Customs-Trade Partnership against Terrorism Supply Chain Security Profile



Similar documents
Customs-Trade Partnership against Terrorism Supply Chain Security Profile

C-TPAT Importer Security Criteria

Seventh Avenue Inc. 1

Intermec Security Letter of Agreement

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Security Criteria for C-TPAT Foreign Manufacturers in English

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

Global Supply Chain Security Recommendations

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Customs & Trade Partnership Against Terrorism (C TPAT)

Return the attached PPG Supply Chain Security Acknowledgement by , fax, or mail within two weeks from receipt.

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

APEC Private Sector. Supply Chain Security Guidelines

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

C-TPAT Self-Assessment - Manufacturing & Warehousing

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

C-TPAT Security Criteria Sea Carriers

CVS Pharmacy C-TPAT Requirements For Product Suppliers

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Security Profile. Business Partner Requirements, Security Procedures (Updated)

What is C-TPAT? Customs Trade Partnership Against Terrorism

Best Practices For. Supply Chain Security

C-TPAT Highway Carrier Security Criteria

Supply Chain Security Audit Tool - Warehousing/Distribution

Rail Carrier Security Criteria

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

C-TPAT Customs Trade Partnership Against Terrorism

AEO Template Introduction

US CUSTOMS IMPORT DOCUMENT REQUIREMENTS

Guidance Notes FSR 2014

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

PHYSICAL SECURITY STANDARDS

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached.

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012

C-TPAT Expectations for Agents, Vendors & Manufactures

Key Small Parcel Requirements

Security Policies and Procedures

Contents. Global Security Verification (GSV) Standard. Introduction The Global Security Verification Criteria Implementation Guidance...

Physical Security Assessment Form

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

C-TPAT Executive Summary

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

World Customs Organization

DOT HAZMAT SECURITY AWARENESS TRAINING

FSIS Security Guidelines for Food Processors

September 25, Dear Mr. Lewis:

Seals Security & Best Practices

Motor Truck Cargo Insurance Application

B/E Aerospace, Inc. Routing Guidelines (Shipping Within and To/From U.S.) Update January 2015

SECURITY IN TRUCKING

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

Protecting Your Company s Identity

Self assessment questionnaire

CONTENTS. Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination...

Does a fence or other type physical barrier define the perimeter of the facility?

Certifying the Industrial Athlete of the Future Edition

C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM

Developing a Security Training and Awareness Program

LOSS PREVENTION IAT GROUP

Caneda Transport Border Guide lines and Regulations Manual. Canada Border Service Agency (PIP) C-TPAT

Supply Chain Security Best Practices Catalog. Customs-Trade Partnership Against Terrorism (C-TPAT)

FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURES

MODESTO CITY SCHOOLS Administrative Regulation

Food Defense Supplier Guidelines

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

2. Employees must wear their ID tag at all times while on the premises.

576 Valley Rd, #234 Wayne, NJ Tel: (973) Fax: (973) Attention: Date:

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

MOTOR TRUCK CARGO APPLICATION BROAD FORM Name of Applicant: doing business as. Name Address City State Zip Code Function

Security Guidelines for. Agricultural distributors

HIPAA Security. assistance with implementation of the. security standards. This series aims to

Bureau of Customs and Border Protection

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Home Security Assessment Checklist DATE

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

Identity Theft Prevention Program Compliance Model

Conveyance Inspection Procedures and Sealing Process. Presented by SSCSS Mark Isaacson SCSS Tom Greulich SCSS Mark Mahoney

Upon completion of the module, you will be issued an electronic training certificate.

Date: Business Name: Business Contact Person: Business Address: Business Telephone Number: Alternate Contact Number/ Officer: Case No:

Supplier Information Security Addendum for GE Restricted Data

E3211. DOT Hazmat Security Awareness. Leader s Guide

Introduction. Conducting a Security Review

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

348 Birch s Road North Bay, ON P1B 8Z4 (ph) (fax) FREIGHT LOSS AND DAMAGE CLAIMS PROCEDURE

Purchasing Card Policies and Procedures

PII Compliance Guidelines

Transcription:

Customs-Trade Partnership against Terrorism Supply Chain Security Profile Service Provider Assessment (Warehouse) Please answer the following questions about your company s cargo security processes and participation in the Customs-Trade Partnership against Terrorism (C-TPAT) program. There is space at the end of this assessment form to provide more detailed answers, or feel free to use separate sheets of paper. The completed form should be returned to us no later than. 1. Are you a member of the C-TPAT program? 2. If not, have you submitted a letter of intent to participate in the C-TPAT program? If yes, please attach a copy. 3. Have you submitted a supply chain security profile to Customs? 4. Has Customs signed the letter of intent and returned it to you? If yes, please attach a copy. 5. Are you participating in the C-TPAT program as a (check all that apply)- Air Carrier Sea Carrier Rail Carrier Air Freight Consolidator Ocean Transportation Intermediary Forwarder/NVOCC Trucker Customs Broker U.S. Marine Port Authority/Terminal Operator Warehouse Operator Other Please Specify: YES NO STATUS Physical Security 6. Are your buildings constructed of materials that resist unlawful entry and protect against outside intrusion? 7. Are gates through which vehicles and/or personnel enter or exit manned and/or monitored? 8. Are parking lots and other exterior areas enclosed by fencing? 9. Is there lighting inside and outside each facility, including entrances and exits, cargo handling and storage areas, fence lines and parking areas? 10. Do private passenger vehicles park in or adjacent to cargo handling and storage areas? 11. Within the cargo facility, is fencing used to segregate domestic, international, high value, and hazardous cargo? C-TPAT Service Provider Assessment Warehouse Page 1 of 5

YES NO STATUS 12. Are locking devices used to secure external and internal doors, windows, gates and fences? 13. Do management or security personnel control the issuance of locks, keys, passwords, pass cards, and similar access devices? 14. Are alarm systems and/or video surveillance cameras utilized to monitor premises and prevent unauthorized access to cargo handling and storage areas? 15. Do private passenger vehicles park in or adjacent to cargo handling, truck or container parking areas? 16. Do you have a procedure for notifying Customs or local law enforcement of shippers and/or cargo with irregular profiles as that term is defined by Customs? Access Controls 17. Do you have written procedures to prevent unauthorized access to your facilities? 18. Do you have identification procedures for all employees, visitors and vendors? 19. Are visitors and vendors issued temporary identification and escorted while in your facilities? 20. Is there a screening procedure for non-cargo packages and mail? 21. Is employee access restricted to areas needed for performance of duties only? 22. Is there a procedure for checking all drivers and vehicles entering and departing your facilities? 23. Do you have procedures to challenge unauthorized/unidentified persons and, if warranted, to report problems to local law enforcement officials? Personnel Security The following procedures must be followed in accordance with local laws and regulations. 24. Do you conduct pre-employment screening and/or background checks on prospective employees? 25. Do you verify the information provided by job applicants? 26. Are current employees periodically re-checked? 27. Do you have an internal written code of conduct? 28. Do you have procedures to report and manage issues related to personnel security? 29. Is there a procedure for removing identification, facility and system access for terminated employees? 30. Do you maintain a current, permanent employee list which includes the name, date of birth, national identification, social security number (or other identifier at foreign facilities), and position held? 31. Do you have a written policy that employees cooperate fully with Customs in implementing C-TPAT and other security programs? Employee Education and Awareness 32. Do you have a security awareness program to educate employees to recognize internal conspiracies, maintain cargo integrity, protect access controls, and to identify and address security issues? C-TPAT Service Provider Assessment Warehouse Page 2 of 5

33. Are employees made aware of company procedures regarding identifying and reporting questionable situations? 34. Does your security awareness program encourage and reward employees for active participation in security programs? 35. Are employees in the shipping and receiving areas, as well as those receiving and opening non-cargo packages and mail, trained in safety and security procedures? YES NO STATUS Documentation Security 36. Do your security procedures ensure the accuracy and completeness of all information related to cargo and documentation? 37. Do these procedures protect against the exchange, loss or introduction of erroneous information? 38. Do you record, report and investigate shortages and overages? 39. Do you track the movement of incoming and outgoing cargo? 40. Do you safeguard access to your computer systems and information? 41. Do you have written procedures regarding password security, logging off unattended terminals, and similar system access controls? 42. Are you ABI, AES and AMS certified? 43. Is there a written policy regarding unauthorized, improper use of the computer system, including tampering with, altering or removing data pertaining to cargo, customers and/or company proprietary data? Verification 44. Has Customs conducted a verification of the security procedures identified in your supply chain security profile? 45. Are the specific procedures identified in your supply chain security profile maintained in a verifiable format? Conveyance and Procedural Security 46. Do you have security procedures to protect against the introduction of unauthorized personnel and material into containers, vehicles and your facilities? 47. Do your procedures provide for reporting the discovery of unmanifested materials or signs of tampering to management and, if warranted, local law enforcement officials? 48. Do your security procedures provide for the physical search of containers, including front wall, left side, right side, floor, ceiling/roof, inside/outside doors, and outside/undercarriage? 49. Do you verify the presence of seals on containers and verify the actual seal number(s) with the seal number(s) recorded on the shipment documents? 50. Do you have a procedure for reporting compromised seals? 51. Is the loading and unloading of cargo supervised by company employees? 52. Do you reconcile the weights, labels, marks and piece counts indicated on documents to the actual cargo being unloaded/loaded? 53. Do you have a written procedure for detecting and reporting discrepancies, including shortages and overages? 54. Do you segregate high-value and/or dangerous cargo in one or more separate areas within the warehouse or storage yard? C-TPAT Service Provider Assessment Warehouse Page 3 of 5

YES NO STATUS 55. Are containers and trucks parked in a secure area, and locked or monitored to prevent unauthorized access? Participation in Other Customs Industry Partnership Programs 56. Are you a participant in (check only those that apply to your company): Super Carrier Initiative The Carrier Initiative Program (CIP) The Business Anti-Smuggling Coalition (BASC) The Free and Secure Trade (FAST) Program Service Provider Security 57. Do you have written standards for your service providers physical and procedural security? 58. Do you have written internal controls for the selection of service providers? 59. Have you requested information from your service providers regarding their participation in the following Customs Industry Partnership Programs (check only those which apply: The Customs-Trade Partnership Against Terrorism The Carrier Initiative Program (CIP) The Super Carrier Initiative Program (SCIP) The Business Anti-Smuggling Coalition (BASC) The Free and Secure Trade (FAST) Program I.T. Security 60. Do you have written procedures regarding password security, logging off unattended terminals, and similar system access controls? 61. Do you have security in place to limit access to your computer system to only authorized users? 62. Do your security procedures require authorized users to regularly change their passwords? 63. Does your system have firewalls? 64. Do you have anti-spam, anti-pop-up and anti-virus software installed on your computer system? Is it regularly updated? 65. Is your computer system regularly backed-up and the back-up media maintained off-site? Security Plans 66. What changes do you plan to make to improve security? 67. Do you periodically and without notice conduct verifications of your security procedures? Additional Information: C-TPAT Service Provider Assessment Warehouse Page 4 of 5

I hereby certify that the information given by me on behalf of my company in completing this assessment is true and correct to the best of my knowledge. Should significant changes occur in our program, we will promptly provide you with written notification about those changes. Company Name: Prepared By: Date Prepared: Title: Signature C-TPAT Service Provider Assessment Warehouse Page 5 of 5