Supply Chain Services and Solutions
|
|
- Leo Stevenson
- 6 years ago
- Views:
Transcription
1 Supply Chain Services and Solutions BSI Risk Management and Intelligence Approach Emmanuel Herve Copyright 2016 BSI. All rights reserved. 1
2 Objectives Introduction Supply Chain Concerns and Risks Supply Chain Risk Exposure and Evaluation Network (SCREEN) Overview Cargo Theft Supply chain disruptions 2
3 A truly global brand Founded in Regional Hubs 73 Offices 182 Countries 80,000 clients 37,384 standards published Experienced: The world first National Standards body founding member of ISO Thought Leaders: Shaped world s most adopted standards including ISO 9001, ISO 14001, OHSAS Copyright 2015 BSI. All rights reserved.
4 BSI Supply Chain Services and Solutions Intelligence Audit Platform Audit Advisory - QRS Supply Chain Risk Analysis Customizable Assessments 73 offices worldwide Financial Risk Modeling Global Risk Maps Incident Reporting Country Risk Reports Corrective Action Plans Supplier Risk Ratings & Reports Global Supplier Mapping Audit Management Platform Supply Chain Security Quality Corporate Social Responsibility Business Continuity Security Countermeasure Cost Analysis Quantifying Security Spending Over or Under-spending on Security? 4
5 Government Partnerships - INTELLIGENCE For 6 years, BSI Supply Chain Solutions has been the one source used by Department for Homeland Security (DHS), CBP, and AEO for supply chain and cargo risk intelligence BSI provides annual security and threat awareness training to the government as well as specialized reports around specific supply chain incidents and trends Canada CBSA and PIP program uses BSI intelligence to quantify risk and BSI provides supply chain security and exposure training to PIP officers BSI Intelligence is used in over 40 countries by U.S. Customs Attaché officers including 80% of AEO countries (including Japan) UK Freight Crime Police Division data sharing agreement and co-reporting Copyright 2015 BSI. All rights reserved 5
6 TAPA EMEA and BSI Audit Risk Management Platform TAPA Member Company locations seeking certification will be uploaded into the TAPA EMEA audit report tool, provided by BSI TAPA will send a self-certification assessment (FSR C 2014 or TSR ) to Member Companies through the TAPA EMEA audit report tool, provided by BSI TAPA Member Companies will complete the selfcertification assessment and waiver process through the TAPA EMEA audit report tool, provided by BSI Automated management and facilitation of results Tracking of completion progress and macro collation of data will be easier and more streamlined through the TAPA EMEA audit report tool, provided by BSI 6
7 Today s Risks In the Global Supply Chain 7
8 Top Global Supply Chain Concerns 100.0% What Are Your Top Supply Chain Concerns? 68.3% 50.0% 41.4% 56.1% 48.8% 53.7% 36.6% 46.3% 0.0% Social Responsibilities Brand protection including counterfeiting, intellectual property rights & unmanifested cargo Government compliance including C-TPAT, AEO, PIP Supplier risk assessment Business continuity (including natural disasters, labor strikes/port outages) Political Instability Financial risks including cargo thefts, counterfeits, insurance increases as well as transport security costs 2.4% Other (specify) Survey of 310 C-TPAT, PIP or AEO Certified Companies Copyright 2013 BSI. All rights reserved. 8
9 Top Global Supply Chain Concerns Copyright 2013 BSI. All rights reserved. 9
10 Security Compliance Government Compliance to include C-TPAT, PIP and AEO Keeping goods moving efficiently across borders is more important than ever Compliance with government programs is a business necessity, not a nice to have Managing programs are time and manpower intensive Unverified supplier information could lead to loss of government certifications Copyright 2013 BSI. All rights reserved. 10
11 In-Transit Risk Direct result of theft, insurance increases, transport security costs and counterfeit goods entering the global supply chain The weakest point in the supply chain while freight is moving The use of a legitimate supply chain to introduce contraband, people or harmful materials Chain of Custody is very important Know your contractors and subcontractors Copyright 2013 BSI. All rights reserved. 11
12 Brand Protection Increased threats to include counterfeiting, intellectual property rights and corporate social responsibility You must know your supplier s labor practices in today s market Visibility into supplier s environmental practices is important Quality of the facility and products needs to be inspected to ensure there aren t any issues Your suppliers must have processes and security measures in place to protect your IP Exposure in any one of these areas can damage your reputation and your companies brand Copyright 2013 BSI. All rights reserved. 12
13 Business Continuity Man-made supply chain shutdowns as a result of political / labor instability, along with the threat of natural disasters in the region Having complete, up-to-date intelligence on your supplier locations is imperative to mitigate supply chain disruptions Having a back-up plan in case of a natural or man-made disaster is key Knowing if your redundant suppliers are really redundant or just a agents for a single manufacturer is critical Copyright 2013 BSI. All rights reserved. 13
14 Supply Chain Security Risk Management Best Practice Approach Copyright 2016 BSI. All rights reserved. 14
15 LOSSES Reasons to Model Risk We need to spend more Can we spend better? Can we safely spend less? SPENDING 15
16 Avoid the Security Spending Pendulum Reactive Low losses, pull spending High losses, increase spending Reactive Acceptable losses, Efficient security Proactive responses to predictable risks 16
17 BSI s Supply Chain Risk Management Framework Smart Resource Allocation This integrated supply chain risk management solution in delivered in three distinct risk components Probability Vulnerability Impact Risk Index Compliance with TAPA TSR/FSR Standards Company Business Risk Variables i.e- critical commodity, high spend with supplier, high volume of transport Likelihood of supply chain disruption events occurring in your global operations How vulnerable are you to an event happening due to policy/procedural compliance How consequential would the event be to your business if it happened in your supply chain? 17
18 Copyright 2016 BSI. All rights reserved. Probability of Disruption BSI SCREEN Country Risk Intelligence 18
19 SCREEN-Supply Chain Risk Exposure Evaluation Network BSI combines a variety of risk factors, quantifies them, and produces threat ratings for 203 countries Countries are rated on a five-panel scale Low Guarded Elevated High Severe Intelligence is gathered from a wide range of sources: Proprietary incident database Information from auditors around the world In-depth analysis and synthesis of local news sources Information from governments, NGOs, and industry A dedicated team of analysts is constantly updating and refining our intelligence, making sure our risk ratings reflect the situation on the ground 19
20 BSI Country Intelligence BSI Proprietary Geographic Risk Intelligence Components Security Business Continuity Social Responsibility Human Rights Environmental Cargo Disruption Cargo Theft Natural Disaster Exposure Business Impact of Natural Disaster Overall Human Rights Child Labour Overall Environment Air Pollution Hijacking Political Stability Women s Rights CO2 Emissions Illicit Smuggling Social Unrest Discrimination Water Pollution Counterfeiting Economic and Financial Stability Working Conditions Stringency of regulations Supply Chain Terrorism Man-made Disruptionstrikes, labour unrest Freedom of Association/Collective Bargaining Enforcement of Regulations Sea Piracy Civil Liberties Political Rights 20
21 COPYRIGHT BSI
22 Cargo Theft Trends in Malaysia Copyright 2016 BSI. All rights reserved. 22
23 Malaysia Cargo Theft Trends Threat of cargo theft in Malaysia remains, but new data suggest a downward trend Both median and average loss values have seen significant reductions Mirrors trend of overall crime rate, which has dropped by as much as 13 percent, according to Royal Police Law enforcement efforts are helping improve security situation for cargo transporters Includes task forces designed to combat organized criminal groups and vehicle theft (includes cargo and personal vehicles) Country still lacks task forces specifically focused on reducing cargo theft Police in Malaysia recover a stolen cargo truck 23
24 Malaysia Cargo Theft Trends Average and median theft values declined into : $198,600 (median); $234,059 (avg.) 2015: $53,800 (median); $74,389 (avg.) BSI also notes increasing diversity among commonly targeted goods Movement away from electronic goods thefts Base metals, consumer goods, and food and beverage items continue to be targeted Other causes of downward-trending risk include Lower-value commodities being increasingly targeted, suggesting diversification in targeted goods Reduction of Mamak Gang and other organized groups role in Malaysian cargo theft 24
25 Cargo Theft in Malaysia Reduced cargo-related activity by Mamak Gang members likely contributor Multiple deaths and arrests of gang members Remaining Mamak Gang members appear engaged in non-cargo crimes Theft of luxury personal vehicles Bank robberies Some pharmacy robberies No evidence to suggest pharmacy robberies will transition to targeting of pharmaceutical cargo shipments 25
26 Cargo Theft Trends in Indonesia Copyright 2016 BSI. All rights reserved. 26
27 Cargo Theft Trends in Indonesia The risk of cargo theft in Indonesia remains Cargo trucks targeted for most thefts, though warehouses increasingly targeted Hijackings remain a concern, particularly for West Java province Data from past two years show a shift towards a more even distribution among modalities Warehouses targeted in more than 23% of thefts over past two years; BSI rarely recorded warehouse thefts prior to
28 Warehouse Thefts in Indonesia BSI has noted a distinct rise in the number of warehouses being targeted for theft Commodities targeted in warehouse thefts largely mirror overall cargo theft trends in Indonesia Agricultural products and other food items most commonly targeted (36%) Industrial goods also heavily targeted (27%) Warehouse thefts often small in scope and value (avg. loss value is $26,790) 28
29 Cargo Theft Trends in China Copyright 2016 BSI. All rights reserved. 29
30 Moving Truck Thefts in China BSI has recorded a number of thefts from moving trucks throughout China Most prominently in Guangdong Province Known locally as kaitianchuang ( 开天窗 ) open sunroof thefts Soft-sided trailers are targeted more often Hole is usually cut on top rather than opening from the back as seen in other countries Electronics and pharmaceuticals have both been targeted in these thefts 30
31 Cargo Theft in Guangdong Province Guangdong Province is one of the few places BSI sees thefts by highly-organized cargo theft gangs High-risk highways G4 (JingGang Ao) highway between Huadu and Shaoguan north of Guangzhou G45 highway north of Guangzhou More thefts occur during the summer Jurisdictional issues harm investigations 31
32 Copyright 2016 BSI. All rights reserved. Cargo Theft Trends in India 32
33 India Cargo Theft Increasing in Sophistication BSI has recorded a rise in sophisticated cargo theft techniques over the past two years Threat of cargo theft in India is Theft groups targeting shipments after customs seals placed on container, prior to container reaching port Shipments diverted to group-controlled warehouses where paneling is removed Customs seals often left intact, delaying discovery until after shipment reaches customer First instance of a theft from a moving truck in July 33
34 India Cargo Theft Increasing in Sophistication Occurrence has been geographically dispersed New Delhi, Navi Mumbai, and Chennai Supply chain employees integral parts of these criminal groups Multiple high-profile cases of supply chain employee thefts in 2016 Implications for cargo integrity: Incidents underscore gaps in security and tampering detection in India Ability to counterweight consignments exposes capacity for UMC introduction into export shipments Criminals ability to break into shipments without breaking customs seal poses major UMC risk due to seeming legitimacy/verification of shipments Background security checks a must for supply chain employees/contractors 34
35 Terrorism and the Supply Chain Copyright 2016 BSI. All rights reserved. 35
36 Copyright 2016 BSI. All rights reserved. 36
37 Terrorist Extortion of the Supply Chain Leading groups for supply chain terrorism attacks are also most likely to extort or exploit the supply chain Groups often perpetrate attacks to threaten or intimidate businesses into paying extortion fees Extortion can increase as revenue from other sources declines ISIS tax on trucks reached as high as $4,000 per vehicle in 2015, up from $200 in 2014 Revenue from the extortion of local businesses is a major financing source for terrorist groups Other supply chain concerns Contraband introductions Smuggling for supplies, revenue February 2016 case in Spain Hijacking and cargo theft Group FARC New People s Army ISIS PKK MEND AQAP Communist Party of India - Maoist Leading Supply Chain Terrorism Groups Often Exploit the Supply Chain Supply Chain Exploitation Tactic Extortion, Kidnapping, Illegal taxes, Drug smuggling Extortion Extortion, Kidnapping, Illegal taxes Extortion, Hijacking, Drug smuggling Kidnapping Explosives introduction, Oil smuggling Kidnapping, Cargo Theft Supply Chain Terrorism Attacks ( ) 37
38 Increasing Terrorism Risk to Commercial Supply Chains Terrorists targeted a wider range of industries and cargo transport modalities in 2015 than any other recent year Increased targeting of industries associated with private/corporate supply chains rather than stateowned infrastructure since 2013 Agriculture/food and beverage attacks more than tripled Attacks on industrial/manufacturing materials and pharmaceuticals more than doubled, metals nearly doubled Portion of fossil fuels targeted dropped from 75% to 51% Decline in previous hotspots for targeting of government supply chain One cargo truck attack in Afghanistan in 2015 compared to average of nearly four annually over past decade Leading Industries and Modalities Targeted for Supply Chain Terrorism Attacks ( ) Fossil Fuels/Minerals Agriculture/Food and Beverage Industrial/Manufacturing Materials Base Metals Pharmaceuticals/Chemical Pipeline Production/Processing Facility Truck Storage Facility Worker 38
39 Increased Terrorist Targeting of the Supply Chain Supply chain terrorism activity increased by virtually every metric in Proportion of supply chain terrorism attacks grew 16% from 2014 Geographic distribution increased 38% to a record of 33 countries Top 10 countries for supply chain terrorism exported $664 billion $96 billion exported to the United States Highlights significant volume of international trade at risk of disruption by terrorist groups 39
40 Asia Factory Labor Unrest Copyright 2016 BSI. All rights reserved. 40
41 Labor Unrest in China Q Update Factory Strikes in China by Grievance Average Major protest in Dongguan in late May highlighted increasing concern of protests over factory closures and relocations Portion of relocation-related factory strikes in China has increased significantly over the past year Absolute number of strikes over relocation issues has also risen dramatically Protest numbers likely to continue rising as operational costs in China escalate Relocation Wage Arrears Factory Strikes in China by Grievance 2016 (YTD) Other Grievance Relocation Wage Arrears Other Grievance Copyright 2016 BSI. All rights reserved. 41
42 Copyright 2016 BSI. All rights reserved. Factory Unrest in Asia Other countries in Asia have witnessed protests over grievances seen in China Timely payment of wages, factory closures, and contract employment vs. physical working conditions, higher pay Most demonstrations in the garment manufacturing industry Cambodia Recent protests over factory closures Industry representatives blame closures on rising operational costs, especially increasing wage rates Bangladesh Officials identified nearly 360 factories vulnerable to protests over wage non-payment, holiday bonuses Likely an increasing concern as factory investment continues rising in these areas 35% 30% 25% 20% 15% 10% 5% 0% -5% -10% -15% Growth in FDI and Wages in Cambodia Foreign Direct Investment Growth Minimum Wage Growth 42
43 Copyright 2016 BSI. All rights reserved. Vulnerability and Compliance Infusion of Probability with TAPA standards 43
44 Strategic Program Design with Operational Program Toolbox An integrated approach to managing organizational risk, adhering to compliance objectives & instilling knowledge Social Responsibility Environment Supply Chain Corruption Political Stability Cargo Theft Counterfeiting Supply Chain Terrorism Natural Disaster Exposure Legal Compliance Ethical Trading Hijacking Illicit Smuggling TAPA FSR/TSR Standards Logistics Security Site Security Physical Access Controls Personnel Security IT Security Questions are weighted Business Impact Variables Business Specific Components Volume of Throughput Criticality of Commodity Security countermeasure spend % of site production on site Probability Vulnerability Impact Risk Index 44
45 Risk-Based Results Lead to Smart Audit Strategy Continuous Improvement Financial spend 45
46 Contact Information Emmanuel Herve BSI Supply Chain Services and Solutions 46
Customs Trade Partnership Against Terrorism An Introduction
Customs Trade Partnership Against Terrorism An Introduction WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel It s a challenging
More informationCreating a Secure Supply Chain
Creating a Secure Supply Chain Sponsored by: On behalf of: Conducted by: Background For many manufacturers and distributors, the supply chain is the cornerstone to their business operations. It serves
More informationSecurity Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006
Security Management How do we implement the Regulations? Marc Volders - MAY 31, 2006 Theme Security in the supply chain How do we as a logistics service provider need to prepare ourselves as well as our
More informationSupply Chain Security IGTLC
Supply Chain Security IGTLC CONVERGENCE: CARGO-CYBER CRIME Mix of Physical and Cyber Tactics to Set-up Fraudulent Pick-ups Phone spoofing Criminals calling airlines to gather intelligence on freight arrival
More informationTCO INVOLVEMENT IN NON-DRUG CRIME
UNCLASSIFIED//FOUO OF TCO INVOLVEMENT IN NON-DRUG CRIME Group Members: Eliasz Krawczuk Crumpton Group, LLC Emily Woodard Fiat Chrysler Automobiles Erin M. DHS Kevin P. DHS Mariko Kawaguchi Element Case,
More information10 REASONS WHY YOU SHOULD INVEST IN RESILIENCY
10 REASONS WHY YOU SHOULD INVEST IN RESILIENCY 10 Reasons Why You Should Invest in Resiliency 1 Prevent Cargo and Inventory Loss Know where to invest in risk mitigation 6 Avoid Lost Sales Leverage network
More informationSpecial Focus On Transportation and Cargo Friday, June 15, 2007
1 of 6 6/15/2007 3:11 PM Special Focus On Transportation and Cargo Friday, June 15, 2007 Assessing Cargo Supply Risk By Dan Purtell and James B. Rice, Jr. A study of supply line risk in 45 countries finds
More information3.5 Advanced Inspection Technologies (AIT)
3.5 Advanced Inspection Technologies (AIT) Before inspection technologies can be further discussed, a baseline definition must be established for the three types of inspections that are commonly used when
More informationCorporate Risk Management Services. Pinkerton is a leading provider of risk management services and solutions for organizations around the globe.
Corporate Risk Management Pinkerton is a leading provider of risk management services and solutions for organizations around the globe. New threats arise every day. Is your business fully protected? Manage
More informationProactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment
Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and
More informationForeign Manufacturer Eligibility Requirements
Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated
More informationSecure container transport: challenges & barriers in the complete stakeholder chain
Secure container transport: challenges & barriers in the complete stakeholder chain Theodoros Theodoropoulos (SEAbility Ltd) 1 st Training Workshop 19 November 2014, Valencia, Spain Overview Introduction
More informationGlobal Supply Chain Redesign
INTEGRATED Global Supply SUPPLY Chain CHAIN NETWORKS Management Global Supply Chain Redesign N. Viswanadham Computer Science and Automation Indian Institute of Science Bangalore- 560012 n.viswanadham@gmail.com
More informationMinimum-Security Criteria for C-TPAT Foreign Manufacturers
Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security
More informationSecure Trade Partnership: Singapore s Authorized Economic Operator Programme
2010/SOM3/CTI/WKSP/014 Secure Trade Partnership: Singapore s Authorized Economic Operator Programme Submitted by: Singapore Ease of Doing Business Workshop on Trading Across Borders Sendai, Japan 18-19
More informationBuilding A Holistic and Risk-Based Insider Threat Program
Building A Holistic and Risk-Based Insider Threat Program An Approach to Preventing, Detecting and Responding to Insider Threats Michael G. Gelles, Psy.D March 2015 Insider Threat Types & Drivers Insider
More informationCustoms and the use of technology to secure global supply chain
Customs and the use of technology to secure global supply chain European Commission Directorate General for Wil van Heeswijk Unit B2 Risk management and Security 1 Facts & Figures 119.000 control officers
More informationBeyond Cost Reduction
Beyond Cost Reduction Measuring How Procurement Creates Business Value By Alex Brown, Kyle Appell and Meghan Truchan Over the past decade, successful businesses have proactively developed strategies that
More informationAir Cargo & Air Supply Chain Security : Perspective From Integrators
Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected
More informationThe online counterfeit economy: consumer electronics
The online counterfeit economy: consumer electronics The digital world is filled with various ways for counterfeiters to attack your brand and turn a profit for themselves, all while under the cloak of
More informationSEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE
SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance
More informationICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION
ICAO WCO JOINT WORKSHOP AIR CARGO SECURITY AND FACILITATION 1 MODULE 7 RISK MANAGEMENT MODELS 2 Module Objective Present Risk Management models used by ICAO and WCO 3 DEFINITIONS 4 Threat ICAO The probability
More informationTo effectively manage risks to supply chain performance, a public health supply chain manager should understand the following: THE LOGISTICS CYCLE
12 12 CHAPTER 12 SUPPLY CHAIN RISK MANAGEMENT FIGURE 11-1. THE LOGISTICS CYCLE Serving Customers WHAT A SUPPLY CHAIN MANAGER NEEDS TO KNOW: As detailed in this handbook, making health commodities available
More informationLocking Down the Supply Chain
Locking Down the Supply Chain September 14, 2016 Orlando, Florida ASIS Supply Chain & Transportation Security Council SCSC Laura Hains Vicki Nichols Dennis Blass Locking Down the Supply Chain What s New!
More informationIoT Business Brief Industrial Manufacturing Business
IoT Brief Industrial Manufacturing picture: shutterstock.com/de POWERING THE SMART FACTORY To secure a smarter future for manufacturing, the disconnects between OT and IT must be bridged. Selecting the
More informationFood Defense: Background and Global Importance
Food Defense: Background and Global Importance Protecting the Food Supply Food Safety the efforts to prevent accidental (unintentional) contamination of food products Food Defense the efforts to prevent
More informationC-TPAT Minimum Security Requirements Importers
Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com
More informationUsing Standards to Cost- Effectively Manage Risk
Using Standards to Cost- Effectively Manage Risk Georgia Logistics Summit Atlanta, Georgia May 2011 Steve O Malley - ISO Ship & Supply Chain Security Standards Coordinator Motivators* Fear Guilt Government
More informationBarriers to Global Maritime Trade
to Global Maritime Business Perspectives on and Frictions in the Pacific Rim University of Southern California Marshall School of Business Busan, Korea November 15, 2005 Exponential growth initiates potential
More informationISO INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO 28001 First edition 2007-10-15 Security management systems for the supply chain Best practices for implementing supply chain security, assessments and plans Requirements and
More informationPSAA - PUBLIC SERVICE & ADMIN
PSAA - Public Service & Admin 1 PSAA - PUBLIC SERVICE & ADMIN PSAA 601 Foundations of Public Service Different perspectives on management and leadership in public service; provides overview of how public
More informationCARGO THEFT AND SMUGGLING
CARGO THEFT AND SMUGGLING Zhongcheng SUN 1 and Hong Yan 2 1. Port Captain, Fleet Management Department, Orient Overseas Container Line Limited 2. Department of Logistics and Maritime Studies, The Hong
More informationFILLING THE GAPS IN YOUR SUPPLY CHAIN AN IOT APPROACH
FILLING THE GAPS IN YOUR SUPPLY CHAIN T O TA L S U P P LY C H A I N V I S I B I L I T Y : AN IOT APPROACH J U N E 2 0 17 End-to-end visibility into your supply chain is more important now than ever before,
More informationImporting to the U.S.: Key requirements you need to be aware of
Importing to the U.S.: Key requirements you need to be aware of Eight areas of the importing process you should familiarize yourself with before you ship your goods to the U.S. If you re new to international
More informationPHARMACEUTICALS. Forensic Services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY
PHARMACEUTICALS Forensic Services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY 1 Helping to protect your business from fraud, misconduct and non-compliance Introduction
More informationSTATE OF THE ASIA-PACIFIC PHARMACEUTICAL INDUSTRY 2013: EXECUTIVE SUMMARY
STATE OF THE ASIA-PACIFIC PHARMACEUTICAL INDUSTRY 2013: EXECUTIVE SUMMARY State of the Asia-Pacific Pharmaceutical Industry The pharmaceutical industry in the Asia-Pacific region has recently been besieged
More informationLow Cost Country Sourcing. A Canadian Pharmaceutical Perspective
Low Cost Country Sourcing A Canadian Pharmaceutical Perspective Low Cost Country Sourcing: A Canadian Pharmaceutical Perspective This publication is also available electronically on the World Wide Web
More informationSecuring Intel s External Online Presence
IT@Intel White Paper Intel IT IT Best Practices Information Security May 2011 Securing Intel s External Online Presence Executive Overview Overall, the Intel Secure External Presence program has effectively
More informationNon-Asset Based. Multi-Modal. Diverse Commodities.
more operationally efficient by streamlining processes and implementing technology to increase their productivity, thereby, allowing the agents to focus on business development and delivering outstanding
More informationApple Supplier Code of Conduct
Apple Supplier Code of Conduct Apple is committed to the highest standards of social and environmental responsibility and ethical conduct. Apple s suppliers are required to provide safe working conditions,
More informationNorth America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure
North America s SuperCorridor Coalition, Inc. Tri-national, non-profit, multi-modal trade and transportation coalition for the efficient and secure movement of freight NASCO s Mission & Purpose Mission:
More informationSecurity Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs
Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following
More informationwww.savinodelbene.com! THE COMPANY Savino Del Bene, whose name is homonymous of its founder, started up in Florence, Italy at the beginning of the 1900 s. The company s early focus was to develop freight
More informationC-TPAT Security Standards. Importers
C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security
More information2008 BUSINESS RESILIENCY SURVEY RESULTS:
ijet/wp0010-06 2008 BUSINESS RESILIENCY SURVEY RESULTS: An Insider's Look at the Current State of Risk Management, Continuity and Resiliency in Multinational Organizations July 2008 ABOUT THE RESEARCH
More informationGlobalization of crime
Globalization of crime Environmental resources Jakarta, 23/06/2010 Globalization of crime: chapter 7 Wildlife from Africa and South-East Asia to Asia Timber from South-East Asia to the European Union and
More informationSafety & Security. Introduction. Chemical transportation. Chemical transportation risk management. Resources. Chemical Transportation
Introduction Chemical Transportation Safety & Security Chemical transportation Safety risks Security risks Chemical transportation risk management SAND No. 2011-0547C Sandia is a multi-program laboratory
More informationAnti-Slavery & Human Trafficking Report
PHOENIX Group UK Anti-Slavery & Human Trafficking Report Who we are The PHOENIX Pan European Group is one of the leading pharmaceutical distribution companies in Europe employing approximately 34,000 people.
More informationC-TPAT Expectations for Agents, Vendors & Manufacturers
BEALL s, INC. C-TPAT Expectations for Agents, Vendors & Manufacturers For Distribution to all new and existing Beall s import related Business Partners Last Updated: 1/27/2009 TABLE OF CONTENTS INTRODUCTION.
More informationSecuring Global Transportation Networks: A Total Security Management Approach
1 of 5 3/4/2007 9:10 AM Securing Global Transportation Networks: A Total Security Management Approach Posted: February 1, 2007 With the dangers of disruption so real, the best precaution is to defend the
More informationFrequently Asked Questions About LS&Co. Global Sourcing Practices
Frequently Asked Questions About LS&Co. Global Sourcing Practices 1. How many factories do you own? How many suppliers do you outsource to or contract with? 2. When did you release the names of your suppliers?
More informationImporters: C-TPAT Minimum Security Requirements
Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested
More informationThe State of Fraud in Government
Public and private organizations employ tools and applications for data analysis and predictive analytics to battle both the rising incidence of fraud and improper payments and the increasing cost of detecting
More informationIT/BPO. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in
IT/BPO Forensic services Helping to protect your business from fraud, misconduct and non-compliance ADVISORY kpmg.com/in IT and ITeS companies face acute price competition, high attrition rates, consolidations
More informationTHE UNDERESTIMATED VALUE OF
THE UNDERESTIMATED VALUE OF DOCK SCHEDULING Beneath the automated schedules, communications features, and web portals lies a hidden feature that will transform your business. WHITE PAPER By Gregory Braun,
More informationANTI-MONEY LAUNDERING: GET CLUED BEFORE IT'S LATE NEED FOR SOLUTIONS TO EVOLVE TO KEEP FINANCIAL CRIME AT BAY
WWW.WIPRO.COM ANTI-MONEY LAUNDERING: GET CLUED BEFORE IT'S LATE NEED FOR SOLUTIONS TO EVOLVE TO KEEP FINANCIAL CRIME AT BAY Sriram Kannan, Practice Partner - CXO Services, Wipro Analytics Table of Contents
More informationDISRUPTIVE OPPORTUNITIES
CHALLENGING TIMES, DISRUPTIVE OPPORTUNITIES The Indian logistics industry is rife with fragmentation, inefficiencies and hence, the opportunities for disruption. Inferior management practices, a high level
More informationGOVERNMENT SECURITY SOLUTIONS SECURE MARKING, AUTHENTICATION, TRACKING AND TRACING TO ASSIST CUSTOMS. Christophe Renard. WCO IT Conference Brisbane
GOVERNMENT SECURITY SOLUTIONS SECURE MARKING, AUTHENTICATION, TRACKING AND TRACING TO ASSIST CUSTOMS Christophe Renard WCO IT Conference Brisbane May 2014 SICPA Security Solutions May 2014 - n 2 CASE STUDIES
More informationTRANSPORTATION MANHATTAN ACTIVE. A Comprehensive Solution for Complex Logistics Networks. With Manhattan Active Transportation you can:
MANHATTAN ACTIVE TRANSPORTATION A Comprehensive Solution for Complex Logistics Networks LOGISTICS COMPLEXITIES AND SERVICE-LEVEL EXPECTATIONS have increased dramatically in today s world. Supply chains
More informationPlease complete the questionnaire and fax it to
Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One
More informationISO Revisions. ISO 9001 Whitepaper. The importance of risk in quality management. Approaching change
ISO Revisions ISO 9001 Whitepaper The importance of risk in quality management Approaching change Background and overview to the ISO 9001:2015 revision As an International Standard, ISO 9001 is subject
More informationWorkplace Violence. Workplace Violence. Work Safe: Preventing Injuries and Workplace Violence. Gene R. La Suer Davis Brown Law Firm
Work Safe: Preventing Injuries and Gene R. La Suer Davis Brown Law Firm What is workplace violence? Workplace violence is any act or threat of physical violence, harassment, intimidation, or other threatening
More informationRisk Advisory Services Developing your organisation s governance for competitive advantage
Advisory Services Developing your organisation s governance for competitive advantage The Deloitte Advisory Platform of Services can help you to govern your strategic plan to guide your operations measure
More informationHOW TO DO BUSINESS WITH Lockheed Martin. Copyright 2015, Lockheed Martin Corporation. All rights reserved 0000.PPT 1/5/2016 1
HOW TO DO BUSINESS WITH Lockheed Martin Copyright 2015, Lockheed Martin Corporation. All rights reserved 0000.PPT 1/5/2016 1 Vision Lockheed Martin is the Leading Aerospace and Global Security Company,
More informationTrade Transformation. CBP Initiatives for 21 st Century Trade. September 2012
Trade Transformation CBP Initiatives for 21 st Century Trade September 2012 1 Evolving our Mission 2 A Day at the U.S. Border CBP protects more than: 5,000 miles of border with Canada 1,900 miles of border
More informationFAQ. From: Christine Curtis Director of Security GOM. REF: Request to Clarify Contactor Background Screen. Date: October 31, 2014
FAQ From: Christine Curtis Director of Security GOM REF: Request to Clarify Contactor Background Screen Date: October 31, 2014 What is the reason/objective for this request? The BP Background Screening
More informationLeveraging Risk Assessments to Raise Funding for Your Security Program
Leveraging Risk Assessments to Raise Funding for Your Security Program Shawn Reilly, CPP, PSP, CHPA, CPD 1 Sources of Information ASIS Facilities Physical Security Measures Guideline Design and Evaluation
More informationGlobal Security Verification Report
Measured Performance - Improved Security Global Security Verification Report Camino Industrial (Huizhou) Company Limited Registration Number : A5046-142191 Company : Date of Verification : 16-Nov-2016
More informationEffective implementation of COSO s new anti-fraud guidance
Effective implementation of COSO s new anti-fraud guidance In September 2016, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) published a new Fraud Risk Management Guide (Anti-fraud
More informationDEPUTY CHIEF OF POLICE RECRUITMENT PACKAGE
The Bradford West Gwillimbury and the Town of Innisfil Police Services Board DEPUTY CHIEF OF POLICE RECRUITMENT PACKAGE TABLE OF CONTENTS Description Page No. Letter from the Chief of Police Designate
More informationCBTC(Customs Border Targeting Center) Korea Customs Service
CBTC(Customs Border Targeting Center) Korea Customs Service RISK If there is a risk of something unpleasant, there is a possibility that it will happen Risk = Threat +Vulnerabilities +Consequence
More informationHow to Source Successfully from China
How to Source Successfully from China Evaluating suppliers Negotiating Managing production and QC Protecting your IP www.globalsources.com/mobileelectronics How to Source Successfully from China From supplier
More informationIntuit Supplier Code of Conduct
Intuit Supplier Code of Conduct At Intuit we simplify the business of life. We invent solutions to important problems. We innovate. This is what we strive for every day, and we truly value the role our
More information2018 AI Global Sourcing Survey
2018 AI Global Sourcing Survey This 2018 edition of the AI Global Sourcing Survey was conducted in December 2017 by AsiaInspection, a leading quality control and compliance provider. It analyzes sourcing,
More informationLabeling Best Practice in a Challenging Manufacturing Landscape A survival guide for pharmaceutical companies
Labeling Best Practice in a Challenging Manufacturing Landscape A survival guide for pharmaceutical companies White Paper www.nicelabel.com/pharma 1 1 Executive summary The number of challenges for the
More informationProposal for Improving the Business Environment in Lao PDR - Based on a JETRO survey on business needs -
Proposal for Improving the Business Environment in Lao PDR - Based on a JETRO survey on business needs - July 4, 2015 Japan External Trade Organization (JETRO) Promote Good Connectivity with Neighboring
More informationHIJACKING HAVENS The Challenges of Transporting Goods in Mexico and Brazil
David A. Jones, CPP, CFI VP Global Security Lead Supply Chain HIJACKING HAVENS The Challenges of Transporting Goods in Mexico and Brazil September 9, 2015 Agenda Hijacking Risk Levels National Statistics
More informationCombating illegal logging
Combating illegal logging Lessons from the EU FLEGT Action Plan A summary In this summary of the publication Lessons from the EU FLEGT Action Plan, we look at the Action Plan s impact in the 10 years since
More informationIBM QRadar SIEM. Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights
IBM Security Data Sheet IBM QRadar SIEM Detect threats with IBM QRadar Security Information and Event Management (SIEM) Highlights Use IBM QRadar Security Information and Event Management, powered by the
More informationIoT Business Brief Energy & Oil Business DRIVING SOCIETY FORWARD
IoT Brief Energy & Oil picture: shutterstock.com/de DRIVING SOCIETY FORWARD Power and transport keep the world moving. With the right infrastructure platform, IoT can enable greater speed and efficiency
More informationOptimized for Growth:
The Fifth Annual Change in the (Supply) Chain Survey Optimized for Growth: High-Tech Executives Adapt to Meet Global Demands INTRODUCTION Optimized for Growth: High-Tech Executives Adapt to Meet Global
More informationOptimised for Growth:
The Fifth Annual Change in the (Supply) Chain Survey REGIONAL SUMMARY: ASIA PACIFIC Optimised for Growth: High-Tech Executives Adapt to Meet Global Demands INTRODUCTION Optimised for Growth: High-Tech
More informationBEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT Schweitzer Engineering Laboratories, Inc. Delivering Quality Products by Managing Supply Chain Risk INTERVIEWS Senior Management from Quality; Manufacturing;
More informationFERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST
SHIP SECURITY ASSESSMENT AUDIT CHECKLIST SHIP SECURITY ASSESSMENT AUDIT CHECKLIST 1. A Ship Security Assessment (SSA) is a process that identifies weaknesses in physical structures, personnel protection
More informationSupplier Oversight PQRI. September Steven Lynn, MS, CMQ/OE Vice President Global Quality Compliance Mylan
Supplier Oversight September 2014 PQRI Steven Lynn, MS, CMQ/OE Vice President Global Quality Compliance Mylan Agenda Mylan Background Setting the Stage with a Scenario Current State Thinking Supplier Qualification
More informationLogistics and ICT 4.0 / Digitalization
January 2017 White Paper Logistics and ICT 4.0 / Digitalization Introduction The last decades transportation, supply chain management, warehousing are more and more depending on software. Efficiency has
More informationTop 5 US Export and Import Commodities
WWW.IBISWORLD.COM Special Report Month 2012 1 Follow on head on Master page A Special Report July 2012 Top 5 US Export and Import Commodities By Josh McBee and Justin Waterman Dominated by oil, cars and
More informationIntroduction to Yangshan Bonded Pore Area and Yangshan Customs
Introduction to Yangshan Bonded Pore Area and Yangshan Customs Yangshan Customs May 2011 The 1st bonded port area approved by the State Council in this country Started operations on Dec. 10, 2005. And
More informationC-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)
C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,
More informationDiversified Services. Our Diversified Services include:
Diversified Services GRC s innovative approach to risk management entails consistent development of new services to better serve our clients. By continuously striving to meet our clients' needs, GRC's
More informationEuropean Road Freight Transport 2017 Sample
European Road Freight Transport 2017 Sample CONTENTS Introduction 6 1 European Road Freight Market Fundamentals 7 1.1 KEY FINDINGS 7 1.2 MARKET STRUCTURE 8 1.3 EUROPEAN ROAD FREIGHT SUPPLY SIDE ISSUES
More informationSports League Fights Sophisticated Criminals with a Combination of Online Intelligence and Rogue Website Litigation
Sports League Fights Sophisticated Criminals with a Combination of Online Intelligence and Rogue Website Litigation Industry: Sports League Solution: MarkMonitor Brand Protection MarkMonitor Professional
More informationAEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan
AEO program (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation while the international
More informationInternational and Transorganizational Information Flow of Tracking Data
International and Transorganizational Information Flow of Tracking Data JOUNI VIITANEN, MARKUS HAPPONEN, PASI PATAMA & JYRI RAJAMÄKI Laurea Leppävaara Laurea University of Applied Sciences Vanha maantie
More informationSecurity intelligence for service providers
Security Thought Leadership White Paper July 2015 Security intelligence for service providers Expanded capabilities for IBM Security QRadar including multi-tenancy, unified management and SaaS 2 Security
More informationSUPPLIER CODE OF CONDUCT
SUPPLIER CODE OF CONDUCT FOREWORD AND SUPPLIER CERTIFICATION CTS Corporation ( CTS ), founded in 1896, has built its reputation by producing quality products as well as by adhering to the highest ethical,
More informationPREVENTING FRAUD. Take-and-Use Guidelines for Chubb Crime Insurance Customers
PREVENTING FRAUD Take-and-Use Guidelines for Chubb Crime Insurance Customers PREVENTING FRAUD Take-and-Use Guidelines For Chubb Crime Insurance Customers Prepared for The Chubb Group of Insurance Companies
More informationOnline brand protection: further down the rabbit hole we go
Contributing firm Online brand protection: further down the rabbit hole we go Author Stephen Ward Online brand enforcement sounds like a strong term, but what does it really mean? How do you know when
More informationStrengthening Forest Law Enforcement and Governance (FLEG) Presentation to the PROFISH Steering Committee, May 17, 2007 Tapani Oksanen,, WB FLEG TTL
Strengthening Forest Law Enforcement and Governance (FLEG) Presentation to the PROFISH Steering Committee, May 17, 2007 Tapani Oksanen,, WB FLEG TTL Scope of Forest Crime US$10 billion annual losses in
More informationInformation Systems and Organizations
1.4.2 ICT Supply Chain Risk ICT supply chain risks include insertion of counterfeits, unauthorized production, tampering, theft, insertion of malicious software and hardware (e.g., GPS tracking devices,
More information