and Key Controls Are all external and internal windows, gates and fences secured with locking devices? Is the issuance of all locks and keys controlled by management or security personnel? 7.6 Lighting Do all buildings have adequate lighting? Do all building premises (e.g., entrances, exits, cargo handling and storage areas, fence lines, parking areas) have adequate lighting? 7.7 Alarm Systems & Video Surveillance Cameras Does the facility have alarms? Do the alarms secure: Doors? Windows? Docks? Vaults? Other? When activated, do the alarms: Emit an audible alarm?

16 Directly alert security (e.g., via pager)? Electronically notify a monitoring station that may dispatch appropriate law enforcement? Directly notify law enforcement? Does the site have security cameras? Do the cameras cover the following areas: Entrances & exits? Cargo storage areas? Loading & unloading docks? Parking areas? Fence lines? Do the cameras record? Are the recordings maintained for a preset period of time? 8.0 INFORMATION TECHNOLOGY SECURITY 8.1 Password Protection Does your facility have written policies, procedures and standards to manage information technology security? Do your procedures require periodic password changes for individually assigned system access accounts? Is information technology security training provided to employees? 8.2 Accountability Does your facility have a system in place to identify the abuse of IT including improper access, tampering ot the altering of business data? Are systems violators subject to appropriate disciplinary actions for abuse? Physical Address of Manufacturing and Shipping Locations

17 Please provide the physical address of your manufacturing locations and shipping locations in the following spaces: (name and address) Manufacturing Site: (name and address, if different from above) Shipping Location: Comments: Please provide any additional information you feel will clarify your facility's responses to this questionnaire in the following space: [Please type comments here.] Name: Title: Phone #: E mail Address: Date: Primary Contact and Date Please provide the name and contact information for the individual who can best answer any questions BMS might have regarding your facility responses to this questionnaire and today's date: I AFFIRM THAT THE INFORMATION CONTAINED HEREIN IS COMPLETE AND TRUE TO THE BEST OF MY KNOWLEDGE AND BELIEF. Signature

18 Print Name Title Date Company Name Site Name Street Address City State/Province Country Zip Code

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.

Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt. TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT

More information

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Partners in Protection / C-TPAT Supply Chain Security Questionnaire Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Trucker) Please answer the following questions about your company s cargo security processes and participation

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

C-TPAT Security Criteria Sea Carriers

C-TPAT Security Criteria Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks

More information

Rail Carrier Security Criteria

Rail Carrier Security Criteria Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers

More information

C-TPAT Highway Carrier Security Criteria

C-TPAT Highway Carrier Security Criteria C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup

More information

CVS Pharmacy C-TPAT Requirements For Product Suppliers

CVS Pharmacy C-TPAT Requirements For Product Suppliers CVS Pharmacy C-TPAT Requirements For Product Suppliers To Our Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with Customs-Trade

More information

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers CVS Pharmacy C-TPAT Requirements For Import Product Suppliers To Our Import Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with

More information

What is C-TPAT? Customs Trade Partnership Against Terrorism

What is C-TPAT? Customs Trade Partnership Against Terrorism Learning Objectives What is C-TPAT? Terrorist Awareness Supply Chain Security Container Security Program 7 Point Inspection Seal Program Locks, Keys & Access Control / Visitor Controls Pre-Employment Verifications

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

Best Practices For. Supply Chain Security

Best Practices For. Supply Chain Security Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers

More information

C-TPAT Customs Trade Partnership Against Terrorism

C-TPAT Customs Trade Partnership Against Terrorism Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers

More information

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen

More information

Contents. Global Security Verification (GSV) Standard. Introduction... 2. The Global Security Verification Criteria Implementation Guidance...

Contents. Global Security Verification (GSV) Standard. Introduction... 2. The Global Security Verification Criteria Implementation Guidance... Global Security Verification (GSV) Standard Contents Introduction.................................... 2 The Global Security Verification Criteria Implementation Guidance......................................

More information

AEO Template Introduction

AEO Template Introduction AEO Template Introduction WCO Members recognize that global consistency of the approval process and enhanced benefits are essential to encouraging broad trade participation and realization of the mutual

More information

US CUSTOMS IMPORT DOCUMENT REQUIREMENTS

US CUSTOMS IMPORT DOCUMENT REQUIREMENTS US CUSTOMS IMPORT DOCUMET REQUIREMETS A. IVOICE Invoice should be billed to the Accounts Payable location. The Federal-Mogul location receiving the product must be listed as the Consignee. Supplier must

More information

Key Small Parcel Requirements

Key Small Parcel Requirements Key RECIPIENT INFORMATION Enter the KLX facility address or destination location. PACKAGE WEIGHT & SIZE Individual package weight up to 150 lbs. (pounds) Maximum dimensions 180 in length, 165 in length

More information

C-TPAT Expectations for Agents, Vendors & Manufactures

C-TPAT Expectations for Agents, Vendors & Manufactures C-TPAT Expectations for Agents, Vendors & Manufactures For Distribution to all new and existing Fred s Incorporated Import related Business Partners Published October, 2012 Version: 1.3 Revised: 06-27-2013

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

Security Policies and Procedures

Security Policies and Procedures Security Policies and Procedures April 26, 2012 Kristen Whelan Transportation Consultant kwhelan@libertyint.com www.libertyint.com Customs-Trade Partnership Against Terrorism What is C-TPAT? CBP and Industry

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

CONTENTS. Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination...

CONTENTS. Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination... 1 CONTENTS Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination...Page 17 Topic 4:Disciplinary Practices...Page 18 Topic 5: Health and

More information

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants Food Defense Self-Assessment Checklist for Slaughter and Processing Plants Outside Security 1. What food defense measures does your plant have in place for the exterior of the building? Are the plant s

More information

B/E Aerospace, Inc. Routing Guidelines (Shipping Within and To/From U.S.) Update January 2015

B/E Aerospace, Inc. Routing Guidelines (Shipping Within and To/From U.S.) Update January 2015 B/E Aerospace, Inc. Routing Guidelines (Shipping Within and To/From U.S.) Update January 2015 Dear Valued Supplier: We work closely with our suppliers to provide the most reliable products and services

More information

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants Adapted from information provided by the U.S. Department of Agriculture Food Safety and Inspection Service GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants March 2008 BY COMPLETING PAGE

More information

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached.

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached. A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached. (Including: Highway / Sea / Air / Rail Carriers, Carrier-Forwarders, Consolidators, NVOCCs, and Others.)

More information

C-TPAT Executive Summary

C-TPAT Executive Summary C-TPAT Executive Summary Customs and Border Protection (CBP) established the Customs-Trade Partnership against Terrorism (C-TPAT) as part of a comprehensive strategy designed to enhance national security

More information

PHYSICAL SECURITY STANDARDS

PHYSICAL SECURITY STANDARDS (T.D. 72-56) Department of the Treasury--Office of the Secretary Standards for security of international cargo There are published below for information of the public recommended physical and procedural

More information

FSIS Security Guidelines for Food Processors

FSIS Security Guidelines for Food Processors United States Department of Agriculture Food Safety and Inspection Service FSIS Security Guidelines for Food Processors Food Security Plan Management Dear Establishment Owner/Operator: The Food Safety

More information

World Customs Organization

World Customs Organization World Customs Organization The Authorised Economic Operator, the Authorised Person and the Authorised Operator ADB- WCO National Workshop on RKC implementation Thimphu, Bhutan, 10 June 2014 The SAFE Framework

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS The requirements of these Oracle Global Supply Chain and High Value Asset Physical Security Standards apply to all geographical

More information

September 25, 2013. Dear Mr. Lewis:

September 25, 2013. Dear Mr. Lewis: 1300 Pennsylvania Ave. NW, Rm. 2.2A Washington, DC 20229 September 25, 2013 Mr. Bruce C Lewis Manager, Global Security Compliance & Corporate Security Fairchild Semiconductor Corporation 82 Running Hill

More information

Seals Security & Best Practices

Seals Security & Best Practices Seals Security & Best Practices Presented by Raymond Monzon Supply Chain Security Specialist Miami C-TPAT Field Office What Will Be Covered Intro This presentation will cover: C-TPAT Criteria ISO Seals

More information

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012 Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012 This template is a tool that was developed In order to assist manufacturer clients with the application

More information

Protecting Your Company s Identity

Protecting Your Company s Identity Protecting Your Company s Identity Stages of Identity Theft Acquisition of the identity such as theft, internet, garbage and mail Use of the identity For financial gain (most common) and/or evade Law Enforcement

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

SECURITY IN TRUCKING

SECURITY IN TRUCKING SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada

More information

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions In an effort to clarify the April 23, 2010 bulletin regarding international

More information

2. Employees must wear their ID tag at all times while on the premises.

2. Employees must wear their ID tag at all times while on the premises. 3. Physical Access Controls Access control must prevent unauthorized entry to facilities, maintain control of employees and visitors and protect company assets. There must be written and verifiable procedures

More information

LOSS PREVENTION IAT GROUP

LOSS PREVENTION IAT GROUP LOSS PREVENTION IAT GROUP CARGO SECURITY AND LOSS PREVENTION Introduction Cargo protection requires thorough planning to be effective and remain effective through changing conditions. Cargo security is

More information

Food Security Training for the Farming Operation. Beth Bland Georgia Fruit & Vegetable Growers Association 10 SE Regional Conference

Food Security Training for the Farming Operation. Beth Bland Georgia Fruit & Vegetable Growers Association 10 SE Regional Conference Food Security Training for the Farming Operation Beth Bland Georgia Fruit & Vegetable Growers Association 10 SE Regional Conference How to Get Started Just like everything else: There are certain aspects

More information

A Self-Audit of Your Current Campus Security Systems

A Self-Audit of Your Current Campus Security Systems A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,

More information

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)

More information

Kroger Manufacturing Trailer Seal Policy Revised 09/03/10

Kroger Manufacturing Trailer Seal Policy Revised 09/03/10 Kroger Manufacturing Trailer Seal Policy Revised 09/03/10 1 Inbound Supplier After the product is loaded and the trailer doors are closed, the supplier (or shipping warehouse) is responsible for affixing

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: 16 March 2010 Table of Contents Topic Introduction 1. Plan administration a. Plan management b. Roles and responsibilities c. Reporting procedures d. Self assessments

More information

Upon completion of the module, you will be issued an electronic training certificate.

Upon completion of the module, you will be issued an electronic training certificate. Introduction The US Department of Transportation mandates security awareness training as part of their security requirements found in Subpart I of Part 172 of the Hazardous Materials Regulations. The requirement

More information

Does a fence or other type physical barrier define the perimeter of the facility?

Does a fence or other type physical barrier define the perimeter of the facility? PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier

More information

C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM

C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM Valued Customer; Elements International has recently joined with Customs Border Patrol (CBP) through the C-TPAT program in attempt to strengthen our supply

More information

Identity Theft Prevention Program Compliance Model

Identity Theft Prevention Program Compliance Model September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

Caneda Transport Border Guide lines and Regulations Manual. Canada Border Service Agency (PIP) C-TPAT

Caneda Transport Border Guide lines and Regulations Manual. Canada Border Service Agency (PIP) C-TPAT Caneda Transport Border Guide lines and Regulations Manual Canada Border Service Agency (PIP) C-TPAT Caneda C-TPAT/ PIP Compliances Manual. Page 1of 27 Caneda Transport C-TPAT / PIP manual Table of Contents

More information

C-TPAT: What Every Security Executive Should Know

C-TPAT: What Every Security Executive Should Know C-TPAT: What Every Security Executive Should Know Barry Brandman President Danbee Investigations Fair Lawn, NJ SPONSOR LOGO C-TPAT: What Every Security Executive Should Know In this session, you will learn:

More information

Developing a Security Training and Awareness Program

Developing a Security Training and Awareness Program Developing a Security Training and Awareness Program Text Slide DEVELOPING AND ENHANCING SECURITY TRAINING AND AWARENESS PROGRAMS One Way of Enhancing Supply Chain Security Efficiency is Through Security

More information

Threats, Risks and Possible solutions

Threats, Risks and Possible solutions Annex 2 Threats, Risks and Possible solutions This document provides a list of the most significant risks related to the AEO authorisation and monitoring process, and at the same time, it provides a list

More information

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008

AUBURN WATER SYSTEM. Identity Theft Prevention Program. Effective October 20, 2008 AUBURN WATER SYSTEM Identity Theft Prevention Program Effective October 20, 2008 I. PROGRAM ADOPTION Auburn Water System developed this Identity Theft Prevention Program ("Program") pursuant to the Federal

More information

Aproved by: doron berger Data Security Manager - National Security unit

Aproved by: doron berger Data Security Manager - National Security unit Israel Electric Corporation National Security unit Data Security Security of critical project performed by vendor abroad Aproved by: doron berger Data Security Manager - National Security unit Project

More information

Each time a driver crosses the international border, the driver must clear, or be released by, the customs agency of the country they are entering.

Each time a driver crosses the international border, the driver must clear, or be released by, the customs agency of the country they are entering. U.S.-CANADA CUSTOMS Falcon does a lot of business in Canada, both picking up and delivering. The company often runs loads across Canada between Buffalo, NY, and Detroit, MI, as Canadian routes are approximately

More information

JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments

JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments NAME: COUNTRY: SPONSOR: DIV/GROUP: PURPOSE: To be filled out by FACTS administrator FACTS Visitor # FACTS Request # JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN

More information

TEXAS DEPARTMENT OF TRANSPORTATION GENERAL SERVICES DIVISION INTERSTATE TRANSPORTATION OF GOODS (FREIGHT) SERVICES PUBLICATION

TEXAS DEPARTMENT OF TRANSPORTATION GENERAL SERVICES DIVISION INTERSTATE TRANSPORTATION OF GOODS (FREIGHT) SERVICES PUBLICATION TEXAS DEPARTMENT OF TRANSPORTATION GENERAL SERVICES DIVISION SPECIFICATION NO. TxDOT 9628622 INTERSTATE TRANSPORTATION OF GOODS (FREIGHT) SERVICES PUBLICATION This specification is a product of the Texas

More information

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard CITY UNIVERSITY OF HONG KONG (Approved by the Information Strategy and Governance Committee in December 2013) PUBLIC Date of Issue: 2013-12-24 Document Control Document Owner Classification Publication

More information

Bureau of Customs and Border Protection

Bureau of Customs and Border Protection Bureau of Customs and Border Protection General Notices Automated Commercial Environment (ACE): National Customs Automation Program Test of Automated Truck Manifest AGENCY: Customs and Border Protection;

More information

FSR2014 FACILITY SECURITY REQUIREMENTS. Transported Asset Protection Association. All Rights Reserved

FSR2014 FACILITY SECURITY REQUIREMENTS. Transported Asset Protection Association. All Rights Reserved FSR2014 FACILITY SECURITY REQUIREMENTS About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics service providers. The

More information

Xavier University. Policy and Procedure Purchasing Card Program. Purchasing Card Program Policy and Procedure

Xavier University. Policy and Procedure Purchasing Card Program. Purchasing Card Program Policy and Procedure Xavier University Policy and Procedure Purchasing Card Program Table of Contents 1.0 Introduction 1.1 Purpose of this Policy and Procedure 1.2 Program Vision 1.3 University Credit Card Partner 1.4 Constituents

More information

Frequently Asked Questions

Frequently Asked Questions 1 Frequently Asked Questions 1. Why do import shipments have to be bonded? 2. Why do ocean shipments have to be insured under a marine policy? 3. Why does it take Customs so long to examine shipments?

More information

Motor Truck Cargo Insurance Application

Motor Truck Cargo Insurance Application Motor Truck Cargo Insurance Application Named Insured: Mailing Address: Policy period or date policy is to be in effect: Business is: Corporation Partnership Sole Owner Established in 19 For whom does

More information

Supply Chain Security Best Practices Catalog. Customs-Trade Partnership Against Terrorism (C-TPAT)

Supply Chain Security Best Practices Catalog. Customs-Trade Partnership Against Terrorism (C-TPAT) Supply Chain Security Best Practices Catalog Customs-Trade Partnership Against Terrorism (C-TPAT) c o n t e n t S Prologue............................................................. iii Introduction...........................................................

More information

VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN

VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN Prepared by: Alice L. Lenthe, PE 24 April 2014 1 INTRODUCTION: The U.S. Transportation

More information

TABLE OF CONTENTS. A. Introduction to Best Practices Page 3. B. Risk Assessment Page 5. C. Business Partner Requirements Page 6

TABLE OF CONTENTS. A. Introduction to Best Practices Page 3. B. Risk Assessment Page 5. C. Business Partner Requirements Page 6 C-TPAT Best Practices Catalog Addendum 2009 TABLE OF CONTENTS. A. Introduction to Best Practices Page 3 B. Risk Assessment Page 5 C. Business Partner Requirements Page 6 D. Conveyance/Container/Trailer

More information

The Authorized Economic Operator and the Small and Medium Enterprise FAQ

The Authorized Economic Operator and the Small and Medium Enterprise FAQ The Authorized Economic Operator and the Small and Medium Enterprise FAQ May 2010 Copyright 2010 World Customs Organization. All rights reserved. Requests and inquiries concerning translation, reproduction

More information

ALARM SYSTEMS INFORMATION & REQUIREMENTS

ALARM SYSTEMS INFORMATION & REQUIREMENTS Revised 9/14/2011 ALARM SYSTEM FEES Alarm system permit fee (annually) $50 Alarm system service fee $50 if in excess of 5 alarms per year (12 alarms for apartments) ARTICLE 4.500 ALARM SYSTEM BUSINESSES

More information

Threats, Risks and Possible solutions

Threats, Risks and Possible solutions Annex 2 Threats, Risks and Possible solutions This document provides a list of the most significant risks related to the AEO authorisation and monitoring process, and at the same time, it provides a list

More information

2010 SECURITY AWARENESS TRAINING

2010 SECURITY AWARENESS TRAINING 2010 SECURITY AWARENESS TRAINING Hazardous materials are essential to the economy of the United States and the well being of its people. They fuel our cars and trucks and locomotives, heat and cool our

More information

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES

SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism

More information

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile October, 2012 Program Content Certified Company and New Certified Company Program (NEEC) Background General

More information

TOWN OF BLACKFALDS BYLAW 1191/15

TOWN OF BLACKFALDS BYLAW 1191/15 A BYLAW OF THE TOWN OF BLACKFALDS, IN THE PROVINCE OF ALBERTA, TO CONTROL SECURITY ALARM SYSTEMS SO AS TO REDUCE FALSE ALARMS REQUIRING RCMP OR FIRE DEPARTMENT RESPONSE WHEREAS Council of the Town of Blackfalds

More information

Purchasing Card Policies and Procedures

Purchasing Card Policies and Procedures Purchasing Card Policies and Procedures I. PURPOSE To set forth the Policies and Procedures for the New Jersey City University Purchasing Card Program. II. POLICY 1. INTRODUCTION The New Jersey City University

More information

INTERNATIONAL BUSINESS

INTERNATIONAL BUSINESS INTERNATIONAL BUSINESS PART 4: FREIGHT FORWARDING TABLE OF CONTENTS PAGE INTRODUCTION TO FREIGHT HANDLING AND FORWARDING... 2 CATEGORIES OF FREIGHT... 3 HOW FREIGHT PRICING IS DETERMINED... 4 CARGO INSURANCE...

More information

Alabama Trucking Association Workers Compensation Fund P. O. BOX 241605 Telephone: (334) 834-7911 MONTGOMERY, AL 36124 Facsimile: (334) 834-7931

Alabama Trucking Association Workers Compensation Fund P. O. BOX 241605 Telephone: (334) 834-7911 MONTGOMERY, AL 36124 Facsimile: (334) 834-7931 Alabama Trucking Association Workers Compensation Fund P. O. BOX 241605 Telephone: (334) 834-7911 MONTGOMERY, AL 36124 Facsimile: (334) 834-7931 Motor Carrier Application A Complete ATA Workers Compensation

More information

Packaging Guidelines Version Date: 11/6/12. ABB Inc. Packaging Guidelines. Version 1.0. Page 1. 3.04.P08.W03 Rev 0

Packaging Guidelines Version Date: 11/6/12. ABB Inc. Packaging Guidelines. Version 1.0. Page 1. 3.04.P08.W03 Rev 0 ABB Inc. Packaging Guidelines Version 1.0 Page 1 Contents Master Carton:... 3 Data Requirements... 3 Barcodes... 5 Label Placement... 6 Packing List... 7 Page 1 Contents... 7 Page 2 Contents... 9 International

More information