Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Size: px
Start display at page:

Download "Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment"

Transcription

1 Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment

2 Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and status. All loaded containers and cars bound for the United States must be affixed with high security seals (when applicable) that meet or exceed the current ISO PAS standards for high security seals. Company unique seals are a plus. Ensure a systemic point inspection is performed and documented on all containers and instruments of traffic bound for the United States prior to loading at the point of origin. In addition, inspections should be conducted randomly while in route to the U.S. and at the last stop before entering the U.S. Comprehensive screening should be performed on all business partners involved in your supply chains.

3 Top Eight Rail Principles (Cont d) Ensure adequate hiring practices and employee background investigations are conducted on company employees and business partner employees. Conduct risk assessments to determine threats involved and weak areas of the supply chain. Have a visual audit trail for all containers or rail cars being loaded that are exported to the U.S. by insisting that loading bays and docks at the point of origin are monitored on a 24/7 basis by a CCTV System. Conduct seizure investigations and risk analysis in the event the supply chain is compromised.

4 Tracking and Monitoring Differential Global Positioning System (DGPS) Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) An enhancement to GPS that uses a network of fixed, ground-based reference stations to broadcast the difference between the positions indicated by the satellite systems and the known fixed positions.

5 Tracking and Monitoring Automatic Equipment Identification (AEI) Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) An electronic recognition system used to identify rail equipment while en route to its destination.

6 Tracking and Monitoring Hotbox Detectors A device attached to the track which monitors passing trains for hot axles & reports via radio transmission.

7 High Security Seals Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) All loaded containers and cars bound for the United States must be affixed with High Security Seals (when applicable) that meet or exceed the current ISO PAS standards for high security seals. Company unique seals are considered a best practice.

8 Systemic Point Inspection Ensure a Systemic Point Inspection is performed and documented on all containers and instruments of traffic bound for the United States prior to loading at the point of origin. In addition, inspections should be conducted randomly while in route to the U.S. and at the last stop before entering the U.S.

9 Business Partner Screening Familiarize yourself with the partner s operation and production process to determine where the supply chain begins. Determine the level of security at your partner s facility; access controls, perimeter security, etc. Determine level of security and procedures at the point of stuffing and during the sealing process. Determine if partner conducts an extensive background investigation on employee s.

10 Adequate Hiring Practices Request background checks for all employees involved in all supply chains. Subject temporary employees, vendors and third party contractors to the same background investigations as your company s permanent employees. Have partners conduct criminal background checks to ensure the integrity of persons having access to your facility and cargo. Request random & periodic employee reinvestigations from business partners. Require partners to verify authenticity of an official government photo ID for all employees and maintain a copy within their personnel file.

11 Risk Assessments On an annual basis, and based on specific changes in operation, policy, or practices, the company should visit its partners directly involved in its supply chain to determine the efficiency of security measures at their site and/or at the points of stuffing. Questionnaires provided in advance should be utilized to confirm what is in place. Evaluate risk levels at the site and during transit. Companies should be provided feedback, recommendations, and/or ideas based on findings. A scoring matrix should be utilized (for multiple partners) to categorize strengths, weaknesses, threats, and best practices.

12 Risk Assessments On an annual basis and based on breaches of supply chain integrity, conduct a self-assessment on company practices to determine if there are weaknesses and/or vulnerabilities. Follow the flow of cargo from your facilities to the border. Evaluate security at each owned/leased facility. Determine if practices that maintain conveyance security integrity are effective and that they are carried out efficiently.

13 CCTV Have a visual audit trail for all containers or rail cars being loaded that are exported to the U.S. by insisting that loading bays and docks at the point of origin are monitored on a 24/7 basis by a CCTV System.

14 Seizure Response Engage with CBP and/or local authorities Inform SCSS and POE if seizure occurs on foreign side or within the U.S. Risk analysis and investigations Determine vulnerable spots along supply chain through immediate investigations. Share risk analysis findings along with seizure investigation findings with local authorities, CBP, and/or other agencies.

15 Seizure Response (Cont d) Communication between rail companies (US & Mexico) Share investigation findings with critical partners. Share intelligence with partners to help combat smuggling/terrorism.

16 Security Measures in an Air Cargo environment.

17 C-TPAT and current Air Security measures C-TPAT acknowledges that air carriers are already subject to defined security mandates created through public laws and regulations, such as the Aviation and Transportation Security Act (PL ). It is not the intention of C-TPAT to duplicate these requirements, rather, C-TPAT seeks to build upon established foundations and require additional security measures and practices which enhance the overall security throughout the international supply chain. Where an air carrier does not control a specific element of the cargo transportation service it has contracted to provide, such as an airport terminal, direct handling of cargo containers or Unit Load Device (ULD). 1. The air carrier must work with these business partners to ensure that pertinent security measures are in place and adhered to. 2. The air carrier is responsible for exercising prudent oversight for all cargo loaded on board its aircraft.

18 Air Cargo Security Risks Potential risks associated with air cargo security include: 1. Introduction of explosive and incendiary devices in cargo placed aboard aircraft. 2. Shipment of undeclared or undetected hazardous materials aboard aircraft. 3. Cargo crime including theft and smuggling. 4. Aircraft hijackings and sabotage by individuals with access to aircraft.

19 C-TPAT Security Criteria Air Carriers Business Partner Requirements Container or Unit Load Devices (ULD) Security Physical Access Controls Personnel Security Procedural Security Security Training and Threat Awareness Physical Security Information Technology (IT) Security

20 Business Partner Requirements Air carriers must have written and verifiable processes for the screening of business partners, including carrier s agents and service providers. Air carriers must also have screening procedures for new customers, beyond financial soundness issues to include indicators of whether the customer appears to be a legitimate business or poses to be a security risk. Site Verification Verify Business Partners Portal Verification

21 Container or Unit Load Devices (ULD) Security Challenges for air cargo.

22 Contaminated ULD(s) and Carts

23 Cargo Screening and Inspection Participation in the Known Shipper Program X-RAYS K 9 s

24 High Security Seals Container Seals When containers/ulds are used, written procedures must stipulate how seals in the air carrier s possession are to be controlled, and only designated employees must distribute seals for integrity purposes. Procedures should also exist for recognizing and reporting compromised seals and/or containers/ulds to U.S. Customs and Border Protection or the appropriate foreign authority.

25 Personnel Security Background Checks Pre-Employment Verification Background checks / Social Economic Personnel Termination Procedures

26 Physical Security

27 Physical Access Controls Access controls prevent unauthorized entry to aircraft and facilities, maintain control of employees and visitors, and protect company assets. Access controls must include the positive identification of all employees, visitors, service providers, and vendors at all points of entry.

28 Conclusion C-TPAT recognizes the complexity of international supply chains and security practices, and endorses the application and implementation of security measures based upon risk. Therefore, the program allows for flexibility and the customization of security plans based on the member s business model. Appropriate security measures, as listed in the C-TPAT criteria, must be implemented and maintained. Air carriers shall have a documented and verifiable process to secure their cargo and facilities and to determine risk throughout their supply chains based on their business model (i.e., volume, country of origin, routing, C-TPAT membership, potential terrorist threat via open source information, ports identified by TSA as having inadequate security, past security incidents, etc.).

29 Proactive Approaches To Minimize Supply Chain Security Breaches in the Marine Environment

30 The Top Five Marine Principles Ensure a Seven Point Inspection is performed and documented on all containers bound for the United States prior to loading at the point of origin. Have a visual audit trail for all containers being loaded for export to the U.S. by insisting that loading bays and docks at the point of origin are monitored on a 24/7 basis by a CCTV System. All loaded containers bound for the United States must be affixed with a High Security Seal that meets or exceeds the current ISO PAS standards for high security seals. Company unique seals are a plus. Know your Trucking Company s Drivers. They are the weak link in the supply chain. Insist that thorough Background Checks are performed on all personnel involved in your supply chains.

31 Seven Point Inspection

32 CCTV System Have a visual audit trail for all containers being loaded. Avoid this situation: Trap Doors

33 High Security Seals Container Seals Must meet or exceed current ISO PAS standards; Documented procedures for how seals are controlled and affixed; Verify seal numbers match shipping documentation. Company unique seals are a plus.

34 Background Checks Require background checks for all employees involved in your supply chains. Subject temporary employees, vendors and third party contractors to the same background investigations as your company s permanent employees. Conduct criminal background checks to ensure the integrity of persons who have access to your facility and cargo. Randomly subject employees to periodic reinvestigations. Verify authenticity of an official government photo ID for all employees and maintain a copy within their personnel file.

35 Truck Drivers Maintain communication with drivers. Require your highway carriers to issue cell phones or radios to all their drivers. Have them call their dispatchers and document it on a regular basis, particularly at arrival at foreign customs or U.S. CBP and their ultimate destination. Utilize multiple monitoring methods. Track conveyances by timing the driver s movements, fuel consumption and. GPS. Today s modern highway carriers have GPS and text messaging in all their tractors. This enables the driver to communicate with their dispatchers. GPS will detect anomalies, unscheduled stops, route variances and enable drivers to quickly send a distress message.

36 Proactive Approaches To Minimize Supply Chain Security Breaches in the Land Border Environment

37 Land Border Container/Trailer Security Freight transportation 7-point container/trailer inspection Types of seals Tamper proof nuts and bolts Narcotic detector dogs Unannounced visits

38 Land Border Container/Trailer Security Who moves the freight at points along the Supply Chain? C-TPAT Certified Companies Non-CTPAT Certified Companies Is the 7-point container/trailer inspection conducted? This inspection must be documented Company must get a copy of the inspection

39 Land Border Container/Trailer Security Types of seals Plastic Metal Bolt - ISO/PAS Cable ISO/PAS Locking Bar with cable seal ISO/PAS Tamper Evident Security Tape

40 Plastic, Metal and Cable Seals

41 Locking Bar and Bolt Seal Image fills this entire area (OR originates at the upper left corner of the area outlined and is sized to the full width or height of this bounding box.) Try to make multiple images approximately the same size Align and group images in an organized manner

42 Tamper Evident Security Tape

43 Tamper Proof nuts and bolts The use of tamper proof nuts and bolts will help deter unauthorized entry. Trailer door hinge Trailer door hinge pins Door hasp Door bar lock assembly Work with companies during site visits. Show them which trailers are in need of repair. Weld the bolts if no other option exists.

44 Tamper Proof nuts and bolts

45 Hasp Manipulation

46 Narcotic Detector Dogs Narcotic detector dogs are available at most Mexican / U.S. border crossings. Located on the Mexican side prior to crossing into the U.S. Dogs are taught to detect concealed narcotics. Most companies also conduct trailer inspection. All inspections are documented. Can go to the company facility or trailer terminal. Drivers should not know when they have to be inspected. Low cost per trailer.

47 K-9 Inspection

48 Unannounced Site Visits Company will not have time to prepare for your visit. You can verify what the company tells you they are doing. Use caution when crossing the border. Be aware of your surroundings. Know how to get to and out of the place you are visiting. Know the language. Make sure the company is aware that an unannounced visit is possible. Have a plan!

49

Air Carrier Eligibility Requirements

Air Carrier Eligibility Requirements Air Carrier Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Air Carrier must the meet the following eligibility requirements: 1. Active Air Carrier transporting cargo shipments to

More information

Rail Carrier Minimum-Security Criteria

Rail Carrier Minimum-Security Criteria Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing

More information

Foreign Manufacturer Eligibility Requirements

Foreign Manufacturer Eligibility Requirements Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated

More information

C-TPAT Security Criteria. Sea Carriers

C-TPAT Security Criteria. Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum security criteria. Where a sea carrier does

More information

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following

More information

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,

More information

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Minimum-Security Criteria for C-TPAT Foreign Manufacturers Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Xerox Supplier Security Requirements

Xerox Supplier Security Requirements Xerox Supplier Security Requirements Suppliers who are involved in the manufacture, storage, and transportation of Xerox products ( Suppliers ) for Xerox Corporation and / or its subsidiaries under Xerox

More information

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security

More information

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Objective The purpose of this procedure is to ensure that LG Sourcing and its manufacturers and suppliers are in compliance

More information

C-TPAT Partner Application for Importers Instructions

C-TPAT Partner Application for Importers Instructions C-TPAT Partner Application for Importers Instructions Importer for C-TPAT Application Qualifications 1. Active U.S. Importer or Non-Resident Canadian Importer into the United States. 2. Have an business

More information

C-TPAT Minimum Security Criteria

C-TPAT Minimum Security Criteria C-TPAT Minimum Security Criteria C-TPAT Security Criteria for Importers Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria.

More information

Importers: C-TPAT Minimum Security Requirements

Importers: C-TPAT Minimum Security Requirements Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested

More information

Please complete the questionnaire and fax it to

Please complete the questionnaire and fax it to Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

C-TPAT Security Standards. Importers

C-TPAT Security Standards. Importers C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security

More information

C-TPAT Minimum Security Requirements Importers

C-TPAT Minimum Security Requirements Importers Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

More information

C-TPAT Questionnaire. Type of Partner

C-TPAT Questionnaire. Type of Partner C-TPAT Questionnaire Business Partner Name Address City State Zip Country Contact Name Contact Title Contact Phone number Contact Email Years in Business Number of Employees Type of Partner Manufacturer

More information

Customs-Trade Partnership Against Terrorism

Customs-Trade Partnership Against Terrorism Customs-Trade Partnership Against Terrorism (C-TPAT) 2 CBP Presence... Over 30,000 uniformed officers protecting over 96,000 miles of U.S. Borders. 18,000 CBP Officers 12,000 Border Patrol Agents On a

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview avenue STORES, LLC Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority.

More information

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office C-TPAT Best Practices Wayne Kornmann Director, Long Beach C-TPAT Field Office 2 C-TPAT Best Practices Overview What are Best Practices? C-TPAT Best Practice Catalog How Do Importers Achieve Tier 3 Status?

More information

A Message for Brokers Letter And Security Guidelines for Brokers

A Message for Brokers Letter And Security Guidelines for Brokers A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business

More information

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES www.alpiworld.com PHISYCAL SECURITY AND ACCESS CONTROL 1. Physical Security The premises, in which goods are deposited, kept and handled

More information

Supply Chain Security Container Inspection and Seal Application

Supply Chain Security Container Inspection and Seal Application Supply Chain Security Container Inspection and Seal Application Supply Chain Security 8/25/2010 1 Supply Chain Security: Container Inspection & Seal Application The attached information has been created

More information

CBP Daily Operations

CBP Daily Operations Our Mission Detect and prevent terrorists and terrorist weapons from entering the United States, while facilitating the orderly and efficient flow of legitimate trade and people at and through our Nation

More information

C-TPAT Information for Foreign Manufacturers & Suppliers

C-TPAT Information for Foreign Manufacturers & Suppliers DISTRIBUTION SERVICES DEPARTMENT 1 Barnes & Noble Way, Monroe Township, NJ 08831 (732) 656-7400 C-TPAT Information for Foreign Manufacturers & Suppliers Foreign Manufacturers/Suppliers Recommendations

More information

Milestone AV Technologies TECHNICAL SPECIFICATION

Milestone AV Technologies TECHNICAL SPECIFICATION Revision: 02 PAGE 1 OF 12 Revision History Date Rev Reason for Change 5/21/2009 00 Initial Release 11/19/2010 01 ECO Number 500003646 Section 3.2.8: Added new F-0218 Container Check List - Chinese form

More information

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers February 2016 I have read this page: Date: Doc C Page 1 Table of Contents Introduction 1. Procedural Security 2. Physical Security 3. Access

More information

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005 Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005 Q: 1.Why is CBP updating the security guidelines for C-TPAT importers? Will other enrollment sectors also be subject

More information

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

TRUSTED TRADER APPLICATION (C-TPAT AND ISA) TRUSTED TRADER APPLICATION (C-TPAT AND ISA) APPLICANT INFORMATION Company Name: Company doing business as: Company Website: Physical Address: City Point of Contact: Phone Number: State/Zip Code Title:

More information

CTPAT Security Requirements for Import Suppliers

CTPAT Security Requirements for Import Suppliers CTPAT Security Requirements for Import Suppliers To Our Import Suppliers: CVS Pharmacy is committed to ensuring supply chain security within a framework consistent with Customs Trade Partnership Against

More information

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. (f/k/a The Swiss Colony, Inc.) is a member of the Customs-Trade

More information

TRAILER/CONTAINER SECURITY

TRAILER/CONTAINER SECURITY TRAILER/CONTAINER SECURITY All international supply chain business partners, including importers and their vendors, must ensure that procedures are in place to maintain container integrity. Container integrity

More information

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance

More information

C-TPAT Security Questionnaire PASS FAIL 1

C-TPAT Security Questionnaire PASS FAIL 1 Company: Address: City, St. Zip Purpose: ATC has committed to participation in the Customs Trade Partnership Against Terrorism (CTPAT) Program administered by Customs. CTPAT is a supply chain security

More information

CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS. ADAPTED FROM United Global Security: The Challenge Ahead

CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS. ADAPTED FROM United Global Security: The Challenge Ahead CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS ADAPTED FROM United Global Security: The Challenge Ahead LEARNING OBJECTIVES Systematic 17-point conveyance inspection process Identifying security

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report HANSAE TG CO., LTD Registration Number : A20480-838116 Company : HANSAE TG CO., LTD Date of Verification : 08-Jul-2016 Auditor(s)

More information

Customs Trade Partnership Against Terrorism An Introduction

Customs Trade Partnership Against Terrorism An Introduction Customs Trade Partnership Against Terrorism An Introduction WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel It s a challenging

More information

C-TPAT Expectations for

C-TPAT Expectations for C-TPAT Expectations for Vendors & Manufacturers 2018 Introduction Hobby Lobby is a participant in the voluntary security program known as the Customs-Trade Partnership Against Terrorism (C-TPAT). This

More information

Text Slide. Container and Seal Inspection Workshop

Text Slide. Container and Seal Inspection Workshop Text Slide Container and Seal Inspection Workshop 1 Inspection Workshop Intro This inspection workshop is intended to help you recognize containers and seals that have been compromised for the purpose

More information

Text Slide. Container and Seal Inspection Workshop

Text Slide. Container and Seal Inspection Workshop Text Slide Container and Inspection Workshop 1 Inspection Workshop Intro This inspection workshop is intended to help you recognize containers and seals that have been compromised for the purpose of smuggling

More information

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements Milliken and Company CTPAT Security Profile Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements Business Partner Requirements Milliken maintains written processes

More information

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action C-TPAT Audit Report Client Supplier Factory AI Service No Auditor Audit Date General Overview of the Audit s findings Clause Theoritical Max Score Actual Score 1. Personal Security 19 2. Physical Security

More information

FERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST

FERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST SHIP SECURITY ASSESSMENT AUDIT CHECKLIST SHIP SECURITY ASSESSMENT AUDIT CHECKLIST 1. A Ship Security Assessment (SSA) is a process that identifies weaknesses in physical structures, personnel protection

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: May 2015 Table of Contents Introduction 3 1. Program administration 3 a. Plan management 3 b. Roles and responsibilities 3 c. Reporting procedures 3 d. Self-assessments

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report Camino Industrial (Huizhou) Company Limited Registration Number : A5046-142191 Company : Date of Verification : 16-Nov-2016

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report Silver Star Garment Limited Registration Number : A11359-485263 Company : Silver Star Garment Limited Date of Verification :

More information

Security Innovations to Adapt to Emerging Threats

Security Innovations to Adapt to Emerging Threats 2013 C-TPAT Conference January 9, 2013 Security Innovations to Adapt to Emerging Threats Barry Brandman President/CEO Danbee Investigations in no va tion noun \ˌi-nə-ˈvā-shən\ Definition: a new idea, method,

More information

Supply Chain Security Guidelines

Supply Chain Security Guidelines Supply Chain Security Guidelines September 12, 2003 Patrice Knight Vice President, Import Compliance Office International Business Machines Corporation Route 100 Somers, New York 10589 914-766-2318 e-mail:

More information

Supply Chain Security IGTLC

Supply Chain Security IGTLC Supply Chain Security IGTLC CONVERGENCE: CARGO-CYBER CRIME Mix of Physical and Cyber Tactics to Set-up Fraudulent Pick-ups Phone spoofing Criminals calling airlines to gather intelligence on freight arrival

More information

Introduction to Homeland Security

Introduction to Homeland Security Introduction to Homeland Security Chapter 5 Safety & Security: Borders and Transportation Border Control The borders of any country are strategically important because of the critical role they play in

More information

Frustrated by C-TPAT? You're Not Alone

Frustrated by C-TPAT? You're Not Alone Frustrated by C-TPAT? You're Not Alone Mohawk Global Trade Advisors www.mohawkglobalta.com Customs-Trade Partnership Against Terrorism (C-TPAT) has undergone numerous changes since its inception in 2001,

More information

Supply Chain Security Management Systems The ISO Link

Supply Chain Security Management Systems The ISO Link Supply Chain Security Management Systems The ISO 28000 Link Topics Security threats, risks and vulnerabilities Impact on Business Initiatives in the Region. ISO 28000 Family of Standards Who s got ISO28000

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT) IMPORTER SECURITY RECOMMENDATIONS Develop and implement a sound plan to enhance security procedures throughout your supply chain. Where an importer does not control a facility, conveyance or process subject

More information

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements C-TPAT Requirements Dated: July 1 st, 2015 To: Valued Suppliers Re: C-TPAT Security Recommendations and Requirements Recently, our company was accepted by US Customs into the C-TPAT program. This program

More information

Secure container transport: challenges & barriers in the complete stakeholder chain

Secure container transport: challenges & barriers in the complete stakeholder chain Secure container transport: challenges & barriers in the complete stakeholder chain Theodoros Theodoropoulos (SEAbility Ltd) 1 st Training Workshop 19 November 2014, Valencia, Spain Overview Introduction

More information

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Ken Konigsmark & Val Parker Global Supplier Conference September 16, 2004 2 Workshop Purpose

More information

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions In an effort to clarify the April 23, 2010 bulletin regarding international

More information

C-TPAT Expectations for Agents, Vendors & Manufacturers

C-TPAT Expectations for Agents, Vendors & Manufacturers BEALL s, INC. C-TPAT Expectations for Agents, Vendors & Manufacturers For Distribution to all new and existing Beall s import related Business Partners Last Updated: 1/27/2009 TABLE OF CONTENTS INTRODUCTION.

More information

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection Customs Brokers Limited Global Logistics SERVICES OFFERED Customs-Trade Partnership Against Terrorism U.S. Customs and Border Protection Partners In Protection Contact: training@affiliated.ca TRAINING:

More information

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc AAPA Terminal and Container Cargo Security Mark Tierney Senior Director Security and Compliance Maersk Inc A.P. Moller is committed to show constant care and to prevent breaches of security associated

More information

HSA INTERNATIONAL, Dubai BROOKS ASIA

HSA INTERNATIONAL, Dubai BROOKS ASIA Airline Security HSA INTERNATIONAL, Dubai With more than 30 years experience in UAE in vast range of hardware products for oil, construction and manufacturing industries, HSA International has now successfully

More information

TEXAS LOTTERY COMMISSION

TEXAS LOTTERY COMMISSION Internal Audit Services Audit Report of: 17 001 Scratch Ticket Warehouse TEXAS LOTTERY COMMISSION Receiving December 19, 2016 Prepared By: Introduction McConnell & Jones LLP (MJ), serving as the outsourced

More information

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe Food Defense and Emergency Response Security Guidelines Keep America's Food Safe Note: This text version is provided to ensure accessibility. A fully illustrated, PDF version is also available. The tragic

More information

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment) ompany name: (Based on -TPAT SS Best Practice, US ustoms and Border Protection) lause Degree of ompliance 1. PERSONNEL SEURITY 1.1 The company conducts employment screening and interviewing of prospective

More information

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Air Cargo & Air Supply Chain Security : Perspective From Integrators Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected

More information

Supply Chain Questionnaire Business Partners

Supply Chain Questionnaire Business Partners Supply Chain Questionnaire Business Partners IF YOU ARE A C TPAT MEMBER PLEASE SEND US A MONITORING REQUEST PER INSTRUCTIONS BELOW AND COMPLETE THIS PAGE ONLY If C TPAT certified please go to the following

More information

SESSION V: Critical port security Issues Assuring cargo integrity prior to, during and post marine terminal operations

SESSION V: Critical port security Issues Assuring cargo integrity prior to, during and post marine terminal operations SESSION V: Critical port security Issues Assuring cargo integrity prior to, during and post marine terminal operations Marine Terminal Management Training Program, Long Beach, CA October 15, 2007 J Michael

More information

Pakistan Supply Chain Security (PSCS) Code

Pakistan Supply Chain Security (PSCS) Code Pakistan Supply Chain Security (PSCS) Code 1.0 Introduction Following September 11, 2001 incident, the attention of international community has been focused on security. Supply chain is considered one

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report IRIS Design Ltd. Registration Number : A22550-107044 Company : IRIS Design Ltd. Date of Verification : 22-May-2016 Auditor(s)

More information

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense Retail Food Establishment Self-Assessment Checklist for Food Defense Ohio Department of Agriculture Division of Food Safety September 2005 Industry Self-Assessment Checklist for Food Defense On January

More information

HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System

HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System HAZMAT Identification, Control, and Emergency Response: The Fundamental Weakness in the System The Security and Public Health Risks Today we see more and more catastrophic accidents involving hazardous

More information

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology 1 Project Team Profile PI: Larry Shi, University of Houston

More information

CONTAINER SECURITY. For example:

CONTAINER SECURITY. For example: CONTAINER SECURITY The introduction of the ISPS Code has aroused an interest regarding the effect it will have in deterring criminal involvement in container crime. There can be no doubt that the improved

More information

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y John F. Fevelo Chief Operating Officer Metro One Loss Prevention Services Group, Inc. 900 South Ave. Staten Island, N.Y. 10314 718-370-6778 Speech Outline Delivered to the Transportation and Logistics

More information

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008 WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008 As an authorized representative of, I acknowledge receipt of the Wilsons Leather (the "Company") Vendor Guidelines. I have read and understand the Company's

More information

California TRU Guidance

California TRU Guidance California TRU Guidance California Air Resources Board Guidance for Brokers, Forwarders, Shippers, Receivers, and Drivers - Chris Burroughs TIA Senior Government Affairs Manager TIA White Paper Series

More information

FOR OFFICIAL USE ONLY

FOR OFFICIAL USE ONLY GAO United States Government Accountability Office Report to Congressional Requesters FOR OFFICIAL USE ONLY March 2008 SUPPLY CHAIN SECURITY U.S. Customs Has Enhanced Its Partnership with Import Trade

More information

In-Transit Container Security Enhancement

In-Transit Container Security Enhancement In-Transit Container Security Enhancement September 9, 2003 Since September 11, 2001, governments and industry have given extensive consideration to the issue of protecting international commerce from

More information

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM 1. What is C-TPAT? (a) The C-TPAT (Customs -Trade Partnership Against Terrorism) is a voluntary United States Customs and Border Protection (CBP) business initiative

More information

U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS

U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS A Compliance Guide for Petroleum Marketers Prepared By: Mark S. Morgan, Esq. Petroleum Marketers Association of America

More information

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION

ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION 1 MODULE 7 RISK MANAGEMENT MODELS 2 Module Objective Present Risk Management models used by ICAO and WCO 3 DEFINITIONS 4 Threat ICAO The probability

More information

3.5 Advanced Inspection Technologies (AIT)

3.5 Advanced Inspection Technologies (AIT) 3.5 Advanced Inspection Technologies (AIT) Before inspection technologies can be further discussed, a baseline definition must be established for the three types of inspections that are commonly used when

More information

TRADE FACILITATION IN MEXICO

TRADE FACILITATION IN MEXICO TRADE FACILITATION IN MEXICO November 2004 1 Trade Facts Mexico s trade growth within the different FTA s has been significant, becoming, on the last 10 years, one of the most dynamic, countries at a worldwide

More information

NORDSTROM factories are required to perform a seven-point inspection process designed to verify the physical integrity of the container.

NORDSTROM factories are required to perform a seven-point inspection process designed to verify the physical integrity of the container. 1. Container Security Container integrity must be maintained to protect against the introduction of unauthorized material and/or persons. Factory-loaded full containers must have written and verifiable

More information

Customs Concerns for the Motor Carrier and Transportation Intermediary

Customs Concerns for the Motor Carrier and Transportation Intermediary Customs Concerns for the Motor Carrier and Transportation Intermediary Presented by Joseph W. Rohe Moderated by Robert D. Moseley, Jr. Smith Moore Leatherwood LLP Attorneys at Law 2 W. Washington Street,

More information

DOWNLOAD PDF REPORT REQUIRED FOR SEPARATE FREIGHT SHIPMENTS 79 62

DOWNLOAD PDF REPORT REQUIRED FOR SEPARATE FREIGHT SHIPMENTS 79 62 Chapter 1 : Tracking, Track Parcels, Packages, Shipments DHL Express Tracking For sea freight carried in FCX arrangements involving multiple suppliers a separate cargo report will be required in respect

More information

Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers.

Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers. Comments in Response to Customs and Border Protection s Request for Information Regarding Smart and Secure Containers I. Introduction February 17, 2004 The World Shipping Council hereby submits the following

More information

APPENDICES. Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019

APPENDICES. Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019 APPENDICES Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019 TABLE OF CONTENTS SECTION A INBOUND SHIPMENTS... 3 SECTIONS A1 & A2 SECURITY OF INBOUND CAN CARGO... 4 SECTION A3

More information

October Import/Export Policy Supply Chain Security for Imports Standard Operating Procedure (SOP) Page 1 of 22.

October Import/Export Policy Supply Chain Security for Imports Standard Operating Procedure (SOP) Page 1 of 22. Issue Date: Policy Number: October 2012 Import/Export Policy - 41 Guide Name: Supply Chain Security for Imports Standard Operating Procedure (SOP) Last Revision Date: January 31, 2018 Page 1 of 22 TABLE

More information

The Sept. 11 terrorist strikes were a wake-up call to the

The Sept. 11 terrorist strikes were a wake-up call to the FEATURE How 9/11 forced efficiency upon supply chains Data-driven customs processes have produced bottom-line gains for supply chains. By Deborah Abrams Kaplan Sept. 11, 2017 The Sept. 11 terrorist strikes

More information

Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation

Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation 2005/STAR/006 Aviation Security Panel 1 Air Cargo Systems Based on ICAO Standards that Balance Security and Trade Facilitation Submitted by: ICAO Third Conference on Secure Trade in the APEC Region Incheon,

More information

Foreign Factory Profile

Foreign Factory Profile All factories manufacturing on behalf of the Company are required to complete this profile. All information is required. PLEASE TYPE IN ENGLISH. Submitted incomplete or with inaccurate information will

More information

The Role of the South Carolina State Port Authority Police Dept. August 2009

The Role of the South Carolina State Port Authority Police Dept. August 2009 The Role of the South Carolina State Port Authority Police Dept August 2009 We provide security for $60B in cargo annually More than 30 Ocean Carriers have vessels that carry cargo between Charleston and

More information

Compliance or Enhance the Competitiveness? The Most Secure Port - HKG

Compliance or Enhance the Competitiveness? The Most Secure Port - HKG Compliance or Enhance the Competitiveness? The Most Secure Port - HKG Hong Kong, 19 Jun, 2013 Jimmy Pang TAPA China, Board of Director The Most Secure Port HKG Introduction of TAPA How can we create value

More information

IMPORTING & EXPORTING NEW DEVELOPMENTS IN OCEAN PRICING AND CUSTOMS SUPPLY CHAIN SECURITY By: Andrew M. Danas, Esq. Grove, Jaskiewicz and Cobert, LLP

IMPORTING & EXPORTING NEW DEVELOPMENTS IN OCEAN PRICING AND CUSTOMS SUPPLY CHAIN SECURITY By: Andrew M. Danas, Esq. Grove, Jaskiewicz and Cobert, LLP IMPORTING & EXPORTING NEW DEVELOPMENTS IN OCEAN PRICING AND CUSTOMS SUPPLY CHAIN SECURITY By: Andrew M. Danas, Esq. Grove, Jaskiewicz and Cobert, LLP 2012 Annual Conference Transportation & Logistics Council,

More information

WARNING: This record contains Sensitive Security Information that is controlled under 49 CFR parts 15 and No part of this record may be

WARNING: This record contains Sensitive Security Information that is controlled under 49 CFR parts 15 and No part of this record may be WARNING: This record contains Sensitive Security Information that is controlled under 49 CFR parts 15 and No part of this record 2 -Applicability- This Amendment is applicable to: All Indirect Air Carrier

More information

Welcome Presenter s Name June 17,

Welcome Presenter s Name June 17, Welcome 2 July 18, 2014 It is my great pleasure to announce that the 2014 C-TPAT National Conference has been approved and will be held after all. As many of you may know, the C-TPAT conference was facing

More information

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011 Audit Rating Score Point Value Process & Procedures - Description of Standard Action Measurement Criteria 0 Not present or utilized - No plans to adopt or Not Acceptable: Immediate SCAR implement 1 Generally

More information

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland Lloyd s Register Group (1760) Marine,Energy,Transportation Managements Systems (LRQA) Quality, Environment Security of : Supply Chain ISO

More information