Hands of Thieves. Guarding Food. from the. Transportation. By kerry beach Product Transports
|
|
- Meagan Abigail Manning
- 6 years ago
- Views:
Transcription
1 Guarding Food By kerry beach Product Transports from the Hands of Thieves In the transportation industry, prepared food and beverage products were the most stolen commodity in january/february 2013 AIB UPDATE
2 AIB UPDATE january/february
3 n December 18, 2012, Canadian police arrested three people in connection with a massive maple syrup heist, which affected the global supply since Quebec produces nearly 80 percent of the world s maple syrup. The syrup, which was stolen in August 2012 from a warehouse that stores Quebec s maple syrup reserves, had an estimated value of $30 million. In addition to facing charges of illicit trafficking of stolen goods, those arrested also face charges of theft, conspiracy, and fraud. This was only the latest incident impacting the Canadian food industry, as there have been an increasing number of bulk food crop thefts in recent years. The problem is not unique to Canada. In December 2012, an infant formula company in the United States began working with the Food and Drug Administration s (FDA) Office of Criminal Investigations (OCI) and other law enforcement officials to recover cases of infant formula products that were stolen from a carrier s lot in Grand Rapids, Mich. In March 2012, thieves in Florida stole six trailer loads of tomatoes, a truck full of cucumbers, and a truckload of frozen meat totaling about $300,000. Prior to the incident, the thieves set up a phony trucking company called E&A Transport Express and registered it with the Federal Motor Carrier Safety Administration. They then stalked websites that brokers use to connect trucking companies with loads they need carried. From there they contacted a broker, which verified E&A s federal registration and insurance coverage, and then arranged for them to pick up the tomatoes from a shipper in Miami. In four days, E&A Transport picked up the loads mentioned above with the intention of selling the stolen perishables to pre-arranged buyers. Cargo theft is the costliest crime in America, but it is also an international issue. In today s global food industry, raw materials are often manufactured and sourced in one part of the world, while finished products are stored and consumed in another, making shipments vulnerable at any point in the chain. Pirates on the Horizon Theft of lower valued goods has rapidly increased in recent years. According to CargoNet, a transportation theft prevention and recovery network, prepared food and beverage products were the most stolen commodity in 2012, followed by metals and electronics. From July to September 2012 alone, there were 56 reported food and beverage theft incidents in the U.S., while base metals and electronics tied for second with each having 36 reported theft incidents. California, Florida, Texas, New Jersey, and Illinois lead the country with the highest number of reported food product transport theft. Other interesting statistics indicate that Friday, Saturday, and Sunday are the days when most cargo theft incidents occur; that the top three theft locations include warehouses or distribution centers, parking lots, and truck stops; and that the average loss values range from $50,000 to $1,000,000. Part of the reason behind the increase in cargo theft incidents is the fact that it is essentially a low-risk, high-payout crime that carries only minor penalties. Thieves charged with stealing a load worth hundreds of thousands of dollars might only serve six months in jail, depending on the jurisdiction. Food - A Hot Commodity Prior to 2010, electronics held the #1 spot for most stolen cargo load. However, in 2010, 2011, and 2012, food and beverage products took the lead. This is due in part to the current economic crisis. Necessities, such as food and bottled water, are in higher demand, thus are easier to resell. It s also due to the fact that the sell value on stolen electronics is not as high as it once was due to tracking systems, such as serial numbers and GPS. It s reported that thieves can get 70 cents on the dollar for food and beverage on the black market, as opposed to 30 cents on the dollar for electronics. Challenges Although cargo theft is certainly an unfortunate economic blow to any company, it is a particularly nightmarish event in the food industry. Food and beverage companies have other factors to worry about in addition to financial and customer loss and a tarnished brand. Lives are at stake. When food transports are stolen, thieves are not worried about keeping the product at the right temperature or avoiding cross contamination during storage. In the often unlikely event that the products are recovered, the product is no longer considered safe. There is the risk that it is adulterated from not having been handled properly or the concern of intentional contamination. Another challenge is that cargo thieves are often highly sophisticated and organized. As noted in the headline about the perishable goods stolen in Florida, thieves plotted the theft as much as a month in advance. They went through the trouble of registering their phony company, obtaining insurance, and seeking out transports on broker websites. Then, they had to have buyers pre-arranged to purchase their black market goods since the clock was ticking against the shelf life of the items they stole. 8 january/february 2013 AIB UPDATE
4 A few other challenges that theft victims face are the fear of insurance costs or damage to their brand, not knowing to which law enforcement group the theft should be reported, and having limited resources for educating drivers. In the Blink of an Eye Once stolen loads are acquired, the goods are moved quickly through a chain of handoffs, often before the theft is even discovered by the manufacturing or transportation company. It only takes a matter of hours for organized thieves to move the stolen goods to a warehouse, off-load and repackage them, and load them onto another vehicle for distribution. This is known as product diversion in the security industry. Stolen transports are acquired a number of ways. Thieves may carjack the trucks directly out of a driver s grasp, or they may wait until a driver leaves the truck unattended at a rest stop and take it from there. In other instances, unattached trailers are stolen from a trailer yard. The thieves will attach their cabs to an unmanned, loaded trailer and drive away. Other times they will simply break into the dropped trailers, unload the cargo into their own empty trailer, and drive away. Regardless of which method is used, the thieves will monitor the activity, then wait for the prime opportunity to strike. Not all cargo theft is done by an external party. In some cases, it is an inside job where the truck driver is paid off to give up his or her truck. Thieves will observe drivers at rest stops and fueling stations, then offer them a set amount to get in on the activity. Experienced criminals may abandon a newly stolen truck or trailer then watch it from afar to learn if a tracking system is embedded in it. If law enforcement does not arrive within a certain timeframe, the thief will assume the stolen load has not been reported or is not being monitored and will then move it to a secured location to begin preparing the goods for resale on the black market. This may involve repackaging, relabeling, and even creating counterfeit bills of lading or other paperwork to more easily move the stolen cargo out of the country. So, who exactly is buying these stolen goods? Most of the time, the brokered buyers knowingly purchase stolen property. They are able to get a lower price point on the stolen goods and are themselves part of the stolen transport ring. In other instances, the thieves are so good at deceit that they are able to sell the stolen property to unsuspecting businesses that are not part of the crime scheme. Take Action to Prevent Theft BE ALERT. Usually before a targeted theft occurs, there will be a period of surveillance while the thief is collecting information about a facility. He or she will watch loading/unloading procedures, monitor high and low periods of activity at the plant, and try to find a pattern in drivers leaving with shipments. Watch for signs that your operation is under the watchful eye of thieves. This might include unknown vehicles parked outside or within the parking lot with drivers inside, unauthorized personnel on the plant property, someone holding a camera or taking notes outside your facility, or vehicles that appear to be following your drivers. KNOW YOUR EMPLOYEES. Before hiring any drivers, conduct a background check to eliminate any applicants likely to steal merchandise or be persuaded to give up their trailers. Remember, cargo theft incidents are often later revealed to be inside jobs. Be especially watchful of new employees and temporary workers assigned to shipping and receiving areas. Once your drivers are hired, provide initial and ongoing security training so that they are equipped to recognize suspicious activity, secure their vehicles when unattended, and promptly report security instances to the proper parties. KNOW YOUR AFFILIATES. Just as drivers should be pre-screened before employment, your supply chain partners, including transport companies and distribution centers, should also pass some sort of established verification procedures before you trust them with your products. Distribution centers are the top location for cargo theft to occur. Frequent assessments of your distribution centers and a solid inventory management system are excellent loss prevention tools to help prevent your cargo from going missing. Familiarizing yourself with distribution center activities makes it easier to recognize suspicious activity. Also, when employees feel that they are being watched and are at a high risk of being caught, they will be less likely to attempt to steal cargo. Cargo theft is the costliest crime in America, but it is also an international issue. In today s global food industry, raw materials are often manufactured and sourced in one part of the world, while finished products are stored and consumed in another, making shipments vulnerable at any point in the chain. AIB UPDATE january/february
5 Once a carrier is selected, verify its identity by checking registration numbers, insurance, etc., and review its security procedures to make sure these are in line with your requirements. When a driver arrives at the plant to pick up an outgoing load, verify the driver s identity before releasing the cargo. Verification of driver s identity goes beyond simply checking a government issued driver s license. Ask your transportation companies to also issue company-provided identification. Both IDs should be verified against the driver s name indicated on the bill of lading or other shipping document. If the name is not indicated, the transportation company should be contacted prior to loading the trailer to ensure this is the assigned driver. Does this require extra effort? Of course! However, as noted in the examples above, thieves are becoming bolder in their efforts to steal. These simple checks can go a long way in deterring organized efforts at theft and prevent simple thieves from trying to show up and pick up a load. Stay informed of the status of your shipment along the way, including any delivery schedules, routes, and pre-arranged stops in trailer yards, and check in to make sure that adequate security measures are being provided en route. By staying informed, you can more easily be alerted to any overdue shipments or out-of-route deliveries. USE SECURITY MEASURES. Your Food Facility Defense Plan should include security measures and procedures to safeguard against transportation theft issues. It is also a good idea to inform and remind employed and contracted drivers of best security practices to use while on the road. Some of those include: If a driver team is transporting the load, one person should remain with the vehicle at all times. Be cautious when relaying information Be cautious when relaying information via CB radio or social media. Don t list specific details about location, cargo load, and final destination. via CB radio or social media. Don t list specific details about location, cargo load, or final destination. Guard truckentry points against thieves. Some drivers run a strap through their interior door handles while inside their trucks at night to prevent entry to the cab. If the trucking company allows travel pets, make sure the animal is trained to bark at intruders. If the truck is equipped with an alarm system, check it frequently to ensure that it is functioning properly. Practice safe parking habits. Park in an area that is not isolated and has good lighting. Seek out truck yards and rest stops that have good security protocols, including CCTV surveillance. Never leave the vehicle unlocked while unattended; this includes while fueling, using the rest stop areas, or waiting on a fuel ticket. Park rear to rear to restrict access to the trailer door. There are a variety of low-cost basic security equipment options that can be used to help thwart cargo theft. Locks. Locks are a big part of cargo security. There are several different types of locks used to help secure various parts of a tractor/trailer rig. King-pin locks. King-pin locks are easy to install and prevent unauthorized hook ups to the trailer. Trailers are at a high risk when they are not attached to a truck. The king-pin lock covers and locks the king pin of the semi-trailer and prevents another truck from driving away with the trailer when parked in a drop location. Glad-hand lock cover. The glad-hand connection on a truck houses the hoses that supply air to the brakes. The glad-hand lock cover inserts a pin into the connection that locks the trailer s air line, preventing the truck from departing until the lock is removed and brake lines are once again operational. Air brake valve lock. When installed, these locks prevent brake release by locking the brake controls. The more locks in use on a cargo load, the less likely it is to be stolen. If a thief cannot overtake a trailer in less than two minutes, the chances of getting caught drastically rise. The more locks in use on a load, the sooner the thief will move on to another target that is easier to steal. 10 january/february 2013 AIB UPDATE
6 Seals. Although seals will not prevent a determined criminal from gaining access, they will limit intrusion and create an alert for drivers and receiving employees that the doors have been tampered with if the seals are broken. Include seal policies in your defense program, and educate drivers on the appropriate actions to take if they notice a seal has been tampered with. Your company should also evaluate the types of seals to be used. There are many different seals and the level of security varies greatly. Some variables to consider are the geographic shipping origination point, in-transit corridor(s), and destination points. In the case of U.S./Mexican cross-border shipments, U.S. customs requires that shippers use seals classified as high-security by ISO/ PAS if they are participating in the U.S. Customs Trade Partnership Against Terrorism (C-TPAT) program 4. In the U.S., shipments moving through areas known as high-risk shipping corridors may call for different security seals than those moving through lower risk areas. The physical environment to which a shipment will be exposed while in transit also impacts proper seal selection. It is not uncommon for shipments to experience extreme seasonal temperature changes when moving from their origination to destination points. Video Surveillance. Another low-cost security measure is the installation of CCTV-monitoring systems on the loading dock, in parking lots, and at gates, as a deterrent against criminal activity. The footage should be checked daily to detect any suspicious activity. Software programs are also available on the CCTV systems and can be programmed to monitor specific areas within the camera s view, and send an alert or alarm to a security officer of any motion or activity within the specified view. An example of this use would be using this capability in a trailer lot after hours when there should be no people or vehicles moving in the area. High Tech Security. In addition to the basic security measures, there are also a number of higher technology tools used to aid in cargo-theft prevention. GPS-tracking tools have been around for a while and are now available in many electronic devices. When installed in a vehicle, they are used to help determine its location if stolen. The downside is that these devices are very easily disconnected and disabled by professional thieves. Geofencing systems send a security alarm to the assigned recipient when a vehicle travels outside an assigned route. The virtual fence is established by the operator, then, if an equipped vehicle crosses the fence, an alert is sent via text or . There are a variety of high-tech vehicle security systems to choose from as well. Perhaps the most basic is a panic button that alerts authorities or honks the horn repeatedly until help arrives. Some of these panic buttons will even slow the truck down to a gradual stop if it is engaged while in motion. Accesscontrol technology can be installed, requiring drivers to enter an access code before being able to move the vehicle. If the vehicle was stolen while idling, the thief would not be able to drive off with it unless he knew the access code. Another advanced type of technology is a vehicle-immobilization system used to remotely disable a stolen vehicle. REPORT IMMEDIATELY. Any suspicious activity should be reported immediately to management and law enforcement agencies. If you notice a trend in false alarms, don t lower your guard. Frequent false alarms can actually be a sign that criminals are testing your security procedures and response times. If you are notified that one of your loads has been stolen, don t hesitate to report it to your company, but also to law enforcement. It is especially a good idea to report the theft to the state police in the state where the truck was stolen, in addition to the local police. State police agencies across the U.S. have specific measures in place to quickly track and locate stolen cargo and trucks and can communicate more quickly across state lines. The sooner you report, the more likely you are to Frequent false alarms can be a sign that criminals are testing your security procedures and response times. recover. Remember, thieves move stolen goods quickly. It only takes a matter of hours for the stolen goods to be rerouted to black-market buyers. Summary Stolen food and beverage transports are on the rise and increasing every year. Although the food industry seems to be a prime target for thieves, being proactive in your security approaches will prevent you from being prey for highway pirates! AIB The author is Editor, AIB International. AIB UPDATE january/february
cargo theft: how to reduce your risk
Cargo at rest is cargo at risk. Freight theft is an unfortunate but all too common occurrence in the shipping world, especially as we ramp up to the holiday season. CargoNet estimates that cargo theft
More informationJohn F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y
John F. Fevelo Chief Operating Officer Metro One Loss Prevention Services Group, Inc. 900 South Ave. Staten Island, N.Y. 10314 718-370-6778 Speech Outline Delivered to the Transportation and Logistics
More informationABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES
ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES www.alpiworld.com PHISYCAL SECURITY AND ACCESS CONTROL 1. Physical Security The premises, in which goods are deposited, kept and handled
More informationFood Defense and Emergency Response Security Guidelines. Keep America's Food Safe
Food Defense and Emergency Response Security Guidelines Keep America's Food Safe Note: This text version is provided to ensure accessibility. A fully illustrated, PDF version is also available. The tragic
More informationAre GPS Trackers Enough for Cargo Security & Theft Recovery?
Are GPS Trackers Enough for Cargo Security & Theft Recovery? May 17, 2018 - Premsai Sainathan Read Time 5 Mins. 1 While GPS tracking systems can improve the odds of tracing stolen vehicles or trailers,
More informationFood Defense Supplier Guidelines
Food Defense Supplier Guidelines Revised: May 2015 Table of Contents Introduction 3 1. Program administration 3 a. Plan management 3 b. Roles and responsibilities 3 c. Reporting procedures 3 d. Self-assessments
More informationPhysical Security Assessment Form
Physical Security Assessment Form Security Assessment Developed in Partnership with: P a g e 2 Introduction Thank you for taking the time to look at your organization s security. It is a critical component
More informationCargo theft - current trends and best practices for prevention. John C. Tabor
Cargo theft - current trends and best practices for prevention John C. Tabor 2 3 Cargo Theft Challenges - The FBI reports cargo theft in the U.S. to exceed 15 billion annually - Cargo Thieves are highly
More informationKeeping Your Cargo Safe
Keeping Your Cargo Safe Keeping Your Cargo Safe A 360 Approach to Freight Security in an Unsafe World There is no doubt that supply chains are complex, and this complexity creates vulnerability. Unfortunately,
More informationLowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities
Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Objective The purpose of this procedure is to ensure that LG Sourcing and its manufacturers and suppliers are in compliance
More informationForeign Manufacturer Eligibility Requirements
Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated
More informationXerox Supplier Security Requirements
Xerox Supplier Security Requirements Suppliers who are involved in the manufacture, storage, and transportation of Xerox products ( Suppliers ) for Xerox Corporation and / or its subsidiaries under Xerox
More informationSupply Chain Security IGTLC
Supply Chain Security IGTLC CONVERGENCE: CARGO-CYBER CRIME Mix of Physical and Cyber Tactics to Set-up Fraudulent Pick-ups Phone spoofing Criminals calling airlines to gather intelligence on freight arrival
More informationMinimum-Security Criteria for C-TPAT Foreign Manufacturers
Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
More informationBIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry
BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry This guidance document was prepared by the International Dairy Foods Association (IDFA) to help you evaluate the security
More informationProactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment
Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and
More informationFOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES
FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES Copy No. Uncontrolled Canadian Grain Commission Process Verification and Accreditation Office Industry Services 900-303 Main Street Winnipeg,
More informationRetail Food Establishment. Self-Assessment Checklist. for. Food Defense
Retail Food Establishment Self-Assessment Checklist for Food Defense Ohio Department of Agriculture Division of Food Safety September 2005 Industry Self-Assessment Checklist for Food Defense On January
More informationSupply Chain - Information Sharing and Analysis Center
2015 1 st Quarter Supply Chain ISAC Report of Cargo Theft Activity The Supply Chain Information Sharing and Analysis Center s (SC-ISAC) primary mission is to continue to facilitate communication among
More informationThe factory must establish in writing the persons who are authorized to complete and/or sign shipping documents.
5. Procedural Security Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling and storage of cargo in the supply chain. Customs and/or
More informationDEVELOPING A FOOD DEFENSE PLAN A GUIDE
DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES EXHIBIT: X BUREAU OF FOOD DISTRIBUTION EFFECTIVE: 407 SOUTH CALHOUN STREET, M-39, 2 ND FLOOR REVISED: September 1, 2012 TALLAHASSEE, FLORIDA 32399-0800 PAGE
More informationCustoms -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview
avenue STORES, LLC Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority.
More informationC-TPAT Security Criteria. Sea Carriers
C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum security criteria. Where a sea carrier does
More informationCANADIAN CARGO THEFT TRENDS: What s new, what s now, and what s on the horizon.
CANADIAN CARGO THEFT TRENDS: What s new, what s now, and what s on the horizon. As long as cargo continues to move along the highways, pass between trailers, and hang out in truck yards, there will be
More informationA Message for Brokers Letter And Security Guidelines for Brokers
A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business
More informationTruck Telematics TECHNOLOGY. ELD Do s and Don ts pg. 2. Medium-duty telematics pg. 8 Tracking trailers pg. 12 Toll management technology pg.
Truck Telematics TECHNOLOGY October 2017 ELD Do s and Don ts pg. 2 Medium-duty telematics pg. 8 Tracking trailers pg. 12 Toll management technology pg. 16 By Carol Birkland Editor-At-Large Trailer Fleet
More informationGuidance Notes FSR 2014
Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a
More informationPlease complete the questionnaire and fax it to
Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One
More informationGLOBAL LIVE - WHITE PAPER Live Mobile CCTV Manage the situation. Don t waste time watching the repeat.
www.global-live.co.uk GLOBAL LIVE - WHITE PAPER Live Mobile CCTV Manage the situation. Don t waste time watching the repeat. MARCH 2013 GLOBAL LIVE - WHITE PAPER Introduction The time you take to make
More informationKeeping Your Cargo Safe
Keeping Your Cargo Safe A 360 Approach to Freight Security in an Unsafe World Don Osterberg, Sr. VP of Safety and Driver Training, Schneider National, Inc. There is no doubt that supply chains are complex,
More informationRail Carrier Minimum-Security Criteria
Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing
More informationSecurity Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs
Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following
More informationT - TALK about what they touch. Talk brands and talk specifics. Let them know you re paying attention.
Our Approach 1. Identify potential thieves a. A customer that doesn t look like the typical Hot Mama shopper b. A customer in a group that demands full attention and draws you away from the group. c. A
More informationSecurity Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution
C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security
More informationAir Carrier Eligibility Requirements
Air Carrier Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Air Carrier must the meet the following eligibility requirements: 1. Active Air Carrier transporting cargo shipments to
More informationC-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office
C-TPAT Best Practices Wayne Kornmann Director, Long Beach C-TPAT Field Office 2 C-TPAT Best Practices Overview What are Best Practices? C-TPAT Best Practice Catalog How Do Importers Achieve Tier 3 Status?
More informationC-TPAT Security Questionnaire PASS FAIL 1
Company: Address: City, St. Zip Purpose: ATC has committed to participation in the Customs Trade Partnership Against Terrorism (CTPAT) Program administered by Customs. CTPAT is a supply chain security
More informationC-TPAT Minimum Security Requirements Importers
Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com
More informationMenard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers
Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers February 2016 I have read this page: Date: Doc C Page 1 Table of Contents Introduction 1. Procedural Security 2. Physical Security 3. Access
More informationCONTAINER SECURITY. For example:
CONTAINER SECURITY The introduction of the ISPS Code has aroused an interest regarding the effect it will have in deterring criminal involvement in container crime. There can be no doubt that the improved
More informationRoad Transport How to protect a parked vehicle?
TechC@RE security BEST PRACTICES Road Transport How to protect a parked vehicle? Three quarters of land freight thefts are committed when a vehicle is stationary. The three most common types of theft are:
More informationMETAL THEFT TRENDS 2015
METAL THEFT TRENDS 2015 Law Enforcement and the Private Sectors Approach to Combating the Problem Joel Squadrito-Corporate Security Director for Steel Dynamics Inc. 1 WHAT DRIVES METAL THEFTS The Commodity
More informationImporters: C-TPAT Minimum Security Requirements
Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested
More informationC-TPAT Minimum Security Criteria
C-TPAT Minimum Security Criteria C-TPAT Security Criteria for Importers Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria.
More informationTO CHANGE. THESE FORMS ARE NOT TO BE USED FOR THE 2017 EVENT! PLEASE BE ADVISED! THESE FORMS ARE FROM THE 2016 EVENT AND PRICES ARE SUBJECT
w h a t a r e Freight Services? As the official service contractor Freeman is the exclusive provider of freight services. Material handling includes unloading your exhibit material storing up to 30 days
More informationCONTACT US: Call: For Sales: For Support: Outside the US? Call:
CONTACT US: Call: 888-464-7748 Outside the US? Call: 619-230-5100 For Sales: sales@gpsit.com For Support: support@gpsit.com www.gpsit.com GPSit Fleet Solution GPSit is a leader in the GPS fleet tracking
More informationIMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)
IMPORTER SECURITY RECOMMENDATIONS Develop and implement a sound plan to enhance security procedures throughout your supply chain. Where an importer does not control a facility, conveyance or process subject
More informationC-TPAT Partner Application for Importers Instructions
C-TPAT Partner Application for Importers Instructions Importer for C-TPAT Application Qualifications 1. Active U.S. Importer or Non-Resident Canadian Importer into the United States. 2. Have an business
More informationEASTERN MICHIGAN U N I V E R S I T Y SECURITY OF HAZARDOUS MATERIALS IN TRANSPORT
EASTERN MICHIGAN U N I V E R S I T Y SECURITY OF HAZARDOUS MATERIALS IN TRANSPORT Department of Public Safety Health and Safety Office 1200 Oakwood Ypsilanti, MI 48197 734.487.0794 July 2004 EASTERN MICHIGAN
More informationSecurity Innovations to Adapt to Emerging Threats
2013 C-TPAT Conference January 9, 2013 Security Innovations to Adapt to Emerging Threats Barry Brandman President/CEO Danbee Investigations in no va tion noun \ˌi-nə-ˈvā-shən\ Definition: a new idea, method,
More informationMilestone AV Technologies TECHNICAL SPECIFICATION
Revision: 02 PAGE 1 OF 12 Revision History Date Rev Reason for Change 5/21/2009 00 Initial Release 11/19/2010 01 ECO Number 500003646 Section 3.2.8: Added new F-0218 Container Check List - Chinese form
More informationWHAT ARE FREIGHT SERVICES?
FREIGHT SERVICES WHAT ARE FREIGHT SERVICES? As the official service contractor, Freeman is the exclusive provider of freight services. Material handling includes unloading your exhibit material storing
More information"SAFETY IN THE SEA PORTS
"SAFETY IN THE SEA PORTS Paper prepared for 22 nd Engineers International Conference At Intercontinental Hotel, Nairobi, Kenya. From 13 th - 15 TH May, 2015. MS. MARYAM MOHAMED KIDERE KENYA PORTS AUTHORITY
More informationC-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements
C-TPAT Requirements Dated: July 1 st, 2015 To: Valued Suppliers Re: C-TPAT Security Recommendations and Requirements Recently, our company was accepted by US Customs into the C-TPAT program. This program
More informationThe Ever-Evolving Threat of Fraud and Theft
The Ever-Evolving Threat of Fraud and Theft Moderator: Mark Yunker, Vice President, Ahmann-Martin Panelists: Scott Cornell, 2vp, Inland Marine, Crime & Theft Specialist, Travelers Keith Lewis, Vice President
More informationU.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS
U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS A Compliance Guide for Petroleum Marketers Prepared By: Mark S. Morgan, Esq. Petroleum Marketers Association of America
More informationFREEMAN exhibit transportation
(800) 995-3579 Toll Free US & Canada (817) 607-5100 Local & International NAME OF SHOW: COMPANY NAME: CONTACT NAME : E-MAIL ADDRESS : For Assistance, please call applicable number listed above to speak
More informationWarehouse/Supply Chain Loss Prevention. Presented by John Tabor, SVP Supply Chain National Retail Systems, Inc.
Warehouse/Supply Chain Loss Prevention Presented by John Tabor, SVP Supply Chain National Retail Systems, Inc. Cargo Theft Challenges The FBI reports cargo theft in the U.S. to exceed 15 billion annually
More informationMATERIAL HANDLING & RATES
Material Handling Information & Rates The following information has been compiled by AGS for use by exhibitors and all third-party contractors to inform you of rates and rules regarding proper shipping
More informationImporting to the U.S.: Key requirements you need to be aware of
Importing to the U.S.: Key requirements you need to be aware of Eight areas of the importing process you should familiarize yourself with before you ship your goods to the U.S. If you re new to international
More informationSAME JETC May 22-25, 2012 America s Center St. Louis, Missouri
5931 West Campus Circle Drive, Irving, Texas 75063 Phone: (972) 580-9000 Fax: (972) 465-1117 Log onto cyberservices @ www.theexpogroup.com 1 2 Choice of Destination Why Ship To The Warehouse? SAME JETC
More informationSupplement to Trucking 106
Copyright 2005 by Innovative Computing Corporation 750 Old Hickory Blvd. Suite 290 Brentwood, TN 37027 615-986-1900 5924 NW 2nd Street Suite 100 Oklahoma City, OK 73127 405-495-8788 www.innovativecomputingcorp.com
More informationBV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)
ompany name: (Based on -TPAT SS Best Practice, US ustoms and Border Protection) lause Degree of ompliance 1. PERSONNEL SEURITY 1.1 The company conducts employment screening and interviewing of prospective
More informationKeith Lewis, CargoNet September 19, 2013
Keith Lewis, CargoNet September 19, 2013 Cargo theft in Georgia Talking Points Supply chain theft overview How they breach the supply chain Analytics Tools of the trade Law enforcement response or lack
More informationPatients are Counting on Us: A Little Less Conversation It s Time to Act
Patients are Counting on Us: A Little Less Conversation It s Time to Act Martin VanTrieste SVP Quality Amgen, Inc. PDA Missouri Valley Chapter Supply Chain Security in the Pharmaceutical Industry Thousand
More informationUnderstand the Source of Product Damage with Data Loggers. Author: ShockWatch, Inc. May 2013
Understand the Source of Product Damage with Data Loggers Author: ShockWatch, Inc. May 2013 Today s Supply Chain Environment In the age of big data, companies are accumulating mountains of it. Data is
More informationWHAT ARE FREIGHT SERVICES?
FREIGHT SERVICES WHAT ARE FREIGHT SERVICES? As the official service contractor, Freeman is the exclusive provider of freight services. Material handling includes unloading your exhibit material storing
More informationSHIPPING INFORMATION
SHIPPING INFORMATION Warehouse Shipping Address: Exhibiting Company Name Booth # c/o FREEMAN 6060 Nancy Ridge Drive Suite C San Diego, CA 92121 Freeman will accept crated, boxed or skidded materials beginning
More informationBSWH Technician Continuing Education 2016 Part 2: Pharmacy Law - Controlled Substance Security & Drug Supply Chain Security Act (DSCSA) Contact
BSWH Technician Continuing Education 2016 Part 2: Pharmacy Law - Controlled Substance Security & Drug Supply Chain Security Act (DSCSA) Contact Hours: 1.5 Objectives List some strategies regarding safe
More informationC-TPAT Questionnaire. Type of Partner
C-TPAT Questionnaire Business Partner Name Address City State Zip Country Contact Name Contact Title Contact Phone number Contact Email Years in Business Number of Employees Type of Partner Manufacturer
More informationTrailer Management and Cargo Tracking Mini guide. How to get stuff from point A to point B. In the smartest, safest way.
Trailer Management and Cargo Tracking Mini guide How to get stuff from point A to point B. In the smartest, safest way. Getting stuff from point A to point B safely. It should be as easy as ABC. When you
More informationC-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)
C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,
More informationColony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire
Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. (f/k/a The Swiss Colony, Inc.) is a member of the Customs-Trade
More informationGE Security. NavLogix. Mobile Resource Management System
GE Security NavLogix Mobile Resource Management System NavLogix simplifies fleet management No matter what kind of fleet you re responsible for, you ll find NavLogix can help you enhance efficiency, reduce
More informationCTPAT Security Requirements for Import Suppliers
CTPAT Security Requirements for Import Suppliers To Our Import Suppliers: CVS Pharmacy is committed to ensuring supply chain security within a framework consistent with Customs Trade Partnership Against
More informationYour freight. Delivered and show-ready.
Your freight. Delivered and show-ready. J&J Motor Service is a full-service transportation company offering specialized freight services and time-definite pick-ups and deliveries throughout the United
More informationSafety, Security and Loss Prevention
Safety, Security and Loss Prevention Safety, Security and Loss Prevention Safety begins with you. This program is designed to increase employee awareness of the impact robberies have on the retail, and
More information5.1 SHIPPING, MOVE IN & MOVE OUT INFORMATION
5.1 SHIPPING, MOVE IN & MOVE OUT INFORMATION GES is the official drayage (freight handling) contractor with responsibility for unloading, delivering, storing of empty boxes/crates, re-loading and processing
More informationTenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US,
Dear Valued Supplier: Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US, C-TPAT is a voluntary joint government-business initiative to build cooperative relationships
More information1970 Williams Street, San Leandro, CA Phone (510) FAX (510) CONVENTION SERVICE SPECIAL EVENT DECOR SET DESIGN PRODUCTION
WES TERN E VEN T SERVICE 1970 Williams Street, Phone (510) 430-0510 FAX (510) 430-0511 CONVENTION SERVICE SPECIAL EVENT DECOR SET DESIGN PRODUCTION Southern California Independent Booksellers Association
More informationTRUSTED TRADER APPLICATION (C-TPAT AND ISA)
TRUSTED TRADER APPLICATION (C-TPAT AND ISA) APPLICANT INFORMATION Company Name: Company doing business as: Company Website: Physical Address: City Point of Contact: Phone Number: State/Zip Code Title:
More informationBill of Lading: Are You Reading the Fine Print
A Publication of IAT Insurance Group Special Points of Interest: Whose Logbooks Are You Checking, And Is This The Best Use Of Your Time? Cell Phone Alert: We Have a Message For You. FMCSA Interventions:
More informationCargo Theft in Latin America. Presentation for IUMI. Jorge Pecci Saavedra AIU MLCE
Cargo Theft in Latin America Presentation for IUMI Jorge Pecci Saavedra AIU MLCE Outline I- Environment II- Regional statistics on cargo theft III- Hi risk Countries Mexico Argentina Brazil Colombia IV-
More information!!!! School Security Get its Head in the Clouds. Deploying Modern Video Surveillance in Educational Institutions. Unlocking the Cloud
APPLICATION BRIEF School Security Get its Head in the Clouds Deploying Modern Video Surveillance in Educational Institutions Unlocking the Cloud Unlock the all the potential tools of a modern enterprise
More informationTechnology vs. Cargo Crime
Technology vs. Cargo Crime Taya Tuggle, Air & Ground World Transport Gary DelVeccio, Logistics Security Consulting LLC Sergeant Carlos Rosario, Miami-Dade Police Depart. Losses in the Freight Environment
More information2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011
Audit Rating Score Point Value Process & Procedures - Description of Standard Action Measurement Criteria 0 Not present or utilized - No plans to adopt or Not Acceptable: Immediate SCAR implement 1 Generally
More informationThe Federal Trade Commission reports that identity theft has been the NUMBER ONE consumer complaint for SIXTEEN consecutive years!
Identity Theft Facts The Federal Trade Commission reports that identity theft has been the NUMBER ONE consumer complaint for SIXTEEN consecutive years! Identity Theft Facts In 2015, approximately 450
More informationTRANSPORTATION SERVICE, FULLY LOADED.
TRANSPORTATION COMPLETE TRANSPORTATION SERVICE, FULLY LOADED. Our convenient, affordable package puts productivity in overdrive. Turn to Freeman for one-stop transportation services. Our all-inclusive
More informationC-TPAT Information for Foreign Manufacturers & Suppliers
DISTRIBUTION SERVICES DEPARTMENT 1 Barnes & Noble Way, Monroe Township, NJ 08831 (732) 656-7400 C-TPAT Information for Foreign Manufacturers & Suppliers Foreign Manufacturers/Suppliers Recommendations
More informationC-TPAT Security Standards. Importers
C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security
More informationSunday, March 18th. Pre-Meeting Breakfast. 8:30am-9:00am. Board of Directors Meetings Transportation & Logistics Council, Inc.
Sunday, March 18th 8:30am-9:00am 9:00am-4:00pm 9:00am-5:00pm Board of Directors Meetings Transportation & Logistics Council, Inc. Optional Seminars 1. CONTRACTING FOR TRANSPORTATION & LOGISTICS SERVICES
More informationMercedes-Benz Concierge Service
Mercedes-Benz CONNECT :: Convenience Service Mercedes-Benz Concierge Service High-quality personal assistance at the touch of a button. Access to high-quality, personal VIP service at any time of the day
More informationCSA: Why the Scores are Important. ü ü ü ü ü ü
W H I T E P A P E R CSA: Why the Scores are Important ü ü ü ü ü ü CSA: Why the Scores are Important Times are changing in the motor carrier industry. Today, shippers need to pick the safest carriers and
More informationRoll Up and Save: Roll-up trailers key to 20%-40% freight savings»» A STRIVE TRANSPORTATION BRIEF
Roll Up and Save: Roll-up trailers key to 20%-40% freight savings A STRIVE TRANSPORTATION BRIEF Freight shippers are missing a relatively easy way to slash freight costs on high-volume lanes. By being
More informationTraining Guide. For Third Party Logistics Services for
Training Guide For Third Party Logistics Services for Table of Contents Introduction to the Freight Program 3 Managing Freight 4 Purchasing 5 Logistics 6 System 9 Frequently Asked Questions 19 Introduction
More informationLogistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes
Logistics SOLUTION ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT Secure the flow of goods, and optimize the operation processes - Security As a fast growing solution provider, ACTi is dedicated
More informationProtect Your Elections
WHITE PAPER Protect Your Elections THE CHANGING FACE OF WAREHOUSE SECURITY In today s election environment, the task of protecting the voting infrastructure from cyber threats has taken center stage. Yet,
More informationSTUDENT ASSESSMENT TLIO5017 MANAGE SECURITY OF STORAGE FACILITIES
STUDENT ASSESSMENT TLIO5017 MANAGE SECURITY OF STORAGE FACILITIES Student Name (Please print) Student Signature Date: / /20 Learners Comments Employer Below section is for office use only UNIT RESULT Competent
More informationTrailer Tracking: Background Issues. Dan Murray January 8, 2008 ATRI
Trailer Tracking: Background Issues Dan Murray January 8, 2008 ATRI 501(c)(3) charitable research organization Governed by 15 member Board of Directors RAC: Freight Carriers Federal/State Government Labor
More informationCabotage Rules for Canadian-Based Drivers
The following document only paraphrases the regulations on cabotage of the Immigration and Naturalization Service and the U.S Customs Service. The contents may not be relied upon as a substitute for the
More information