A CISCO-EAGLE WHITE PAPER:
|
|
|
- Jonah Simmons
- 10 years ago
- Views:
Transcription
1 A CISCO-EAGLE WHITE PAPER: industrial & warehouse Security: put a stop to theft and pilferage
2 theft costs warehousers, manufacturers, & shippers $15 billion every year. Theft costs companies more than $15 billion annually. This includes product theft, fraud such as false damage claims for goods, and false inventory and shipping counts. Pilferage also carries indirect costs. Higher insurance premiums, investigative costs, increased personnel turnover, reduced customer satisfaction due to inventory issues, and lower morale are just a few examples. 87% of losses happen in freight yards and warehouses Cargo theft is a serious concern for many businesses. In the U.S. alone, product loss during transit is another $10 billion annually. Freight yards and warehouses are primary theft threat points, where 87% of losses occur. In most cases INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 2
3 of cargo theft, an inside employee aids and abets the thief, or is working on his own. Employees can falsify records or distract others from being aware the theft is taking place. Scary thought, right? And if you think your facility is immune because you aren t stocking high-value consumer oriented goods, consider this: once stolen, almost anything can be resold or traded. Thieves know how to sell everything from scrap metal to plastics. It s all about motivation In industrial security, the 10/10/80 rule tends to apply: 10% of your employees will never steal from you, 10% will steal whenever they can, and the remaining 80% can be motivated to steal from you -- or motivated not to. When an employee feels entitled to a little something extra Too many people think they are owed more than their compensation. Creating an environment of fairness and clear expectations goes a long way in reducing entitlement attitudes. Help employees understand how theft actually impacts wages, then empower them to participate in anti-theft and security efforts. Create a culture of honesty that begins with managers. Fair treatment combats entitlement thinking. In particular, that 80% will be emboldened when theft is easy, and risks are low. Controlling these conditions significantly reduces pilferage risks in the very fluid 80%. when and why do the 80% steal When an employee has financial problems Pressures at home drive people to do things they normally wouldn t. If an employee is facing monetary problems, the risks escalate. While you might offer employees financial planning and budgeting assistance through company sponsored workshops or counseling to aid employees who are having financial struggles, you have very little control of how they use that knowledge. When an opportunity arises Opportunity is the easiest factor to control. Understanding what a thief may be looking for and how to thwart his attempts to steal can greatly reduce the losses you incur as a result of employee theft. Controlling opportunity helps keep the 80% honest. Theft prevention is about identifying weaknesses and limiting opportunities. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 3
4 Are you an enabler? No one likes to think so, but many operations enable corrupt employees to steal because they don t actively combat it. Thieves work at the edges of institutional awareness, and you have to close those gaps. Evaluate for security Six basic assessment factors: Hire right do your due diligence before hiring; background checks and interviews are the first (and perhaps best) line of defense Audit your facility lay out to tighten access to cravable inventory and tools Defend the perimeter evaluate building exterior perimeters to reduce external opportunities Focus on access evaluate facility access points to make it harder to enter and/or remove goods unobserved or unchallenged Scrutinize shipping & receiving procedures limit opportunities for employee collusion with outsiders and each other at the dock area Get your people involved Institute security awareness programs so that employees participate in reducing theft When you take action on the above factors, you will reap benefits beyond theft reduction. You ll increase productivity, improve your processes, and slash the very high indirect costs of theft. Know why, where and how they ll hit Key criteria: value per ounce When a product has a high per pound value, is easily disposed of through selling, trading or pawning, and is an enjoyable item to own, you have all the ingredients for theft. For instance, tobacco products are at high risk in grocery distribution operations. Smartphones and other small, valuable items are always at high risk, but this is only the highest risk; thieves frequently steal bulk items if operations aren t adequately prepared. Ease of access, transport and concealment If an item can be tucked into a pocket, loose shirt or apron, it is a prime target. If it s easy to remove from the facility either on an employee or in a container of some kind it is more likely to be targeted. If there s easy access to product, if individual products have high dollar value and are easily traded or sold, you ll want to secure them better. The higher the dollar value, the easier it is to move and the more popular or appealing the product is, the greater the likelihood that product will be stolen. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 4
5 the fundamentals of vulnerability We will explore each of these vulnerabilities in detail in this paper. These areas sit on the right side of any industrial security pareto analysis; get them right, and you ll plug the worst vulnerabilities in your operation. Collusion - between an employee and truck driver (or other outsiders) Receiving - there are 15 vulnerabilities at this location alone Storage access, access, access Shipping picking, staging and dock Perimeters places goods can be hidden for later pick-up, access point security INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 5
6 preventing collusion Dealing with outsiders Dishonest truckers, visitors, service people, sales reps, contractors, or temporary employees often start small and work their way into your operations through gift giving or building a personal relationship with an employee in order to get choice delivery slots, or access to goods. In time this works its way into the thief finding an employee who will work with him to short orders, load stolen goods into his trailer or other vehicle, or conceal stolen goods. The problem with this type of collusion is that it s often difficult to detect. Ways to combat collusion Prevent truckers from fraternizing with employees by keeping them separated. Utilize a driver holding area or lounge where drivers can cool their heels during loading or unloading. Never allow them to hang around the docks unsupervised. Use set scheduling for each delivery and pick-up if possible. Honest truckers prefer a set schedule so they can better plan their routes and keep dispatch informed. Rotate the receiving door assignments consistently so that truckers aren t working with the same receiving team each time. This minimizes collusion opportunities. Make sure the trucker provides correct information about his cargo. Compare it against your copy of the Advance Shipping Notice. Above: a driver cage allows visitors to enter your facility, but prevents them from wandering around without someone admitting them personally. collusion at the receiving area Put the right people in the right places The receiving area is one of the most likely places a theft will occur. There is so much activity going on that goods can be lifted and concealed easily: Shipping counts can be altered on the Advance Shipping Notice the trucker hands over Goods can be left on the truck, yet the order is signed off Fraudulent damaged goods write-offs can occur INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 6
7 Merchandise is left in a staging area for extended times, leading to easy removal after the count has been done Receiving counts are not conducted or altered and received goods not inspected Shipping seals are not recorded properly or have been broken in transit Solutions Use the advance shipping notice The Advance Shipping Notice is one of your best security tools if you use it. Look for alterations of any kind on the trucker s copy this is a red flag Compare cargo counts against copy that comes directly from vendor, not the trucker s copy If in doubt, contact the vendor company to double check Check shipping seals - broken seals are another red flag. Follow these steps to guard against cargo transit theft: Upon arrival make sure all doors including trailer side doors have seals and that none of the seals have been broken Never let the trucker remove shipping seals. Question and document any discrepancy in seal condition or numbering Seal numbers must match those given on Advance Shipping Notice Verify all seals are accounted for on the Advance Shipping Notice Count your shipment carefully if your load is less than load. There may not be seals on the trailer, so these loads are easy prey for thieves Pay attention to packaging One of the best indicators of in-transit theft is damaged stretch-wrap around palletized materials. Thieves will often attack the center of the pallets removing center loads, rearranging top layers, and then re-wrapping the pallet to disguise the loss. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 7
8 responsibility among authorized managers and co-workers so that collusion among workers is more difficult. Managers should do spontaneous walk-throughs and spot checks during receiving operations to throw would-be thieves and accomplices off-balance. Broken pallets are an easy and inviting target for thieves. If a shipment arrives unwrapped, it s a red flag. What to watch for in packaging Count stock on pallets with less than pristine stretch wrapping. Immediately break down the pallet and do a count to assure correct quantity has been received. Stretch wrap palletized goods for out-bound shipping. Make sure it s smooth and tight. Overwrap pallet top edges to make inner layers too tight to remove goods in the center of the load. Consider ordering stretch wrap with your logo to ensure others can t easily unwrap and then re-wrap your pallets. Unload practices Be sure all goods have been removed from the truck to the loading dock and the trailer door closed before doing a count and signing off on the shipment. Dishonest drivers and their cohorts in crime work to see that a part of the load is overlooked in the off-loading but not the count, or may move part of the load back into the truck after the count and sign off is done. Make sure two of your employees participate in the count and sign-off. Rotate count Control driver movements. Another unload issue is allowing the truck to remain at the receiving dock unaccompanied. Just where is the driver? Who is keeping an eye on him? Is he wandering your product areas alone? Locate restrooms and lounge areas close to docks and partition off so that truckers and other non-essential visitors don t have easy access to storage areas. At the docks, consider installing driver cages with dispatch windows. Don t stage product for thieves. Do you have product sitting in a staging area near your receiving doors? This is a choice opportunity for a driver or cohort to move staged product into the truck unnoticed. Monitor staged materials carefully at all times, or secure it in partitioned cages with locks to prevent access until ready to move. Watch the trailers. To assure goods are not moved back into the trailer, check that the truck is empty, and then close the trailer doors. Go one step further and close the dock door, too. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 8
9 Damaged goods fraud Fraudulent damage claims can cause significant losses for both you and the sender. This kind of fraud takes place when receiving of goods is not monitored well. A dishonest employee can mark certain goods as damaged even though there is no damage, then write it up as returned to the sender. He then conceals or removes the goods to his vehicle to take home later. Carefully monitor the percentage of damaged goods claimed on arriving shipments. Take pictures of the damaged goods. Workers who know there s going to be a camera involved will be less likely to make false damaged goods claims. Be sure a manager inspects the damages and signs off on them. Don t leave this in the hands of the dock workers alone. Between staging and storage Often goods are left unattended in a staging area after arrival. This is risky a thief could walk by and remove product or even an entire pallet from the shipment. What can you do? Keep a watch on staged goods Store as quickly as possible to limit theft opportunities Shrink wrap palletized loads to limit access Require a two- person sign off on all damaged goods. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 9
10 storage area security Access is everything Although product in trucks, on docks, and in shipping is exceptionally vulnerable, storage areas are hardly exempt from pilferage. In a bustling industrial facility or warehouse, ample opportunities for theft exist for thieves. The good news is that with some tweaks in the ways you store goods and grant access to that inventory, you can combat this type of theft. secure storage Solutions Limit access to stored products Workers from other departments and sections of the facility have no business being in storage areas unless by assignment. If they aren t there to pick, count, or replenish, why? Security is mostly about access, so the fewer people who can come close to desirable inventory, components, or tools, the better. Store it out of reach. Keep bulk amounts of craveable goods on upper rack levels INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 10
11 Cage it. Store valuable goods behind lockable partitions, in secure racks, or in special cages. Many warehouses designate high-security storage areas for the most vulnerable and desirable goods. Design your facility for security. Control nonemployee access to goods as referred to under Collusion. customs check points during transit, as the load is easily read and accounted for. Consider using cycle counting a prescribed, scheduled program of inventory management through frequency, regularity, and selectivity. See more in the resources section. Track workers near high value areas. Use area coded ID badges if necessary, and provide temporary assignment badges to workers doing special work in the storage zones. Restrict access to storage zones. If possible, have only one entry and exit point for storage zones and put exit alarms on all other doorways to prevent goods from disappearing through other entry points. Invest in inventory management You count at receiving. Do you count as goods are slotted into storage positons? You might want to unmonitored goods are vulnerable at any point between staging and storage. Also, how easy is it to remove and conceal goods from the storage area? Take a daily count as a preventive audit process and make sure employees know there is an audit daily to reduce risk-taking behavior. Audit often. Audits provide valuable links to who was working when the count was off. If you see a pattern in personnel present, you may have a thief on your radar already. Consider RFID tagging or other electronic tracking technologies for instant inventory counts and to track goods not found in their assigned bins. This can often reveal where thieves are concealing goods for later retrieval. Electronic inventory management is also valuable in expediting processing through INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 11
12 Shipping & STAGING security Control goods carefully on their way out The outbound shipping portion of your facility includes order picking, staging, and dock operations. In many cases, what has been said in the Receiving section holds true here, but there are additional considerations. Order pickers may have access to almost every SKU in your operation, and have opportunities to short through collusion between picker and packer. Pickers can hide items for later retrieval. Outbound staging areas are highly vulnerable to theft. Goods are frequently left unsecured and unwatched. Anyone walking by can remove small quantities of goods. Somebody good with a forklift can remove entire pallets into a waiting truck through collusion with the driver. Docks are the most vulnerable point during the shipping process. As in receiving, there is ample opportunity for collusion between dock workers and outsiders. It s an easy place for someone to remove and conceal goods from the load, from storage, or from staging. Solutions: Order picking security Hire the right people and don t be shy about conducting back ground and reference checks. Due diligence is critical to security in these positions. See more about hiring in the resource section. Limit access to the storage area one way in and one way out (so long as you meet fire safety standards). All other entry points should be locked against intruders and alarmed so that inventory can t walk out. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 12
13 Consider automation. Equipment such as carousels and ASRS are not only lockable and less accessible they also track orders and picks better. More information is never good for the thief. Keep employee parking partitioned off from building entry and exit points, especially the dock area. Absolutely no employee parking should be near the warehouse. Encourage employees to report discarded packaging materials. This is a red flag for theft. Thieves remove packaging in order to better conceal the stolen goods. Staging area security measures Keep staged goods secure until loading time; don t leave picked orders loose and available Never let the driver apply the seals. Truckers have been known to keep a roll of seals handy in the cab and substitute one of their seals for your seal. They then take your seal and apply it during transit after they ve removed some of the load for their own profit. Always notate the seal numbers on shipping documents. This lets the receiving company know whether the load has been tampered with. Keep your supply of seals secured. They are your theft deterrent tool during transit. If you allow unauthorized access to seals, you re helping the thief lay claim to your goods. Utilize temporary gates. If you keep dock doors open during work shifts, consider using scissor gates that help prevent people from wandering inside through an open door. Shorten the staging process and move goods immediately onto the waiting truck. This means you need to schedule shipment picking carefully to coincide with truck arrival times. Palletize and stretch-wrap all goods Dock operations Don t allow visitors to roam free. Unauthorized personnell should never have free access to your docks, stock, or storage areas. Keep truck doors and dock doors closed until the start of loading. This keeps other goods from finding their way into the trailer with the assistance of thieves. Count the load as it enters the truck. Sign-off needs to be by two employees who participated in the count. Above: a folding security gate is an inexpensive and easy way to close off dock doors while maintainining visibility, access, and air circulation. People can and do wander into open dock doors. Count the load again after all loading is completed and just prior to sealing the truck doors. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 13
14 warehouse perimeter vulnerabilities Put boundaries on theft opportunities Thieves are ingenious when it comes to hiding stolen goods. That s why doing a perimeter audit is vital to secure operations. You should check for anything a thief can hide product in, under, behind or on top of. Make sure that: Trash dumpsters, large bins, containers, and recycle bins are located away from the building, preferably not on the dock side. Thieves use dumpsters as concealment points for retrieving pilfered goods later. If the dumpster must be on the dock side of the building or near the building, put fencing around it and lock the gate. Make frequent spot checks for stolen goods. Make it known that dumpsters are spot checked. HVAC units near the warehouse are enclosed and locked. Utility pads and HVAC units also provide ample opportunity for concealing stolen goods for retrieval later. This also helps protect the units from copper and component thieves. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 14
15 Bushes or shrubs should never be allowed near dock doors and entry/exit points. Shrubbery makes a great place to hide goods until the end of a shift, or other convenient time to retrieve hidden goods. All entry and exit points are wellmonitored or secured against access. Fire exit doors should be locked from entrance by outside intruders and alarmed to deter employees inside from using those access points for removing goods. Employee parking is separated from dock areas and truck parking. Install fencing between the two to keep employees from running goods out to their cars during their shifts. Receiving and shipping docks are separated either by proximity or barriers. It s very easy to slip goods from a received shipment and put it in an outbound truck. Restrooms and lounge area can be accessed without going through the storage rack aisles. If drivers must cross the warehouse to use the facilities, then make sure there is a limited access path for them to follow that routes them around, not through areas where inventory is stored. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 15
16 A warehouse theft deterrence quiz How many issues can you spot? 1. Employee parking is potentially too close to shipping dock doors 2. Shipping and receiving areas are too close to each other (assuming no barriers) 3. Trash dumpster or scrap dumpsters are too close to entry/exit points 4. Shrubbery is too near egress points in multiple areas of this facility 5. Too many egress points are unsecured (a total of 5 doors in this case) 6. HVAC units aren t fenced or otherwisee secured to help prevent hiding of stolen items 7. Unsecured, staged goods left outside awaiting truck arrival 8. Restroom/trucker break room require that vistors cross warehouse from docks area to the back of the facility 9. Dock doors are left open when a truck isn t present INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 16
17 industrial theft deterrence is a mind game. Win it. shift the risk-tobenefit ratio in your favor Much of what keeps an employee from stealing while on the job is his risk-to-benefit perception. If you can establish an atmosphere of high risk without reducing employee morale, you will make significant strides in reducing theft. To create a high risk environment increase security measures throughout your facility. Be mindful of the most effective security measures you can take: Limit access to high-value goods with physical barriers Allow access to authorized personnel only Keep non-employee personnel away from your workers Secure anything that may assist thieves in stealing INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 17
18 Step up overall security If thieves believe they are being watched, they will think long and hard before attempting to remove goods. There are several general security measures you can take to increase the worry factor for thieves. Utilize spot checks to increase risks for thieves, in particular if you are experiencing loss. Spot scan employees at shift changes using metal detectors if your goods are amenable to this type of detection. Search coolers or lunch pails if necessary. This is a step you must undertake carefully. Increase monitoring on the floor by management. Step up the number of unscheduled walk-throughs. Do spot checks on shipment counts at receiving and shipping docks. Track access to specific areas. Use work zone ID badges to limit worker access to specific work areas and reduce ease of theft. Install security mirrors at strategic locations to allow observation of activity in the rack aisle, at the docks, staging and other critical theft opportunity points. Install monitoring devices such as closedcircuit TV or digital closed-circuit systems. Digital network video offers the added ability to monitor remotely and allows one to easily locate and scan sections of recordings. Add motion detection systems to critical areas of your facility. When activity is detected an alarm triggers, alerting workers in the area to check on the activity. Go undercover. If theft is a big problem, consider hiring an undercover agent or security firm who, in the guise of an employee, will infiltrate your operations to identify thieves (and other security issues you may be unaware of). Utilize RFID tags on all goods for tracking and inventory management purposes. Install reader arrays that time-stamp product movement through the facility. While systems such as these are an expensive outlay, if you stock high-value goods, the savings in loss to theft will be recouped quickly. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 18
19 Teach your employees appropriate procedures for challenging unauthorized people in and around secure areas. Consult with security advisors, if needed. Instruct employees in security contact protocols as to when to involve management, the internal security force, or law enforcement. Build teamwork. Encourage employee participation through discussion of ways to further secure the facility against theft (your frontline workers probably know more than you do about vulnerable points in your procedures). Develop a security awareness program and a culture of honesty Securing the product, managing the inventory and monitoring employees and employee activity are all great ways to reduce theft at the warehouse. In fact, phenomenal results have been achieved through these efforts alone, but if you want to remove the Big Brother is watching you mentality, implement a security awareness program that positively involves employees. Empower employees with proper procedures for handling security issues and security violations. Answer the question of What do I do when I see.? What is would you like them to do when they find evidence of theft, or witness it directly? Don t assume that people understand that situation. Train for it. Document it. This can be vital when the situation arises. Most people are honest. Most people do want to do the right thing. Enable them to do it. Establish a reporting system or hotline to encourage employees to be watchful and report security violations or occurrences of theft. Allow anonymity to better encourage employee participation. It may be useful to provide rewards for catching thieves, in particular if you have a higher risk product and issues with theft. This is a measure you should consider carefully and consult with attorneys before implementing. Security awareness programs consist of developing a company mindset of anti-theft participation. Communicate and demonstrate anti-theft security measures. No need to label it employee theft in particular. Everyone will understand as they become aware of new security measures. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 19
20 Be prepared for added benefits Improved security increases efficiency Obviously, better security reduces inventory losses, but consider some of the ancillary effects of increased security and theft awareness that add to your bottom line: Supply chain efficiencies will improve. Your exposure to supply chain disruptions will probably improve as you gain better awareness of your supply chain through higher visibility and use of the Advance Shipping Notice. You ll enjoy a higher rate of customer satisfaction through improved order fulfillment (remember all those customers calling to report their order was short?) Better inventory management also reaps the benefit of reduced cycle times and shortens shipping times through faster product location, picking, packing and shipment. Realize cost reductions through greater efficiency facility-wide, plus reduced insurance claims, loss coverage and personnel turn-overs. Increased compliance with newly mandated government security initiatives such as: 1. Customs Trade Partnership Against Terrorism (C-TPAT), through which you get the benefit of reduced inspections at the port. Processing is expedited; your shipment moves to the front of the line and penalties are mitigated where possible. 2. Emergency Planning and Community Right-to-know Act (EPCRA), which requires detailed haz-mat storage information to be provided to community members. 3. Advance Manifest Rule (AMR), requiring detailed electronic cargo data for all transportation modes prior to arrival at port or customs, which will determine prescreening and inspections. 4. Free and Secure Trade Initiative (FAST), which allows confirmed low security risk goods on verified reputable carriers rapid border clearance and focuses resources on unknown or high-risk shipments. Increased operations flexibility using interchangeable parts, similar or identical plant designs and processes across the company, employee cross-training, improved procurement strategies, and diversified supplier locations through better awareness of supply chain weaknesses. Improved corporate culture through higher management to employee communication, empowering employees to be better decision makers, share in security power, increase problem solving abilities and have greater passion for what they do. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 20
21 the numbers behind better security: From the study, Innovators in Supply Chain Security, published by Stanford University s Manufacturing Institute, we learn that: Improved customer satisfaction through these activities resulted in: 26% reduction in customer attrition 20% increase in new customers Improved product handling can result in: 43% increase in automated handling 30% reduction in process deviations through improved processes 49% reduction in cargo delays at customs 48% reduction in cargo inspections at customs 29% reduction in transit time 28% reduction in delivery time window Greater resilience with 30% reduction in problem identification time, response time and resolution time Improved product safety leads to: 38% theft reduction 37% tampering reduction Reduced damages to goods Reduced fraud Reduce counterfeiting Improved inventory management means: 14% less excess inventory 12% improved on-time delivery Improved accuracy in received quantities Lower inventory levels Results of security investments made show: Improved internal operations Stronger customer relations Increased profitability Theft deterrence measures turn out to be an investment rather than a financial burden It all comes down to basic deterrence: Hire the right employees Improve processes and procedures Increase security measures facility-wide Involve employees in theft issue problem solving When you take these steps you reduce theft opportunities, you empower honest employees, reduce the benefits to dishonest ones, and create better working conditions for everyone. INDUSTRIAL SECURITY by Cisco-Eagle cisco-eagle.com/security 21
22 For video, specs and much more toll free for expert assistance
10 Ways to use Material Handling to Increase Security
10 Ways to use Material Handling to Increase Security Security is more than guards and cameras it s about the ways you store, organize, track, and segment inventory Inside: 10 ways to secure your operation
Warehouse Security Tips
Warehouse Security Tips an e Book from RSI Insurance Brokers to Help Prevent Cargo Loss www.rsiinsurancebrokers.com/warehousesecurity Toll Free (800) 828 5273 Email: info@rsi ins.com TABLE OF CONTENTS:
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
C-TPAT Self-Assessment - Manufacturing & Warehousing
Task # Section/Control Description 1 Security Management System 1.1 Is there a manager or supervisor responsible for implementing security within the company? Please provide the security manager s name
DOT HAZMAT SECURITY AWARENESS TRAINING
ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader
Customs & Trade Partnership Against Terrorism (C TPAT)
Customs & Trade Partnership Against Terrorism (C TPAT) Bristol Myers Squibb Company Customs & Trade & Corporate Security Departments As a result of the events of September 11, 2001, the United States Customs
Global Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
Seventh Avenue Inc. 1
Seventh Avenue Inc. Supply Chain Security Profile Customs-Trade Partnership against Terrorism Supplier Questionnaire Seventh Avenue is a member of the Customs-Trade Partnership against Terrorism (C-TPAT).
"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
Crime Prevention: A Guide for Small Businesses
Crime Prevention: A Guide for Small Businesses Text File Slide 1 Crime Prevention: A Guide for Small Businesses Welcome to SBA s online training program, Crime Prevention: A Guide for Small Businesses.
Supply Chain Security Audit Tool - Warehousing/Distribution
Supply Chain Security Audit Tool - Warehousing/Distribution This audit tool was developed to assist manufacturer clients with the application of the concepts in the Rx-360 Supply Chain Security White Paper:
SECURITY IN TRUCKING
SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS SECURITY IN TRUCKING A CHECKLIST FOR FLEET OPERATORS This checklist for fleet security has been compiled by the Private Motor Truck Council of Canada
APEC Private Sector. Supply Chain Security Guidelines
APEC Private Sector Supply Chain Security Guidelines 1 Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview
Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority. Due to the attacks
Security Profile. Business Partner Requirements, Security Procedures (Updated)
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
Security Criteria for C-TPAT Foreign Manufacturers in English
Security Criteria for C-TPAT Foreign Manufacturers in English These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE
AbbVie is a participant in the U.S. Customs supply chain security program called the Customs-Trade Partnership Against Terrorism (C-TPAT). Participation in C-TPAT requires AbbVie to ensure that its overseas
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers
Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided
Customs-Trade Partnership against Terrorism Supply Chain Security Profile
Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Trucker) Please answer the following questions about your company s cargo security processes and participation
C-TPAT Importer Security Criteria
C-TPAT Importer Security Criteria Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria. Where an importer outsources
MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION
MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION 1.0 Objective The purpose of this procedure is to ensure that Toys R Us, Inc. and its manufacturers, suppliers, and warehousemen
Customs-Trade Partnership against Terrorism Supply Chain Security Profile
Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation Minimum Security Criteria Scope Designed to be the building
Rail Carrier Security Criteria
Rail Carrier Security Criteria Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing that rail carriers
Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
Security Guidelines for. Agricultural distributors
Security Guidelines for Agricultural distributors SECURITY GUIDELINES FOR AGRICULTURAL DISTRIBUTORS As a result of global uncertainties the security of agricultural retail facilities has taken on a whole
LOSS PREVENTION IAT GROUP
LOSS PREVENTION IAT GROUP CARGO SECURITY AND LOSS PREVENTION Introduction Cargo protection requires thorough planning to be effective and remain effective through changing conditions. Cargo security is
Vehicle Tracking Solution
Vehicle Tracking Solution Business Challenges KeyTone Benefits Inbound/outbound trailer tracking process is manual, error prone and time consuming Not knowing where a given vehicle/trailer is result in
A Message for Warehouse Operators And Security Guidelines for Warehouse Operators
A Message for Warehouse Operators And Security Guidelines for Warehouse Operators Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint
Physical Security Assessment Form
Physical Security Assessment Form Security Self-Assessment T Wake 10 February 2012 Security Assessment Contents Facility / Site Security Assessment Form... 3 Identification Details... 3 Facility Details...
Best Practices For. Supply Chain Security
Best Practices For Supply Chain Security Document Information Created By: Family Dollar Imports Updated On: 10.21.2015 2 Contents What is C-TPAT? 5 Family Dollar s Distribution Network 6 Distribution Centers
Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)
Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL) Since its inception, the Customs-Trade Partnership Against Terrorism (C-TPAT) program
APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS
APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS The requirements of these Oracle Global Supply Chain and High Value Asset Physical Security Standards apply to all geographical
Upon completion of the module, you will be issued an electronic training certificate.
Introduction The US Department of Transportation mandates security awareness training as part of their security requirements found in Subpart I of Part 172 of the Hazardous Materials Regulations. The requirement
C-TPAT Highway Carrier Security Criteria
C-TPAT Highway Carrier Security Criteria The supply chain for highway carriers for C-TPAT purposes is defined from point of origin from the yard or where the tractors and trailers are stored, through pickup
The Authorized Economic Operator and the Small and Medium Enterprise FAQ
The Authorized Economic Operator and the Small and Medium Enterprise FAQ May 2010 Copyright 2010 World Customs Organization. All rights reserved. Requests and inquiries concerning translation, reproduction
FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand
FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.
Security Policies and Procedures
Security Policies and Procedures April 26, 2012 Kristen Whelan Transportation Consultant [email protected] www.libertyint.com Customs-Trade Partnership Against Terrorism What is C-TPAT? CBP and Industry
E3211. DOT Hazmat Security Awareness. Leader s Guide
E3211 DOT Hazmat Security Awareness Leader s Guide This easy-to-use Leader s Guide is provided to assist in conducting a successful presentation. Featured are: INTRODUCTION: A brief description of the
C-TPAT Security Criteria Sea Carriers
C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Where a sea carrier does
Business Security Check List
DOORS, WINDOWS, AND OPENINGS: Are all entrance doors clearly visible from either the parking lot or the street? Do all entrances doors have shatterproof windows that allow a person to look outside before
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy
Louisiana State University Information Technology Services (ITS) Frey Computing Services Center Data Center Policy Access: If you have been granted a Frey Access Card with currently approved access to
Guidance Notes FSR 2014
Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a
TECHNOLOGY BRIEF. Business Benefits from Radio Frequency Identification (RFID)
TECHNOLOGY BRIEF Business Benefits from Radio Frequency Identification (RFID) Executive summary Today the largest government and business enterprises in the world are developing plans to deploy electronic
C-TPAT Customs Trade Partnership Against Terrorism
Food and Agriculture Border Gateway Summit C-TPAT Customs Trade Partnership Against Terrorism Robert Gaydo, Senior Trade Advisor A.N. DERINGER, INC. Feb. 20, 1014 Who can participate? Air/Rail/Sea Carriers
GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants
Adapted from information provided by the U.S. Department of Agriculture Food Safety and Inspection Service GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants March 2008 BY COMPLETING PAGE
Cargo Theft Prevention and Risk Mitigation for the Holiday Season
Hanover Risk Solutions Cargo Theft Prevention and Risk Mitigation for the Holiday Season As the holiday season approaches, manufacturers warehouses are packed to capacity as high-season inventory begins
WHITE PAPER TOP 10 LOSING WAREHOUSE STRATEGIES AND HOW TO AVOID THEM
TOP 10 LOSING WAREHOUSE STRATEGIES AND HOW TO AVOID THEM Old habits can be hard to break, but when it comes to improving your warehouse management operations, you ll reap big rewards if you lose these
Nexus Recycling Management System product summary.
Nexus Recycling Management System product summary. Nexus is an unparalleled application designed to automate the daily routine of processing scale transactions, invoicing customers, and managing employees,
Best Practices: Inventory Management for the Small to Medium-Sized Business
Best Practices: Inventory Management for the Small to Medium-Sized Business You don t have to be a big business to use technology to improve your inventory management processes. In fact, if you are a smaller
A Guide to Implementing a World-Class Cycle Counting Program
A Guide to Implementing a World-Class Cycle Counting Program - Page 1 A Guide to Implementing a World-Class Cycle Counting Program By Jeff Rose, Principal The implementation of comprehensive cycle counting
http://homedefensesecurity.com
The Basics of Home Security Topics Covered: Home Security Basics Home Security Guides Home Security Products and Services The Value of Insurance in Home Protection Top Ten Tips for Your Home Security Essentials
NSW POLICE FORCE. Home Safe
NSW POLICE FORCE Home Safe IS YOUR HOME SECURE? This brochure is intended to provide your household with the latest information regarding home security and break-in prevention. You will learn how to evaluate
The Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
Operations/Inventory Excellence
Operations/Inventory Excellence 7 Keys to Profit Improvement from Purchasing to Delivery For 20 NASSAU STREET, SUITE 244 PRINCETON, NEW JERSEY 08542 Our Presentation This presentation on Business Operations/Inventory
White Paper. Top Five Ways to Cheat a Truck Scale. How To Prevent it from Happening to You
White Paper Top Five Ways to Cheat a Truck Scale How To Prevent it from Happening to You Theft, forgery and credit card fraud. Those are all ways that criminals cheat the system for their own personal
The Complete Security Survey
The Complete Security Survey You should do a security survey of your office or property on a regular basis. Follow this checklist. It will provide you with an overview of the level of security in your
Kroger Manufacturing Trailer Seal Policy Revised 09/03/10
Kroger Manufacturing Trailer Seal Policy Revised 09/03/10 1 Inbound Supplier After the product is loaded and the trailer doors are closed, the supplier (or shipping warehouse) is responsible for affixing
Study Guide for Material Handler
Study Guide for Material Handler Test Number: 2727 Human Resources Performance Assessment Services Southern California Edison An Edison International Company REV032613 Introduction The 2727 Material Handler
Holidays are special times to be shared with family and friends. Protect yourself and loved ones by following these safety tips.
DECEMBER HOLIDAY SAFETY AND SECURITY TIPS San Diego Police Department December 1 st, 2015 CONTENTS AT HOME AWAY FROM HOME WHEN DRIVING AND PARKING WHEN SHOPPING CHILDREN Holidays are special times to be
7 Ways your Fax Machine is Putting You at Risk for Identity Theft. How is your company protecting private information in everyday transactions?
WHITEPAPER 7 Ways your Fax Machine is Putting You at Risk for Identity Theft How is your company protecting private information in everyday transactions? 2010 DPD International All Rights Reserved. This
Automated Receiving. Saving Money at the Dock Door. Page 8
Automated Receiving Saving Money at the Dock Door Page 8 Today s warehouse management and automated sortation systems are far easier to integrate than in the past. As a result, distribution centers are
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES
SECURITY VULNERABILITY CHECKLIST FOR ACADEMIC AND SMALL CHEMICAL LABORATORY FACILITIES by the American Chemical Society, Committee on Chemical Safety, Safe Practices Subcommittee Introduction Terrorism
8 secrets. Your Burglar Won't Tell You
8 secrets Your Burglar Won't Tell You In the United States alone, a home burglary occurs every 14 seconds. These kinds of statistics can be alarming, and the best thing you can do as a homeowner is educate
Partners in Protection / C-TPAT Supply Chain Security Questionnaire
Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One
Why home security is important. Contents
Why home security is important Although property crime is falling it still accounted for 70% of all police recorded crimes in England and Wales in 2013/14, so it s important to do all you can to keep your
Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants
Food Defense Self-Assessment Checklist for Slaughter and Processing Plants Outside Security 1. What food defense measures does your plant have in place for the exterior of the building? Are the plant s
WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business
Business Name: Owner Name: Business Address: Officer: Survey No.: WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business "Being There When Needed" DOORS 1. Is the exterior doors solid core
Interpreting the Numbers: From Data to Design. William Elenbark, Consultant Gross & Associates 732-636-2666; belenbark@grossassociates.
Interpreting the Numbers: From Data to Design William Elenbark, Consultant Gross & Associates 732-636-2666; [email protected] Robert Muller, Industrial Engineer Gross & Associates 732-636-2666;
Transportation Requirements
Transportation Requirements DEFINITIONS Small Package: Less than 151 pounds per single package or less than 251 pounds per single shipment, up to 11 packages, and complies with carrier s requirements.
Home Security Inspection
Home Security Inspection This document sets forth conclusions and recommendations following a Crime Prevention Through Environmental Design inspection performed by the Thunderbolt Police Department. The
Storage & Inventory Control
s Guide Storage & Inventory Control Storage and Inventory Control include the activities related to holding material and the processes of counting and transacting the material as it moved through the warehouse.
Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/Email: Officer: Case No:
ISLE OF PALMS POLICE DEPARTMENT Thomas E. Buckhannon, III, Chief of Police 30 J. C. Long Boulevard Isle of Palms, South Carolina 29451 (843) 886-6522 BUSINESS SECURITY SURVEY Date: Business Name: Business
APL Logistics. Free Carrier (FCA): Improving Supply Chain Performance
APL Logistics Free Carrier (FCA): Improving Supply Chain Performance FCA: Improving Supply Chain Performance 2 FCA: An Introduction Free Carrier (FCA) is an internationally accepted trade term that assigns
Palm Beach County Sheriff s Office
Palm Beach County Sheriff s Office Home Security Self Survey Since 1909, the deputies of Palm Beach County have provided a safe environment for thousands of people who live, work and visit Palm Beach County.
Food Defense Supplier Guidelines
Food Defense Supplier Guidelines Revised: 16 March 2010 Table of Contents Topic Introduction 1. Plan administration a. Plan management b. Roles and responsibilities c. Reporting procedures d. Self assessments
TEXAS DEPARTMENT OF TRANSPORTATION GENERAL SERVICES DIVISION INTERSTATE TRANSPORTATION OF GOODS (FREIGHT) SERVICES PUBLICATION
TEXAS DEPARTMENT OF TRANSPORTATION GENERAL SERVICES DIVISION SPECIFICATION NO. TxDOT 9628622 INTERSTATE TRANSPORTATION OF GOODS (FREIGHT) SERVICES PUBLICATION This specification is a product of the Texas
IBM Sterling Transportation Management System
IBM Sterling Management System Drive costs out of transportation with cloud-based TMS Overview In this Solution Overview, you will learn: Why you should seek an on cloud TMS solution How you can better
Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody
Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody Banks are normally sought out by importers who need financing. Traditionally the financing has usually been through
The Training Material on Logistics Planning and Analysis has been produced under Project Sustainable Human Resource Development in Logistic Services
The Training Material on Logistics Planning and Analysis has been produced under Project Sustainable Human Resource Development in Logistic Services for ASEAN Member States with the support from Japan-ASEAN
What is C-TPAT? Customs Trade Partnership Against Terrorism
Learning Objectives What is C-TPAT? Terrorist Awareness Supply Chain Security Container Security Program 7 Point Inspection Seal Program Locks, Keys & Access Control / Visitor Controls Pre-Employment Verifications
Home Security Assessment Checklist DATE
Home Security Assessment Checklist DATE PREFACE The Home Security Assessment Checklist is designed to assist justices, judges, and other court officials in determining their level of security at home.
Connect and extend your site and asset security
Whitepaper Connect and extend your site and asset security M2M for business security M2M.vodafone.com M2M for business security What this paper is about Security is an industry in flux. While in many cases
C-TPAT: What Every Security Executive Should Know
C-TPAT: What Every Security Executive Should Know Barry Brandman President Danbee Investigations Fair Lawn, NJ SPONSOR LOGO C-TPAT: What Every Security Executive Should Know In this session, you will learn:
Return the attached PPG Supply Chain Security Acknowledgement by email, fax, or mail within two weeks from receipt.
TO: International Suppliers shipping to the United States PPG Industries, Inc., and its affiliates have been certified as a member of the U. S. Customs Trade Partnership Against Terrorism ( C-TPAT ). C-TPAT
Visibility in the Import Supply Chain Getting a Clear View into Competitive Advantage
Visibility in the Import Supply Chain Getting a Clear View into Competitive Advantage A GT Nexus White Paper Executive Summary Leading importers are reaping the benefits of end-to-end global supply chain
Scaleable cloud-based warehousing & delivery for South Africa
Scaleable cloud-based warehousing & delivery for South Africa Contents Introduction 3 Send & Receive Stock Remotely 3 Courier LiveQuote 3 Multi-Platform Integration 3 Reporting Analytics 3 How It Works
INTERNATIONAL BUSINESS
INTERNATIONAL BUSINESS PART 4: FREIGHT FORWARDING TABLE OF CONTENTS PAGE INTRODUCTION TO FREIGHT HANDLING AND FORWARDING... 2 CATEGORIES OF FREIGHT... 3 HOW FREIGHT PRICING IS DETERMINED... 4 CARGO INSURANCE...
CVS Pharmacy C-TPAT Requirements For Import Product Suppliers
CVS Pharmacy C-TPAT Requirements For Import Product Suppliers To Our Import Product Suppliers: CVS Pharmacy, Inc. (CVS) is committed to ensuring supply chain security within a framework consistent with
The Fundamentals of Inventory Management
The Fundamentals of Inventory Management Article brought to you by Angela Aisbet, Inventory Management Consultant for MWI. To inquire about additional information about our Inventory Management Consultation
