Warehouse Security Tips

Size: px
Start display at page:

Download "Warehouse Security Tips"

Transcription

1 Warehouse Security Tips an e Book from RSI Insurance Brokers to Help Prevent Cargo Loss Toll Free (800) info@rsi ins.com

2 TABLE OF CONTENTS: Chapter 1 Inventory Protection Measures Chapter 2 Warehouse Layout For Better Security Chapter 3 Security Tips for Docks Chapter 4 Responsibilities of Management & Drivers Chapter 5 - Available Technology

3 CHAPTER 1: Inventory Protection Measures VISUAL HERE Cargo theft is an ever increasing problem in the transportation industry. It's estimated that cargo theft costs shippers and trucking companies up to $30 billion a year and it's only getting worse. A recent study showed the frequency of cargo theft claims is increasing 13% percent per year. Sentry Insurance Page 3

4 Inventory Protection Measures With people in, out and around your inventory, it's difficult to protect it from pilferage...but there are ways. Retailers have long understood that they have more to fear from dishonest employees than they do shoplifters. In 2002, retailers lost over $15 billion to employee theft and fraud. For your warehouse, the losses are almost entirely internal; there are no customers to shoplift, and external thieves often work with an employee to gain access or information. The threat to your inventory and profitability is significant. It costs you in lost inventory, higher insurance premiums, and personnel turnover. A recent study at the University of Florida reveals that security managers attribute more than 48 percent of theft to employees. Hire the Right People It starts with hiring the right people which is easier said than done. You can reduce your risks with personnel steps like checking references and backgrounds of your applicants. Look for felony records, especially for those you re going to trust with access to areas with highly desirable inventory. Even mundane inventory will be pilfered at surprisingly high rates if you have the wrong people in place. Utilize Warehouse Equipment that Secures Areas Equipment solutions are possible, as well. You can look at such items as security mirrors that give you visibility into closed areas, around corners, and into hallways. Wire Partitions and Security Cages will tightly control access. You can also limit access to an area with Folding Security Gates, if you need flexibility and door coverage. Lockable wire cabinets and lockers can provide pilferage deterrence and protection in the right situation. There are other products that can lock a pallet rack bay or a shelving unit down, allowing you to combine security and storage into the same process. Security focused storage equipment is not the sole answer, of course, but its role is often understated. Page 4

5 Monitor and Check Frequently Look toward your inventory monitoring processes to also provide some relief. If you know what inventory you have and what you re supposed to have at any given point, identifying a source of theft is much easier. If it goes on for weeks or months before you know about it, the damage has already been done and you probably won t recoup the losses. It s best to check early and often. For extreme cases, there are companies that specialize in undercover operations and surveillance. You can find many of them by searching Google or Yahoo under the term warehouse security system. Often, they will discover problems that undermine productivity as well as pilferage. For instance, Florida based Internal Intelligence International discovered a significant illegal drug selling operation in the plant of one of its clients. This is an extreme measure, but if you need it, you need it. Focus Security Systems and Processes Internally as well as Externally Sufficient monitoring systems should be considered for high risk areas, too. Camera and surveillance systems are good, but something as simple and inexpensive as unscheduled walk throughs are very effective theft deterrents. Unpredictability is the key. Your information should be timely, but your walk throughs in the warehouse should be something that you do frequently and without a fixed schedule. Watch your loading docks and platforms they re very easy places for a thief to remove stolen property, often in partnership with an outsider. Your security system is typically designed to protect your facility from outside thieves. How much emphasis does it put on employee theft? Read and Update your Knowledge The U.S. Customs department has published warehouse security information for companies dealing with Customs issues on its website. Many of its recommendations are common sense, and apply to general warehousing as well as customs specific operations. Page 5

6 One common sense recommendation is that you separate shipping docks from employee parking lots, making it much more difficult to remove items from the warehouse. No single thing will reduce theft, but a combination of processes, hiring standards, security systems, and equipment can combine to help you improve your operation and eliminate losses associated with internal inventory pilferage. For more information to help you prevent cargo theft in your operation, please contact a Safety Consultant at RSI Insurance Brokers. We also encourage you to visit Page 6

7 CHAPTER 2: Warehouse Layout For Better Security Lay out your warehouse for security: how your warehouse layout can deter inventory theft, pilferage, and shrinkage. 1: Trash Dumpsters and other Containers It's a poor idea to place a dumpster or other bins, large containers, scrap vessels, or cans near an accessible door. They can become ideal places for thieves to stow stolen inventory for later pickup and removal to cars. If you cannot position your dumpster in a way that discourages thievery, consider making it lockable so that access is difficult to unauthorized personnel, searching it frequently, and letting people know it is monitored. 2: Total number of Doors This warehouse has far too many doors. There should only be one that is open, and there should be a guard or other employee in charge of watching this door. If fire regulations require more than one door, use bars that set off an alarm if the doors are opened. You can secure these doors with equipment such as folding security gates or man trap cages if they are already in your facility (but be certain to follow all local fire codes). 3: Staging Area This staging area may be too close to the loading docks. If no one is around to keep an eye out, it would be easy to take something and put it in a truck. Page 7

8 4: Shipping and Receiving Doors The receiving dock and the shipping dock are too close together, and there is no barrier between them. It would be easy to take things from one truck and put them into another. Erect a barrier between the doors if they are in place already with easy crossaccess between them. 5: Employee Parking Lot This parking area is too accessible to an employees who might steal inventory. The door is very close to the parking lot, making it easy to take things from the warehouse out to cars. It's best to have parking separated by a comfortable distance from the warehouse doors, making it more difficult to transport pilfered items. Best case scenario is to have a fence separating the warehouse from the parking lot, as well. 6: Trucker's Lounge, Break Room, etc. To get to this lounge area, the truckers have to walk all through the warehouse. Look at the tracks (light blue arrows) to see where they might walk. Everything along these routes is at risk. It is important to restrict movement in your warehouse. Don't let people just go wherever they want. If possible, lay out your warehouse to move visitors or guests to a lounge area without any access to inventory. If not, strictly instruct them on where they are expected to walk through your facility (and make sure they stick to it). Consider "man trap" dock area cages that let you admit truckers and other visitors at your convenience, within your restrictions. 7: Restroom Location This is a bad spot for the restroom. To reach it, the truckers have to walk through the warehouse. This puts your goods at risk of being stolen. Just because people are dropping off or picking up shipments doesn't mean they are free to wander around. It's best to keep unauthorized people out of the warehouse, or within a strictly limited path if they must be inside. There is usually no reason for someone other than your employees to be in your shelving or storage racks with access to stored items. Page 8

9 8: Bushes and Foliage Bushes, shrubbery, and foliage are a good hiding spot for things stolen out of the warehouse, especially when they are near a door. Remove the bushes or lock the doors to curtail this avenue for thieves. For more information to help you prevent cargo theft in your operation, please contact a Safety Consultant at RSI Insurance Brokers. We also encourage you to visit: Page 9

10 CHAPTER 3: Security Tips for Docks Avoiding Cargo Theft at the Point of Loading & Unloading $10 billion a year is stolen at shipping & receiving docks in the U.S. How can you protect your operations? Page10

11 Cargo theft occurs in freight forwarding yards, warehouses and during transportation in trucks, airfreight, and ships. Worldwide, the direct cost of cargo theft exceeds $30 billion annually and $10 billion in the United States alone, with indirect costs many times higher. On top of the cargo costs, losses are amplified by double or more due to investigative and insurance costs. For a business operating on a just in time basis, freight loss can be an extreme problem that threatens profitability and viability. According to a study done by the Australian Institute of Criminology, 87 percent of these losses are inflicted at the road transport level, where warehousers, shippers, and receivers of goods are most at risk. Almost any warehouse has something people want, although items such as electronics, footwear, clothing, prescription drugs, computers, jewelry, tobacco, and media such as DVD discs are especially coveted. But nearly anything can be at risk. The most common method employed to steal cargo involves a truck driver working with a warehouse employee. Working together, these parties can easily break a chain of awareness that shippers and receivers put into place and obscure exactly when the theft may have occurred. Cargo is at its greatest risk when it s being loaded and unloaded. It can be carted off while a driver s attention is diverted. Short orders can be loaded, or loose cargo can be concealed for later removal, according to the AIC report. This timeframe is particularly chaotic, involving people who are mostly concerned with getting the truck unloaded and away from the dock, not with security at any conscious level. Especially since the 2004 Hours of Service working rules change, warehouses and distribution centers are more concerned than ever with the speed at which they load or unload a truck. Unfortunately, this focus on loading speed also makes trucks and warehouses more vulnerable to theft and pilferage. Page11

12 What can you do? Experts say that besides being thorough in your hiring process certainly something you should do, but something that s not bulletproof there are several common sense steps you can take. Harden the Target Restrict access to your shipping and receiving areas: This is the point of vulnerability, where confusion and opportunity may meet and allow thieves an opportunity. Be sure everyone in the area has proper identification and is supposed to be there. It s all about access: you need to control who has it and who doesn t. If the trucker isn t involved in unloading, don t let him loiter in the area; consider providing a lounge area away from inventory and loading docks if possible. Secure your storage areas Utilize security partitions, cages, secure storage lockers, or mini security cages to lock up things that are particularly desirable to thieves as quickly as possible when they are received. Keep them locked up until you must unlock them before shipping. A number of available accessories can transform standard pallet racking and shelving into secure areas that you can control. Move cargo from receiving into these secure devices as soon as possible. On the shipping side, move it from them into trucks in the same, quick manner. Don't let things sit around the dock doors unattended and unlocked. Make sure all doors and windows have locks. Going further, consider the reason a particular door or window exists at all. When it isn t being used for business reasons or safety reasons, why keep it at all? You should consult safety experts in advance of permanently sealing a door. Get involved with the process * Hang around the docks: Nothing is more effective than being there, watching, and participating. Go to the docks, talk to people, and make sure they know you know who they are and what they re doing. This doesn t have to be an onerous process; a friendly conversation works wonders. Criminals play a percentage game. If the percentages shift, even a little, they may be deterred. This is particularly true in the case of casual thieves who take easy pickings but shun riskier thefts. Make it risky by being around and creating a culture of honesty Page12

13 among the people at the docks. The presence of a watcher can help to do that and make them wary for days. * Make sure merchandise isn t left unattended for long periods of time. It s folly to allow valuable inventory to stack up, unwatched, in the receiving department. Get it loaded into stock whenever possible. For those periods when you can t load higher risk shipments into normal storage, look to solutions such as portable, lockable security carts that can stow it away safely wherever it sits. This works even in shipping operations, since you can have a trusted employee unlock it when trucks arrive. If it s palletized, shrink wrap it so that getting at it requires more effort and more visibility. * Use seals that are difficult to reseal once they ve been broken: Such tools as self voiding tape and water gum tape make it hard for thieves to hide what they ve done. If they break a carton seal, it s visible. In the case of a trucker working with a warehouse employee, this can be particularly effective. * Consider electronic security systems and surveillance. You can monitor movements in the warehouse using these tools. Your insurance company may provide better rates to you if you have them, and they are great deterrence. Simple tricks such as installing a dome mirror or an opaque camera dome may deter some people. It lets them know that you re paying attention. In the end, nothing is foolproof, but a combination of common sense tactics, equipment, and awareness can significantly cut your chance of losses. Consider the way people steal cars: no thief can be stopped by a car alarm or steering wheel attachment, but they may move on to cars that don t have these devices. Your efforts aren t meant to create a totally secure environment very little can make that happen. Your shipping and receiving area should become a hard target, too risky for thieves to consider. Page13

14 CHAPTER 4: Responsibilities According to most experts, the vast majority possibly as much as 85% of cargo losses can be attributed to employee theft. Cargo security generally centers on three specific areas: at the terminal, while in transit, and at the destination. Since in transit hijackings account for only a small percentage of cargo crime, clearly the key to reducing cargo losses is to focus on the prevention of theft and pilferage at the terminal, during delivery of the shipment, and while cargo is being unloaded at the destination. This e Book provides practical measures that can be used to improve the security provided to cargo. By establishing an effective security program that provides for the accountability of cargo at all stages of its handling, substantial reductions can be made in cargo crime losses. Information specific to hijacking prevention is not included. Page14

15 Management Responsibilities Implement a cargo security program that includes written procedures for the proper handling of cargo. Establish guidelines for the screening and selection of employees. Maintain liaison with local, State, and federal law enforcement agencies. Enclose the terminal with a perimeter fence and, where practical, utilize a fence alarm system. Maintain adequate nighttime lighting along the perimeter fencing, around storage structures, and in all yard and parking areas. Install a central station burglar alarm system to protect the facility during the closed period. The system should protect all buildings and high value cargo enclosures, as well as yard storage areas. Equip all perimeter entrances with secure locking devices and establish an effective key control program. Provide parking for employees and visitors outside the terminal enclosure. Require employees and visitors to enter and exit the terminal enclosure through one monitored door or gate. Require that all parcels be declared upon entry to the facility and inspected upon departure. Implement a badge identification system to regulate the movement of employees and visitors, and require employees to display their badges at all times, Station guards at perimeter gates to inspect and manifest all cargo upon arrival at or departure from the facility. Maintain a log of all cargo seals and store un issued seals in a secure place with access limited only to authorized personnel. Store all high value cargo in cargo cages or other secure areas, and assign supervisory responsibility to one person per shift. Page15

16 Identify high value cargo on bills of lading by code numbers or as general freight to conceal its identity. Restrict access into storage areas only to those employees so authorized. Separate the shipping and receiving areas as much as possible. Supervise the shipping and receiving operations, and utilize closed circuit television surveillance to deter pilferage. Implement a program of frequent, unannounced spot checks, or audits, of shipping and receiving operations. Rotate cargo personnel onto different shifts and locations, as practical, to limit the opportunity for collusion. Supervise trash disposal and salvage activities to prevent valuable items from being concealed in trash containers for later retrieval. Use kingpin locks to secure loaded cargo trailers and maintain arecord of their use. Devise a parking arrangement for loaded trailers to prevent easy, unauthorized hook up. Install truck alarm systems that provide for 90 day maintenance checks and keep a record of all service. Provide high visibility identification for trailers (e.g., paint numbers on top for easy identification from overhead. Provide good locks for securing trailers during multi stop deliveries. Select a reputable company when storing cargo in transit, and determine beforehand that the storage location has adequate security. Driver Responsibilities Inspect the integrity of cargo seals on departure from the terminal. Check operation of truck alarm before departure from the terminal. Do not to discuss the nature of the cargo with anyone. Establish a pre planned route to the destination and deviate as little as possible from the route. Page16

17 Keep cab doors locked while driving, and do not to pick up hitchhikers. Park the truck in an area where it can be observed during relief or meal stops. Do not park loaded trailers in unlighted or remote areas. Remove keys from the ignition when leaving vehicle, roll up windows, and lock all door and compartments. Log in with the dispatcher immediately upon arrival at a destination. Inspect cargo seals for tampering and compare seal numbers with shipping documents. Oversee the unloading of cargo. Obtain a signed acknowledgement for the receipt of cargo. Page17

18 CHAPTER 5: Available Technology Cargo theft hurts your bottom line and your reputation with shippers. By developing and implementing strong countermeasures, you can control this growing hazard. For more information to help you prevent cargo theft in your operation, please contact a Safety Consultant at RSI Insurance Brokers. We also encourage you to visit Page18

19 Take Advantage of Technology When it makes sense, install alarm surveillance systems, and respond to every alert. Ensure the perimeter, entrances, building doors and windows are well lit. Vehicle and cargo tracking, vehicle immobilizers, including anti theft heavy duty locking devices and advanced security seals, are now available at lower costs. No matter what you purchase and install, combine it with a viable escalation and response plan. Global Positioning System tracking is available for power units, trailers and cargo. This technology helps law enforcement locate and recover both equipment and cargo. Radio Frequency Integrated Circuits can be loaded in with the cargo to assist authorities in recovering stolen cargo GeoFencing can be set up to notify dispatch when a unit leaves apreset course Systems are also available that allow dispatch to remotely disable a power unit if a theft occurs Page19

20 If you re interested in improving your Warehouse Security Processes, request an evaluation from a Safety Consultant at RSI Insurance Brokers. Toll-Free (800) info@rsi-ins.com Sources: Sentry Insurance, NICB, CargoNet, & Cisco-Eagle

10 Ways to use Material Handling to Increase Security

10 Ways to use Material Handling to Increase Security 10 Ways to use Material Handling to Increase Security Security is more than guards and cameras it s about the ways you store, organize, track, and segment inventory Inside: 10 ways to secure your operation

More information

Crime Prevention: A Guide for Small Businesses

Crime Prevention: A Guide for Small Businesses Crime Prevention: A Guide for Small Businesses Text File Slide 1 Crime Prevention: A Guide for Small Businesses Welcome to SBA s online training program, Crime Prevention: A Guide for Small Businesses.

More information

SECURITY IN TRUCKING

SECURITY IN TRUCKING SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada

More information

A CISCO-EAGLE WHITE PAPER:

A CISCO-EAGLE WHITE PAPER: A CISCO-EAGLE WHITE PAPER: industrial & warehouse Security: put a stop to theft and pilferage www.cisco-eagle.com 888-877-3861 theft costs warehousers, manufacturers, & shippers $15 billion every year.

More information

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Security Profile. Business Partner Requirements, Security Procedures (Updated) Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

DOT HAZMAT SECURITY AWARENESS TRAINING

DOT HAZMAT SECURITY AWARENESS TRAINING ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader

More information

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade

More information

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

DOT IN-DEPTH HAZMAT SECURITY TRAINING PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow

More information

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS The requirements of these Oracle Global Supply Chain and High Value Asset Physical Security Standards apply to all geographical

More information

LOSS PREVENTION IAT GROUP

LOSS PREVENTION IAT GROUP LOSS PREVENTION IAT GROUP CARGO SECURITY AND LOSS PREVENTION Introduction Cargo protection requires thorough planning to be effective and remain effective through changing conditions. Cargo security is

More information

Business Security Check List

Business Security Check List DOORS, WINDOWS, AND OPENINGS: Are all entrance doors clearly visible from either the parking lot or the street? Do all entrances doors have shatterproof windows that allow a person to look outside before

More information

Supply Chain Security Audit Tool - Warehousing/Distribution

Supply Chain Security Audit Tool - Warehousing/Distribution Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:

More information

APEC Private Sector. Supply Chain Security Guidelines

APEC Private Sector. Supply Chain Security Guidelines APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

Security Guidelines for. Agricultural distributors

Security Guidelines for. Agricultural distributors Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole

More information

How to Prevent Car Theft

How to Prevent Car Theft During the time it takes you to read this, a thief could break into your vehicle, hot-wire it and drive away. If you think it won't happen to you, consider these following facts that were given by the

More information

C-TPAT Self-Assessment - Manufacturing & Warehousing

C-TPAT Self-Assessment - Manufacturing & Warehousing Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name

More information

E3211. DOT Hazmat Security Awareness. Leader s Guide

E3211. DOT Hazmat Security Awareness. Leader s Guide E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...

More information

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core

More information

Seventh Avenue Inc. 1

Seventh Avenue Inc. 1 Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).

More information

Customs & Trade Partnership Against Terrorism (C TPAT)

Customs & Trade Partnership Against Terrorism (C TPAT) Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs

More information

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No: ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business

More information

Best Practices For. Supply Chain Security

Best Practices For. Supply Chain Security Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers

More information

AUTO THEFT PREVENTION HANDBOOK ST. LOUIS COUNTY POLICE DEPARTMENT TABLE OF CONTENTS. Important Numbers 2. Auto Theft Statistics 3

AUTO THEFT PREVENTION HANDBOOK ST. LOUIS COUNTY POLICE DEPARTMENT TABLE OF CONTENTS. Important Numbers 2. Auto Theft Statistics 3 AUTO THEFT PREVENTION HANDBOOK TABLE OF CONTENTS Important Numbers 2 Auto Theft Statistics 3 Precautionary Measures 4 What Not to Do 5 6 Anti Theft Devices 7 8 Personal Safety Tips 9 Vehicle Purchases

More information

NSW POLICE FORCE. Home Safe

NSW POLICE FORCE. Home Safe NSW POLICE FORCE Home Safe IS YOUR HOME SECURE? This brochure is intended to provide your household with the latest information regarding home security and break-in prevention. You will learn how to evaluate

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program

More information

C-TPAT Highway Carrier Security Criteria

C-TPAT Highway Carrier Security Criteria C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup

More information

Cargo Theft Prevention and Risk Mitigation for the Holiday Season

Cargo Theft Prevention and Risk Mitigation for the Holiday Season Hanover Risk Solutions Cargo Theft Prevention and Risk Mitigation for the Holiday Season As the holiday season approaches, manufacturers warehouses are packed to capacity as high-season inventory begins

More information

Upon completion of the module, you will be issued an electronic training certificate.

Upon completion of the module, you will be issued an electronic training certificate. Introduction The US Department of Transportation mandates security awareness training as part of their security requirements found in Subpart I of Part 172 of the Hazardous Materials Regulations. The requirement

More information

The Training Material on Logistics Planning and Analysis has been produced under Project Sustainable Human Resource Development in Logistic Services

The Training Material on Logistics Planning and Analysis has been produced under Project Sustainable Human Resource Development in Logistic Services The Training Material on Logistics Planning and Analysis has been produced under Project Sustainable Human Resource Development in Logistic Services for ASEAN Member States with the support from Japan-ASEAN

More information

Security Policies and Procedures

Security Policies and Procedures Security Policies and Procedures April 26, 2012 Kristen Whelan Transportation Consultant kwhelan@libertyint.com www.libertyint.com Customs-Trade Partnership Against Terrorism What is C-TPAT? CBP and Industry

More information

http://homedefensesecurity.com

http://homedefensesecurity.com The Basics of Home Security Topics Covered: Home Security Basics Home Security Guides Home Security Products and Services The Value of Insurance in Home Protection Top Ten Tips for Your Home Security Essentials

More information

The Complete Security Survey

The Complete Security Survey The Complete Security Survey You should do a security survey of your office or property on a regular basis. Follow this checklist. It will provide you with an overview of the level of security in your

More information

Holidays are special times to be shared with family and friends. Protect yourself and loved ones by following these safety tips.

Holidays are special times to be shared with family and friends. Protect yourself and loved ones by following these safety tips. DECEMBER HOLIDAY SAFETY AND SECURITY TIPS San Diego Police Department December 1 st, 2015 CONTENTS AT HOME AWAY FROM HOME WHEN DRIVING AND PARKING WHEN SHOPPING CHILDREN Holidays are special times to be

More information

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.

The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online. 1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful

More information

C-TPAT Security Criteria Sea Carriers

C-TPAT Security Criteria Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does

More information

FSIS Security Guidelines for Food Processors

FSIS Security Guidelines for Food Processors United States Department of Agriculture Food Safety and Inspection Service FSIS Security Guidelines for Food Processors Food Security Plan Management Dear Establishment Owner/Operator: The Food Safety

More information

April 16th, 2009. By John Tabor Corporate Security Director National Retail Systems Inc.

April 16th, 2009. By John Tabor Corporate Security Director National Retail Systems Inc. April 16th, 2009 By John Tabor Corporate Security Director National Retail Systems Inc. In my former position as loss prevention executive for a major retailer, an important responsibility was designing

More information

Identity Theft: Knowingly uses identifying information of another to obtain cash,

Identity Theft: Knowingly uses identifying information of another to obtain cash, THEFT, C.R.S. CRS 18-4-401 401 Boulder Police Department Non Emergency 303-441 441-3333 Emergency 911 Agenda Officer Robyn Vanderleest Theft Definition i i Felony vs. Misdemeanor Employee Theft Credit

More information

A Self-Audit of Your Current Campus Security Systems

A Self-Audit of Your Current Campus Security Systems A Self-Audit of Your Current Campus Security Systems Security Solutions for Education, Business & Public Safety Free Consultations on ID Card Systems, Access Control, Call Recording, Video Surveillance,

More information

Security Criteria for C-TPAT Foreign Manufacturers in English

Security Criteria for C-TPAT Foreign Manufacturers in English Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors. Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right

More information

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities. 2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must

More information

Palm Beach County Sheriff s Office

Palm Beach County Sheriff s Office Palm Beach County Sheriff s Office Business Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for hundreds of thousands of people who live, work and visit

More information

Global Supply Chain Security Recommendations

Global Supply Chain Security Recommendations Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed

More information

BUSINESS SECURITY CHECKLIST

BUSINESS SECURITY CHECKLIST BUSINESS SECURITY CHECKLIST Bozeman Police Department 615 South 16th Avenue - Bozeman, MT - 59715 406-582-2000 - n Emergency bozemanpolice.com Exterior Doors, Windows & Openings Are all entrance doors

More information

Rail Carrier Security Criteria

Rail Carrier Security Criteria Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Trucker) Please answer the following questions about your company s cargo security processes and participation

More information

Car Security Begins at Home

Car Security Begins at Home Please print out and complete this form to reduce the risk of car theft happening to you. In Australia, seven in 10 late model vehicles are stolen by the thief gaining access to the vehicles keys or transponder.

More information

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building

More information

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and

More information

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft?

Protecting Yourself Against Identity Theft. Identity theft is a serious. What is Identity Theft? Protecting Yourself Against Identity Theft Identity theft is a serious crime. Identity theft happens when someone steals your personal information and uses it without your permission. It is a growing threat

More information

Intermec Security Letter of Agreement

Intermec Security Letter of Agreement Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism

More information

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants Adapted from information provided by the U.S. Department of Agriculture Food Safety and Inspection Service GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants March 2008 BY COMPLETING PAGE

More information

Policing requirements for Closed Circuit Television

Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 1 Policing requirements for Closed Circuit Television Policing requirements for Closed Circuit Television 2 Closed circuit television (CCTV) systems

More information

C-TPAT Importer Security Criteria

C-TPAT Importer Security Criteria C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources

More information

Integrating Routing Software With Your Business Process Workflow

Integrating Routing Software With Your Business Process Workflow Integrating Routing Software With Your Business Process Workflow Appian Software for Routing and Logistics from TMW Systems 2012 TMW Systems Inc. Cleveland Dallas Raleigh Indianapolis Oklahoma City Vancouver

More information

Preventing Burglaries

Preventing Burglaries Preventing Burglaries By Captain Binder The United States is one of the wealthiest countries in the world, home to some very affluent communities. Not surprisingly, some of the wealthiest cities are located

More information

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen

More information

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided

More information

8 secrets. Your Burglar Won't Tell You

8 secrets. Your Burglar Won't Tell You 8 secrets Your Burglar Won't Tell You In the United States alone, a home burglary occurs every 14 seconds. These kinds of statistics can be alarming, and the best thing you can do as a homeowner is educate

More information

Home Security Assessment Checklist DATE

Home Security Assessment Checklist DATE Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.

More information

Keeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety.

Keeping your identity safe. Keeping you safe. Your home, shed and outbuildings. Bogus callers. Keeping your things safe. Internet safety. // CRIME IS LOW IN LANCASHIRE We want to work with you to keep it that way. This section contains tips on how you can help to prevent crime and avoid becoming a victim of crime. Click on the contents below

More information

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants Food Defense Self-Assessment Checklist for Slaughter and Processing Plants Outside Security 1. What food defense measures does your plant have in place for the exterior of the building? Are the plant s

More information

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas

More information

Small Business Crime Prevention

Small Business Crime Prevention Small Business Crime Prevention Crime burglary, robbery, vandalism, shoplifting, employee theft, and fraud costs businesses billions of dollars each year. Crime can be particularly devastating to small

More information

Palm Beach County Sheriff s Office

Palm Beach County Sheriff s Office Palm Beach County Sheriff s Office Home Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for thousands of people who live, work and visit Palm Beach County.

More information

GENERAL GUIDE FOR WORKPLACE TRAFFIC MANAGEMENT

GENERAL GUIDE FOR WORKPLACE TRAFFIC MANAGEMENT 1 This General Guide provides information on how to manage traffic risks at a workplace. It is supported by specific guidance material on traffic management for shopping centres, construction workplaces,

More information

INSURANCE ADVICE ON HOME SECURITY

INSURANCE ADVICE ON HOME SECURITY INSURANCE ADVICE ON HOME SECURITY Prepared by the Association of British Insurers (ABI) and the Home Office Association of British Insurers 51 Gresham Street London EC2V 7HQ 020 7600 3333 www.abi.org.uk

More information

Staying alert A guide to passenger security

Staying alert A guide to passenger security Staying alert A guide to passenger security GO Safely GO Transit is one of the safest transit systems in North America. Still, we have to be prepared for unexpected incidents. Your safety and security

More information

How To Protect A Water System

How To Protect A Water System SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol

More information

Connect and extend your site and asset security

Connect and extend your site and asset security Whitepaper Connect and extend your site and asset security M2M for business security M2M.vodafone.com M2M for business security What this paper is about Security is an industry in flux. While in many cases

More information

the Ministry of Community Safety and Correctional Services

the Ministry of Community Safety and Correctional Services Message from the Ministry of Community Safety and Correctional Services The Ontario Association of Chiefs of Police (OACP) is conducting its first public education and awareness campaign on crime prevention.

More information

Exhibit like an expert.

Exhibit like an expert. home Pre-show At show Exhibit like an expert. Post-show Boost leads Shrink costs Stop stress This guide can be navigated like a website. To get tips based on a time period or business goal, click the tabs

More information

Customer Guide to the DATAONE Datacenter

Customer Guide to the DATAONE Datacenter Customer Guide to the DATAONE Datacenter User guide for Private Suite or Colocation Customer Version 1.0 July 2012 CONTENTS 1 Welcome... 3 2 Getting started... 4 2.1 CONTACTING US... 4 2.2 OBTAINING SECURITY

More information

Does a fence or other type physical barrier define the perimeter of the facility?

Does a fence or other type physical barrier define the perimeter of the facility? PHYSCIAL SECURITY SURVEY CHECKLIST PERIMETER BARRIERS TRANSIT FACILITIES Does a fence or other type physical barrier define the perimeter of the facility? (1) Specify type and height of physical barrier

More information

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.

More information

= =The video will take place in a Buy & Save store and will be narrated by an actor playing a Buy & Save manager.= =

= =The video will take place in a Buy & Save store and will be narrated by an actor playing a Buy & Save manager.= = Nash Finch Companies Buy & Save Video Script = =The video will take place in a Buy & Save store and will be narrated by an actor playing a Buy & Save manager.= = Welcome to my store it may look a little

More information

IAPE STANDARDS SECTION 10 - MONEY

IAPE STANDARDS SECTION 10 - MONEY IAPE STANDARDS SECTION 10 - MONEY Standard 10.1: Money - Packaging Standard: Money should be packaged in uniquely colored envelopes or in containers with unique labels attached. Information on the label

More information

Motor Truck Cargo Insurance Application

Motor Truck Cargo Insurance Application Motor Truck Cargo Insurance Application Named Insured: Mailing Address: Policy period or date policy is to be in effect: Business is: Corporation Partnership Sole Owner Established in 19 For whom does

More information

Business Protection Online Activity Store Self Assessment

Business Protection Online Activity Store Self Assessment Business Protection Online Activity Store Self Assessment Complete each question in the Business Protection Online Activity Store Self Assessment. The selfassessment covers potential areas of vulnerability,

More information

Deterring Collector Car. Theft

Deterring Collector Car. Theft Deterring Collector Car Theft Although hundreds of cars are stolen every day, automobile thieves usually target latemodel vehicles that can be disassembled and quickly sold for parts. Although more expensive

More information

STEER STEER CLEAR CLEAR OF CAR CRIME OF CAR CRIME. Security tips for motorists

STEER STEER CLEAR CLEAR OF CAR CRIME OF CAR CRIME. Security tips for motorists STEER CLEAR OF CAR CRIME STEER CLEAR OF CAR CRIME Security tips for motorists CCL01 Published by the Home Office Communication Directorate, July 2001 Crown Copyright SECURITY TIPS FOR MOTORISTS Car crime

More information

HOW TO HELP SECURE YOUR HOME

HOW TO HELP SECURE YOUR HOME HOW TO HELP SECURE YOUR HOME Village Green Los Angeles, CA Fall 2007 The information attached hereto is being provided as a courtesy only. The Village Green Owners Association makes no representations

More information

348 Birch s Road North Bay, ON P1B 8Z4 (ph) 1-800-265-9370 (fax) 1-866-352-6740 FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURE

348 Birch s Road North Bay, ON P1B 8Z4 (ph) 1-800-265-9370 (fax) 1-866-352-6740 FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURE 348 Birch s Road North Bay, ON P1B 8Z4 (ph) 1-800-265-9370 (fax) 1-866-352-6740 FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURE 1 TABLE OF CONTENTS Shipper s Responsibilities 3 Consignee Responsibilities 4 Salvage

More information

Security Services Survey Response Summary Conducted February 2011

Security Services Survey Response Summary Conducted February 2011 Item Survey Question Yes No Other Campus Safety Office /Responses 1 Respondent classification Total Survey Respondents: 157 (broken down as follows) Students ( 37) 27.6% Resident Student Jaguar Hall (4)

More information

Commercial Burglary Prevention

Commercial Burglary Prevention Commercial Burglary Prevention Montgomery County Police 2 nd District Officer Dana Stroman Community Services Officer Officer Oliver Janney Community Services Officer 240-773-6700 Message from the commander

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Partners in Protection / C-TPAT Supply Chain Security Questionnaire Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related

More information

Designing a point of purchase display (POP) that works for you

Designing a point of purchase display (POP) that works for you Designing a point of purchase display (POP) that works for you By: Scott Buchanan Wire to Wire Manufacturing Ltd. Gone are the days of dropping your product out to the local five and dime where the manager

More information

Guide for Non-Profit Housing Societies Security Guide Table of Contents

Guide for Non-Profit Housing Societies Security Guide Table of Contents Guide for Non-Profit Housing Societies Security Guide Table of Contents Chapter 1 - General Security Guidelines Chapter 2 - Target hardening Chapter 3 - Security window bars Chapter 4 - Anti-Graffiti solutions

More information

Improving the Effectiveness of Retail Video Surveillance

Improving the Effectiveness of Retail Video Surveillance Brochure Improving the Effectiveness of Retail Video Surveillance Cisco Video Surveillance for Retail solutions help you boost loss prevention effectiveness and much more. W ha t Y ou Will Lea rn Theft

More information

CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE

CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE CALIFORNIA HIGHWAY PATROL C.T.I.P. TASKFORCE PRESENTER BACKGROUND Sgt. Ken Huerta 25 Years, Port of Los Angeles Police Cargo Theft Interdiction Program Cargo Criminal Apprehension Team Criminal Investigations

More information

MONROE POLICE DEPARTMENT

MONROE POLICE DEPARTMENT MONROE POLICE DEPARTMENT 104 Stage Road Monroe, NY 10950 Main: (845) 782-8644 - Fax: (845) 782-2227 A. Alex Melchiorre Website: www.monroepd.org Chief of Police BUSINESS BURGLARY PREVENTION TIPS Is your

More information

Business Security Checklist

Business Security Checklist Business Security Checklist The Grove City Division of Police The mission of the Grove City Division of Police is to serve and protect all by providing professional law enforcement services in partnership

More information

Electronic Security. For Financial Institutions

Electronic Security. For Financial Institutions A partner you can bank on Our bank was growing. New branches. New card processing center. We wanted to tie access control, alarm monitoring and video surveillance into one system we could monitor from

More information

Cyber Security Response to Physical Security Breaches

Cyber Security Response to Physical Security Breaches Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically

More information