Protecting Your Company s Identity



Similar documents
A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

Intermec Security Letter of Agreement

C-TPAT Importer Security Criteria

Security Criteria for C-TPAT Foreign Manufacturers in English

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Global Supply Chain Security Recommendations

Rail Carrier Security Criteria

Return the attached PPG Supply Chain Security Acknowledgement by , fax, or mail within two weeks from receipt.

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Security Profile. Business Partner Requirements, Security Procedures (Updated)

C-TPAT Security Criteria Sea Carriers

C-TPAT Highway Carrier Security Criteria

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

Customs & Trade Partnership Against Terrorism (C TPAT)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

C-TPAT Self-Assessment - Manufacturing & Warehousing

Identity Theft Prevention Presented by: Matt Malone Assero Security

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

C-TPAT Executive Summary

Interagency Guidelines on Identity Theft Detection, Prevention, and Mitigation

Citi Identity Theft Solutions

APEC Private Sector. Supply Chain Security Guidelines

Best Practices For. Supply Chain Security

Protect Yourself From Identity Theft

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

C-TPAT Customs Trade Partnership Against Terrorism

Identity Theft Prevention Program Compliance Model

Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper

C-TPAT Expectations for Agents, Vendors & Manufactures

University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule

Application For C TPAT Certification Details

Identification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft

Corona Police Department

Key Small Parcel Requirements

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Identity Protection Guide. The more you know, the better you can protect yourself.

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached.

What is Identity Theft?

Identity Theft, Fraud & You. Prepare. Protect. Prevent.

CVS Pharmacy C-TPAT Requirements For Product Suppliers

Identity Theft. Occurs when someone uses your personal information without your permission for personal gain.

Identity Theft: Prevention & Survival

Questions and Answers About the Identity Theft Red Flag Requirements

DHL GLOBAL FORWARDING Import Customs Brokerage USA

Seventh Avenue Inc. 1

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

INFORMATION SECURITY AND SECURITY BREACH NOTIFICATION GUIDANCE Preventing, Preparing for, and Responding to Breaches of Information Security

Seals Security & Best Practices

Customs-Trade Partnership Against Terrorism. C-TPAT Portal User Manual

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody

Client Resources SAFEGUARDING YOUR IDENTITY. Your personal and financial information is precious. Protect it by being savvy about identity theft.

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

Red Flag Rules and Aging Services: What You Need to Know

U.S. CUSTOMS & BORDER PROTECTION NUMBER: TRADE INFORMATION NOTICE ISSUE DATE:

Identity Theft. Protecting Your Credit Identity G1

IDENTITY THEFT: MINIMIZING YOUR RISK

U.S. Customs and Border Protection (CBP) Management By Account Webinar

MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

What is C-TPAT? Customs Trade Partnership Against Terrorism

I know what is identity theft but how do I know if mine has been stolen?

CONTENTS. Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination...

Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Transcription:

Protecting Your Company s Identity

Stages of Identity Theft Acquisition of the identity such as theft, internet, garbage and mail Use of the identity For financial gain (most common) and/or evade Law Enforcement Discovery of the theft Identity theft may take from six months to several years to discover. Evidence suggests the longer it takes to discover the theft, the greater the loss incurred by the victim. Source: National Institute of Justice / U.S. Department of Justice

Acquisition Dumpster diving going through garbage cans, dumpsters, trash bins to obtain copies of your documents that typically bear your name, address, and even telephone number. These types of records make it easy for criminals to obtain accounts in your name. Shoulder surfing watching from a nearby location as you enter data into the computer or read trade sensitive information on your desk. Criminals buy old/unwanted computers and troll their hard drives for sensitive information. The same goes for Blackberries, Palm Pilots, and PDA s, which often hold both personal and business-related information. Insider employee steals sensitive data by removing paper documents or accessing electronic data. Criminals may bribe employees to gain access to sensitive company data.

Use / Discovery Confessed to stealing between one to two million dollars in cash and merchandise. All he needed to do was find processed deposit slips and junk mail with full names and addresses in the garbage of a local bank. Stole social security numbers and racked up $60,000 on credit cards. Police say she went looking for moving boxes, and found the employment applications in the dumpster. Cleaning worker arrested: pulled papers from the trash barrel or recycle bin anything that had a name or Social Security number. She stated she had the codes to the offices. Arrested for stealing one million credit card numbers: It started with accomplices driving around the city with laptops looking for unsecured computer networks.

Mitigate Risk Corporate identity theft is on the rise Use Minimum Security Criteria as a tool Contractually obligate business partners to adhere to MSC Business Partner Requirements Personnel Security Procedural Security Information Technology Security Reduce opportunities for criminals to obtain your information

Business Partner Requirements Security procedures For those business partners eligible for C-TPAT certification (carriers, ports, terminals, brokers, consolidators, etc.) the importer must have documentation (e.g., C-TPAT certificate, SVI number, etc.) indicating whether these business partners are or are not C-TPAT certified. For those business partners not eligible for C-TPAT certification, importers must require their business partners to demonstrate that they are meeting C-TPAT security criteria via written/electronic confirmation (e.g., contractual obligations; via a letter from a senior business partner officer attesting to compliance; a written statement from the business partner demonstrating their compliance with C-TPAT security criteria or an equivalent WCO accredited security program administered by a foreign customs authority; or, by providing a completed importer security questionnaire). Based upon a documented risk assessment process, non-c-tpat eligible business partners must be subject to verification of compliance with C-TPAT security criteria by the importer. ASK: How have we confirmed that our business partners meet MSC requirements?

Business Partner Requirements Brokers must have written and verifiable processes for the screening of new business partners, beyond financial soundness issues, to include security indicators.. Written procedures must exist to address the specific factors or practices as determined by CBP as sufficient to trigger additional scrutiny of the import transaction as informed by U.S. Customs and Border Protection (CBP). ASK: What do we know about this business partner? Never met customer Only contacts by fax, email or cell phone ASK: Do we verify that the POA is legitimate?

Personnel Security Written and verifiable processes must be in place to screen prospective employees and to periodically check current employees. Pre-Employment Verification Application information, such as employment history and references must be verified prior to employment. Background Checks/Investigations Consistent with foreign, federal, state, and local regulations, background checks and investigations should be conducted for prospective employees. Once employed, periodic checks and reinvestigations should be performed based on cause, and/or the sensitivity of the employee s position. Personnel Termination Procedures Companies must have procedures in place to remove identification, facility, and system access for terminated employees. ASK: What do we know about the individuals that work in our facility? ASK: Has all facility access been removed for separated employees?

Procedural Security: Documentation Processing Documentation Processing: Procedures must be in place to ensure that all information used in the clearing of merchandise/cargo, is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information. ASK: How is trade sensitive documentation destroyed? Internal Business Partners ASK: Did we revoke inactive POAs?

Procedural Security: Documentation Processing Brokers must have procedures must be in place to ensure that all information provided by the importer/exporter, freight forwarder, etc., and used in the clearing of merchandise/cargo, is legible and protected against the exchange, loss or introduction of erroneous information.. Review of documentation for completeness and clarity and contacting the business partner or importer/exporter, as necessary, to obtain corrected documentation or information. To the extent such information comes to the broker s attention, alerting the importer/exporter of its obligation to notify CBP and/or any other appropriate law enforcement agency of any errors and/or shortages and overages of merchandise that create a security risk in the supply chain, and providing assistance that is consistent with its for hire services in making such notification and correction of data as may be required or requested by the importer/exporter.

Procedural Security: Document Review Transportation Carrier personnel should be trained to review manifests and other documents in order to identify or recognize suspicious cargo shipments that: Originate from or are destined to unusual locations Paid by cash or a certified check Have unusual routing methods Exhibit unusual shipping/receiving practices Provide vague, generalized or poor information All instances of a suspicious cargo shipment should be reported immediately to the nearest CBP port of entry.

Information Technology Security Documentation control must include safeguarding computer access and information Password Protection Automated systems must use individually assigned accounts that require a periodic change of password. Accountability A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data. All system violators must be subject to appropriate disciplinary actions for abuse. ASK: Do only those with a Need to Know have access to sensitive information? Levels of access Password protected Anti-intrusion software

Monitor Your Credit Report ACE Reports to monitor import activity by IOR Port, HTS, filer code, export countries Notify CBP when suspicious activity is identified C-TPAT POC Account Manager Port Have all of the particulars available Date Entry Number / Bill of lading How suspicious activity differs from normal import operations Obtain an ACE Account Today Type keyword ACE Application in search box on www.cbp.gov

Be Proactive Employees must be trained to report suspicious activity Verification of Power of Attorney Do you know the customer? Do you know the individual named on the POA? Confirm that customer is legitimate Contact company to verify POA Who has access to company information? Is sensitive information secure after business hours? Cleaning crew: do you know who they are? Other employees without a Need to Know IT disabled after employee separates from company Disposal of trade sensitive information Paper documents: shred, burn bag, etc. Wipe all files off old computers and PDA s before getting rid of them. Hackers buy such devices for the information stored on them.

Case Study