Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Similar documents
welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Security Criteria for C-TPAT Foreign Manufacturers in English

Return the attached PPG Supply Chain Security Acknowledgement by , fax, or mail within two weeks from receipt.

Global Supply Chain Security Recommendations

C-TPAT Importer Security Criteria

Intermec Security Letter of Agreement

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

Seventh Avenue Inc. 1

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

Customs & Trade Partnership Against Terrorism (C TPAT)

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

C-TPAT Highway Carrier Security Criteria

C-TPAT Security Criteria Sea Carriers

Rail Carrier Security Criteria

C-TPAT Self-Assessment - Manufacturing & Warehousing

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

What is C-TPAT? Customs Trade Partnership Against Terrorism

CVS Pharmacy C-TPAT Requirements For Product Suppliers

Key Small Parcel Requirements

C-TPAT Expectations for Agents, Vendors & Manufactures

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached.

C-TPAT Customs Trade Partnership Against Terrorism

Best Practices For. Supply Chain Security

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

B/E Aerospace, Inc. Routing Guidelines (Shipping Within and To/From U.S.) Update January 2015

APEC Private Sector. Supply Chain Security Guidelines

Supply Chain Security Audit Tool - Warehousing/Distribution

Security Policies and Procedures

CARGO SEALING GUIDE - PROCEDURES FOR C-TPAT/FAST PARTICIPANTS

AEO Template Introduction

Contents. Global Security Verification (GSV) Standard. Introduction The Global Security Verification Criteria Implementation Guidance...

CONTENTS. Introduction...Page 5 Topic 1: Child Labor...Page 11 Topic 2: Forced Labor/Prison Labor...Page 15 Topic 3: Discrimination...

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

Conveyance Inspection Procedures and Sealing Process. Presented by SSCSS Mark Isaacson SCSS Tom Greulich SCSS Mark Mahoney

Caneda Transport Border Guide lines and Regulations Manual. Canada Border Service Agency (PIP) C-TPAT

Seals Security & Best Practices

Guidance Notes FSR 2014

September 25, Dear Mr. Lewis:

Physical Security Assessment Form

US CUSTOMS IMPORT DOCUMENT REQUIREMENTS

Developing a Security Training and Awareness Program

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

Upon completion of the module, you will be issued an electronic training certificate.

C-TPAT: What Every Security Executive Should Know

Supply Chain Security Best Practices Catalog. Customs-Trade Partnership Against Terrorism (C-TPAT)

SECURITY IN TRUCKING

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012

Protecting Your Company s Identity

World Customs Organization

DOT HAZMAT SECURITY AWARENESS TRAINING

Security Guidelines for. Agricultural distributors

C-TPAT Executive Summary

Each time a driver crosses the international border, the driver must clear, or be released by, the customs agency of the country they are entering.

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

Hazardous Materials Transportation Security Planning

E3211. DOT Hazmat Security Awareness. Leader s Guide

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

FSR2014 FACILITY SECURITY REQUIREMENTS. Transported Asset Protection Association. All Rights Reserved

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Reducing Trade-Financing Risks Through the Use of the Powers Secured Chain of Custody

How To Protect A Water System

C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM

FSIS Security Guidelines for Food Processors

TABLE OF CONTENTS. A. Introduction to Best Practices Page 3. B. Risk Assessment Page 5. C. Business Partner Requirements Page 6

Cargo Theft Prevention and Risk Mitigation for the Holiday Season

Threats, Risks and Possible solutions

PHYSICAL SECURITY STANDARDS

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

U.S. Customs and Border Protection Security Seal/Hologram Program Procedures (Updated Sep 2010)

Security Overview. A guide to data security at AIMES Data Centres. TEL: enquiries@aimes.

2. Employees must wear their ID tag at all times while on the premises.

SUPPLY CHAIN SECURITY IN THE 21 st CENTURY

Threats, Risks and Possible solutions

VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN

Risk Assessments and Risk Based Supply Chain Security. March, 2010

WESTERVILLE DIVISION OF POLICE Security Survey Checklist: Business

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

Kroger Manufacturing Trailer Seal Policy Revised 09/03/10

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

CITY UNIVERSITY OF HONG KONG Physical Access Security Standard

Food Defense Supplier Guidelines

Packaging Guidelines Version Date: 11/6/12. ABB Inc. Packaging Guidelines. Version 1.0. Page P08.W03 Rev 0

Evergreen Seal Management Policy

LOGISTICS FREIGHT FORWARDERS SUPPLEMENTAL APPLICATION

Service Organization Control (SOC 3) Report on a Description of the Data Center Colocation System Relevant to Security and Availability

Jordan s electronic transit monitoring and facilitation system

LOSS PREVENTION IAT GROUP

APL Logistics. Free Carrier (FCA): Improving Supply Chain Performance

Framework Requirements for Product Security in the German Automotive Industry (Prototype Protection)

Transcription:

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers In support of Vectora's C-TPAT program implementation, these security requirements and guidelines are provided to international shippers to institute effective security practices designed to ensure supply chain security to mitigate the risk of loss, theft, and contraband smuggling that could potentially introduce terrorists and implements of terrorism into the global supply chain. The following security criteria, as outlined by the US Customs and Border Protection (CBP) Customs Trade Partnership Against Terrorism (C-TPAT) program, identify areas and opportunities for ensuring security of the supply chain supporting Vectora: 1. Business Partnerships/Use of Sub-Contractors Supplier/Shipper shall ensure that they and any sub-contracted supplier/shipper or logistics service provider involved in handling any shipment being sent directly to the U.S. (for which Vectora is the U.S. Importer of Record) employs security practices which ensure the security of such shipments. If supplier/shipper sub-contracts with other suppliers/shippers or logistics service providers engaged in manufacturing, packaging, or transport of Vectora shipments directly to the U.S., the supplier/shipper must have documented processes for the selection of such business partners to ensure that they are a viable business that will provide adequate supply chain security. International suppliers/shippers should ensure that any business partners involved in handling shipments to Vectora be knowledgeable of and demonstrate that they are meeting the Vectora C- TPAT Security Guidelines this may be accomplished via written/electronic confirmation (i.e. contractual obligations; via a letter attesting to compliance; a written statement from the business partner demonstrating their compliance with C-TPAT security criteria or an equivalent a supply chain security program sponsored by your nation; or, by providing a completed security questionnaire). 2. Physical Security Supplier/Shipper facilities must have physical security deterrents that protect against unauthorized access. Physical security deterrents employed by international suppliers/shippers may include, but are not limited to, the following elements: 2.1 Fencing Perimeter fencing or walls should enclose supplier/shipper facilities where other controls are not in place to prevent unauthorized access. All fencing and walls should be regularly inspected and maintained. Best practices also include internal securing of shipping and receiving areas via fencing, locking doors, or other access controls 2.2 Gates/Entries Entry and exit points for vehicles and/or personnel must be controlled. The number of gates should be kept to the minimum necessary for proper access and safety controls. 2.3 Guards Guards or access controls should be in place to ensure that unauthorized personnel do not enter the facility or gain access to Vectora shipments. 1

2.4 Parking Controls Private passenger vehicles should be prohibited from parking in or adjacent to shipping and receiving areas to prevent unauthorized materials from being introduced into shipments or conveyance vehicles. 2.5 Locking Devices and Key Controls External and internal windows, gates, and doors through which unauthorized personnel could access the facility or cargo storage areas must be secured with locking devices. Management or security personnel should control the issuance of all locks and keys. 2.6 Lighting Adequate lighting must be provided inside and outside the facility to prevent unauthorized access. 2.7 Alarms Systems and Video Surveillance Cameras Alarm systems and video surveillance cameras should be utilized where necessary to monitor premises and prevent unauthorized access to cargo handling and storage areas. 3. Access Controls Access controls (e.g. badge readers, locks, key cards, guards, etc.) must prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect Vectora s assets. Access controls should include the positive identification of all employees, visitors, and vendors at all points of entry and use of badges for employees and visitors. 3.1 Employees An employee identification system must be in place for positive identification and access control purposes. Company management or security personnel must adequately control the issuance and removal of employee, visitor and vendor identification badges. 3.2 Visitors Visitors must present photo identification for documentation purposes upon arrival. All visitors should be escorted and should visibly display temporary identification. 3.3 Access Devices Procedures should be in place and documented for the issuance, removal and changing of access devices (e.g. badges, keys, key cards, etc.). 3.4 Deliveries Proper vendor identification and/or photo identification must be presented upon arrival by all vendors for documentation purposes. Controls should be in place to ensure vendor access is limited to the areas necessary to perform their duties. 3.5 Challenging and Removing Unauthorized Persons Procedures should be in place to identify, challenge and address unauthorized/unidentified persons. 4. Personnel Security Screen prospective employees consistent with local regulations. Verify employment application information prior to employment. 2

4.1 Background Checks / Investigations Background checks should be conducted for potential employees. Such checks may include; educational and employment background, criminal records and other information to confirm the identification of potential employees. Once employed, periodic checks should be performed based on cause, and/or the sensitivity of the employee s position. 4.2 Personnel Termination Procedures Companies must have procedures in place to remove badges, uniforms, and facility and IT system access for terminated employees. 5. Ocean Container and Truck Trailer Security Container and trailer security must be maintained to protect against the introduction of unauthorized material and/or persons. For suppliers/shippers that stuff/load the ocean container at their facility, procedures must be in place to properly seal and maintain the security of shipping containers and trailers at the point of stuffing. A high security seal must be affixed to all access doors on truck trailers (from Canada or Mexico) and ocean containers bound for the U.S. All seals must meet or exceed the current PAS ISO 17712 standard for high security seals. If the supplier/shipper is not contractually responsible for stuffing / loading the ocean container or getting the cargo to the stuffing location under established Vectora INCOTerms (e.g. ExWorks) and/or agreements, cargo container and trailer security procedures, including bolt seal requirements, the supplier/shipper is not responsible for container and trailer security. 5.1 Ocean Container and Truck Trailer Inspection: If the supplier/shipper is responsible for stuffing ocean containers or truck trailers, an inspection must be conducted on the ocean container or truck trailer prior to stuffing, including the reliability of the locking mechanisms of the doors. A seven-point inspection process is recommended for all containers: Front wall Left side Right side Floor Ceiling/Roof Inside/outside doors Outside/Undercarriage For Truck Trailers, these 3 additional inspections are recommended: Fifth wheel area - check natural compartment/skid plate Exterior - front/sides Rear - bumper/doors 5.2 Ocean Container and Truck Trailer Storage: Ocean containers and truck trailers under the supplier s/shipper s control or located in a facility of the supplier/shipper must be stored in a secure area to prevent unauthorized access and/or manipulation. 5.3 Security and Control of Container and Trailer Seals The international supplier/shipper must affix a high security seal to all fully loaded ocean containers or truck trailers (i.e. from Canada or Mexico) bound for the U.S. when such trailers and containers are stuffed at the supplier s/shipper s location. International suppliers/shippers must have documented procedures in place to manage, control and record the issuance and use of high security bolt seals. Such procedures should include procedures for recognizing and reporting compromised seals and/or containers/trailers. Only 3

designated employees should distribute and apply seals for security purposes. Best practices include storing seals in a locked area or cabinet, limiting access to select employees, and keeping a documented inventory of all seals. 6. Information Technology (IT) Security Security measures must be in place to ensure automated systems are protected from unauthorized access. 6.1 Password Protection Automated systems should use individually assigned accounts that require a periodic change of password. IT security policies, procedures and standards should be in place and provided to employees in the form of training. 6.2 Accountability A system should be in place to identify the abuse of IT including improper access, tampering or the altering of business data. All system violators should be subject to appropriate disciplinary actions for abuse. 7. Procedural Security Security procedures must exist, be documented and communicated to employees to ensure the security measures in this document are followed. Common documentation formats include the use of a security manual, policies, employee handbook, or the like. Upon Vectora s request, international supplier/shipper shall provide evidence of such documented procedures. Specific to Vectora shipments, the following procedures must be documented and communicated: 7.1 Procedures for the issuance, removal and changing of access devices. 7.2 Procedures to identify and challenge unauthorized or unidentified persons 7.3 Procedures to remove identification, facility, and system access for terminated employees. 7.4 Procedures for IT security and standards. 7.5 Procedures for employees to report security incidents and/or suspicious behavior. 7.6 Procedures for the inspection of ocean containers or truck trailers prior to stuffing. 7.7 Procedures to manage control and record the issuance and use of high security bolt seals for ocean containers and truck trailers. 7.8 Shipment Documentation Security Procedures Procedures should be in place to ensure that all information used in the clearing of shipments through Customs is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information. Documentation control should include safeguarding computer access and information related to Vectora shipments. 7.9 Shipping and Receiving Security Procedures Procedures should be in place to ensure that departing cargo is verified against purchase or delivery orders. Best practices include a documented process to ensure accurate piece count, weight and part numbers and verification that contraband is not present. Drivers picking up cargo should be positively identified before cargo is released. 4

7.10 Shipping and Packaging Security Procedures Documented procedures should be in place to control the access to shipping and packaging areas. Once packaged, all shipments should be securely controlled to prevent unauthorized access and the possible introduction of any contraband items. Security Training A security training program should be established and maintained to educate and build employee awareness of proper security procedures as outlined in these security guidelines. Best practices include training on the threat posed by terrorists and contraband smugglers at each point in the supply chain as well as training on topics such as ethical conduct, and avoidance of corruption, fraud and exploitation. Additional training on ensuring proper supply chain security should be provided to employees in the shipping and receiving areas. A documented procedure must be in place for employees to report any security incidents and/or suspicious behavior. Shipment Routing International suppliers/shippers shall follow all INCOTerms, routing, and International Shipment Routing Instructions provided by Vectora. If the international supplier/shipper does not control the routing of the goods between the point of origin and the point of delivery to Vectora, the foreign supplier/shipper is not responsible for supply chain security beyond the point of shipment transfer per the INCOTerms. On U.S. bound Vectora shipments coordinated by the supplier/shipper; international suppliers/shippers shall use transportation freight forwarders and carriers who are either C-TPAT certified or who meet the Vectora C-TPAT Security Guidelines. Business Partner Summary: Is your company C-TPAT certified? (Circle one) Yes / No Status Verification Interface ( SVT ) Number as issued from CBP Signature of Authorized Representative: Printed Name of Authorized Representative: Date: For Vectora Solutions, LLC Signature of Authorized Representative: Printed Name of Authorized Representative: Date: 5