Xerox Supplier Security Requirements

Size: px
Start display at page:

Download "Xerox Supplier Security Requirements"

Transcription

1 Xerox Supplier Security Requirements Suppliers who are involved in the manufacture, storage, and transportation of Xerox products ( Suppliers ) for Xerox Corporation and / or its subsidiaries under Xerox Corporation s control (collectively Xerox ) are required, at a minimum, to meet the following Xerox Supplier Security Requirements. 1. Supplier Security Requirements: The Xerox Supplier Security Requirements listed herein need to be present in the security / business processes and practices of Suppliers, as allowed by law, for the manufacture, storage, and transportation of Xerox products to satisfy requirements of the United States Customs-Trade Partnership Against Terrorism (C-TPAT) and the European Union Authorised Economic Operator (AEO) programs that Xerox participates in. a) Suppliers will notify Xerox in writing of C-TPAT, EU AEO or any other certification by foreign customs administrations supply chain security programs. Certification information can be ed to: CorporateSecurity@xerox.com b) Suppliers will notify Xerox in writing within five (5) business days in the event their C-TPAT, EU AEO certification or other certification is suspended, revoked or cancelled. c) Suppliers will include current and future criteria contained in the Xerox Supplier Security Requirements in their security / business process. Xerox Supplier Security Requirements are, in part, based on criteria found in C-TPAT and EU AEO guidelines. Criteria for the C-TPAT program can be found at the following link: d) Suppliers should also take steps designed to incorporate these Xerox Supplier Security Requirements into their agreements with their suppliers who manufacture, load, transit, accept, store, deliver, or otherwise affect the integrity of Xerox shipments e) In order to comply with Importer Security Filing requirements for ocean shipments under U.S. Customs and Border Protection regulations, Supplier will provide full cooperation and support as reasonably requested by Xerox, including without limitation, providing complete and accurate data to Xerox s applicable freight forwarder at least 48 hours prior to loading the shipment aboard a vessel destined for the U.S. Supplier shall indemnify and hold Xerox harmless from any fines, penalties, damages, costs and expenses levied against Xerox due to Supplier s failure to comply with the foregoing. 2. Container and Trailer Security and Inspection: Container and trailer integrity protects against the introduction of unauthorized material and/or persons and to prevent the unauthorized removal of material. At point of stuffing, procedures must be in place to properly inspect, seal and maintain the integrity of the shipping containers and trailers. A high security seal must be affixed to all loaded containers and trailers bound for Xerox that will cross an international border. All seals must meet or exceed the current PAS ISO standards for high security seals. a) Container Inspection: Documented procedures must be in place and followed to verify the physical integrity of the container structure prior to stuffing, to include the reliability of the locking mechanisms of the doors. The following seven-point inspection process must be followed and documented for all containers to ensure that there are no hidden compartments in which unauthorized material could be hidden: 1. Front wall 2. Left side 3. Right side 4. Floor 5. Ceiling/Roof 6. Inside/Outside doors 7. Outside /Undercarriage Xerox Supplier Security Requirements 01/25/2018) Page 1 of 5

2 b) Trailer Inspection: Procedures must be in place to verify the physical integrity of the trailer structure prior to stuffing, to include the reliability of the locking mechanisms of the doors. The following ten-point process must be followed and documented: 1. Fifth wheel area check natural compartment/skid plate 2. Exterior front/sides 3. Rear bumpers/doors 4. Front wall 5. Left side 6. Right side 7. Floor 8. Ceiling/Roof 9. Inside/Outside doors 10. Outside/Undercarriage c) Container and Trailer Seals: Written procedures must stipulate how seals are to be controlled and affixed to loaded containers and trailers, to include procedures for recognizing and reporting compromised seals and/or containers/trailers to Xerox and appropriate local authorities. Only designated Supplier employees should distribute container seals for integrity purposes. d) Removal of Container Seals: Suppliers who are accepting sealed shipments for Xerox must take steps to ensure the integrity of the seal prior removing it from a container/trailer. The seal must be inspected to ensure the number matches the information on the shipping documents. It must also be inspected for signs of tampering or compromise. If evidence of tampering or compromise is found, the container/trailer should not be opened until management and Xerox Corporate Security is notified. d) Container and Trailer Storage: Containers and trailers must be stored in a secure area to prevent unauthorized access and/or manipulation. Procedures must be in place for reporting and neutralizing unauthorized entry into containers/trailers or container storage areas. 3. Conveyance Security: Conveyances are defined as the combined tractor trailer/container. Conveyances must be secured to prevent against the introduction of non-manifested goods being added to them and to prevent unauthorized access to the actual container/trailer while they are under the control of the Supplier. a) Conveyance Security: Procedures must be in place to ensure that conveyances are capable of being effectively secured against the introduction of unauthorized material and persons. b) Conveyance Inspection: Procedures must be in place to ensure that potential places of concealment of illegal goods on conveyances (natural or hidden) are regularly inspected. All internal and external compartments and panels must be secured. c) Tracking and Monitoring of Conveyance: Procedures must be in place to track and accurately monitor activities relating to the movement of conveyances containing Xerox products both within the Supplier s premises and at handover points between the Supplier and external parties. The tracking and monitoring system can be via (a) electronic means (e.g., transponders, smart cards, electronic seals, videos, digital photos, mobile phones, radios and Global Positioning Systems (GPS)) or (b) activity logs, etc. d) Operators Guide: Operators of conveyances must be trained to maintain the security of the conveyances and the cargo at all times and to report any actual or suspicious incident to designated security department staff. Guidelines must be in place to train operators on: (1) Detail route planning for pick up and delivery; (2) Confidentiality of load, route and destination; (3) Policy on keys, parking area, refueling, and unscheduled stops; and (4) Installation and testing of security alarms and tracking devices, if any. e) Storage of Conveyance: Conveyances must be stored in a secure area and/or manner as to prevent unauthorized access and/or tampering. Xerox Supplier Security Requirements 01/25/2018) Page 2 of 5

3 4. Physical Access Controls: Access controls prevent unauthorized entry to facilities, maintain control of Supplier s employees and visitors, and protect company assets. Access control processes must include a method to establish the positive identification of all Supplier employees, visitors, and vendors at all points of entry. a) Supplier Employees: An employee identification system must be in place for positive identification and access control purposes. Supplier employees should only be given access to those areas necessary for the performance of their duties. Company management or security personnel for Supplier must adequately control the issuance and removal of Supplier employee, visitor and vendor identification badges. Procedures for the issuance, removal and changing of access devices (e.g. keys, key cards, etc.) must be documented. b) Visitors: Visitors must present photo identification for documentation purposes upon arrival. All visitors should be escorted and visibly display temporary identification. A visitors log must be retained for at least 30 days. c) Driver Identification: All drivers of inbound or outbound loads must be identified using a government issued photo ID (driver s license) and recorded on a log. d) Deliveries (including mail): Proper vendor ID and/or photo identification must be presented for documentation purposes upon arrival by all vendors. Arriving packages and mail should be periodically screened before being disseminated e) Challenging and Removing Unauthorized Persons: Procedures must be in place to identify, challenge and address unauthorized/unidentified persons. 5. Personnel Security: Processes must be in place to screen prospective employees of Supplier and to periodically check current employees of Supplier, including those set forth below, as permitted by applicable law. The purpose is to verify the prospective employee s identity and that their background and employment experience does not demonstrate unethical or illegal conduct that would affect their performance of assigned duties. In the event a Supplier s contract with Xerox contains additional pre-employment verification, background check and/or drug screening requirements, the Supplier must comply with such requirements as permitted by applicable law and, if such requirements conflict with those contained in these Xerox Supplier Security Requirements, the Supplier s contract with Xerox shall take precedence. a) Pre-Employment Verification: Application information, such as employment history, references, and job performance, must be verified prior to employment. b) Background Checks / Investigations: Consistent with governmental regulations, background checks and investigations should be conducted for prospective employees of Supplier. c) Personnel Termination Procedures: Companies must have procedures in place to remove identification, facility, and system access for terminated employees of Supplier. 6. Procedural Security: Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo in the supply chain. a) Documentation Processing: Procedures must be in place to ensure that all information used in the clearing of merchandise/cargo is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information. Documentation control must include safeguarding computer access and information. b) Manifesting Procedures: To help ensure the integrity of shipments, procedures must be in place to ensure that information required to support the shipping of products to Xerox is provided to Xerox and other entities as required to support the shipment process and is reported accurately and timely. Xerox Supplier Security Requirements 01/25/2018) Page 3 of 5

4 c) Shipping & Receiving: Arriving cargo must be reconciled against information on the cargo manifest. The cargo should be accurately described, and the weights, labels, marks and piece count indicated and verified. Departing cargo should be verified against purchase or delivery orders. Drivers delivering or receiving cargo must be positively identified before cargo is received or released. d) Storage of Xerox Products: Storage of finished Xerox products must be separated by a physical barrier from Xerox products staged on loading docks awaiting shipment. e) Cargo Discrepancies: All shortages, overages, and other significant discrepancies or anomalies must be resolved and/or investigated appropriately. Applicable law enforcement agencies must be notified if illegal or suspicious activities are detected, as appropriate. f) Property Control: Controls must be in place to control the removal of property. g) Losses & Incidents: All losses and other incidents concerning Xerox products must be reported to Xerox Corporate Security (CorporateSecurity@xerox.com) or ) within 1 business day. Supplier must fully investigate losses and other incidents concerning Xerox products under their control. 7. Physical Security: Facilities must have physical barriers and deterrents that guard against unauthorized access. Physical security criteria include: a) Fencing: As practicable, perimeter fencing should enclose the areas around cargo handling and storage facilities. Interior fencing within a cargo handling structure should be used to segregate domestic, international, high value, and hazardous cargo. All fencing must be regularly inspected for integrity and damage. b) Gates and Gate Houses: Gates used to control access through which vehicles and/or personnel enter or exit must be manned and/or monitored. The number of gates should be kept to the minimum necessary for proper access and safety. c) Parking: Private passenger vehicles should be prohibited from parking without authorization in or adjacent to cargo handling and storage area. d) Building Structure: Buildings must be constructed of materials that resist unlawful entry. The integrity of structures must be maintained by periodic inspection and repair. e) Locking Devices and Key Controls: All external and internal windows, gates and fences must be secured with locking devices. Management or security personnel must control the issuance of all locks and keys. f) Lighting: Adequate lighting must be provided inside and outside the facility including the following areas: entrances and exits, cargo handling and storage areas, fence lines and parking areas. g) Alarms Systems & Video Surveillance Cameras: Alarm systems and video surveillance cameras utilized to monitor premises and prevent unauthorized access to cargo handling and storage areas must be functioning and maintained. CCTV images must be maintained for at least 60 days. 8. Security Training and Threat Awareness: A threat awareness program must be in place and maintained to recognize and foster awareness of the threat posed to Xerox products at each point in the supply chain. Supplier s employees must be made aware of the procedures the Supplier has in place to address a situation and how to report it. Additional training should be provided to Supplier employees in the shipping and receiving areas, as well as those receiving and opening mail. a) Specific training should be offered to assist employees in maintaining cargo integrity, recognizing internal conspiracies, and protecting access controls. b) A process for reporting security incidents should be in place and made available to all employees. Xerox Supplier Security Requirements 01/25/2018) Page 4 of 5

5 9. Information Technology Security: a) Password Protection: Automated systems must use individually assigned accounts that require a periodic change of password. IT security policies, procedures and standards must be in place and provided to Supplier s employees in the form of training. b) Accountability: A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data. All system violators must be subject to disciplinary actions for abuse, as permitted by applicable law. 10. Compliance Process: Xerox will assess a Supplier s compliance with these Xerox Supplier Security Requirements through an online self assessment completed by the Supplier and through a physical audit. a) Self Assessments: Suppliers will complete an online security assessment via the Xerox Supplier Security Assessment Tool (XSSAT) that measures compliance with these Xerox Supplier Security Requirements. Follow up online assessments will be required once per year, or more frequently in the event there is a material change to a Supplier s scope of work for Xerox, a significant change in a Supplier s security process, or at the request of Xerox. The survey can be initiated by completing a Self Assessment Initiation Form found at: b) Audit: Suppliers will provide Xerox and any agent of Xerox, access, upon reasonable notice, to their records and facilities in connection with an audit to determine compliance with these Xerox Supplier Security Requirements. c) Non-Compliance with Xerox Supplier Security Requirements: Suppliers shall identify areas of its operations that are found to be in non-compliance based on the online security assessment and / or Xerox audit and promptly develop and implement a plan to correct such non-compliance. 11. Questions: Suppliers should contact Xerox with any questions or requests for exceptions to these Xerox Supplier Security Requirements to Xerox Corporate Security (CorporateSecurity@xerox.com). Any exceptions granted by Xerox to these Xerox Supplier Security Requirements shall be made in writing (including without limitation, or other electronic format) by Xerox Corporate Security. 12. DISCLAIMER: THESE XEROX SUPPLIER SECURITY REQUIREMENTS ARE MINIMUM REQUIREMENTS TO BE A SUPPLIER TO XEROX AND SHALL ONLY BE FOLLOWED AS PERMITTED BY APPLICABLE LAW. XEROX DOES NOT REPRESENT OR WARRANT THAT COMPLYING WITH THESE XEROX SUPPLIER SECURITY REQUIREMENTS WILL BE ADEQUATE TO ADDRESS A SUPPLIER S SECURITY NEEDS. Xerox Supplier Security Requirements 01/25/2018) Page 5 of 5

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Minimum-Security Criteria for C-TPAT Foreign Manufacturers Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Foreign Manufacturer Eligibility Requirements

Foreign Manufacturer Eligibility Requirements Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated

More information

C-TPAT Minimum Security Criteria

C-TPAT Minimum Security Criteria C-TPAT Minimum Security Criteria C-TPAT Security Criteria for Importers Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria.

More information

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following

More information

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,

More information

Importers: C-TPAT Minimum Security Requirements

Importers: C-TPAT Minimum Security Requirements Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested

More information

C-TPAT Partner Application for Importers Instructions

C-TPAT Partner Application for Importers Instructions C-TPAT Partner Application for Importers Instructions Importer for C-TPAT Application Qualifications 1. Active U.S. Importer or Non-Resident Canadian Importer into the United States. 2. Have an business

More information

C-TPAT Minimum Security Requirements Importers

C-TPAT Minimum Security Requirements Importers Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

More information

C-TPAT Security Standards. Importers

C-TPAT Security Standards. Importers C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security

More information

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

TRUSTED TRADER APPLICATION (C-TPAT AND ISA) TRUSTED TRADER APPLICATION (C-TPAT AND ISA) APPLICANT INFORMATION Company Name: Company doing business as: Company Website: Physical Address: City Point of Contact: Phone Number: State/Zip Code Title:

More information

Please complete the questionnaire and fax it to

Please complete the questionnaire and fax it to Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

Air Carrier Eligibility Requirements

Air Carrier Eligibility Requirements Air Carrier Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Air Carrier must the meet the following eligibility requirements: 1. Active Air Carrier transporting cargo shipments to

More information

A Message for Brokers Letter And Security Guidelines for Brokers

A Message for Brokers Letter And Security Guidelines for Brokers A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview avenue STORES, LLC Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority.

More information

Milestone AV Technologies TECHNICAL SPECIFICATION

Milestone AV Technologies TECHNICAL SPECIFICATION Revision: 02 PAGE 1 OF 12 Revision History Date Rev Reason for Change 5/21/2009 00 Initial Release 11/19/2010 01 ECO Number 500003646 Section 3.2.8: Added new F-0218 Container Check List - Chinese form

More information

C-TPAT Security Criteria. Sea Carriers

C-TPAT Security Criteria. Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum security criteria. Where a sea carrier does

More information

C-TPAT Security Questionnaire PASS FAIL 1

C-TPAT Security Questionnaire PASS FAIL 1 Company: Address: City, St. Zip Purpose: ATC has committed to participation in the Customs Trade Partnership Against Terrorism (CTPAT) Program administered by Customs. CTPAT is a supply chain security

More information

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Objective The purpose of this procedure is to ensure that LG Sourcing and its manufacturers and suppliers are in compliance

More information

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008 WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008 As an authorized representative of, I acknowledge receipt of the Wilsons Leather (the "Company") Vendor Guidelines. I have read and understand the Company's

More information

CTPAT Security Requirements for Import Suppliers

CTPAT Security Requirements for Import Suppliers CTPAT Security Requirements for Import Suppliers To Our Import Suppliers: CVS Pharmacy is committed to ensuring supply chain security within a framework consistent with Customs Trade Partnership Against

More information

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements C-TPAT Requirements Dated: July 1 st, 2015 To: Valued Suppliers Re: C-TPAT Security Recommendations and Requirements Recently, our company was accepted by US Customs into the C-TPAT program. This program

More information

Rail Carrier Minimum-Security Criteria

Rail Carrier Minimum-Security Criteria Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing

More information

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action C-TPAT Audit Report Client Supplier Factory AI Service No Auditor Audit Date General Overview of the Audit s findings Clause Theoritical Max Score Actual Score 1. Personal Security 19 2. Physical Security

More information

C-TPAT Expectations for

C-TPAT Expectations for C-TPAT Expectations for Vendors & Manufacturers 2018 Introduction Hobby Lobby is a participant in the voluntary security program known as the Customs-Trade Partnership Against Terrorism (C-TPAT). This

More information

C-TPAT Information for Foreign Manufacturers & Suppliers

C-TPAT Information for Foreign Manufacturers & Suppliers DISTRIBUTION SERVICES DEPARTMENT 1 Barnes & Noble Way, Monroe Township, NJ 08831 (732) 656-7400 C-TPAT Information for Foreign Manufacturers & Suppliers Foreign Manufacturers/Suppliers Recommendations

More information

C-TPAT Questionnaire. Type of Partner

C-TPAT Questionnaire. Type of Partner C-TPAT Questionnaire Business Partner Name Address City State Zip Country Contact Name Contact Title Contact Phone number Contact Email Years in Business Number of Employees Type of Partner Manufacturer

More information

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT) IMPORTER SECURITY RECOMMENDATIONS Develop and implement a sound plan to enhance security procedures throughout your supply chain. Where an importer does not control a facility, conveyance or process subject

More information

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements Milliken and Company CTPAT Security Profile Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements Business Partner Requirements Milliken maintains written processes

More information

Foreign Factory Profile

Foreign Factory Profile All factories manufacturing on behalf of the Company are required to complete this profile. All information is required. PLEASE TYPE IN ENGLISH. Submitted incomplete or with inaccurate information will

More information

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES www.alpiworld.com PHISYCAL SECURITY AND ACCESS CONTROL 1. Physical Security The premises, in which goods are deposited, kept and handled

More information

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers February 2016 I have read this page: Date: Doc C Page 1 Table of Contents Introduction 1. Procedural Security 2. Physical Security 3. Access

More information

C-TPAT Expectations for Agents, Vendors & Manufacturers

C-TPAT Expectations for Agents, Vendors & Manufacturers BEALL s, INC. C-TPAT Expectations for Agents, Vendors & Manufacturers For Distribution to all new and existing Beall s import related Business Partners Last Updated: 1/27/2009 TABLE OF CONTENTS INTRODUCTION.

More information

Supply Chain Questionnaire Business Partners

Supply Chain Questionnaire Business Partners Supply Chain Questionnaire Business Partners IF YOU ARE A C TPAT MEMBER PLEASE SEND US A MONITORING REQUEST PER INSTRUCTIONS BELOW AND COMPLETE THIS PAGE ONLY If C TPAT certified please go to the following

More information

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security

More information

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. (f/k/a The Swiss Colony, Inc.) is a member of the Customs-Trade

More information

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US,

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US, Dear Valued Supplier: Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US, C-TPAT is a voluntary joint government-business initiative to build cooperative relationships

More information

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment) ompany name: (Based on -TPAT SS Best Practice, US ustoms and Border Protection) lause Degree of ompliance 1. PERSONNEL SEURITY 1.1 The company conducts employment screening and interviewing of prospective

More information

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM 1. What is C-TPAT? (a) The C-TPAT (Customs -Trade Partnership Against Terrorism) is a voluntary United States Customs and Border Protection (CBP) business initiative

More information

TRAILER/CONTAINER SECURITY

TRAILER/CONTAINER SECURITY TRAILER/CONTAINER SECURITY All international supply chain business partners, including importers and their vendors, must ensure that procedures are in place to maintain container integrity. Container integrity

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: May 2015 Table of Contents Introduction 3 1. Program administration 3 a. Plan management 3 b. Roles and responsibilities 3 c. Reporting procedures 3 d. Self-assessments

More information

Supply Chain Security Container Inspection and Seal Application

Supply Chain Security Container Inspection and Seal Application Supply Chain Security Container Inspection and Seal Application Supply Chain Security 8/25/2010 1 Supply Chain Security: Container Inspection & Seal Application The attached information has been created

More information

Supply Chain Security Guidelines

Supply Chain Security Guidelines Supply Chain Security Guidelines September 12, 2003 Patrice Knight Vice President, Import Compliance Office International Business Machines Corporation Route 100 Somers, New York 10589 914-766-2318 e-mail:

More information

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense Retail Food Establishment Self-Assessment Checklist for Food Defense Ohio Department of Agriculture Division of Food Safety September 2005 Industry Self-Assessment Checklist for Food Defense On January

More information

AM Retail Group, Inc. C-TPAT EVALUATION

AM Retail Group, Inc. C-TPAT EVALUATION DATE: FACILITY NAME: FACILITY ADDRESS: PRINT NAME OF FACILITY MANAGER/RESPONSIBLE PARTY: --------------------------------------------------------------------------------------------------------------------------------

More information

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES Copy No. Uncontrolled Canadian Grain Commission Process Verification and Accreditation Office Industry Services 900-303 Main Street Winnipeg,

More information

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011 Audit Rating Score Point Value Process & Procedures - Description of Standard Action Measurement Criteria 0 Not present or utilized - No plans to adopt or Not Acceptable: Immediate SCAR implement 1 Generally

More information

Text Slide. Container and Seal Inspection Workshop

Text Slide. Container and Seal Inspection Workshop Text Slide Container and Seal Inspection Workshop 1 Inspection Workshop Intro This inspection workshop is intended to help you recognize containers and seals that have been compromised for the purpose

More information

Pakistan Supply Chain Security (PSCS) Code

Pakistan Supply Chain Security (PSCS) Code Pakistan Supply Chain Security (PSCS) Code 1.0 Introduction Following September 11, 2001 incident, the attention of international community has been focused on security. Supply chain is considered one

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report HANSAE TG CO., LTD Registration Number : A20480-838116 Company : HANSAE TG CO., LTD Date of Verification : 08-Jul-2016 Auditor(s)

More information

ACCO Brands Corporation. Global Social Responsibility Policy

ACCO Brands Corporation. Global Social Responsibility Policy ACCO Brands Corporation Global Social Responsibility Policy ACCO Brands Global Social Responsibility Policy Revision 1 Page 1 of 8 Effective Date: September 1, 2018 Revision History Version Revision Reason

More information

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection Customs Brokers Limited Global Logistics SERVICES OFFERED Customs-Trade Partnership Against Terrorism U.S. Customs and Border Protection Partners In Protection Contact: training@affiliated.ca TRAINING:

More information

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents.

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents. 5. Procedural Security Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling and storage of cargo in the supply chain. Customs and/or

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report Silver Star Garment Limited Registration Number : A11359-485263 Company : Silver Star Garment Limited Date of Verification :

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report IRIS Design Ltd. Registration Number : A22550-107044 Company : IRIS Design Ltd. Date of Verification : 22-May-2016 Auditor(s)

More information

Text Slide. Container and Seal Inspection Workshop

Text Slide. Container and Seal Inspection Workshop Text Slide Container and Inspection Workshop 1 Inspection Workshop Intro This inspection workshop is intended to help you recognize containers and seals that have been compromised for the purpose of smuggling

More information

Integrated Compliance Manual for Vendors and Factories

Integrated Compliance Manual for Vendors and Factories Integrated Compliance Manual for Vendors and Factories Version 1.0 March 2014 Catherines Stores Corporation Lane Bryant Purchasing Corp Maurices Incorporated The Dress Barn, Inc. Tween Brands Service Co.

More information

CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS. ADAPTED FROM United Global Security: The Challenge Ahead

CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS. ADAPTED FROM United Global Security: The Challenge Ahead CONVEYANCE INSPECTION PROCEDURES AND SEALING PROCESS ADAPTED FROM United Global Security: The Challenge Ahead LEARNING OBJECTIVES Systematic 17-point conveyance inspection process Identifying security

More information

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe

Food Defense and Emergency Response Security Guidelines. Keep America's Food Safe Food Defense and Emergency Response Security Guidelines Keep America's Food Safe Note: This text version is provided to ensure accessibility. A fully illustrated, PDF version is also available. The tragic

More information

Integrated Compliance Manual for Vendors and Factories

Integrated Compliance Manual for Vendors and Factories Integrated Compliance Manual for Vendors and Factories Version 4.0 August 2017 Catherines Stores Corporation Lane Bryant Purchasing Corp Maurices Incorporated The Dress Barn, Inc. Tween Brands Service

More information

FACTORY COMPLIANCE. NEW VENDOR MANUAL

FACTORY COMPLIANCE. NEW VENDOR MANUAL FACTORY COMPLIANCE factory.compliance@kohls.com NEW VENDOR MANUAL Vendors Producing Private Label, Exclusive Brand, or where Kohl s is the Importer of Record 2018 1 Table of Content CoC and DI Contact

More information

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report Camino Industrial (Huizhou) Company Limited Registration Number : A5046-142191 Company : Date of Verification : 16-Nov-2016

More information

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland Lloyd s Register Group (1760) Marine,Energy,Transportation Managements Systems (LRQA) Quality, Environment Security of : Supply Chain ISO

More information

DEVELOPING A FOOD DEFENSE PLAN A GUIDE

DEVELOPING A FOOD DEFENSE PLAN A GUIDE DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES EXHIBIT: X BUREAU OF FOOD DISTRIBUTION EFFECTIVE: 407 SOUTH CALHOUN STREET, M-39, 2 ND FLOOR REVISED: September 1, 2012 TALLAHASSEE, FLORIDA 32399-0800 PAGE

More information

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005 Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005 Q: 1.Why is CBP updating the security guidelines for C-TPAT importers? Will other enrollment sectors also be subject

More information

SECTION 1: TRADER INFORMATION

SECTION 1: TRADER INFORMATION QUESTIONNAIRE FOR SUPPLY CHAIN SECURITY PROCEDURES SECTION 1: TRADER INFORMATION Subsection 01 - Member Identification Member Name: Mail Address: (including the post office box number, city, country and

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Assessment Developed in Partnership with: P a g e 2 Introduction Thank you for taking the time to look at your organization s security. It is a critical component

More information

Security Innovations to Adapt to Emerging Threats

Security Innovations to Adapt to Emerging Threats 2013 C-TPAT Conference January 9, 2013 Security Innovations to Adapt to Emerging Threats Barry Brandman President/CEO Danbee Investigations in no va tion noun \ˌi-nə-ˈvā-shən\ Definition: a new idea, method,

More information

CUSTOMS-NOTES. December 13, Important Trade Security Measures

CUSTOMS-NOTES. December 13, Important Trade Security Measures CUSTOMS-NOTES The materials contained in this document have been prepared by the George R. Tuttle Law Offices for informational purposes only. The information contained is general in nature, and may not

More information

IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS

IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS PURPOSE: CONTENTS: IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS The purpose of the XYZ Corporation Foreign Vendor Assessment Program is to objectively evaluate overseas suppliers, identifying areas

More information

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office C-TPAT Best Practices Wayne Kornmann Director, Long Beach C-TPAT Field Office 2 C-TPAT Best Practices Overview What are Best Practices? C-TPAT Best Practice Catalog How Do Importers Achieve Tier 3 Status?

More information

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Ken Konigsmark & Val Parker Global Supplier Conference September 16, 2004 2 Workshop Purpose

More information

Table of Contents. Introduction Features for 2015 Implementation Suggestions C-TPAT Project Plan and Organizer Formatting Instructions

Table of Contents. Introduction Features for 2015 Implementation Suggestions C-TPAT Project Plan and Organizer Formatting Instructions Table of Contents Introduction Features for 2015 Implementation Suggestions C-TPAT Project Plan and Organizer Formatting Instructions I. Internal Policies and Plan Development Internal Policies and Plan

More information

Ground Transportation. Robert Fernandez Vice President, Direct Services, Inc. September 3, 2014

Ground Transportation. Robert Fernandez Vice President, Direct Services, Inc. September 3, 2014 Ground Transportation Robert Fernandez Vice President, Direct Services, Inc. September 3, 2014 Overview Ground Transportation of Live Animals Within the United States Animal requirements Regulations Shipper

More information

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Air Cargo & Air Supply Chain Security : Perspective From Integrators Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected

More information

APPENDIX 4-D PROCEDURES FOR ENTERING VAULT STORAGE AREAS OF SENSITIVE STOCKPILE MATERIALS

APPENDIX 4-D PROCEDURES FOR ENTERING VAULT STORAGE AREAS OF SENSITIVE STOCKPILE MATERIALS 1. General a. The ensuing procedures will be adhered to whenever access is required to high-value, sensitive vault material under the control of the DNSC. These procedures shall be applicable to vaults

More information

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry This guidance document was prepared by the International Dairy Foods Association (IDFA) to help you evaluate the security

More information

FSR List of Changes 2014 v 2017

FSR List of Changes 2014 v 2017 FSR List of Changes 2014 v 2017 2014 Sections / Requirement #s TAPA FSR 2014 TAPA FSR 2017 A B C Requirement 2017 Sections / Requirement #s A B C Description of Change / New Requirement Self audits x x

More information

APPENDICES. Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019

APPENDICES. Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019 APPENDICES Agricultural Calcium Ammonium Nitrate Security Code of Practice JANUARY 2019 TABLE OF CONTENTS SECTION A INBOUND SHIPMENTS... 3 SECTIONS A1 & A2 SECURITY OF INBOUND CAN CARGO... 4 SECTION A3

More information

FACILITY SECURITY PLAN (FSP) REVIEW CHECKLIST

FACILITY SECURITY PLAN (FSP) REVIEW CHECKLIST FACILITY SECURITY PLAN (FSP) REVIEW CHECKLIST Facility ID Number: MISLE Activity Number: Date(s) Conducted: CG Unit: 1 st Reviewer: 2 nd Reviewer: Guidance for completing the Facility Security Plan (FSP)

More information

U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS

U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS U.S. DOT SECURITY PLAN REQUIREMENTS FOR THE TRANSPORTATION OF PETROLEUM PRODUCTS A Compliance Guide for Petroleum Marketers Prepared By: Mark S. Morgan, Esq. Petroleum Marketers Association of America

More information

AEO Safety and Security Guidelines: Freight Forwarder

AEO Safety and Security Guidelines: Freight Forwarder EUROPEAN COMMISSION, DIRECTORATE-GENERAL, TAXATION AND CUSTOMS UNION AEO Safety and Security Guidelines: Freight Forwarder Section I.2.5 Safety and Security Requirements Only Brussels, 29 June 2007 TAXUD/2006/1450

More information

ICC Guidelines for Cross-Border Traders in Goods

ICC Guidelines for Cross-Border Traders in Goods ICC Guidelines Prepared by the ICC Committee on Customs and Trade Regulations ICC Guidelines for Cross-Border Traders in Goods Document No. 103-6/15 21 April 2013 Introduction Trade is facilitated when

More information

TEXAS LOTTERY COMMISSION

TEXAS LOTTERY COMMISSION Internal Audit Services Audit Report of: 17 001 Scratch Ticket Warehouse TEXAS LOTTERY COMMISSION Receiving December 19, 2016 Prepared By: Introduction McConnell & Jones LLP (MJ), serving as the outsourced

More information

Cargo and Mail ( )

Cargo and Mail ( ) Cargo and Mail (11.2.3.9) Persons implementing security controls for cargo and mail other than screening, or having access to identifiable air cargo or identifiable air mail Syllabus A B C D Training objectives

More information

McCain Foods Limited North American Customer Pickup Policy version 1.0

McCain Foods Limited North American Customer Pickup Policy version 1.0 PURPOSE This Customer Pickup Policy ( CPU Policy ) sets forth the requirements which McCain Foods USA, Inc.; McCain Foods (Canada) and its affiliates (collectively, McCain ) requires of those Customers/Distributors

More information

FSR2017 FACILITY SECURITY REQUIREMENTS DRAFT COPY. Transported Asset Protection Association

FSR2017 FACILITY SECURITY REQUIREMENTS DRAFT COPY. Transported Asset Protection Association FSR2017 FACILITY SECURITY REQUIREMENTS FSR Table of Contents 1 Introduction Purpose of this FSR Document...3 Resources to Implement the TAPA FSR...3 Protecting LSP Policies and...3 2 About TAPA TAPA s

More information

SECTION 10. WASTE TIRE FACILITIES and WASTE TIRE HAULERS Standards for Tire Retailers, Wholesalers and Fleet Service Facilities

SECTION 10. WASTE TIRE FACILITIES and WASTE TIRE HAULERS Standards for Tire Retailers, Wholesalers and Fleet Service Facilities SECTION 10 WASTE TIRE FACILITIES and WASTE TIRE HAULERS 10.1 Scope and Applicability 10.2 General Provisions 10.3 Standards for Waste Tire Hauling 10.4 Standards for Tire Retailers, Wholesalers and Fleet

More information

IMPORTING & EXPORTING NEW DEVELOPMENTS IN OCEAN PRICING AND CUSTOMS SUPPLY CHAIN SECURITY By: Andrew M. Danas, Esq. Grove, Jaskiewicz and Cobert, LLP

IMPORTING & EXPORTING NEW DEVELOPMENTS IN OCEAN PRICING AND CUSTOMS SUPPLY CHAIN SECURITY By: Andrew M. Danas, Esq. Grove, Jaskiewicz and Cobert, LLP IMPORTING & EXPORTING NEW DEVELOPMENTS IN OCEAN PRICING AND CUSTOMS SUPPLY CHAIN SECURITY By: Andrew M. Danas, Esq. Grove, Jaskiewicz and Cobert, LLP 2012 Annual Conference Transportation & Logistics Council,

More information

Tandy Leather Factory Supplier Code of Conduct

Tandy Leather Factory Supplier Code of Conduct Tandy Leather Factory Supplier Code of Conduct Tandy Leather is committed to ensuring that working conditions in Tandy s supply chain are safe, that workers are treated with respect and dignity, and that

More information

Appendix 2 Authorized Economic Operators (AEO) Self-assessment questionnaire

Appendix 2 Authorized Economic Operators (AEO) Self-assessment questionnaire Appendix 2 Authorized Economic Operators (AEO) Self-assessment questionnaire Instructions for the authorized economic subjects It is recommended to read the instructions from the European Commission for

More information

NORDSTROM factories are required to perform a seven-point inspection process designed to verify the physical integrity of the container.

NORDSTROM factories are required to perform a seven-point inspection process designed to verify the physical integrity of the container. 1. Container Security Container integrity must be maintained to protect against the introduction of unauthorized material and/or persons. Factory-loaded full containers must have written and verifiable

More information

Supply Chain Security Management Systems The ISO Link

Supply Chain Security Management Systems The ISO Link Supply Chain Security Management Systems The ISO 28000 Link Topics Security threats, risks and vulnerabilities Impact on Business Initiatives in the Region. ISO 28000 Family of Standards Who s got ISO28000

More information

IMPLEMENTING GUIDANCE FOR LICENSEES THAT POSSESS RADIOACTIVE MATERIAL QUANTITIES OF CONCERN

IMPLEMENTING GUIDANCE FOR LICENSEES THAT POSSESS RADIOACTIVE MATERIAL QUANTITIES OF CONCERN IMPLEMENTING GUIDANCE FOR LICENSEES THAT POSSESS RADIOACTIVE MATERIAL QUANTITIES OF CONCERN Access Control The objective is to limit access to radioactive material quantities of concern and devices containing

More information

October Import/Export Policy Supply Chain Security for Imports Standard Operating Procedure (SOP) Page 1 of 22.

October Import/Export Policy Supply Chain Security for Imports Standard Operating Procedure (SOP) Page 1 of 22. Issue Date: Policy Number: October 2012 Import/Export Policy - 41 Guide Name: Supply Chain Security for Imports Standard Operating Procedure (SOP) Last Revision Date: January 31, 2018 Page 1 of 22 TABLE

More information

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc AAPA Terminal and Container Cargo Security Mark Tierney Senior Director Security and Compliance Maersk Inc A.P. Moller is committed to show constant care and to prevent breaches of security associated

More information

DRIVER ADDENDUM TO SERVICES AGREEMENT. Last update: October 20, 2015

DRIVER ADDENDUM TO SERVICES AGREEMENT. Last update: October 20, 2015 DRIVER ADDENDUM TO SERVICES AGREEMENT Last update: October 20, 2015 This Driver Addendum to Services Agreement ( Addendum ) constitutes a legal agreement between an independent company in the business

More information

Supplier International Shipping Instructions

Supplier International Shipping Instructions 1 1.0 Purpose The defines the steps to ensure the timely moving of goods to ABG or Amway location 2.0 Scope The procedure applies to all ABG paid international shipments from a supplier to an ABG or Amway

More information