APEC Private Sector. Supply Chain Security Guidelines



Similar documents
Customs-Trade Partnership against Terrorism Supply Chain Security Profile

Customs-Trade Partnership against Terrorism Supply Chain Security Profile

C-TPAT Self-Assessment - Manufacturing & Warehousing

WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

C-TPAT Importer Security Criteria

Intermec Security Letter of Agreement

MINIMUM SECURITY GUIDELINES FOR SOURCE MANUFACTURER/WAREHOUSEMEN C-TPAT INFORMATION

A Message for Warehouse Operators And Security Guidelines for Warehouse Operators

Security Criteria for C-TPAT Foreign Manufacturers in English

Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.

Global Supply Chain Security Recommendations

Customs & Trade Partnership Against Terrorism (C TPAT)

Seventh Avenue Inc. 1

Return the attached PPG Supply Chain Security Acknowledgement by , fax, or mail within two weeks from receipt.

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Partners in Protection / C-TPAT Supply Chain Security Questionnaire

CVS Pharmacy C-TPAT Requirements For Import Product Suppliers

CVS Pharmacy C-TPAT Requirements For Product Suppliers

C-TPAT Security Criteria Sea Carriers

Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum Security Criteria Third Party Logistics Providers (3PL)

ABBVIE C-TPAT SUPPLY CHAIN SECURITY QUESTIONNAIRE

Security Profile. Business Partner Requirements, Security Procedures (Updated)

Customs-Trade Partnership Against Terrorism (C-TPAT) Security Guidelines for Suppliers/Shippers

Supply Chain Security Audit Tool - Warehousing/Distribution

US CUSTOMS IMPORT DOCUMENT REQUIREMENTS

Best Practices For. Supply Chain Security

PHYSICAL SECURITY STANDARDS

1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.

What is C-TPAT? Customs Trade Partnership Against Terrorism

C-TPAT Highway Carrier Security Criteria

Rail Carrier Security Criteria

Contents. Global Security Verification (GSV) Standard. Introduction The Global Security Verification Criteria Implementation Guidance...

Security Policies and Procedures

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

World Customs Organization

Food Defense Self-Assessment Checklist for. Slaughter and Processing Plants

SECURITY IN TRUCKING

AEO Template Introduction

C-TPAT Executive Summary

C-TPAT Customs Trade Partnership Against Terrorism

C-TPAT CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM

Guidance Notes FSR 2014

Physical Security Assessment Form

Security Guidelines for. Agricultural distributors

FSIS Security Guidelines for Food Processors

C-TPAT Expectations for Agents, Vendors & Manufactures

APPENDIX 1: ORACLE SUPPLY CHAIN AND HIGH VALUE ASSET PHYSICAL SECURITY STANDARDS

Rx-360 Supply Chain Security Template -- Requirements for Third Party Logistics Providers 6 June 2012

"DOT IN-DEPTH HAZMAT SECURITY TRAINING"

GUIDE TO DEVELOPING A FOOD DEFENSE PLAN FOR Food Processing Plants

DOT HAZMAT SECURITY AWARENESS TRAINING

September 25, Dear Mr. Lewis:

Food Defense Supplier Guidelines

Key Small Parcel Requirements

LOSS PREVENTION IAT GROUP

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

SUPPLY CHAIN SECURITY IN THE 21 st CENTURY

Seals Security & Best Practices

New Certified Company Program (NEEC) Reinforcing Supply Chain Security in Mexico NEEC Profile

Threats, Risks and Possible solutions

Court Security Guidelines

A Message for Carriers, Carrier-Forwarders and Others, With Security Procedures Guidelines Attached.

Increasing Competitiveness / Lowering Costs with Supply Chain Management and Security Standards

IOWA LABORATORIES FACILITIES PHYSICAL SECURITY PLAN

Certifying the Industrial Athlete of the Future Edition

E3211. DOT Hazmat Security Awareness. Leader s Guide

Protecting Your Company s Identity

Developing a Security Training and Awareness Program

Upon completion of the module, you will be issued an electronic training certificate.

Identity Theft Prevention Program Compliance Model

Kroger Manufacturing Trailer Seal Policy Revised 09/03/10

Threats, Risks and Possible solutions

Each time a driver crosses the international border, the driver must clear, or be released by, the customs agency of the country they are entering.

Does a fence or other type physical barrier define the perimeter of the facility?

Motor Truck Cargo Insurance Application

ISO IEC ( ) INFORMATION SECURITY AUDIT TOOL

The Authorized Economic Operator and the Small and Medium Enterprise FAQ

Hazardous Materials Security Awareness

Jordan s electronic transit monitoring and facilitation system

File 6: Appendix A, 36 CFR 1234 (formally numbered as 36 CFR 1228 subpart K) Federal Facility Security Standards (version 2.0 issued May 15, 2014)

Self assessment questionnaire

FACILITY SECURITY CERTIFICATION FORM DOJ SECURITY LEVEL II

IAPE STANDARDS SECTION 10 - MONEY

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

VILLANOVA UNIVERSITY ENVIRONMENTAL HEALTH AND SAFETY DEPARTMENT OF TRANSPORTATION HAZARDOUS MATERIALS SECURITY PLAN

CREATING YOUR SCHOOL FOOD DEFENSE PLAN

Bureau of Customs and Border Protection

SPECIAL RECOMMENDATION IX: CASH COURIERS DETECTING AND PREVENTING THE CROSS-BORDER TRANSPORTATION OF CASH BY TERRORISTS AND OTHER CRIMINALS

How to build a great compliance program for your U.S. imports

DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008

B/E Aerospace, Inc. Routing Guidelines (Shipping Within and To/From U.S.) Update January 2015

Preparer: Owner: Approver: Security Manager Security Senior VP/Site Manager, Freeport Plant

RADLEY ACURA RED FLAG IDENTITY THEFT PROTECTION PROGRAM and ADDRESS DISCREPANCY PROGRAM

Trusted Traders Programs Overview

DEPARTMENT OF DEFENSE COMMERCIAL AIR TRANSPORTATION QUALITY AND SAFETY REQUIREMENTS INTRODUCTION

Transcription:

APEC Private Sector Supply Chain Security Guidelines 1

Contents Executive Summary 3 Physical Security 4 Access Control 5 Personnel Security 6 Education and Training Awareness 7 Procedural Security 8 Documentation Processing Security 9 Trading Partner Security 10 Conveyance Security 11 Crisis Management and Disaster Recovery 12 References 13 2

Executive Summary Key elements of supply chain security include: Physical Security Access Control Personnel Security Education and Training Awareness Procedural Security Documentation Processing Security Trading Partner Security Conveyance Security Crisis Management and Disaster Recovery Elements of supply chain security pertain differently to each organization. Focus on elements of greatest importance to your organization. Complex, multi-country supply chains demand more collaboration on security issues. Security inside the organization is not sufficient. Collaboration outside the organization is essential. Conduct security assessments and implement security plans. Update regularly. Comply with international standards and requirements set by the World Customs Organization, the International Maritime Organization, the International Standards Organization, etc. 3

Physical Security Physical security includes security measures that monitor and control the facility s exterior and interior perimeters. This will include Mail Service Security, Lock and Key Control, and Perimeter and Interior Alarms. Recommended features, to be installed as appropriate: Appropriate peripheral and perimeter barriers. Electronic security systems, to include theft alarm systems, access control systems, closed circuit television (CCTV). Clear identification of restricted areas. Locking devices on external and internal doors, windows, gates and fences. Exterior doors and windows should be equipped with alarms. Segregated and marked domestic, international, high value, and dangerous goods cargo areas within the warehouse, preferably by a safe, caged or otherwise fenced-in area. Emergency lighting / power systems for key operational areas and high value cargo areas. Periodic inspection and repair to assure integrity of security measures. Depending upon its size, the company may require a security organization. Gates or doors through which vehicles or personnel enter or exit should be manned or under observation by management or security personnel. Access to employee parking should be controlled. Employee parking separate from visitor parking. Private passenger vehicles should be prohibited from parking in cargo areas or immediately adjacent to cargo storage buildings. Lock and key control, including signing in and out of high-risk areas. Restrict access to document or cargo storage areas. 4

Access Control Access controls prohibit unauthorized access to facilities, conveyances, vessels, aircraft, shipping, loading docks, and cargo areas. If access control is not possible, increased precautions in other security aspects may be needed. Use of access control points and the positive identification, recording, and tracking of all employees, contractors, visitors, and vendors. Access control system for persons and vehicles. Procedure to challenge unauthorized / unidentified persons. Deny access and trigger an alarm when visitors attempt to enter an unauthorized area. Inspect vehicles required to access operations areas. Control the times individuals have access to facilities. Post a map of restricted areas within the view of employees and visitors. 5

Personnel Security Personnel security is concerned with the screening of employees and prospective employees, as appropriate and as allowed for by law. Review skill requirements for key positions. Verify job application information. Check background of employees in sensitive positions. Contact references. Investigate criminal records, if any. Assure correct alignment of job skill requirements with individual s skills. Conduct periodic background checks, note unusual changes in social and economic situation. Check background and corporate structure of independent contractors. Implement drug consciousness programs. Drug testing (as allowed for by law): Before hiring Random periodic testing At times of reasonable suspicion Employee identification (ID) procedures. ID cards or bracelets. Different color ID cards to designate access privileges. Different color uniforms for each sensitive area. Different color uniforms for security staff. Gate passes should be issued to truckers and other onward carriers to control and identify those authorized to enter the facility. 6

Education, Training and Awareness Education, training and awareness encompass education and training of personnel regarding security policies, encouraging alertness for deviations from those policies and knowing what actions to take in response to security lapses. Communicate security policies and standards to employees, including consequences of noncompliance. Participation of all personnel in security awareness and training programs. Recognition for active employee participation in security controls. Incentives for individuals or employees reporting suspicious activities. Use press releases, email distribution lists and bulletin boards. 7

Procedural Security Procedural security assures recorded and verifiable location of goods in the supply chain. Procedures should provide for the security of goods throughout the supply chain. Contingency procedures should be included within the scope of procedural security. Record and verify introduction of goods into the supply chain under the supervision of a designated security officer. Record and verify removal of goods from the supply chain under the supervision of a designated security officer. Protect against unmanifested material being introduced into the supply chain. Properly store empty and full containers to prevent unauthorized access, including the use of tamper-proof/non-counterfeitable seals. Check empty container received for storage or loading to assure its structure has not been modified. Establish procedure for affixing, recording, tracking, and verifying tamper-proof/noncounterfeitable seals on containers, trailers, and railcars. Seals should not be used in strict numeric sequence nor should seals be registered and controlled by a single person. Verify the identity and authority of the carrier requesting delivery of cargo prior to cargo release. Procedure for detecting shortages, overages, irregularity or illegal activities. Procedure for notifying Customs and other law enforcement agencies of suspected illegal activities. Proper marking, weighing, counting and documenting of cargo/cargo equipment, verified against manifest documents Procedure for tracking the timely movement of incoming and outgoing goods. Random, unannounced security assessments. Inspection of persons and packages. Additional security procedures for high-value and high-risk goods. 8

Documentation Processing Security Documentation processing security, both electronic and manual, assures that information is legible and protected against the loss of data or introduction of erroneous information. Safeguard computer access and information. Control access to information systems, both by level of job responsibility and level of information sensitivity. Physical security in computer areas. Monitor employee use of data systems. Processes to backup computer system data. Record the amount of cargo by packing unit type, packing conditions, and security seal stamps. Discrepancies should be recorded with a note, photograph and scale weight records. Signatures required for all process checkpoints (e.g., document preparation, whe n seals are applied/broken, truck inspection, opening the vault, cargo delivery, cargo receipt, counting unshipped pieces, etc.) Fix times for the preparation of documents, and for the shipping and unshipping of cargoes. Use special control procedures to prepare emergency/last-minute shipments and if necessary notify authorities regarding such shipments. Software system should register transactions or support operations and, if possible, make a follow up of the activities that it handles. Record the entrance and exit time of people receiving and delivering goods. Document significant process delays. Ensure manifests are complete, legible, accurate, and submitted in a timely manner. Future automated data exchange-related procedures Establish electronic customs reporting systems based on World Customs Organization Customs Data Model and the Unique Consignment Reference. Establish advance manifest reporting systems. 9

Trading Partner Security Trading partner security extends supply chain security to your suppliers and customers. Communication, assessment, training, and improvement are key components. Encourage trading partners/suppliers/contractors to assess and enhance, if required, their supply chain security. Request written security agreements with trading partners/suppliers/contractors to include controls such as: Tamper-proof/non-counterfeitable seals Signatures Time controls Agreed means of communication Consider offering incentives to trading partners/suppliers/contractors for enhanced security coordination and cooperation. Document mutual supply chain security policies. Extensive exchange of information between trading partners/suppliers/contractors. Advise Customs and foreign authorities of security agreements with trading partners. Education, training and awareness by trading partners on supply chain security. If possible, include equivalent security provisions as a condition of contract for contractors/suppliers providing services. 10

Conveyance Security Conveyance security provides protection against the introduction of unauthorized personnel and material into the supply chain, including the areas between the links of the supply chain. Recommended proc edures, to be conducted as appropriate: Routinely search all readily accessible parking, storage, loading and transit areas. Secure internal/external compartments and panels. Procedures for reporting instances in which unauthorized personnel, unmanifested materials, or signs of tampering of a conveyance are discovered. When high-value or high-risk cargo must be transported a substantial distance from the point of unloading to a special security area, vehicles capable of being locked or otherwise secured should be used. Use locks, tamper-proof/non-counterfeitable seals or electronic seals to secure conveyances. If cost-effective, use transponders to facilitate continual tracking of conveyances. Use automatic electronic transmittal of 'smart card' data to Customs if available. Use 'smart card' technology containing vehicle, consignment, and driver information where automated border crossings are in place. Consider cost and future standardization issues related to use of smart cards, electronic seals and transponders. Stay informed regarding development of standards and requirements regarding smart cards, electronic seals and transponders by World Customs Organization, International Maritime Organization, International Standards Organization, etc. 11

Crisis Management and Disaster Recovery Crisis management and disaster recovery procedures include advance planning and process establishment to operate in extraordinary circumstances. Emergency Plan Crisis Management Team (CMT) Emergency Response personnel in-house Periodic updates and walk-through Crisis Management Rooms Primary and alternate off-site locations Training Periodic Emergency Response personnel - ongoing Testing Emergency Plan Compliance Reporting Senior Location Leadership Certification - all locations Incident tracking and information coordination Investigation capability and follow-up Law enforcement role and linkage Analysis of cause of crisis 12

References Business Anti-Smuggling Coalition (BASC) Security Program Customs-Trade Partnership Against Terrorism (C-TPAT) Guidelines World Customs Organization (WCO) Supply Chain Security and Facilitation Advance Cargo Information Guidelines IBM Corporate Security Guidelines 13