Hands of Thieves. Guarding Food. from the. Transportation. By kerry beach Product Transports

Size: px
Start display at page:

Download "Hands of Thieves. Guarding Food. from the. Transportation. By kerry beach Product Transports"

Transcription

1 Guarding Food By kerry beach Product Transports from the Hands of Thieves In the transportation industry, prepared food and beverage products were the most stolen commodity in january/february 2013 AIB UPDATE

2 AIB UPDATE january/february

3 n December 18, 2012, Canadian police arrested three people in connection with a massive maple syrup heist, which affected the global supply since Quebec produces nearly 80 percent of the world s maple syrup. The syrup, which was stolen in August 2012 from a warehouse that stores Quebec s maple syrup reserves, had an estimated value of $30 million. In addition to facing charges of illicit trafficking of stolen goods, those arrested also face charges of theft, conspiracy, and fraud. This was only the latest incident impacting the Canadian food industry, as there have been an increasing number of bulk food crop thefts in recent years. The problem is not unique to Canada. In December 2012, an infant formula company in the United States began working with the Food and Drug Administration s (FDA) Office of Criminal Investigations (OCI) and other law enforcement officials to recover cases of infant formula products that were stolen from a carrier s lot in Grand Rapids, Mich. In March 2012, thieves in Florida stole six trailer loads of tomatoes, a truck full of cucumbers, and a truckload of frozen meat totaling about $300,000. Prior to the incident, the thieves set up a phony trucking company called E&A Transport Express and registered it with the Federal Motor Carrier Safety Administration. They then stalked websites that brokers use to connect trucking companies with loads they need carried. From there they contacted a broker, which verified E&A s federal registration and insurance coverage, and then arranged for them to pick up the tomatoes from a shipper in Miami. In four days, E&A Transport picked up the loads mentioned above with the intention of selling the stolen perishables to pre-arranged buyers. Cargo theft is the costliest crime in America, but it is also an international issue. In today s global food industry, raw materials are often manufactured and sourced in one part of the world, while finished products are stored and consumed in another, making shipments vulnerable at any point in the chain. Pirates on the Horizon Theft of lower valued goods has rapidly increased in recent years. According to CargoNet, a transportation theft prevention and recovery network, prepared food and beverage products were the most stolen commodity in 2012, followed by metals and electronics. From July to September 2012 alone, there were 56 reported food and beverage theft incidents in the U.S., while base metals and electronics tied for second with each having 36 reported theft incidents. California, Florida, Texas, New Jersey, and Illinois lead the country with the highest number of reported food product transport theft. Other interesting statistics indicate that Friday, Saturday, and Sunday are the days when most cargo theft incidents occur; that the top three theft locations include warehouses or distribution centers, parking lots, and truck stops; and that the average loss values range from $50,000 to $1,000,000. Part of the reason behind the increase in cargo theft incidents is the fact that it is essentially a low-risk, high-payout crime that carries only minor penalties. Thieves charged with stealing a load worth hundreds of thousands of dollars might only serve six months in jail, depending on the jurisdiction. Food - A Hot Commodity Prior to 2010, electronics held the #1 spot for most stolen cargo load. However, in 2010, 2011, and 2012, food and beverage products took the lead. This is due in part to the current economic crisis. Necessities, such as food and bottled water, are in higher demand, thus are easier to resell. It s also due to the fact that the sell value on stolen electronics is not as high as it once was due to tracking systems, such as serial numbers and GPS. It s reported that thieves can get 70 cents on the dollar for food and beverage on the black market, as opposed to 30 cents on the dollar for electronics. Challenges Although cargo theft is certainly an unfortunate economic blow to any company, it is a particularly nightmarish event in the food industry. Food and beverage companies have other factors to worry about in addition to financial and customer loss and a tarnished brand. Lives are at stake. When food transports are stolen, thieves are not worried about keeping the product at the right temperature or avoiding cross contamination during storage. In the often unlikely event that the products are recovered, the product is no longer considered safe. There is the risk that it is adulterated from not having been handled properly or the concern of intentional contamination. Another challenge is that cargo thieves are often highly sophisticated and organized. As noted in the headline about the perishable goods stolen in Florida, thieves plotted the theft as much as a month in advance. They went through the trouble of registering their phony company, obtaining insurance, and seeking out transports on broker websites. Then, they had to have buyers pre-arranged to purchase their black market goods since the clock was ticking against the shelf life of the items they stole. 8 january/february 2013 AIB UPDATE

4 A few other challenges that theft victims face are the fear of insurance costs or damage to their brand, not knowing to which law enforcement group the theft should be reported, and having limited resources for educating drivers. In the Blink of an Eye Once stolen loads are acquired, the goods are moved quickly through a chain of handoffs, often before the theft is even discovered by the manufacturing or transportation company. It only takes a matter of hours for organized thieves to move the stolen goods to a warehouse, off-load and repackage them, and load them onto another vehicle for distribution. This is known as product diversion in the security industry. Stolen transports are acquired a number of ways. Thieves may carjack the trucks directly out of a driver s grasp, or they may wait until a driver leaves the truck unattended at a rest stop and take it from there. In other instances, unattached trailers are stolen from a trailer yard. The thieves will attach their cabs to an unmanned, loaded trailer and drive away. Other times they will simply break into the dropped trailers, unload the cargo into their own empty trailer, and drive away. Regardless of which method is used, the thieves will monitor the activity, then wait for the prime opportunity to strike. Not all cargo theft is done by an external party. In some cases, it is an inside job where the truck driver is paid off to give up his or her truck. Thieves will observe drivers at rest stops and fueling stations, then offer them a set amount to get in on the activity. Experienced criminals may abandon a newly stolen truck or trailer then watch it from afar to learn if a tracking system is embedded in it. If law enforcement does not arrive within a certain timeframe, the thief will assume the stolen load has not been reported or is not being monitored and will then move it to a secured location to begin preparing the goods for resale on the black market. This may involve repackaging, relabeling, and even creating counterfeit bills of lading or other paperwork to more easily move the stolen cargo out of the country. So, who exactly is buying these stolen goods? Most of the time, the brokered buyers knowingly purchase stolen property. They are able to get a lower price point on the stolen goods and are themselves part of the stolen transport ring. In other instances, the thieves are so good at deceit that they are able to sell the stolen property to unsuspecting businesses that are not part of the crime scheme. Take Action to Prevent Theft BE ALERT. Usually before a targeted theft occurs, there will be a period of surveillance while the thief is collecting information about a facility. He or she will watch loading/unloading procedures, monitor high and low periods of activity at the plant, and try to find a pattern in drivers leaving with shipments. Watch for signs that your operation is under the watchful eye of thieves. This might include unknown vehicles parked outside or within the parking lot with drivers inside, unauthorized personnel on the plant property, someone holding a camera or taking notes outside your facility, or vehicles that appear to be following your drivers. KNOW YOUR EMPLOYEES. Before hiring any drivers, conduct a background check to eliminate any applicants likely to steal merchandise or be persuaded to give up their trailers. Remember, cargo theft incidents are often later revealed to be inside jobs. Be especially watchful of new employees and temporary workers assigned to shipping and receiving areas. Once your drivers are hired, provide initial and ongoing security training so that they are equipped to recognize suspicious activity, secure their vehicles when unattended, and promptly report security instances to the proper parties. KNOW YOUR AFFILIATES. Just as drivers should be pre-screened before employment, your supply chain partners, including transport companies and distribution centers, should also pass some sort of established verification procedures before you trust them with your products. Distribution centers are the top location for cargo theft to occur. Frequent assessments of your distribution centers and a solid inventory management system are excellent loss prevention tools to help prevent your cargo from going missing. Familiarizing yourself with distribution center activities makes it easier to recognize suspicious activity. Also, when employees feel that they are being watched and are at a high risk of being caught, they will be less likely to attempt to steal cargo. Cargo theft is the costliest crime in America, but it is also an international issue. In today s global food industry, raw materials are often manufactured and sourced in one part of the world, while finished products are stored and consumed in another, making shipments vulnerable at any point in the chain. AIB UPDATE january/february

5 Once a carrier is selected, verify its identity by checking registration numbers, insurance, etc., and review its security procedures to make sure these are in line with your requirements. When a driver arrives at the plant to pick up an outgoing load, verify the driver s identity before releasing the cargo. Verification of driver s identity goes beyond simply checking a government issued driver s license. Ask your transportation companies to also issue company-provided identification. Both IDs should be verified against the driver s name indicated on the bill of lading or other shipping document. If the name is not indicated, the transportation company should be contacted prior to loading the trailer to ensure this is the assigned driver. Does this require extra effort? Of course! However, as noted in the examples above, thieves are becoming bolder in their efforts to steal. These simple checks can go a long way in deterring organized efforts at theft and prevent simple thieves from trying to show up and pick up a load. Stay informed of the status of your shipment along the way, including any delivery schedules, routes, and pre-arranged stops in trailer yards, and check in to make sure that adequate security measures are being provided en route. By staying informed, you can more easily be alerted to any overdue shipments or out-of-route deliveries. USE SECURITY MEASURES. Your Food Facility Defense Plan should include security measures and procedures to safeguard against transportation theft issues. It is also a good idea to inform and remind employed and contracted drivers of best security practices to use while on the road. Some of those include: If a driver team is transporting the load, one person should remain with the vehicle at all times. Be cautious when relaying information Be cautious when relaying information via CB radio or social media. Don t list specific details about location, cargo load, and final destination. via CB radio or social media. Don t list specific details about location, cargo load, or final destination. Guard truckentry points against thieves. Some drivers run a strap through their interior door handles while inside their trucks at night to prevent entry to the cab. If the trucking company allows travel pets, make sure the animal is trained to bark at intruders. If the truck is equipped with an alarm system, check it frequently to ensure that it is functioning properly. Practice safe parking habits. Park in an area that is not isolated and has good lighting. Seek out truck yards and rest stops that have good security protocols, including CCTV surveillance. Never leave the vehicle unlocked while unattended; this includes while fueling, using the rest stop areas, or waiting on a fuel ticket. Park rear to rear to restrict access to the trailer door. There are a variety of low-cost basic security equipment options that can be used to help thwart cargo theft. Locks. Locks are a big part of cargo security. There are several different types of locks used to help secure various parts of a tractor/trailer rig. King-pin locks. King-pin locks are easy to install and prevent unauthorized hook ups to the trailer. Trailers are at a high risk when they are not attached to a truck. The king-pin lock covers and locks the king pin of the semi-trailer and prevents another truck from driving away with the trailer when parked in a drop location. Glad-hand lock cover. The glad-hand connection on a truck houses the hoses that supply air to the brakes. The glad-hand lock cover inserts a pin into the connection that locks the trailer s air line, preventing the truck from departing until the lock is removed and brake lines are once again operational. Air brake valve lock. When installed, these locks prevent brake release by locking the brake controls. The more locks in use on a cargo load, the less likely it is to be stolen. If a thief cannot overtake a trailer in less than two minutes, the chances of getting caught drastically rise. The more locks in use on a load, the sooner the thief will move on to another target that is easier to steal. 10 january/february 2013 AIB UPDATE

6 Seals. Although seals will not prevent a determined criminal from gaining access, they will limit intrusion and create an alert for drivers and receiving employees that the doors have been tampered with if the seals are broken. Include seal policies in your defense program, and educate drivers on the appropriate actions to take if they notice a seal has been tampered with. Your company should also evaluate the types of seals to be used. There are many different seals and the level of security varies greatly. Some variables to consider are the geographic shipping origination point, in-transit corridor(s), and destination points. In the case of U.S./Mexican cross-border shipments, U.S. customs requires that shippers use seals classified as high-security by ISO/ PAS if they are participating in the U.S. Customs Trade Partnership Against Terrorism (C-TPAT) program 4. In the U.S., shipments moving through areas known as high-risk shipping corridors may call for different security seals than those moving through lower risk areas. The physical environment to which a shipment will be exposed while in transit also impacts proper seal selection. It is not uncommon for shipments to experience extreme seasonal temperature changes when moving from their origination to destination points. Video Surveillance. Another low-cost security measure is the installation of CCTV-monitoring systems on the loading dock, in parking lots, and at gates, as a deterrent against criminal activity. The footage should be checked daily to detect any suspicious activity. Software programs are also available on the CCTV systems and can be programmed to monitor specific areas within the camera s view, and send an alert or alarm to a security officer of any motion or activity within the specified view. An example of this use would be using this capability in a trailer lot after hours when there should be no people or vehicles moving in the area. High Tech Security. In addition to the basic security measures, there are also a number of higher technology tools used to aid in cargo-theft prevention. GPS-tracking tools have been around for a while and are now available in many electronic devices. When installed in a vehicle, they are used to help determine its location if stolen. The downside is that these devices are very easily disconnected and disabled by professional thieves. Geofencing systems send a security alarm to the assigned recipient when a vehicle travels outside an assigned route. The virtual fence is established by the operator, then, if an equipped vehicle crosses the fence, an alert is sent via text or . There are a variety of high-tech vehicle security systems to choose from as well. Perhaps the most basic is a panic button that alerts authorities or honks the horn repeatedly until help arrives. Some of these panic buttons will even slow the truck down to a gradual stop if it is engaged while in motion. Accesscontrol technology can be installed, requiring drivers to enter an access code before being able to move the vehicle. If the vehicle was stolen while idling, the thief would not be able to drive off with it unless he knew the access code. Another advanced type of technology is a vehicle-immobilization system used to remotely disable a stolen vehicle. REPORT IMMEDIATELY. Any suspicious activity should be reported immediately to management and law enforcement agencies. If you notice a trend in false alarms, don t lower your guard. Frequent false alarms can actually be a sign that criminals are testing your security procedures and response times. If you are notified that one of your loads has been stolen, don t hesitate to report it to your company, but also to law enforcement. It is especially a good idea to report the theft to the state police in the state where the truck was stolen, in addition to the local police. State police agencies across the U.S. have specific measures in place to quickly track and locate stolen cargo and trucks and can communicate more quickly across state lines. The sooner you report, the more likely you are to Frequent false alarms can be a sign that criminals are testing your security procedures and response times. recover. Remember, thieves move stolen goods quickly. It only takes a matter of hours for the stolen goods to be rerouted to black-market buyers. Summary Stolen food and beverage transports are on the rise and increasing every year. Although the food industry seems to be a prime target for thieves, being proactive in your security approaches will prevent you from being prey for highway pirates! AIB The author is Editor, AIB International. AIB UPDATE january/february

cargo theft: how to reduce your risk

cargo theft: how to reduce your risk Cargo at rest is cargo at risk. Freight theft is an unfortunate but all too common occurrence in the shipping world, especially as we ramp up to the holiday season. CargoNet estimates that cargo theft

More information

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y

John F. Fevelo Chief Operating Officer. Metro One Loss Prevention Service Group, Inc. 900 South Ave. Staten Island, N.Y John F. Fevelo Chief Operating Officer Metro One Loss Prevention Services Group, Inc. 900 South Ave. Staten Island, N.Y. 10314 718-370-6778 Speech Outline Delivered to the Transportation and Logistics

More information

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES www.alpiworld.com PHISYCAL SECURITY AND ACCESS CONTROL 1. Physical Security The premises, in which goods are deposited, kept and handled

More information

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe Food Defense and Emergency Response Security Guidelines Keep America's Food Safe Note: This text version is provided to ensure accessibility. A fully illustrated, PDF version is also available. The tragic

More information

Are GPS Trackers Enough for Cargo Security & Theft Recovery?

Are GPS Trackers Enough for Cargo Security & Theft Recovery? Are GPS Trackers Enough for Cargo Security & Theft Recovery? May 17, 2018 - Premsai Sainathan Read Time 5 Mins. 1 While GPS tracking systems can improve the odds of tracing stolen vehicles or trailers,

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: May 2015 Table of Contents Introduction 3 1. Program administration 3 a. Plan management 3 b. Roles and responsibilities 3 c. Reporting procedures 3 d. Self-assessments

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Assessment Developed in Partnership with: P a g e 2 Introduction Thank you for taking the time to look at your organization s security. It is a critical component

More information

Cargo theft - current trends and best practices for prevention. John C. Tabor

Cargo theft - current trends and best practices for prevention. John C. Tabor Cargo theft - current trends and best practices for prevention John C. Tabor 2 3 Cargo Theft Challenges - The FBI reports cargo theft in the U.S. to exceed 15 billion annually - Cargo Thieves are highly

More information

Keeping Your Cargo Safe

Keeping Your Cargo Safe Keeping Your Cargo Safe Keeping Your Cargo Safe A 360 Approach to Freight Security in an Unsafe World There is no doubt that supply chains are complex, and this complexity creates vulnerability. Unfortunately,

More information

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Objective The purpose of this procedure is to ensure that LG Sourcing and its manufacturers and suppliers are in compliance

More information

Foreign Manufacturer Eligibility Requirements

Foreign Manufacturer Eligibility Requirements Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated

More information

Xerox Supplier Security Requirements

Xerox Supplier Security Requirements Xerox Supplier Security Requirements Suppliers who are involved in the manufacture, storage, and transportation of Xerox products ( Suppliers ) for Xerox Corporation and / or its subsidiaries under Xerox

More information

Supply Chain Security IGTLC

Supply Chain Security IGTLC Supply Chain Security IGTLC CONVERGENCE: CARGO-CYBER CRIME Mix of Physical and Cyber Tactics to Set-up Fraudulent Pick-ups Phone spoofing Criminals calling airlines to gather intelligence on freight arrival

More information

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Minimum-Security Criteria for C-TPAT Foreign Manufacturers Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry This guidance document was prepared by the International Dairy Foods Association (IDFA) to help you evaluate the security

More information

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and

More information

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES Copy No. Uncontrolled Canadian Grain Commission Process Verification and Accreditation Office Industry Services 900-303 Main Street Winnipeg,

More information

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense Retail Food Establishment Self-Assessment Checklist for Food Defense Ohio Department of Agriculture Division of Food Safety September 2005 Industry Self-Assessment Checklist for Food Defense On January

More information

Supply Chain - Information Sharing and Analysis Center

Supply Chain - Information Sharing and Analysis Center 2015 1 st Quarter Supply Chain ISAC Report of Cargo Theft Activity The Supply Chain Information Sharing and Analysis Center s (SC-ISAC) primary mission is to continue to facilitate communication among

More information

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents.

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents. 5. Procedural Security Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling and storage of cargo in the supply chain. Customs and/or

More information

DEVELOPING A FOOD DEFENSE PLAN A GUIDE

DEVELOPING A FOOD DEFENSE PLAN A GUIDE DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES EXHIBIT: X BUREAU OF FOOD DISTRIBUTION EFFECTIVE: 407 SOUTH CALHOUN STREET, M-39, 2 ND FLOOR REVISED: September 1, 2012 TALLAHASSEE, FLORIDA 32399-0800 PAGE

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview avenue STORES, LLC Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority.

More information

C-TPAT Security Criteria. Sea Carriers

C-TPAT Security Criteria. Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum security criteria. Where a sea carrier does

More information

CANADIAN CARGO THEFT TRENDS: What s new, what s now, and what s on the horizon.

CANADIAN CARGO THEFT TRENDS: What s new, what s now, and what s on the horizon. CANADIAN CARGO THEFT TRENDS: What s new, what s now, and what s on the horizon. As long as cargo continues to move along the highways, pass between trailers, and hang out in truck yards, there will be

More information

A Message for Brokers Letter And Security Guidelines for Brokers

A Message for Brokers Letter And Security Guidelines for Brokers A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business

More information

Truck Telematics TECHNOLOGY. ELD Do s and Don ts pg. 2. Medium-duty telematics pg. 8 Tracking trailers pg. 12 Toll management technology pg.

Truck Telematics TECHNOLOGY. ELD Do s and Don ts pg. 2. Medium-duty telematics pg. 8 Tracking trailers pg. 12 Toll management technology pg. Truck Telematics TECHNOLOGY October 2017 ELD Do s and Don ts pg. 2 Medium-duty telematics pg. 8 Tracking trailers pg. 12 Toll management technology pg. 16 By Carol Birkland Editor-At-Large Trailer Fleet

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

Please complete the questionnaire and fax it to

Please complete the questionnaire and fax it to Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

GLOBAL LIVE - WHITE PAPER Live Mobile CCTV Manage the situation. Don t waste time watching the repeat.

GLOBAL LIVE - WHITE PAPER Live Mobile CCTV Manage the situation. Don t waste time watching the repeat. www.global-live.co.uk GLOBAL LIVE - WHITE PAPER Live Mobile CCTV Manage the situation. Don t waste time watching the repeat. MARCH 2013 GLOBAL LIVE - WHITE PAPER Introduction The time you take to make

More information

Keeping Your Cargo Safe

Keeping Your Cargo Safe Keeping Your Cargo Safe A 360 Approach to Freight Security in an Unsafe World Don Osterberg, Sr. VP of Safety and Driver Training, Schneider National, Inc. There is no doubt that supply chains are complex,

More information

Rail Carrier Minimum-Security Criteria

Rail Carrier Minimum-Security Criteria Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing

More information

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following

More information

T - TALK about what they touch. Talk brands and talk specifics. Let them know you re paying attention.

T - TALK about what they touch. Talk brands and talk specifics. Let them know you re paying attention. Our Approach 1. Identify potential thieves a. A customer that doesn t look like the typical Hot Mama shopper b. A customer in a group that demands full attention and draws you away from the group. c. A

More information

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security

More information

Air Carrier Eligibility Requirements

Air Carrier Eligibility Requirements Air Carrier Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Air Carrier must the meet the following eligibility requirements: 1. Active Air Carrier transporting cargo shipments to

More information

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office C-TPAT Best Practices Wayne Kornmann Director, Long Beach C-TPAT Field Office 2 C-TPAT Best Practices Overview What are Best Practices? C-TPAT Best Practice Catalog How Do Importers Achieve Tier 3 Status?

More information

C-TPAT Security Questionnaire PASS FAIL 1

C-TPAT Security Questionnaire PASS FAIL 1 Company: Address: City, St. Zip Purpose: ATC has committed to participation in the Customs Trade Partnership Against Terrorism (CTPAT) Program administered by Customs. CTPAT is a supply chain security

More information

C-TPAT Minimum Security Requirements Importers

C-TPAT Minimum Security Requirements Importers Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

More information

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers February 2016 I have read this page: Date: Doc C Page 1 Table of Contents Introduction 1. Procedural Security 2. Physical Security 3. Access

More information

CONTAINER SECURITY. For example:

CONTAINER SECURITY. For example: CONTAINER SECURITY The introduction of the ISPS Code has aroused an interest regarding the effect it will have in deterring criminal involvement in container crime. There can be no doubt that the improved

More information

Road Transport How to protect a parked vehicle?

Road Transport How to protect a parked vehicle? TechC@RE security BEST PRACTICES Road Transport How to protect a parked vehicle? Three quarters of land freight thefts are committed when a vehicle is stationary. The three most common types of theft are:

More information

METAL THEFT TRENDS 2015

METAL THEFT TRENDS 2015 METAL THEFT TRENDS 2015 Law Enforcement and the Private Sectors Approach to Combating the Problem Joel Squadrito-Corporate Security Director for Steel Dynamics Inc. 1 WHAT DRIVES METAL THEFTS The Commodity

More information

Importers: C-TPAT Minimum Security Requirements

Importers: C-TPAT Minimum Security Requirements Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested

More information

C-TPAT Minimum Security Criteria

C-TPAT Minimum Security Criteria C-TPAT Minimum Security Criteria C-TPAT Security Criteria for Importers Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria.

More information

TO CHANGE. THESE FORMS ARE NOT TO BE USED FOR THE 2017 EVENT! PLEASE BE ADVISED! THESE FORMS ARE FROM THE 2016 EVENT AND PRICES ARE SUBJECT

TO CHANGE. THESE FORMS ARE NOT TO BE USED FOR THE 2017 EVENT! PLEASE BE ADVISED! THESE FORMS ARE FROM THE 2016 EVENT AND PRICES ARE SUBJECT w h a t a r e Freight Services? As the official service contractor Freeman is the exclusive provider of freight services. Material handling includes unloading your exhibit material storing up to 30 days

More information

CONTACT US: Call: For Sales: For Support: Outside the US? Call:

CONTACT US: Call: For Sales: For Support: Outside the US? Call: CONTACT US: Call: 888-464-7748 Outside the US? Call: 619-230-5100 For Sales: sales@gpsit.com For Support: support@gpsit.com www.gpsit.com GPSit Fleet Solution GPSit is a leader in the GPS fleet tracking

More information

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT) IMPORTER SECURITY RECOMMENDATIONS Develop and implement a sound plan to enhance security procedures throughout your supply chain. Where an importer does not control a facility, conveyance or process subject

More information

C-TPAT Partner Application for Importers Instructions

C-TPAT Partner Application for Importers Instructions C-TPAT Partner Application for Importers Instructions Importer for C-TPAT Application Qualifications 1. Active U.S. Importer or Non-Resident Canadian Importer into the United States. 2. Have an business

More information

EASTERN MICHIGAN U N I V E R S I T Y SECURITY OF HAZARDOUS MATERIALS IN TRANSPORT

EASTERN MICHIGAN U N I V E R S I T Y SECURITY OF HAZARDOUS MATERIALS IN TRANSPORT EASTERN MICHIGAN U N I V E R S I T Y SECURITY OF HAZARDOUS MATERIALS IN TRANSPORT Department of Public Safety Health and Safety Office 1200 Oakwood Ypsilanti, MI 48197 734.487.0794 July 2004 EASTERN MICHIGAN

More information

Security Innovations to Adapt to Emerging Threats

Security Innovations to Adapt to Emerging Threats 2013 C-TPAT Conference January 9, 2013 Security Innovations to Adapt to Emerging Threats Barry Brandman President/CEO Danbee Investigations in no va tion noun \ˌi-nə-ˈvā-shən\ Definition: a new idea, method,

More information

Milestone AV Technologies TECHNICAL SPECIFICATION

Milestone AV Technologies TECHNICAL SPECIFICATION Revision: 02 PAGE 1 OF 12 Revision History Date Rev Reason for Change 5/21/2009 00 Initial Release 11/19/2010 01 ECO Number 500003646 Section 3.2.8: Added new F-0218 Container Check List - Chinese form

More information

WHAT ARE FREIGHT SERVICES?

WHAT ARE FREIGHT SERVICES? FREIGHT SERVICES WHAT ARE FREIGHT SERVICES? As the official service contractor, Freeman is the exclusive provider of freight services. Material handling includes unloading your exhibit material storing

More information

"SAFETY IN THE SEA PORTS

SAFETY IN THE SEA PORTS "SAFETY IN THE SEA PORTS Paper prepared for 22 nd Engineers International Conference At Intercontinental Hotel, Nairobi, Kenya. From 13 th - 15 TH May, 2015. MS. MARYAM MOHAMED KIDERE KENYA PORTS AUTHORITY

More information

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements C-TPAT Requirements Dated: July 1 st, 2015 To: Valued Suppliers Re: C-TPAT Security Recommendations and Requirements Recently, our company was accepted by US Customs into the C-TPAT program. This program

More information

The Ever-Evolving Threat of Fraud and Theft

The Ever-Evolving Threat of Fraud and Theft The Ever-Evolving Threat of Fraud and Theft Moderator: Mark Yunker, Vice President, Ahmann-Martin Panelists: Scott Cornell, 2vp, Inland Marine, Crime & Theft Specialist, Travelers Keith Lewis, Vice President

More information

U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS

U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS A Compliance Guide for Petroleum Marketers Prepared By: Mark S. Morgan, Esq. Petroleum Marketers Association of America

More information

FREEMAN exhibit transportation

FREEMAN exhibit transportation (800) 995-3579 Toll Free US & Canada (817) 607-5100 Local & International NAME OF SHOW: COMPANY NAME: CONTACT NAME : E-MAIL ADDRESS : For Assistance, please call applicable number listed above to speak

More information

Warehouse/Supply Chain Loss Prevention. Presented by John Tabor, SVP Supply Chain National Retail Systems, Inc.

Warehouse/Supply Chain Loss Prevention. Presented by John Tabor, SVP Supply Chain National Retail Systems, Inc. Warehouse/Supply Chain Loss Prevention Presented by John Tabor, SVP Supply Chain National Retail Systems, Inc. Cargo Theft Challenges The FBI reports cargo theft in the U.S. to exceed 15 billion annually

More information

MATERIAL HANDLING & RATES

MATERIAL HANDLING & RATES Material Handling Information & Rates The following information has been compiled by AGS for use by exhibitors and all third-party contractors to inform you of rates and rules regarding proper shipping

More information

Importing to the U.S.: Key requirements you need to be aware of

Importing to the U.S.: Key requirements you need to be aware of Importing to the U.S.: Key requirements you need to be aware of Eight areas of the importing process you should familiarize yourself with before you ship your goods to the U.S. If you re new to international

More information

SAME JETC May 22-25, 2012 America s Center St. Louis, Missouri

SAME JETC May 22-25, 2012 America s Center St. Louis, Missouri 5931 West Campus Circle Drive, Irving, Texas 75063 Phone: (972) 580-9000 Fax: (972) 465-1117 Log onto cyberservices @ www.theexpogroup.com 1 2 Choice of Destination Why Ship To The Warehouse? SAME JETC

More information

Supplement to Trucking 106

Supplement to Trucking 106 Copyright 2005 by Innovative Computing Corporation 750 Old Hickory Blvd. Suite 290 Brentwood, TN 37027 615-986-1900 5924 NW 2nd Street Suite 100 Oklahoma City, OK 73127 405-495-8788 www.innovativecomputingcorp.com

More information

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment) ompany name: (Based on -TPAT SS Best Practice, US ustoms and Border Protection) lause Degree of ompliance 1. PERSONNEL SEURITY 1.1 The company conducts employment screening and interviewing of prospective

More information

Keith Lewis, CargoNet September 19, 2013

Keith Lewis, CargoNet September 19, 2013 Keith Lewis, CargoNet September 19, 2013 Cargo theft in Georgia Talking Points Supply chain theft overview How they breach the supply chain Analytics Tools of the trade Law enforcement response or lack

More information

Patients are Counting on Us: A Little Less Conversation It s Time to Act

Patients are Counting on Us: A Little Less Conversation It s Time to Act Patients are Counting on Us: A Little Less Conversation It s Time to Act Martin VanTrieste SVP Quality Amgen, Inc. PDA Missouri Valley Chapter Supply Chain Security in the Pharmaceutical Industry Thousand

More information

Understand the Source of Product Damage with Data Loggers. Author: ShockWatch, Inc. May 2013

Understand the Source of Product Damage with Data Loggers. Author: ShockWatch, Inc. May 2013 Understand the Source of Product Damage with Data Loggers Author: ShockWatch, Inc. May 2013 Today s Supply Chain Environment In the age of big data, companies are accumulating mountains of it. Data is

More information

WHAT ARE FREIGHT SERVICES?

WHAT ARE FREIGHT SERVICES? FREIGHT SERVICES WHAT ARE FREIGHT SERVICES? As the official service contractor, Freeman is the exclusive provider of freight services. Material handling includes unloading your exhibit material storing

More information

SHIPPING INFORMATION

SHIPPING INFORMATION SHIPPING INFORMATION Warehouse Shipping Address: Exhibiting Company Name Booth # c/o FREEMAN 6060 Nancy Ridge Drive Suite C San Diego, CA 92121 Freeman will accept crated, boxed or skidded materials beginning

More information

BSWH Technician Continuing Education 2016 Part 2: Pharmacy Law - Controlled Substance Security & Drug Supply Chain Security Act (DSCSA) Contact

BSWH Technician Continuing Education 2016 Part 2: Pharmacy Law - Controlled Substance Security & Drug Supply Chain Security Act (DSCSA) Contact BSWH Technician Continuing Education 2016 Part 2: Pharmacy Law - Controlled Substance Security & Drug Supply Chain Security Act (DSCSA) Contact Hours: 1.5 Objectives List some strategies regarding safe

More information

C-TPAT Questionnaire. Type of Partner

C-TPAT Questionnaire. Type of Partner C-TPAT Questionnaire Business Partner Name Address City State Zip Country Contact Name Contact Title Contact Phone number Contact Email Years in Business Number of Employees Type of Partner Manufacturer

More information

Trailer Management and Cargo Tracking Mini guide. How to get stuff from point A to point B. In the smartest, safest way.

Trailer Management and Cargo Tracking Mini guide. How to get stuff from point A to point B. In the smartest, safest way. Trailer Management and Cargo Tracking Mini guide How to get stuff from point A to point B. In the smartest, safest way. Getting stuff from point A to point B safely. It should be as easy as ABC. When you

More information

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,

More information

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. (f/k/a The Swiss Colony, Inc.) is a member of the Customs-Trade

More information

GE Security. NavLogix. Mobile Resource Management System

GE Security. NavLogix. Mobile Resource Management System GE Security NavLogix Mobile Resource Management System NavLogix simplifies fleet management No matter what kind of fleet you re responsible for, you ll find NavLogix can help you enhance efficiency, reduce

More information

CTPAT Security Requirements for Import Suppliers

CTPAT Security Requirements for Import Suppliers CTPAT Security Requirements for Import Suppliers To Our Import Suppliers: CVS Pharmacy is committed to ensuring supply chain security within a framework consistent with Customs Trade Partnership Against

More information

Your freight. Delivered and show-ready.

Your freight. Delivered and show-ready. Your freight. Delivered and show-ready. J&J Motor Service is a full-service transportation company offering specialized freight services and time-definite pick-ups and deliveries throughout the United

More information

Safety, Security and Loss Prevention

Safety, Security and Loss Prevention Safety, Security and Loss Prevention Safety, Security and Loss Prevention Safety begins with you. This program is designed to increase employee awareness of the impact robberies have on the retail, and

More information

5.1 SHIPPING, MOVE IN & MOVE OUT INFORMATION

5.1 SHIPPING, MOVE IN & MOVE OUT INFORMATION 5.1 SHIPPING, MOVE IN & MOVE OUT INFORMATION GES is the official drayage (freight handling) contractor with responsibility for unloading, delivering, storing of empty boxes/crates, re-loading and processing

More information

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US,

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US, Dear Valued Supplier: Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US, C-TPAT is a voluntary joint government-business initiative to build cooperative relationships

More information

1970 Williams Street, San Leandro, CA Phone (510) FAX (510) CONVENTION SERVICE SPECIAL EVENT DECOR SET DESIGN PRODUCTION

1970 Williams Street, San Leandro, CA Phone (510) FAX (510) CONVENTION SERVICE SPECIAL EVENT DECOR SET DESIGN PRODUCTION WES TERN E VEN T SERVICE 1970 Williams Street, Phone (510) 430-0510 FAX (510) 430-0511 CONVENTION SERVICE SPECIAL EVENT DECOR SET DESIGN PRODUCTION Southern California Independent Booksellers Association

More information

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

TRUSTED TRADER APPLICATION (C-TPAT AND ISA) TRUSTED TRADER APPLICATION (C-TPAT AND ISA) APPLICANT INFORMATION Company Name: Company doing business as: Company Website: Physical Address: City Point of Contact: Phone Number: State/Zip Code Title:

More information

Bill of Lading: Are You Reading the Fine Print

Bill of Lading: Are You Reading the Fine Print A Publication of IAT Insurance Group Special Points of Interest: Whose Logbooks Are You Checking, And Is This The Best Use Of Your Time? Cell Phone Alert: We Have a Message For You. FMCSA Interventions:

More information

Cargo Theft in Latin America. Presentation for IUMI. Jorge Pecci Saavedra AIU MLCE

Cargo Theft in Latin America. Presentation for IUMI. Jorge Pecci Saavedra AIU MLCE Cargo Theft in Latin America Presentation for IUMI Jorge Pecci Saavedra AIU MLCE Outline I- Environment II- Regional statistics on cargo theft III- Hi risk Countries Mexico Argentina Brazil Colombia IV-

More information

!!!! School Security Get its Head in the Clouds. Deploying Modern Video Surveillance in Educational Institutions. Unlocking the Cloud

!!!! School Security Get its Head in the Clouds. Deploying Modern Video Surveillance in Educational Institutions. Unlocking the Cloud APPLICATION BRIEF School Security Get its Head in the Clouds Deploying Modern Video Surveillance in Educational Institutions Unlocking the Cloud Unlock the all the potential tools of a modern enterprise

More information

Technology vs. Cargo Crime

Technology vs. Cargo Crime Technology vs. Cargo Crime Taya Tuggle, Air & Ground World Transport Gary DelVeccio, Logistics Security Consulting LLC Sergeant Carlos Rosario, Miami-Dade Police Depart. Losses in the Freight Environment

More information

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011 Audit Rating Score Point Value Process & Procedures - Description of Standard Action Measurement Criteria 0 Not present or utilized - No plans to adopt or Not Acceptable: Immediate SCAR implement 1 Generally

More information

The Federal Trade Commission reports that identity theft has been the NUMBER ONE consumer complaint for SIXTEEN consecutive years!

The Federal Trade Commission reports that identity theft has been the NUMBER ONE consumer complaint for SIXTEEN consecutive years! Identity Theft Facts The Federal Trade Commission reports that identity theft has been the NUMBER ONE consumer complaint for SIXTEEN consecutive years! Identity Theft Facts In 2015, approximately 450

More information

TRANSPORTATION SERVICE, FULLY LOADED.

TRANSPORTATION SERVICE, FULLY LOADED. TRANSPORTATION COMPLETE TRANSPORTATION SERVICE, FULLY LOADED. Our convenient, affordable package puts productivity in overdrive. Turn to Freeman for one-stop transportation services. Our all-inclusive

More information

C-TPAT Information for Foreign Manufacturers & Suppliers

C-TPAT Information for Foreign Manufacturers & Suppliers DISTRIBUTION SERVICES DEPARTMENT 1 Barnes & Noble Way, Monroe Township, NJ 08831 (732) 656-7400 C-TPAT Information for Foreign Manufacturers & Suppliers Foreign Manufacturers/Suppliers Recommendations

More information

C-TPAT Security Standards. Importers

C-TPAT Security Standards. Importers C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security

More information

Sunday, March 18th. Pre-Meeting Breakfast. 8:30am-9:00am. Board of Directors Meetings Transportation & Logistics Council, Inc.

Sunday, March 18th. Pre-Meeting Breakfast. 8:30am-9:00am. Board of Directors Meetings Transportation & Logistics Council, Inc. Sunday, March 18th 8:30am-9:00am 9:00am-4:00pm 9:00am-5:00pm Board of Directors Meetings Transportation & Logistics Council, Inc. Optional Seminars 1. CONTRACTING FOR TRANSPORTATION & LOGISTICS SERVICES

More information

Mercedes-Benz Concierge Service

Mercedes-Benz Concierge Service Mercedes-Benz CONNECT :: Convenience Service Mercedes-Benz Concierge Service High-quality personal assistance at the touch of a button. Access to high-quality, personal VIP service at any time of the day

More information

CSA: Why the Scores are Important. ü ü ü ü ü ü

CSA: Why the Scores are Important. ü ü ü ü ü ü W H I T E P A P E R CSA: Why the Scores are Important ü ü ü ü ü ü CSA: Why the Scores are Important Times are changing in the motor carrier industry. Today, shippers need to pick the safest carriers and

More information

Roll Up and Save: Roll-up trailers key to 20%-40% freight savings»» A STRIVE TRANSPORTATION BRIEF

Roll Up and Save: Roll-up trailers key to 20%-40% freight savings»» A STRIVE TRANSPORTATION BRIEF Roll Up and Save: Roll-up trailers key to 20%-40% freight savings A STRIVE TRANSPORTATION BRIEF Freight shippers are missing a relatively easy way to slash freight costs on high-volume lanes. By being

More information

Training Guide. For Third Party Logistics Services for

Training Guide. For Third Party Logistics Services for Training Guide For Third Party Logistics Services for Table of Contents Introduction to the Freight Program 3 Managing Freight 4 Purchasing 5 Logistics 6 System 9 Frequently Asked Questions 19 Introduction

More information

Logistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes

Logistics SOLUTION. ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT. Secure the flow of goods, and optimize the operation processes Logistics SOLUTION ACTi, YOUR BEST PARTNER IN LOGISTICS SECURITY AND MANAGEMENT Secure the flow of goods, and optimize the operation processes - Security As a fast growing solution provider, ACTi is dedicated

More information

Protect Your Elections

Protect Your Elections WHITE PAPER Protect Your Elections THE CHANGING FACE OF WAREHOUSE SECURITY In today s election environment, the task of protecting the voting infrastructure from cyber threats has taken center stage. Yet,

More information

STUDENT ASSESSMENT TLIO5017 MANAGE SECURITY OF STORAGE FACILITIES

STUDENT ASSESSMENT TLIO5017 MANAGE SECURITY OF STORAGE FACILITIES STUDENT ASSESSMENT TLIO5017 MANAGE SECURITY OF STORAGE FACILITIES Student Name (Please print) Student Signature Date: / /20 Learners Comments Employer Below section is for office use only UNIT RESULT Competent

More information

Trailer Tracking: Background Issues. Dan Murray January 8, 2008 ATRI

Trailer Tracking: Background Issues. Dan Murray January 8, 2008 ATRI Trailer Tracking: Background Issues Dan Murray January 8, 2008 ATRI 501(c)(3) charitable research organization Governed by 15 member Board of Directors RAC: Freight Carriers Federal/State Government Labor

More information

Cabotage Rules for Canadian-Based Drivers

Cabotage Rules for Canadian-Based Drivers The following document only paraphrases the regulations on cabotage of the Immigration and Naturalization Service and the U.S Customs Service. The contents may not be relied upon as a substitute for the

More information