LOJACK SUPPLY CHAIN INTEGRITY. Solving the Commercial On-Highway Theft Problem for Cargo, Trucks and Trailers
|
|
- Elmer Lee
- 3 years ago
- Views:
From this document you will learn the answers to the following questions:
What type of protection does LoJack Stolen Vehicle Recovery System add to trucks and trailers?
What is the main mission of LoJack SCI InTransit?
LoJack SCI InTransit integrates what with what?
Transcription
1 LOJACK SUPPLY CHAIN INTEGRITY Solving the Commercial On-Highway Theft Problem for Cargo, Trucks and Trailers
2 TABLE OF CONTENTS OVERVIEW... 3 Securing the Supply Chain: Evolving Solutions to Meet Today s Needs... Uniquely Qualified to Lead the Emerging Commercial On-Highway Security Market... LoJack SCI InTransit A Comprehensive, Innovative Solution... The Right Technology for the Right Application... Covert protection and tracking... Real-time surveillance and web-based monitoring... Integration with law enforcement for dispatch and recovery... The Wisdom of Sharing Intelligence... Support... Standing Apart from the Crowd & Contact Information
3 OVERVIEW A recent survey by Chubb Group Insurance Companies revealed that broken links in the supply chain are one of the top three threats to business operations and one of the most significant breaks in the supply chain is theft. In the cargo security market, it is estimated that $10 billion $30 billion in merchandise alone is stolen from cargo ships, trucks, ports, railroads and highways annually in the U.S. And, according to the Transported Asset Protection Association (TAPA), 85 percent of all business security losses are attributed to either the theft or loss of product in transit. These facts were echoed in the first annual Cargo Theft Study* conducted by LoJack Supply Chain Integrity (LoJack SCI). The study, which was released in April 2009, revealed that cargo theft is a serious, ongoing problem that is extremely profitable for professional thieves and very costly for organizations throughout the supply chain. According to the study, of the 353 incidents reported in 2008, 299 of them involved cargo According to LoJack theft on our nation s highways. Of the 353 reported incidents, 145 provided a SCI s 2008 Cargo dollar figure. The total reported losses amounted to nearly $51 million dollars Theft Study, companies ($50,821,224) or more than $350,000 per incident. reported an average Often, stealing cargo is only one component of theft. The trucks and loss of $350,000 trailers transporting cargo are also vulnerable. For example, in one recent per incident. incident, a tractor-trailer containing a load of 12 pallets of Owens Corning shingles bound for Houston was hijacked in Dallas. The tractor, trailer and cargo all were stolen. According to industry officials, the combination of truck and cargo theft is responsible for more than $10 billion in business losses each year. Clearly, adding truck theft losses to that of merchandise makes the growing problem of Commercial On- Highway Security that much greater. Add in the theft of trailers and the numbers climb even higher. Although there is no hard data on overall recoveries, anecdotal information indicates that the percentage of recovered stolen property is very low. With so much valuable property at risk and at stake in the Commercial On-Highway Market, ** it is becoming an increasing priority for businesses to find new, effective measures to ensure the security of cargo, trucks and trailers and even more important to recover those assets in the event that theft occurs. Securing the Supply Chain: Evolving Solutions to Meet Today s Needs Back in the days when technology wasn t available to provide immediate access to information, supply chain security was limited to physical barriers like, locks, seals, fences and guard gates, uniformed guards at entrances and limited 3
4 surveillance equipment, such as video cameras. These measures were set up to protect production, warehouse, distribution and transportation facilities. They may have been effective while cargoes were confined, but once the assets left the protected areas, they became vulnerable to something as simple as a pair of bolt cutters, but specifically to organized thieves who found cargo theft a low risk, high reward crime. As mobile communications, technology and web-based solutions became more prevalent in the supply chain, many companies made investments in fleet management systems in an attempt to protect their fleets and cargoes. However, most fleet management systems provided GPS-based features that focused on operations, maintenance and maximizing equipment utilization but did not protect cargoes from theft. Some solutions did provide the ability to access real-time location of equipment within a limited geographic range. While this type of solution may help to run and maintain an efficient fleet, it did not and still does not adequately address the problem of theft protection. And, the theft problem continues to grow each year. From 2007 to 2008, claims at the Chubb Group*** showed that incidents of on-highway theft increased 40 percent, reinforcing the fact that fleet management and fleet protection are two separate efforts that require different solutions. In today s world, with increasing incidents of theft, the ongoing threat of terror and seemingly more frequent natural disasters, there is an increasingly critical need for solutions that truly protect the integrity of the supply chain solutions that go beyond fleet management and even fleet protection, to include not only fleet, but cargo recovery as well. LoJack SCI s primary mission is to deliver powerful, effective solutions that address the needs of businesses operating in today s vulnerable supply chain, providing valuable information, resources, protection and recovery. Uniquely Qualified to Lead the Emerging Commercial On-Highway Security Market Founded in 2004 as Supply Chain Integrity, today LoJack Supply Chain Integrity is the only company that provides a truly integrated solution for supply chain protection from covert tracking, monitoring and recovery to investigation and prevention. In 2006, LoJack Corporation (NASDAQ:LOJN), the premier worldwide provider of tracking and recovery systems, made a strategic investment in Supply Chain Integrity and two years later became a majority shareholder. This investment brought LoJack s resources, recovery expertise, trusted brand and especially important, its law enforcement relationships, to this innovative, emerging company creating LoJack SCI. Today, LoJack SCI s flagship solution, LoJack SCI InTransit, has emerged as a powerful result of the union of the two companies. 4
5 LoJack SCI InTransit A Comprehensive, Innovative Solution LoJack SCI InTransit is a comprehensive, innovative solution for the emerging Commercial On-Highway Security Market that provides the technology, intelligence and support needed to create a visible, secure and reliable supply chain operation. The Right Technology for the Right Application: LoJack SCI InTransit is a multi-faceted solution that integrates the right technology, whether it s GPS, Assisted GPS, Cellular (CDMA and GSM) and integration with Radio Frequency, into the right application to deliver the most advanced features available for: Covert protection and tracking Real-time surveillance and web-based monitoring Integration with law enforcement for dispatch and recovery GPS CELLULAR RADIO Covert Protection and Tracking Not only does LoJack InTransit integrate the right technology into the right application, it leverages the LoJack Stolen Vehicle Recovery System, which adds an unprecedented layer of protection for trucks and trailers. Since most theft occurs while the driver is out of the truck at an unsecured location, having a tracking device hidden in the cargo as well as on the truck and trailer, gives the driver the freedom to stop at a rest area or truck stop knowing that his entire rig is protected. It s like having your own personal covert surveillance team to keep watch on your cargo and tractor-trailer without incurring the expense that type of solution requires. For cargo, the state-of-theart tracking technology that supports two tracking platforms (CDMA and GSM) with motion sensor and Radio Frequency integration is hidden within the cargo. The flagship device is small enough to be easily concealed, robust enough to help recover your cargo if stolen. Battery performance is optimized through our exclusive device management software, which enables the most efficient use of device and battery life for the entire logistics cycle. LoJack InTransit can customize the appearance of the unit 5
6 to blend in with cargo making the device that much more difficult to detect. Coverage is currently available in the United States, Canada and Mexico. For trucks, the LoJack Stolen Vehicle Recovery System uses patented Radio Frequency-based technology that has a special FCC-allocated frequency and operates on a 12V or 24V power source. It contains an internal backup battery and can be installed on tractor-trailers, straight trucks box trucks, vans, service trucks and commercial auto fleets. For trailers, there is a covert LoJack device specifically designed for untethered trailers that is self-contained with a longlife battery. No external power source is required and it can be installed on approved trailer models, including box trailers, flatbed trailers, lowboy trailers and dump trailers. There is a special device available for refrigerated trailer units. Protection and tracking entails far more than simply installing covert devices on the cargo, truck and trailer. What distinguishes LoJack SCI from the competition is its experience and expertise with technology solutions for realtime surveillance and web-based monitoring. Real-Time Surveillance and Web-based Monitoring LoJack SCI s monitoring software is the most feature-rich and adaptable mobile asset monitoring application available. LoJack SCI developers customize its applications to quickly, accurately, and cost-effectively fulfill the unique needs of customers. The intuitive web-based interface also enables customers to tailor tracking tools to match their precise requirements, maintain constant surveillance and control fast-developing situations. The monitoring application uses Microsoft Virtual Earth, which provides a number of views of the cargo while in transit including map and aerial satellite views to know where the cargo is at all times. The software enables a user to see where a truck has stopped and also provides a view of the surrounding terrain. There are three different types of virtual fences available for surveillance and monitoring: Geo Fence can be used to specify a High Risk Zone in locations known to be dangerous. When a truck enters the zone, the frequency of reports 6
7 generated can be increased and text or alerts can be sent indicating the time entering the zone and the time departing it. Route Fence indicates the approved route for the load to travel. Text or alerts can be sent indicating entry to and exit from the Route Fence, and frequency of reports can be increased if the truck bearing the cargo leaves the fence. Location Fence can show the origin, destination and Safe Zone, i.e.: secured yard for the cargo. Text or alerts can be sent indicating the cargo is leaving its origin, entering and leaving the Safe Zone and arriving at its destination. Other alerts are also available that monitor the status and condition of cargo in transit, including Stationary, Distance to Destination and Arrival. Customers may have their own monitoring personnel or may use the LoJack SCI Monitoring Center, which provides advanced monitoring services. The Center is staffed by highly skilled professionals and is available 24/7/365 to provide world-class monitoring and device management support. For example, the leading provider of less-than and full-truckload services is respected and trusted by many shippers, including global airlines and freight forwarders to transport their goods expeditiously and safely between California and Florida. This transportation company provides a guaranteed 56-Hour Turnaround Commitment to its customers for the delivery of their goods. To ensure the guarantee delivery, the company utilizes the resources of the LoJack SCI Monitoring Center for constant surveillance of its trucks, evaluating all en route circumstances related to their defined security protocols and offers logistical adjustments as necessary to make certain it is able to fulfill its turnaround promise and hence retain its leadership position. The LoJack SCI Monitoring Center also is the focal point for responding, validating and dispatching the appropriate law enforcement or investigative agencies based on customers established protocols. Integration with Law Enforcement for Dispatch and Recovery A Key Differentiator: LoJack SCI is the only company in the emerging Commercial On-Highway Security Market that has the benefit of LoJack Corporation s unique and longstanding relationship with law enforcement agencies throughout the U.S. Plus, LoJack SCI has developed its own extensive multi-agency law enforcement database and recovery network that complements LoJack s existing relationships and includes cargo task forces, state and local law enforcement agencies and private investigators, as well as LoJack law enforcement liaisons. The combination of these two resources creates a formidable asset that no other company can duplicate. 7
8 For reported cargo theft: as soon as LoJack SCI receives a theft alert pertaining to cargo or a disruption in the supply chain, a specialist in the Monitoring Center notifies an appropriate department in its network of law enforcement agencies to handle the process of tracking and recovery. For reported truck or trailer theft: to expedite activation and tracking of a truck or trailer that has been reported stolen, the LoJack Stolen Vehicle Recovery System s software and databases are directly integrated with each state s crime computers. Police enter the report and the identification number is matched to the LoJack System registration number. After the match, the LoJack System is activated by police, which causes the small, hidden radio transceiver in the truck or trailer to emit a silent, continuous Radio Frequency signal. LoJack s Police Tracking Computers (PTCs) are installed in law enforcement vehicles, helicopters and fixed-wing aircraft to optimize tracking and recovery. Through the PTCs, the stolen asset communicates its whereabouts to authorities in real-time via the signal that is emitted from the hidden transceiver. This vehicle-to-vehicle communication delivers unprecedented precision in last mile tracking, which is optimal for recovery. Plus, LoJack has a distinctive staff of law enforcement liaisons, all former police officers with a specialization in vehicle theft prevention that work directly with LoJack SCI and law enforcement agencies in the fight against theft. Many law enforcement professionals acknowledge this as the optimal method for the recovery of trucks, trailers, and now, cargo. Recently, a well-known cosmetics company placed two LoJack SCI InTransit tracking devices in its 19-pallet shipment that was being transported from Chicago to Miami. The cargo, valued at more than $150,000, was stolen en route. Within approximately 24 hours of being notified of the theft, LoJack SCI monitoring specialists were able to provide law enforcement with the location of the cargo. The load was found within 30 feet of where the tracking device indicated it would be. Law enforcement was able to recover the cargo and identified a suspect who was placed under arrest. In another instance, gunmen drove into a truck terminal, stole a tractor-trailer loaded with a shipment of tobacco valued at $1,000,000, crashed through the gates and escaped. The LoJack SCI Monitoring Center was notified of the heist Approximately forty-five minutes later, law enforcement located the tractor-trailer... and within minutes was able to contact local law enforcement with the location of the tractor-trailer. Approximately forty-five minutes later, law enforcement located the tractor-trailer and was able to return it to the terminal. After an investigation, four suspects were arrested for the theft. LoJack SCI InTransit provides the covert tracking and monitoring solution that actually recovers stolen cargo. It also provides intangible benefits, including 8
9 helping law enforcement fight the problem of cargo theft which aids police in combating organized crime rings and getting wanted criminals off the streets. But most important, LoJack SCI InTransit helps protect both the supply chain and a company s bottom line. As an added incentive, insurance companies have recognized the positive impact that their insured customers investments in supply chain security and transportation asset protection solutions have on their overall risk profile. In most cases, the insured customers who make these investments can expect consideration from their insurer for loss deductible waivers and positive underwriting, which could lower their annual insurance rates. LoJack has specific programs with several insurance companies, including Chubb, Hanover, Liberty Mutual and Progressive. The Wisdom of Sharing Intelligence The 9/11 Commission Report stated that there is a heightened need to move from a need to know to a need to share mindset. LoJack SCI is fulfilling that need to share through its Supply Chain Information Sharing Analysis Center (SC-ISAC), which provides an extensive, diverse community of customer members from private industry to law enforcement with a platform to report information and combat supply chain threats. SC-ISAC is one of 11 existing ISACs that were instituted as part of a presidential decision directive under both the Clinton and Bush administrations to provide information critical for the safety of the infrastructure in the U.S. SC-ISAC aggregates intelligence not only from its members, but from the 10 other ISACs, as well as the Department of Homeland Security. It serves as the information sharing source that captures, analyzes and disseminates historical incident and case data on threats and vulnerabilities in the supply chain, including cargo theft, product diversion, and counterfeit cases. SC-ISAC provides actionable information to government, law enforcement and its private sector members and plays a vital role in bringing together cross industry organizations that contribute to the protection of the national infrastructure. The world s leading manufacturing, logistics and retail corporations are among the many member companies using SC-ISAC and LoJack SCI s solutions. At the end of 2008, SC-ISAC had more than 1,500 users from nearly 600 organizations a number that is increasing rapidly. The value that SC-ISAC provides continues to grow with each additional contributing member. As detailed earlier, LoJack SCI published its first annual Cargo Theft Study report based on information from SC-ISAC and will continue to issue these reports to the public at large annually and to members quarterly to provide the industry with important statistics and trend information. Membership in SC-ISAC provides benefits that cannot be found elsewhere, including: Alerts: Immediate notification of potential threats to the supply chain as they occur; available information on terrorist threats and natural catastrophes that could impact a member s interests 9
10 Bulletins: Twice Weekly news, advisories, incidents, events affecting the supply chain; industry-specific bulletins regarding counterfeiting, in-transit cargo theft and illegal diversion that will help in an individual organization s investigation, recovery and prevention efforts Situational Awareness: Up-to-date information including live maps and data feeds on external situations that could potentially disrupt and threaten the supply chain Events: Upcoming tradeshows, conferences, seminars, and other educational, networking, and collaborating opportunities that impact the supply chain across a broad spectrum of industries Advisories: Updates as they occur on government regulation and compliance requirements and strategies LoJack SCI s foresight and understanding of the market need for sharing information were catalysts for the development of SC-ISAC and one more example of how the company stands apart from the competition. Support LoJack SCI offers a wide range of support both as part of LoJack SCI InTransit and as stand-alone services. Clearly the most notable support within LoJack SCI InTransit is provided by the company s relationship with law enforcement, which includes Cargo Task Forces, state and local law enforcement agencies, private investigators, as well as LoJack Corporation s law enforcement liaisons. LoJack SCI also provides implementation support for its InTransit customers, which can encompass solutions such as asset protection, consultancy and incident and case management. LoJack SCI s support extends to its sales team who can offer prospective customers the opportunity to experience the capabilities and value of its solutions through its Pilot Programs. The sales team also works closely with customers to tailor buying and leasing options to meet exact requirements that balance security and business needs. Standing Apart from the Crowd Balancing security and business needs is indeed a challenge in today s world. In fact, maximizing efficiencies and minimizing risks particularly in the supply chain are essential for an enterprise s bottom line performance. No other company provides an integrated solution like LoJack SCI. LoJack SCI has the right management, partners and technology plus the power of LoJack s core technology, resources and law enforcement connection to deliver a comprehensive Commercial On-Highway Security solution that protects assets in the supply chain and ultimately impacts profitability. For more information, visit or call (800)
11 * The LoJack SCI Theft Study was based on information the company collected and analyzed in 2008 from members of its Supply Chain- Information Sharing and Analysis Center (SC-ISAC), the only source for information and analysis sanctioned by the government that helps the supply chain community and law enforcement protect the supply chain from illegal and disruptive activities. ** On-Highway Market includes truck stops, rest areas and other scheduled stops en route *** Chubb North American Cargo Theft 2008 Annual Recap 11
FACT SHEET COMPANY OVERVIEW PRODUCTS I. LoJack System For Cars and Light Trucks: The Flagship LoJack Stolen Vehicle Recovery System LoJack
FACT SHEET COMPANY OVERVIEW LoJack Corporation (NASDAQ: LOJN) is the premier worldwide provider of tracking and recovery systems. More than 25 years ago, LoJack Corporation created the stolen vehicle recovery
More informationSETTING THE STANDARD FOR SUPPLY CHAIN SECURITY
Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association
More informationApril 16th, 2009. By John Tabor Corporate Security Director National Retail Systems Inc.
April 16th, 2009 By John Tabor Corporate Security Director National Retail Systems Inc. In my former position as loss prevention executive for a major retailer, an important responsibility was designing
More informationSECURITY IN TRUCKING
SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada
More informationWith Satellite Technology
Containing Cargo Theft... With Satellite Technology author: Anu Sood, SkyWave Mobile Communications Cargo theft is an international phenomenon. While no definitive statistics are available as to how much
More informationCustoms-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)
Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program
More informationLOJACK AND LAW ENFORCEMENT
LOJACK AND LAW ENFORCEMENT A Cooperative Relationship for Stolen Vehicle Recovery For Law Enforcement Use Only TABLE OF CONTENTS Who is LoJack Corporation?... 2 What are LoJack s Products?...3 The following
More informationThe best way to protect commercial fleet assets from theft LOJACK STOLEN VEHICLE RECOVERY SYSTEM FOR COMMERCIAL FLEETS
The best way to protect commercial fleet assets from theft LOJACK STOLEN VEHICLE RECOVERY SYSTEM FOR COMMERCIAL FLEETS The unsettling facts about fleet vehicle theft Every business day, more than 10 million
More informationSecurity Profile. Business Partner Requirements, Security Procedures (Updated)
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
More informationCALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE
CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE PRESENTER BACKGROUND Sgt. Ken Huerta 25 Years, Port of Los Angeles Police Cargo Theft Interdiction Program Cargo Criminal Apprehension Team Criminal Investigations
More informationGlobal Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
More informationTotal Security Surveillance Ltd. Vehicle Tracking Services BROCHURE
Total Security Surveillance Ltd Vehicle Tracking Services BROCHURE Total Security Surveillance Ltd. Mucai Drive, Off Ngong Road, P.O Box 4243 00506 Nairobi. Tel: 020-2721218, 2017911/2, 020-6750440, Fax:
More informationC-TPAT Highway Carrier Security Criteria
C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup
More informationTracking Trucks With GPS
SUPPLY CHAIN BASICS: Tracking Trucks With GPS U.S. Department of Agriculture Agricultural Marketing Service Marketing Services Program January 2008 SUPPLY CHAIN BASICS: Tracking Trucks With GPS Gerald
More informationBONEMA TECHNOLOGIES PRODUCT FEATURES. The following training provides information on the Bonema product features.
BONEMA TECHNOLOGIES PRODUCT FEATURES The following training provides information on the Bonema product features. Real-time tracking Vehicle tracking relies both on the Global Positioning satellites (GPS)
More informationCargo Theft Prevention and Risk Mitigation for the Holiday Season
Hanover Risk Solutions Cargo Theft Prevention and Risk Mitigation for the Holiday Season As the holiday season approaches, manufacturers warehouses are packed to capacity as high-season inventory begins
More informationCloud Based Asset Management Case Study
Cloud Based Asset Management Case Study Presenter: Henry Popplewell, SVP and GM, SkyBitz Kate Gardner, Director of Information Technology, Taylor Truck Line, Inc. Presenters Henry Popplewell, Senior Vice
More information"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
More informationWelcome to TRACKER. STOLEN VEHICLE RECOVERY Agriculture and Construction
Welcome to TRACKER STOLEN VEHICLE RECOVERY Agriculture and Construction Welcome to total peace of mind Now you can happily leave your asset knowing that with TRACKER hidden inside, the police will be guided
More informationThe technology, experience. and expertise to solve. logistics challenges and. move products from origin. to destination, anywhere. in the world.
The technology, experience and expertise to solve logistics challenges and move products from origin to destination, anywhere in the world. MAGELLAN Transport Logistics A complete solution to all your
More informationAPEC Private Sector. Supply Chain Security Guidelines
APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation
More informationSecurity Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
More informationPool Distribution - Enhancing Store Fulfillment
Pool Distribution - Enhancing Store Fulfillment Service quality and cost equally matter for your company s distribution programs.. The good news is you don t have to sacrifice one for the other when you
More informationSCORPION TRACK.COM. Technologically Advanced Stolen Vehicle Tracking & Fleet Management System. Part of the Scorpion group
SCORPION TRACK.COM Technologically Advanced Stolen Vehicle Tracking & Fleet Management System Award Winning Best Consumer Tracking System Best Security Product Best Fleet Management System Best British
More informationSIMPLIFYING LOGISTICS: THE BENEFITS OF RAIL IN A MULTIMODAL SHIPPING SYSTEM
SIMPLIFYING LOGISTICS: THE BENEFITS OF RAIL IN A MULTIMODAL SHIPPING SYSTEM A well-designed shipping plan has bottom-line implications for any business. Creating a sound logistics strategy supported by
More informationSAMA Tracking Solutions
SAMA Tracking Solutions Vehicle Tracking System VTS SAMA Telecom 1 About SAMA Telecom SAMA TELECOM, is a leading company in telecommunication services, software application and system implementation. We
More informationCommercial Motor Vehicle Safety and Security Systems Technology Wireless Mobile Communications
Commercial Motor Vehicle Safety and Security Systems Technology Wireless Mobile Communications Objective Satellite- and cellular-based mobile two-way communication tracking systems for commercial motor
More informationFleet Optimization with IBM Maximo for Transportation
Efficiencies, savings and new opportunities for fleet Fleet Optimization with IBM Maximo for Transportation Highlights Integrates IBM Maximo for Transportation with IBM Fleet Optimization solutions Offers
More informationABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE
AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas
More informationSupply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
More informationDOT HAZMAT SECURITY AWARENESS TRAINING
ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader
More informationVehicle Tracking System
Vehicle Tracking System VASUDHA SoftAim Innovations Pvt. Ltd., Rahul Enclave, Atul Nagar, Waraje, Pune -58, M.S. India. email-contactus@softaiminnovations.com, Ph: +91-020-30421077 www.softaiminnovations.com
More informationA fool proof Fleet Management System
A fool proof Fleet Management System for your business providing complete fleet management with customised solutions that not only ensure the safety of your goods, vehicles and personnel, but also enhances
More informationC-TPAT Security Criteria Sea Carriers
C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does
More informationtranslating zero-1 Searching Business Solutions... Empowering Technology Across Enterprises, Infox translating zero- 1 Fleet Management
translating zero-1 Satellite Vehicle Tracking Embedded Systems Development Fleet Management Searching Business Solutions... Empowering Technology Across Enterprises, Infox COMPANY OVERVIEW Infox is an
More informationWAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
More information1.877.775.6522. www.lojack.com TS 5/09
1.877.775.6522 www.lojack.com TS 5/09 The criminal world has discovered a lucrative and growing market: heavy construction equipment. This growing problem is extremely costly to owners of construction
More informationIntermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
More informationALL TRACK Provides Solutions for:
ALL TRACK Provides Solutions for: Fleet / Vehicle tracking (GPS / AVL) Tracking of rider activity (entry / exit) on transit vehicles Tracking asset movement (e.g. pumps, motors, generators, etc.) Tracking
More informationTSR2014 TRUCKING SECURITY REQUIREMENTS. Transported Asset Protection Association. All rights reserved.
TSR2014 TRUCKING SECURITY REQUIREMENTS About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics service providers. The
More informationGlobal Asset Tracking & Identification System
` Global Asset Tracking & Identification System 2 About GATIS Solutions Global Asset Tracking & Identification Systems GATIS is a robust, secure and comprehensive Auto-ID system, with a logistic and asset
More informationRedefining Security for the Modern Facility
Redefining Security for the Modern Facility TM Make the most of your energy 02 Protecting your people, property and data 03 Trust your facilities to a leader in security systems The world is changing rapidly.
More informationProtect your pride and joy with tracker
Protect your pride and joy with tracker STOLEN VEHICLE RECOVERY Car theft affects thousands of people each year, but the impact is wider than just losing your vehicle there are both financial and emotional
More informationwelcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
More information{TSR} PROTECTED. Transported Asset Protection Association
{TSR} PROTECTED TRUCK SECURITY REQUIREMENTS (TSR) 2012 About TAPA About TAPA Cargo crime is one of the biggest supply chain challenges for manufacturers of high value, high risk products and their logistics
More informationHAZMAT by truck: another vulnerability?
J Transp Secur DOI 10.1007/s12198-009-0036-1 HAZMAT by truck: another vulnerability? Jim Giermanski Received: 16 November 2009 / Accepted: 14 December 2009 # Springer Science+Business Media, LLC 2009 Abstract
More informationIncreasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards
Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards September 2010 SURGE logistics- GSProgress Inc. 1000 Potomac Street NW The Flour Mill Building Washington,
More informationTAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility
TAC I/A Series Continuum Security Solutions Redefining Security for the Modern Facility Trust your facilities to a leader in security systems The world is changing rapidly. Companies and government agencies
More informationSeventh Avenue Inc. 1
Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).
More informationWelcome to TRACKER STOLEN VEHICLE RECOVERY
Welcome to TRACKER STOLEN VEHICLE RECOVERY Welcome to total peace of mind Now you can happily leave your vehicle knowing that with TRACKER hidden inside, the police will be guided straight to it, should
More informationTASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)
TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such
More informationGuidance Notes FSR 2014
Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a
More informationLeverage Real-Time Business Intelligence to Optimize Mobile Resource Management
Leverage Real-Time Business Intelligence to Optimize Mobile Resource Management LEVERAGE REAL-TIME BUSINESS INTELLIGENCE TO OPTIMIZE MOBILE RESOURCE MANAGEMENT Commercial businesses and government organizations
More informationAPPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES
APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES Northern Border Activities B-1 July 2012 CBP MISSION We are the guardians of our Nation s borders. We are America s frontline.
More informationLOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION
LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION INSTRUCTIONS FOR COMPLETING APPLICATION: 1. Please answer all the questions. This information is required to make an underwriting and pricing evaluation.
More informationCustoms-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided
More informationTracKing. A complete web-enabled temperature management system.
TracKing A complete web-enabled temperature management system. Wireless communications for improved asset utilization and fleet efficiency. T hermo King is proud to offer a new mobile communications system
More informationRail Carrier Security Criteria
Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers
More informationHow GPS works? WHAT IS GPS? HOW TRACKING WORKS?
WHAT IS GPS? The Global Positioning System (GPS) is a satellite-based navigation system made up of a network of 24 satellites placed into orbit by the U.S. Department of Defense. GPS was originally intended
More informationYusen Logistics (Italy) S.p.A. A Company Profile
Yusen Logistics (Italy) S.p.A. A Company Profile Yusen Logistics Global - Mission Statement Mission Contribute to global economic development and maximize corporate value by earning the trust of our customers
More informationRECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING
U.S. Department of Homeland Security Arlington, VA 22202 RECURRENT FLIGHT SCHOOL SECURITY AWARENESS (FSSA) TRAINING Recurrent FSSA Training for Flight School Employees and independent Certified Flight
More informationWHITE PAPER. Improving Driver Safety with GPS Fleet Tracking Technology
Improving Driver Safety with GPS Fleet Tracking Technology 1 How Much Will Unsafe Driving Cost You? Whether you are a small business owner or a fleet manager for a larger organization, it s difficult to
More informationMINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION
MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen
More informationMANAGEMENT SOLUTION 0861 CARTRACK (0861 22 78 72)
THE THE INTELLIGENT INTELLIGENT VEHICLE VEHICLE RECOVERY AND AND FLEET FLEET MANAGEMENT SOLUTION 0861 CARTRACK (0861 22 78 72) INTRODUCTION Having established itself in no less than eleven Sub-Saharan
More informationTotally Wireless Video Security
Traditional Video Surveillance ($50,000+) vs. Event-Based Videofied Solution ($2,500) Executive Summary: Totally Wireless Video Security has been effective but cost and complexity has limited deployment
More information1.1 OVERVIEW OF THE DOCUMENT 1.2 BACKGROUND TO THE PROJECT
CHAPTER 1 INTRODUCTION 1.1 OVERVIEW OF THE DOCUMENT This project thesis examines the task of learning to develop a cost-effective vehicle movement tracking system for companies to track their vehicles.
More informationAbout Redtail Telematics
Company Overview About Redtail Telematics Redtail was established to explore the potential of GPS technology; turning location and accelerometer data into meaningful insight for consumers, fleet managers,
More informationOmnis. tracking technology. tamed protecting freight, safeguarding profits
Omnis tracking technology tamed protecting freight, safeguarding profits 2 Our vision: to make freight more efficient The massive increase in transportation of goods and freight forwarding has inevitably
More informationSeals Security & Best Practices
Seals Security & Best Practices Presented by Raymond Monzon Supply Chain Security Specialist Miami C-TPAT Field Office What Will Be Covered Intro This presentation will cover: C-TPAT Criteria ISO Seals
More informationSENTRY S E C U R I T Y SYSTEMS, LLC Presents. Critical Considerations in Site Security San Antonio TX
SENTRY S E C U R I T Y SYSTEMS, LLC Presents Critical Considerations in Site Security San Antonio TX AGENDA Who We Are A Telling Story The Heart of Sentry s System: THE ELECTRIC GUARD DOG How it Works
More informationSUPPLY CHAIN SECURITY IN THE 21 st CENTURY
SUPPLY CHAIN SECURITY IN THE 21 st CENTURY INTRODUCTION Overview of the Supply Chain Recent Supply Chain Security Issues Standards: World Customs Organization (WCO) Framework U.S. Customs and Border Protection
More informationEach time a driver crosses the international border, the driver must clear, or be released by, the customs agency of the country they are entering.
U.S.-CANADA CUSTOMS Falcon does a lot of business in Canada, both picking up and delivering. The company often runs loads across Canada between Buffalo, NY, and Detroit, MI, as Canadian routes are approximately
More informationCustoms & Trade Partnership Against Terrorism (C TPAT)
Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs
More informationFreedom to drive. Taking back tomorrow with class leading products and services
Freedom to drive Taking back tomorrow with class leading products and services Tracker helps you to manage the costs and risks associated with owning and using a vehicle in South Africa. We re taking back
More informationHOW TO SELECT A LTL CARRIER
HOW TO SELECT A LTL CARRIER By ADLI Logistics January 2016 Abstract Selecting a carrier for LTL (less than truckload) shipments can be a daunting task given the large number of carrier providers. Prior
More informationE3211. DOT Hazmat Security Awareness. Leader s Guide
E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the
More informationImporters must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationTHE ROLE OF GIS IN PSAP AND RESPONDER OPERATIONS
THE ROLE OF GIS IN PSAP AND RESPONDER OPERATIONS Thought Paper: The Role of GIS in PSAP and Responder Operations In the past, PSAP personnel and responders were dependent on wall maps and map books for
More informationGPS Forensics Crime, Jamming & Spoofing. Professor David Last
GPS Forensics Crime, Jamming & Spoofing Professor David Last Consultant Engineer & Expert Witness jdl@navaid.demon.co.uk ABSTRACT. The most widely used of all GPS devices currently are car satellite navigators.
More informationFOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand
FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.
More informationBest Practices For. Supply Chain Security
Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers
More informationSatellite Monitoring as a Legal Compliance Tool in the Environment Sector. Case Study Four: The Global Positioning System and Waste Tracking
Satellite Monitoring as a Legal Compliance Tool in the Environment Sector Case Study Four: The Global Positioning System and Waste Tracking (Ref: AHRC Report 22). 1. Introduction GPS (the Global Positioning
More informationOur Driving Force. is People
Our Driving Force is People Win-Win Relationships Being situated in Atlantic Canada has its advantages. The strong sense of community we ve grown up with is fully integrated into our company s culture.
More informationMSC Security Program Security in the Logistics Supply Chain
Maritime Security Council L MSC Security Program Security in the Logistics Supply Chain First Hemispheric Convention on Port Logistics and Competitiveness Ixtapa-Zihuatanejo November 3-5, 2010 Talking
More informationJOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
More informationLAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN ESF-13
LAWRENCE COUNTY, KENTUCKY EMERGENCY OPERATIONS PLAN LAW ENFORCEMENT AND SECURITY ESF-13 Coordinates and organizes law enforcement and security resources in preparing for, responding to and recovering from
More informationJordan s electronic transit monitoring and facilitation system
World Customs Journal Jordan s electronic transit monitoring and facilitation system Abstract Arif A Alfitiani Like most countries with numerous international borders, Jordan has adopted a number of different
More informationNG 911-FirstNet Whitepaper. NPSBN as a Strategic Enabler of Next Generation 9-1-1
NG 911-FirstNet Whitepaper NPSBN as a Strategic Enabler of Next Generation 9-1-1 Table of Contents Emergency Communications in a Mobile World... 2 Overview of NG911... 3 Overview of NPSBN... 3 Using NPSBN
More informationTECHNOLOGY BRIEF. Business Benefits from Radio Frequency Identification (RFID)
TECHNOLOGY BRIEF Business Benefits from Radio Frequency Identification (RFID) Executive summary Today the largest government and business enterprises in the world are developing plans to deploy electronic
More informationServing all of North America with one of the largest fleets on the continent
TRANSPORTATION Flatbeds Single Drop Decks Double Drop Decks Stretch Trailers Dry Vans Side Kits Conestoga Trailers Truckloads LTLs Partials Teams Tracking Expedited HazMat TWIC Fast Pak C-TPAT Serving
More informationIncisive Business Guide to Vehicle Tracking
Incisive Business Guide to Vehicle Tracking Vehicle Tracking Guide Summary This guide from Incisive Business outlines the features and benefits for your business from managing your company vehicles using
More informationCHAPTER 8: INTELLIGENT TRANSPORTATION STSTEMS (ITS)
CHAPTER 8: INTELLIGENT TRANSPORTATION STSTEMS (ITS) Intelligent Transportation Systems (ITS) enables people and goods to move more safely and efficiently through a state-of-the-art multi-modal transportation
More informationReturn the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.
TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT
More informationwww.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services
www.lgrmg.ca Setting the Standard in Risk Management Consulting and Investigation Services Setting the Standard in Risk Management Consulting and Investigation Services AN INTRODUCTION Lions Gate Risk
More informationDEMONSTRATION OF THE RADIO FREQUENCY IDENTIFICATION TRANSPORTATION SECURITY AND SAFETY SYSTEM
DEMONSTRATION OF THE RADIO FREQUENCY IDENTIFICATION TRANSPORTATION SECURITY AND SAFETY SYSTEM Technology Demonstration Summary Laredo, Texas, October 15, 2003 Co-sponsors U.S. Department of Energy and
More information2010 SECURITY AWARENESS TRAINING
2010 SECURITY AWARENESS TRAINING Hazardous materials are essential to the economy of the United States and the well being of its people. They fuel our cars and trucks and locomotives, heat and cool our
More informationSylectus and Omnitracs Integration
Case Study Sylectus and Omnitracs Integration Leading expediter Load One integrates the latest technologies to automate operations, eliminate costs, and gain the competitive edge. In today s business climate,
More informationFedEx HealthCare Solutions. Supporting the global healthcare industry
FedEx HealthCare Solutions Supporting the global healthcare industry Today s Agenda Industry Trends Supply Chain Implications FedEx HealthCare Solutions Q&A 2 The HealthCare Industry is at a Critical Development
More information