Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

Size: px
Start display at page:

Download "Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements"

Transcription

1 Milliken and Company CTPAT Security Profile Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

2 Business Partner Requirements Milliken maintains written processes for the selection of business partners. As part of this process, a business partner's CTPAT status is determined by means of their SVI or CTPAT certificate. The vast majority of Milliken s logistics service providers have current CTPAT certifications. For those partners who have submitted an SVI as proof of their participation, their SVI has been entered into the CTPAT portal for validation and is updated annually. For those business partners who are not eligible for CTPAT or who have chosen not to join CTPAT, their security level is assessed by means of a security questionnaire administered via the internet. A copy of this questionnaire is available at The information provided in the questionnaire is then used to assess the security risks of partners without current CTPAT certification. Milliken s purchasing department is responsible for collecting and reviewing applications by material suppliers, and Milliken s logistics department is responsible for reviewing logistics providers. For those partners who have submitted an SVI as proof of their participation, their SVI has been entered into the CTPAT portal for validation and is checked annually. For the partners who have submitted a copy of their certificate as validation, Milliken maintains a copy of the certificate on file. Milliken will assess the risks associated with our import supply chains in order to insure their security. This process is based on the 5 Step Risk Assessment Process recommended by CBP. The risk assessment process is owned by the Logistics & Trade Compliance department working in conjunction with Purchasing, Supply Chain Management and other affected functional areas. A risk assessment will be conducted on all major import supply chains upon initiation of business or at the discretion of the Trade Compliance team based on changes in the supply chain or on their knowledge of the current security situation. Cargo flows will be mapped from origin to domestic distribution point using the CTPAT Cargo Flow / Business Partner Analysis template. The threat assessment will be completed by the Logistics & Trade Compliance team using the CTPAT Threat Assessment template. The available sources include those listed in Attachment B of the CTPAT 5 Step Risk Assessment Process Guide published at plus other resources as determined by Milliken associates. The level of threat will be evaluated as follows: 1. Low Risk - No recent incidents/intelligence/information 2. Medium Risk - No recent incidents/some intelligence/information on possible activity

3 3. High Risk - Recent incidents and intelligence/information The vulnerability assessment will be done by verifying the partner s participation in CTPAT for those partners are eligible or by completing Milliken s security questionnaire for those partners who can t or have chosen not to participate in CTPAT. More details can be found in the Milliken s Business Partner Requirements section. Upon completion of the aforementioned assessments, the CTPAT Risk Assessment Action Plan will be used to document findings and actions to address deficiencies. Milliken's Logistics Department or Purchasing Department is responsible for ensuring that partners take appropriate actions to address problems. Security Procedure, Point of Origin Milliken has developed its "supplier portal" which is used to communicate via the internet security information and CTPAT criteria with our business partners. The URL for the portal is Milliken has also developed its "CTPAT Shipping Security Guidelines" which provide specific information on how business partners are expected to ship materials to Milliken. A copy of these guidelines can be found in the CTPAT Partner Document Exchange section of this portal. These guidelines have been incorporated into the supplier portal. Security Procedure, Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs As part of the security questionnaire, Milliken asked each of its suppliers or service providers to indicate their participation in any supply chain security programs administered by a foreign Customs Administration. This information is available upon request. Security Procedure, Other internal criteria for selection Milliken's non-logistics purchasing activities are controlled by the Global Purchasing group. Milliken's logistics purchasing activities are controlled by the Global Logistics group. The purchasing group reports to the Vice President of Purchasing, and the logistics group reports to the President of Manufacturing. This change in organization took place in Milliken associates are responsible for ensuring that potential business partners are viable, legitimate, on-going businesses that are capable of meeting the needs of Milliken & Company. For non-logistics suppliers, the primary record of a supplier's viability is an approving the business to be a Milliken Supplier and the creation of a Vendor Number. This process is initiated through an request for the Supplier to provide information into the Milliken Supplier Add Database. This database records the supplier's organization, primary product or services offered, physical and remit-to

4 addresses, payment information, D&B number, Tax Identification Number, terms, contacts and security data. The supplier is also asked to accept and acknowledge Milliken s Supplier Code of Conduct and Terms and Conditions, before acceptance as a Milliken Supplier. This database is maintained by the Global Sourcing group until the supplier is removed from the approved suppliers list. Milliken's non-logistics purchasing activities are controlled by the Global Purchasing group. Milliken's logistics purchasing activities are controlled by the Global Logistics group. Milliken associates are responsible for ensuring that potential business partners are viable, legitimate, on-going businesses that are capable of meeting the needs of Milliken & Company. For non-logistics suppliers, the primary record of a supplier's viability is the "Request for New Supplier Form". A copy of this can be found in the CTPAT Document Exchange section of this portal. This document records the supplier's organization, primary product or services offered, physical and remit-to addresses, payment information, D&B number, Tax Identification Number, terms,contacts and security data. This report is maintained by the Global Purchasing group until the supplier is removed from the approved suppliers list. For logistics suppliers, the primary record of a supplier's viability is the "Carrier Information Report" maintained by the logistics department. Logistics department associates are responsible for completing this report for each provider. A copy of the "Carrier Information Report" can be found in the Partner Document Exchange section of this portal. Container Security, General Milliken maintains procedures covering the inspection, loading, sealing, and manifesting of containers. These procedures have incorporated USCBP's guidance for a 7-point inspection process, proper commercial invoice data in accordance with 19CFR141.86, and the usage of seals compliant with ISO A copy of this procedure (CTPAT shipping security guidelines) can be found in the CTPAT Partner Document Exchange section of this portal. Container Security, Container Inspection Milliken has incorporated USCBP's 7-point inspection plan into the "CTPAT shipping security guidelines". A copy of this procedure can be found in the CTPAT Partner Document Exchange section of this portal. Container Security, Container Seals Milliken maintains procedures for the control, affixation, and documentation of container seals as part of its "CTPAT shipping security guidelines". A copy of this procedure can be found in the CTPAT Partner Document Exchange section of this portal. Container Security, Container Storage

5 Milliken's CTPAT shipping security guidelines dictate that containers must be kept in a secure location, and any breach of security must be communicated to location management and other authorities as the case warrants. A copy of this procedure can be found in the CTPAT Partner Document Exchange section of this portal. Physical Access Controls, Employees Access to all Milliken locations is controlled by electronic proximity cards and/or security personnel. All Milliken & Co. associates are required to carry a company issued identification badge. Processes are maintained by the Human Resources department at each location to control the issuance and revocation of associate identification badges. Physical Access Controls, Visitor Controls All Milliken locations require visitors including contractors, subcontractors, suppliers, and customers to present positive/current identification in the form of a government issued identification upon initial arrival at the Milliken location. All locations maintain a visitor s log/badge system to include: Name of Visitor Time of Arrival Nature of Visit Milliken Contact/Host Name of Company or Business Time of Departure Upon completion of the visitor sign in/out process, the visitor is assigned a visitor pass that must be visible at all times while at the Milliken location. Each visitor to a Milliken location is assigned a Milliken associate to act as a host and guide while they are on-site. All Milliken locations maintain an unauthorized access control process for responding to unknown persons in company facilities or on company property. Physical Access Controls, Building Security All access points at Milliken locations are either staffed with security personnel that ensures the Milliken Visitor procedures are followed or the access point requires that you scan a Milliken-issued badge to enter. All badges contain a photo ID which is required to be visible at all times. Physical Access Controls, Deliveries (including mail) See information in previous section. Mail and packages coming into Milliken locations are inspected by personnel in the mail rooms or incoming mail delivery areas. Anything leaving a Milliken location that is not customer products must have an ADOE, Authorized Deposit of Equipment before it can leave the location/plant.

6 All Milliken manufacturing locations are protected by perimeter fencing with several exceptions. Exceptions include security guards and/or prox card systems to prevent entry into the location. Where fencing applies, this fencing is inspected at least annually by Milliken & Co. location/plant associates and at least every two years by the corporate security director to ensure integrity and/or implement repairs where needed and where recorded. Access points in the fencing are monitored by electronic proximity cards, security personnel, and/or CCTV Digital Cameras. Physical Access Controls, Challenging and Removing Unauthorized Persons See information in previous section. Milliken & Co. has a corporate guideline that requires all Milliken locations maintain an unauthorized/unidentified access control process for responding to unknown persons in company facilities or on company property. A copy of this procedure can be found in the partner document exchange section under "Unauthorized Access Procedure". Personnel Security If any red flags are raised during the application process or during employment which indicates follow up is needed, checks may be done. Milliken may use government websites, databases, and law enforcement agencies to help facilitate the screening. A copy of the "Associate Employment Guide" can be found in the CTPAT Partner Document Exchange section of this portal. Personnel Security, Pre-Employment Verification Milliken has a standard process for verifying and documenting employment history and references prior to employment. A copy of the "Associate Employment Guide" can be found in the CTPAT Partner Document Exchange section of this portal. Personnel Security, Background checks / investigations If a review of the employment application indicates that follow up is needed, local government websites may be used. We may also involve our Labor Law Attorney who has access to certain state databases. If associates are hired through certain temporary agencies, the temp agency performs background checks. Once employed, checks may be done based on cause. Personnel Security, Personnel Termination Procedures Milliken has standard procedures and processes in place to remove identification, facility, and system access for all terminated associates. Copies of the management and non-management exit interview documentation can be found in the partner s document exchange section of this portal.

7 Procedural Security, Documentation Processing Milliken maintains procedures to ensure that all information used for entering cargo is legible, complete, and accurate. These procedures can be found in "CTPAT Shipping Security Guidelines" and the "Supplier Documentation Guidelines" in the CTPAT Partners Document Exchange section of this portal. Milliken also maintains procedures to safeguard computer access and information. This information can be found in "IT Security SPI 9011" in the document exchange section. Procedural Security, Manifesting Procedures See "CTPAT Shipping Security Guidelines" and the "Supplier Documentation Guidelines" in the CTPAT Partner Document Exchange section of the portal for information on manifesting procedures. Procedural Security, Shipping & Receiving Milliken maintains written procedures to control the shipping and receiving processes. These procedures include instructions for verifying the authenticity of the load and identity of the driver, inspecting the conveyance and seal for tampering, and reconciling the contents of the shipment against shipment documentation. Copies of these procedures can be found in the document exchange section of the portal under "CTPAT Receiving Process" Procedural Security Milliken considers a business partner anyone in the supply chain that could have access to the goods. This includes transportation partners and warehousing partners. Milliken maintains written processes for the selection of business partners. As part of this process, a business partner's CTPAT status is determined by means of their SVI or CTPAT certificate. For those business partners who are not eligible for CTPAT or who have chosen not to join CTPAT, their security level is assessed by means of a security questionnaire administered via the internet. This information is then used to assess the security risks of these business partners. Procedural Security, Cargo Discrepancies Milliken maintains procedures for identifying and investigating shortages, overages, and other discrepancies. These are part of Milliken's receiving process. A copy can be found in the CTPAT partner document exchange under "CTPAT Receiving Process". Security Training and Threat Awareness All Milliken locations maintain updated Crisis Communications/Emergency

8 Preparedness processes as a part of the Safety/Health/Security Process. All associates receive annual education/training as it relates to Safety/Health/Security. All locations also have detailed Business Continuity/Contingency Planning Processes. All locations have Crisis Models which include Bomb Threats, Workplace Violence, Terrorism, etc. Education/Training through this initiative is included in the Crisis Models for each location/plant. These processes are also reviewed by OSHA (Occupational Safety & Health Administration) in that all 39 Milliken & Co. U.S. sites are OSHA VPP "STAR" sites. All Milliken locations include the following in their crisis models; Risk Assessments Security Reviews Emergency & Crisis Management and Planning Physical Security, Fencing Milliken utilizes perimeter fencing where necessary to secure its facilities. This fencing is inspected at least annually by Milliken associates to ensure integrity and/or implement repairs. This inspection is typically the responsibility of the location engineering associate. Milliken & Co. Security Director reviews these audits at least every 24 months. This is included in the Milliken & Co. Security Audit Process. Physical Security, Gates and Gate Houses Gates at Milliken locations are monitored by security personnel, Milliken associates, and/or electronic access control devices. Gates are kept to a minimum with all access gates having CCTV Digital Cameras to monitor entry and exit. Physical Security, Parking Milliken's cargo handling facilities are separated from associate and visitor parking areas by fencing that incorporates access control procedures. Physical Security, Building Structure Milliken's facilities are constructed of concrete, steel, metal, or other substantial building materials. The condition of all facilities is inspected regularly by plant personnel. Physical Security, Building Security Milliken treats internal cargo handling and storage locations as Milliken facilities and are covered by the company security procedures detailed in this security profile. Milliken considers any outside cargo handling or storage facility as a business partner.

9 Milliken maintains written processes for the selection of business partners. As part of this process, a business partner's CTPAT status is determined by means of their SVI or CTPAT certificate. For those business partners who are not eligible for CTPAT or who have chosen not to join CTPAT, their security level is assessed by means of a security questionnaire administered via the internet. This information is then used to assess the security risks of these business partners. Physical Security, Locking Devices and Key Controls All windows, gates, and fences are secured by means of a locking device. All Master and Grand Master locks are accounted for by location/plant engineering. Physical Security, Lighting Milliken's exterior and interior lighting is designed and maintained to comply with all local building codes. All lighting is reviewed on the Corporate Security Audit that is done every 16 months by the corporate director of Safety/Health/Security/IP. Physical Security, Alarms Systems & Video Surveillance Cameras All Milliken locations/plants have specific designed security systems in place to include CCTV Digital Camera systems, lighting, prox card access controls, fencing and/or Security Services either from SFI or American Security. All locations are reviewed at least every 16 months. This process is also included on the Corporate Security Audit Process. Information Technology Security - Password Protection Milliken's set of information security policies begin with our Information Security Charter which outlines the mission, roles, and responsibilities associated with our program (SPI 91.00). This high-level policy is supported by several, more specific policies covering topics such as data classification, secure computing behaviors, user ID management, and password policy. These security policies are accessible on Milliken's intranet site and are reviewed on an annual basis. Milliken's information systems are designed to ensure both individual accountability and auditability. Access to company information systems is controlled by unique user identification and passwords. Individual passwords must be changed periodically according to corporate standards. All Milliken associates receive mandatory security training on an annual basis which is supplemented with live presentations, mass communications, and intranet news bulletins. Information Technology Security Accountability

10 It is the responsibility of each associate to report data security violations to their manager. Milliken also utilizes firewalls, endpoint protection software, and security monitoring systems for the purpose of identifying security breaches or other improprieties. Milliken maintains Human Resource policies that outline disciplinary procedures to be used in the event of data security breaches. (See Personnel Policy Manual SPI 8.07) Milliken Data Security schedules annual reviews with Data Owners to validate that current access is appropriate. In addition, a Governance, Risk, and Compliance (GRC) system has been implemented to identify segregation of duty issues, track usage of critical transactions, and report activity of associates with a high level of access. GRC reports are reviewed by designated owners either on a daily, or a monthly basis, as determined by the GRC Administrator. Access to data resources is approved by Data Owners and administered by the Data Security team. Data Security is notified of new hires, job changes, and terminations automatically through the HR system to insure access is prompted added or removed.

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs Customs-Trade Partnership Against Terrorism (C-TPAT) Minimum-Security Criteria Importers Importers must conduct a comprehensive assessment of their international supply chains, based upon the following

More information

C-TPAT Minimum Security Criteria

C-TPAT Minimum Security Criteria C-TPAT Minimum Security Criteria C-TPAT Security Criteria for Importers Importers must conduct a comprehensive assessment of their international supply chains based upon the following C-TPAT security criteria.

More information

C-TPAT Partner Application for Importers Instructions

C-TPAT Partner Application for Importers Instructions C-TPAT Partner Application for Importers Instructions Importer for C-TPAT Application Qualifications 1. Active U.S. Importer or Non-Resident Canadian Importer into the United States. 2. Have an business

More information

Importers: C-TPAT Minimum Security Requirements

Importers: C-TPAT Minimum Security Requirements Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Restatement and Document Preparation by Prep4Audit, LLC 1 of 16 Suggested

More information

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC) (04/24/2006) C-TPAT Qualifications for Air Freight Consolidators,

More information

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Minimum-Security Criteria for C-TPAT Foreign Manufacturers Minimum-Security Criteria for C-TPAT Foreign Manufacturers These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security

More information

Foreign Manufacturer Eligibility Requirements

Foreign Manufacturer Eligibility Requirements Foreign Manufacturer Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Foreign Manufacturer must meet the following eligibility requirements: 1. Be an active Manufacturer incorporated

More information

C-TPAT Minimum Security Requirements Importers

C-TPAT Minimum Security Requirements Importers Customs and Border Protection, U.S. Department of Homeland Security C-TPAT Minimum Security Requirements Importers Released March, 2005 Prepared by Prep4Audit, LLC Version 2: August, 2014 www.prep4audit.com

More information

C-TPAT Security Standards. Importers

C-TPAT Security Standards. Importers C-TPAT Security Standards Importers Importers must conduct a comprehensive self-assessment of their international supply chains based upon the following C-TPAT security standards. Appropriate security

More information

A Message for Brokers Letter And Security Guidelines for Brokers

A Message for Brokers Letter And Security Guidelines for Brokers A Message for Brokers Letter And Security Guidelines for Brokers Kingchem LLC is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). C-TPAT is a voluntary joint government-business

More information

Xerox Supplier Security Requirements

Xerox Supplier Security Requirements Xerox Supplier Security Requirements Suppliers who are involved in the manufacture, storage, and transportation of Xerox products ( Suppliers ) for Xerox Corporation and / or its subsidiaries under Xerox

More information

C-TPAT Security Questionnaire PASS FAIL 1

C-TPAT Security Questionnaire PASS FAIL 1 Company: Address: City, St. Zip Purpose: ATC has committed to participation in the Customs Trade Partnership Against Terrorism (CTPAT) Program administered by Customs. CTPAT is a supply chain security

More information

Please complete the questionnaire and fax it to

Please complete the questionnaire and fax it to Partners in Protection / C-TPAT Supply Chain Security Questionnaire Dear: Supply Trade Partner As you are aware there have been several changes in the transportation industry over the past few years. One

More information

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

TRUSTED TRADER APPLICATION (C-TPAT AND ISA) TRUSTED TRADER APPLICATION (C-TPAT AND ISA) APPLICANT INFORMATION Company Name: Company doing business as: Company Website: Physical Address: City Point of Contact: Phone Number: State/Zip Code Title:

More information

Air Carrier Eligibility Requirements

Air Carrier Eligibility Requirements Air Carrier Eligibility Requirements (04/07/2008) To be eligible for C-TPAT, the Air Carrier must the meet the following eligibility requirements: 1. Active Air Carrier transporting cargo shipments to

More information

C-TPAT Security Criteria. Sea Carriers

C-TPAT Security Criteria. Sea Carriers C-TPAT Security Criteria Sea Carriers Sea carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum security criteria. Where a sea carrier does

More information

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection Customs Brokers Limited Global Logistics SERVICES OFFERED Customs-Trade Partnership Against Terrorism U.S. Customs and Border Protection Partners In Protection Contact: training@affiliated.ca TRAINING:

More information

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities Objective The purpose of this procedure is to ensure that LG Sourcing and its manufacturers and suppliers are in compliance

More information

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview avenue STORES, LLC Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview On September 11, 2001, combating the threat of terrorism became U.S. Customs number one priority.

More information

Supply Chain Questionnaire Business Partners

Supply Chain Questionnaire Business Partners Supply Chain Questionnaire Business Partners IF YOU ARE A C TPAT MEMBER PLEASE SEND US A MONITORING REQUEST PER INSTRUCTIONS BELOW AND COMPLETE THIS PAGE ONLY If C TPAT certified please go to the following

More information

Rail Carrier Minimum-Security Criteria

Rail Carrier Minimum-Security Criteria Rail Carrier Minimum-Security Criteria (08/28/2006) Rail carriers must conduct a comprehensive assessment of their security practices based upon the following C-TPAT minimum-security criteria. Recognizing

More information

Milestone AV Technologies TECHNICAL SPECIFICATION

Milestone AV Technologies TECHNICAL SPECIFICATION Revision: 02 PAGE 1 OF 12 Revision History Date Rev Reason for Change 5/21/2009 00 Initial Release 11/19/2010 01 ECO Number 500003646 Section 3.2.8: Added new F-0218 Container Check List - Chinese form

More information

C-TPAT Questionnaire. Type of Partner

C-TPAT Questionnaire. Type of Partner C-TPAT Questionnaire Business Partner Name Address City State Zip Country Contact Name Contact Title Contact Phone number Contact Email Years in Business Number of Employees Type of Partner Manufacturer

More information

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers February 2016 I have read this page: Date: Doc C Page 1 Table of Contents Introduction 1. Procedural Security 2. Physical Security 3. Access

More information

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action

C-TPAT Audit Report. General Overview of the Audit s findings. Overall Score (result) Audit Findings & Corrective Action C-TPAT Audit Report Client Supplier Factory AI Service No Auditor Audit Date General Overview of the Audit s findings Clause Theoritical Max Score Actual Score 1. Personal Security 19 2. Physical Security

More information

C-TPAT Information for Foreign Manufacturers & Suppliers

C-TPAT Information for Foreign Manufacturers & Suppliers DISTRIBUTION SERVICES DEPARTMENT 1 Barnes & Noble Way, Monroe Township, NJ 08831 (732) 656-7400 C-TPAT Information for Foreign Manufacturers & Suppliers Foreign Manufacturers/Suppliers Recommendations

More information

Foreign Factory Profile

Foreign Factory Profile All factories manufacturing on behalf of the Company are required to complete this profile. All information is required. PLEASE TYPE IN ENGLISH. Submitted incomplete or with inaccurate information will

More information

CTPAT Security Requirements for Import Suppliers

CTPAT Security Requirements for Import Suppliers CTPAT Security Requirements for Import Suppliers To Our Import Suppliers: CVS Pharmacy is committed to ensuring supply chain security within a framework consistent with Customs Trade Partnership Against

More information

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES www.alpiworld.com PHISYCAL SECURITY AND ACCESS CONTROL 1. Physical Security The premises, in which goods are deposited, kept and handled

More information

C-TPAT Expectations for

C-TPAT Expectations for C-TPAT Expectations for Vendors & Manufacturers 2018 Introduction Hobby Lobby is a participant in the voluntary security program known as the Customs-Trade Partnership Against Terrorism (C-TPAT). This

More information

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM 1. What is C-TPAT? (a) The C-TPAT (Customs -Trade Partnership Against Terrorism) is a voluntary United States Customs and Border Protection (CBP) business initiative

More information

Table of Contents. Introduction Features for 2015 Implementation Suggestions C-TPAT Project Plan and Organizer Formatting Instructions

Table of Contents. Introduction Features for 2015 Implementation Suggestions C-TPAT Project Plan and Organizer Formatting Instructions Table of Contents Introduction Features for 2015 Implementation Suggestions C-TPAT Project Plan and Organizer Formatting Instructions I. Internal Policies and Plan Development Internal Policies and Plan

More information

SECTION 1: TRADER INFORMATION

SECTION 1: TRADER INFORMATION QUESTIONNAIRE FOR SUPPLY CHAIN SECURITY PROCEDURES SECTION 1: TRADER INFORMATION Subsection 01 - Member Identification Member Name: Mail Address: (including the post office box number, city, country and

More information

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008

WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008 WILSONS LEATHER POLICY ACKNOWLEDGEMENT 2008 As an authorized representative of, I acknowledge receipt of the Wilsons Leather (the "Company") Vendor Guidelines. I have read and understand the Company's

More information

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment) ompany name: (Based on -TPAT SS Best Practice, US ustoms and Border Protection) lause Degree of ompliance 1. PERSONNEL SEURITY 1.1 The company conducts employment screening and interviewing of prospective

More information

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution C-TPAT Membership Importers Brokers / Forwarders / Consolidators Carriers (Air, Sea, Rail, Truck) Port Authorities / Terminal Operators Foreign Manufacturers (Mexico and Canada) WHAT REALLY HAPPENS Security

More information

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment Proactive Approaches To Minimize Supply Chain Security Breaches in the Rail, Air, Ocean and Land Environment Top Eight Rail Principles Track and monitor pulls on a 24 hour basis to determine location and

More information

C-TPAT Expectations for Agents, Vendors & Manufacturers

C-TPAT Expectations for Agents, Vendors & Manufacturers BEALL s, INC. C-TPAT Expectations for Agents, Vendors & Manufacturers For Distribution to all new and existing Beall s import related Business Partners Last Updated: 1/27/2009 TABLE OF CONTENTS INTRODUCTION.

More information

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense Retail Food Establishment Self-Assessment Checklist for Food Defense Ohio Department of Agriculture Division of Food Safety September 2005 Industry Self-Assessment Checklist for Food Defense On January

More information

Food Defense Supplier Guidelines

Food Defense Supplier Guidelines Food Defense Supplier Guidelines Revised: May 2015 Table of Contents Introduction 3 1. Program administration 3 a. Plan management 3 b. Roles and responsibilities 3 c. Reporting procedures 3 d. Self-assessments

More information

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire Colony Brands, Inc. (f/k/a The Swiss Colony, Inc.) is a member of the Customs-Trade

More information

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES Copy No. Uncontrolled Canadian Grain Commission Process Verification and Accreditation Office Industry Services 900-303 Main Street Winnipeg,

More information

Guidance Notes FSR 2014

Guidance Notes FSR 2014 Definition (page 13) TERM DEFINITION GUIDANCE/ AMENDMENT BACKED UP To make a copy of a data file which is stored securely in a separate location and can be used as a security copy. To make a copy of a

More information

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US,

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US, Dear Valued Supplier: Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US, C-TPAT is a voluntary joint government-business initiative to build cooperative relationships

More information

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005 Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005 Q: 1.Why is CBP updating the security guidelines for C-TPAT importers? Will other enrollment sectors also be subject

More information

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT)

IMPORTER SECURITY RECOMMENDATIONS CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM (C-TPAT) IMPORTER SECURITY RECOMMENDATIONS Develop and implement a sound plan to enhance security procedures throughout your supply chain. Where an importer does not control a facility, conveyance or process subject

More information

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements C-TPAT Requirements Dated: July 1 st, 2015 To: Valued Suppliers Re: C-TPAT Security Recommendations and Requirements Recently, our company was accepted by US Customs into the C-TPAT program. This program

More information

Supply Chain Security Guidelines

Supply Chain Security Guidelines Supply Chain Security Guidelines September 12, 2003 Patrice Knight Vice President, Import Compliance Office International Business Machines Corporation Route 100 Somers, New York 10589 914-766-2318 e-mail:

More information

DEVELOPING A FOOD DEFENSE PLAN A GUIDE

DEVELOPING A FOOD DEFENSE PLAN A GUIDE DEPARTMENT OF AGRICULTURE AND CONSUMER SERVICES EXHIBIT: X BUREAU OF FOOD DISTRIBUTION EFFECTIVE: 407 SOUTH CALHOUN STREET, M-39, 2 ND FLOOR REVISED: September 1, 2012 TALLAHASSEE, FLORIDA 32399-0800 PAGE

More information

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE APPENDIX TO ANNEX 1 SEAL INTEGRITY PROGRAMME FOR SECURE CONTAINER SHIPMENTS INTRODUCTION Importance

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report Silver Star Garment Limited Registration Number : A11359-485263 Company : Silver Star Garment Limited Date of Verification :

More information

ACCO Brands Corporation. Global Social Responsibility Policy

ACCO Brands Corporation. Global Social Responsibility Policy ACCO Brands Corporation Global Social Responsibility Policy ACCO Brands Global Social Responsibility Policy Revision 1 Page 1 of 8 Effective Date: September 1, 2018 Revision History Version Revision Reason

More information

IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS

IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS PURPOSE: CONTENTS: IMPORTER ASSESSMENT PROGRAM FOR FOREIGN VENDORS The purpose of the XYZ Corporation Foreign Vendor Assessment Program is to objectively evaluate overseas suppliers, identifying areas

More information

AEO. (Authorized Economic Operator) Challenges of Japan Customs. Customs & Tariff Bureau, Ministry of Finance, Japan

AEO. (Authorized Economic Operator) Challenges of Japan Customs. Customs & Tariff Bureau, Ministry of Finance, Japan AEO (Authorized Economic Operator) Challenges of Japan Customs Customs & Tariff Bureau, Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation

More information

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland

TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland TAPA FSR 2009 Kraków 4th June 2009 Leszek Sitkowski LRQA Poland Lloyd s Register Group (1760) Marine,Energy,Transportation Managements Systems (LRQA) Quality, Environment Security of : Supply Chain ISO

More information

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011

2011 TAPA FSR Scoring Matrix FOR USE WITH TAPA BUYER AUDIT FORM 2011 Audit Rating Score Point Value Process & Procedures - Description of Standard Action Measurement Criteria 0 Not present or utilized - No plans to adopt or Not Acceptable: Immediate SCAR implement 1 Generally

More information

AM Retail Group, Inc. C-TPAT EVALUATION

AM Retail Group, Inc. C-TPAT EVALUATION DATE: FACILITY NAME: FACILITY ADDRESS: PRINT NAME OF FACILITY MANAGER/RESPONSIBLE PARTY: --------------------------------------------------------------------------------------------------------------------------------

More information

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry

BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry BIOSECURITY IN THE DAIRY PLANT IDFA's Guidance Document for the Dairy Industry This guidance document was prepared by the International Dairy Foods Association (IDFA) to help you evaluate the security

More information

Pakistan Supply Chain Security (PSCS) Code

Pakistan Supply Chain Security (PSCS) Code Pakistan Supply Chain Security (PSCS) Code 1.0 Introduction Following September 11, 2001 incident, the attention of international community has been focused on security. Supply chain is considered one

More information

Fraud Risk Management

Fraud Risk Management Fraud Risk Management Specific Anti-Fraud Controls (Process or Transaction Level) 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization have adequate staffing

More information

Notice of arrival of ship and submission of advance manifest. Arrival, Boarding of ship and Reporting of cargo

Notice of arrival of ship and submission of advance manifest. Arrival, Boarding of ship and Reporting of cargo IMPORT PROCEDURES Notice of arrival of ship and submission of advance manifest Arrival, Boarding of ship and Reporting of cargo Arrival of Aircraft and Reporting of cargo Discharge and tallying of cargo

More information

Security Innovations to Adapt to Emerging Threats

Security Innovations to Adapt to Emerging Threats 2013 C-TPAT Conference January 9, 2013 Security Innovations to Adapt to Emerging Threats Barry Brandman President/CEO Danbee Investigations in no va tion noun \ˌi-nə-ˈvā-shən\ Definition: a new idea, method,

More information

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan AEO program (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan International background The global trading system is vulnerable to terrorist exploitation while the international

More information

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices Ken Konigsmark & Val Parker Global Supplier Conference September 16, 2004 2 Workshop Purpose

More information

Integrated Compliance Manual for Vendors and Factories

Integrated Compliance Manual for Vendors and Factories Integrated Compliance Manual for Vendors and Factories Version 1.0 March 2014 Catherines Stores Corporation Lane Bryant Purchasing Corp Maurices Incorporated The Dress Barn, Inc. Tween Brands Service Co.

More information

Hazardous Materials and Chemicals

Hazardous Materials and Chemicals Standard Operating Procedures Hazardous Materials and Chemicals Last Modified: JAN 2013 1 of 11 Hazardous Materials and Chemicals I PURPOSE To ensure that controls are in place to minimize the risk to

More information

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions In an effort to clarify the April 23, 2010 bulletin regarding international

More information

This application process is for the New Modernized Drive Clean Program that uses the new OBD II and/or TSI, and Heavy Duty test equipment.

This application process is for the New Modernized Drive Clean Program that uses the new OBD II and/or TSI, and Heavy Duty test equipment. DRIVE CLEAN ACCREDITATION CHECKLIST How to Become a Light Duty Test Only, Test & Repair, Repair Only, Heavy Duty Non-Diesel, or Heavy Duty Diesel (Mobile or Non-Mobile) Drive Clean Facility Important Complete

More information

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Air Cargo & Air Supply Chain Security : Perspective From Integrators Air Cargo & Air Supply Chain Security : Perspective From Integrators Introduction The September 11 terrorist attacks in the US in 2001 has changed the whole concept of Aviation Security and has affected

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report HANSAE TG CO., LTD Registration Number : A20480-838116 Company : HANSAE TG CO., LTD Date of Verification : 08-Jul-2016 Auditor(s)

More information

INTERNAL CONTROLS REVIEW PROGRESS REPORT Yellow highlighted items have been completed/validated since last report in August 2016

INTERNAL CONTROLS REVIEW PROGRESS REPORT Yellow highlighted items have been completed/validated since last report in August 2016 INTERNAL S REVIEW PROGRESS REPORT Yellow highlighted items have been completed/validated since last report in August 2016 RECOMMENDATIONS ADDRESSED THROUGH INTERNAL AUDIT WORK PLANS Monthly Reconciliation

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report Camino Industrial (Huizhou) Company Limited Registration Number : A5046-142191 Company : Date of Verification : 16-Nov-2016

More information

INTERNAL CONTROLS REVIEW PROGRESS REPORT Highlighted items have been completed since last report in January 2016

INTERNAL CONTROLS REVIEW PROGRESS REPORT Highlighted items have been completed since last report in January 2016 INTERNAL S REVIEW PROGRESS REPORT Highlighted items have been completed since last report in January 2016 RECOMMENDATIONS ADDRESSED THROUGH INTERNAL AUDIT WORK PLANS Internal Audit: prepare documentation

More information

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office

C-TPAT Best Practices. Wayne Kornmann Director, Long Beach C-TPAT Field Office C-TPAT Best Practices Wayne Kornmann Director, Long Beach C-TPAT Field Office 2 C-TPAT Best Practices Overview What are Best Practices? C-TPAT Best Practice Catalog How Do Importers Achieve Tier 3 Status?

More information

Supply Chain Security Container Inspection and Seal Application

Supply Chain Security Container Inspection and Seal Application Supply Chain Security Container Inspection and Seal Application Supply Chain Security 8/25/2010 1 Supply Chain Security: Container Inspection & Seal Application The attached information has been created

More information

EMPLOYEE FRAUD OPPORTUNITIES CHECKLIST

EMPLOYEE FRAUD OPPORTUNITIES CHECKLIST Page 128 of 174 EMPLOYEE FRAUD OPPORTUNITIES CHECKLIST Recognizing Warning Signs and Preventing Problem Situations Why are consistent internal controls important? Management decisions, financial reports,

More information

Requirements and Guidelines

Requirements and Guidelines Contractor and Subcontractor Purpose The purpose of this program is to establish the safety requirements for contractors to be able to work on Fieldwood owned or managed properties. The objectives of this

More information

Integrated Compliance Manual for Vendors and Factories

Integrated Compliance Manual for Vendors and Factories Integrated Compliance Manual for Vendors and Factories Version 4.0 August 2017 Catherines Stores Corporation Lane Bryant Purchasing Corp Maurices Incorporated The Dress Barn, Inc. Tween Brands Service

More information

Division of Student Affairs Internal Control Questionnaire FY 2011

Division of Student Affairs Internal Control Questionnaire FY 2011 Control Environment Yes No N/A Notations Are the roles and responsibilities of financial and administrative staff (including the establishment of the unit Director as the appropriate signature authority)

More information

Patrick Malloy Communities Quality Assurance System

Patrick Malloy Communities Quality Assurance System Patrick Malloy Communities Quality Assurance System Page 1 of 83 Log of Quality Manual Revisions Version Number Revision Date Type of Revision 1 April 9, 2007 1 st release 1 April 13, 2007 Sec 1.10 removed

More information

ICMI International Cyanide Management Code Summary Audit Report. Intermarine, LLC - Industrial Terminals Initial Certification Audit

ICMI International Cyanide Management Code Summary Audit Report. Intermarine, LLC - Industrial Terminals Initial Certification Audit ICMI International Cyanide Management Code Summary Audit Report Intermarine, LLC - Industrial Terminals Initial Certification Audit Submitted to: The International Cyanide Management Institute 1400 I Street,

More information

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det.

GOVERNANCE AES 2012 INFORMATION TECHNOLOGY GENERAL COMPUTING CONTROLS (ITGC) CATALOG. Aut. / Man. Control ID # Key SOX Control. Prev. / Det. GOVERNANCE 8.A.1 - Objective: Information Technology strategies, plans, personnel and budgets are consistent with AES' business and strategic requirements and goals. Objective Risk Statement(s): - IT Projects,

More information

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology 1 Project Team Profile PI: Larry Shi, University of Houston

More information

INTERNAL CONTROLS REVIEW PROGRESS REPORT Yellow highlighted items have been updated since last report in October 2017

INTERNAL CONTROLS REVIEW PROGRESS REPORT Yellow highlighted items have been updated since last report in October 2017 INTERNAL S REVIEW PROGRESS REPORT Yellow highlighted items have been updated since last report in October 2017 RECOMMENDATIONS ADDRESSED THROUGH INTERNAL AUDIT WORK PLANS Internal Audit: prepare documentation

More information

Submission, Review and Approval of Construction Documents Submission and Review of a Completed Application for Permit

Submission, Review and Approval of Construction Documents Submission and Review of a Completed Application for Permit Building Code The Florida State University Building Code Administration Program (BCA) was established in 2001 and is responsible for ensuring that all construction activities on FSU owned facilities are

More information

Purchase Card Program

Purchase Card Program Purchase Card Program POLICIES AND PROCEDURES South Puget South Community College has established a Purchase Card Program in accordance with the Office of Financial Management and the Department of Enterprise

More information

Warehousing Process - Sea

Warehousing Process - Sea High Level Process Pre-clearance Process 1 2 3 4 Ministries Departments and Agencies (MDA) Process Bond Process Shipping Agent Process Pre-clearance Movement Process Scans Bill of Lading (BL) and Commercial

More information

Customs Trade Partnership Against Terrorism An Introduction

Customs Trade Partnership Against Terrorism An Introduction Customs Trade Partnership Against Terrorism An Introduction WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel It s a challenging

More information

Physical Security Assessment Form

Physical Security Assessment Form Physical Security Assessment Form Security Assessment Developed in Partnership with: P a g e 2 Introduction Thank you for taking the time to look at your organization s security. It is a critical component

More information

INTERNAL CONTROLS REVIEW PROGRESS REPORT Yellow highlighted items have been updated since last report in October 2016

INTERNAL CONTROLS REVIEW PROGRESS REPORT Yellow highlighted items have been updated since last report in October 2016 INTERNAL S REVIEW PROGRESS REPORT Yellow highlighted items have been updated since last report in October 2016 RECOMMENDATIONS ADDRESSED THROUGH INTERNAL AUDIT WORK PLANS Internal Audit: prepare documentation

More information

Global Security Verification Report

Global Security Verification Report Measured Performance - Improved Security Global Security Verification Report IRIS Design Ltd. Registration Number : A22550-107044 Company : IRIS Design Ltd. Date of Verification : 22-May-2016 Auditor(s)

More information

INTERNAL CONTROLS REVIEW PROGRESS REPORT

INTERNAL CONTROLS REVIEW PROGRESS REPORT INTERNAL S REVIEW PROGRESS REPORT RECOMMENDATIONS ADDRESSED THROUGH INTERNAL AUDIT WORK PLANS Monthly Reconciliation 1 High High Accounts Receivable Training 2, 8, 9 High Moderate 1 12, 13 High High 3

More information

ANNEX 2 Security Management Plan

ANNEX 2 Security Management Plan ANNEX 2 Page 1 of 24 The following pages define our draft security management plan (a complete and up to date shall be submitted to The Authority within 20 days of contract award as per Schedule 2.4, para

More information

Central Fabrication Accreditation PRE-APPLICATION. checklist. American Board for Certification in Orthotics, Prosthetics and Pedorthics, Inc.

Central Fabrication Accreditation PRE-APPLICATION. checklist. American Board for Certification in Orthotics, Prosthetics and Pedorthics, Inc. Central Fabrication Accreditation PRE-APPLICATION checklist 3 Thank you for choosing ABC s Central Fabrication Accreditation program. We ve created this checklist to help you prepare for the accreditation

More information

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc AAPA Terminal and Container Cargo Security Mark Tierney Senior Director Security and Compliance Maersk Inc A.P. Moller is committed to show constant care and to prevent breaches of security associated

More information

Electronic I-9 Documentation Guardian Electronic I-9 and E-Verify Compliance with 8 CFR 274a.2

Electronic I-9 Documentation Guardian Electronic I-9 and E-Verify Compliance with 8 CFR 274a.2 Electronic I-9 Documentation Guardian Electronic I-9 and E-Verify Compliance with 8 CFR 274a.2 Abstract This document may be provided to Immigration and Customs Enforcement (ICE) in connection with a Form

More information

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents.

The factory must establish in writing the persons who are authorized to complete and/or sign shipping documents. 5. Procedural Security Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling and storage of cargo in the supply chain. Customs and/or

More information

MONTACHUSETT REGIONAL TRANSIT AUTHORITY (MART) BROKERAGE DEPARTMENT QUALITY ASSURANCE AND INTEGRITY PLAN FY2015

MONTACHUSETT REGIONAL TRANSIT AUTHORITY (MART) BROKERAGE DEPARTMENT QUALITY ASSURANCE AND INTEGRITY PLAN FY2015 MONTACHUSETT REGIONAL TRANSIT AUTHORITY (MART) BROKERAGE DEPARTMENT QUALITY ASSURANCE AND INTEGRITY PLAN FY2015 Page 1 of 9 MONTACHUSETT REGIONAL TRANSIT AUTHORITY (MART) BROKERAGE DEPARTMENT QUALITY ASSURANCE

More information

Petty Cash and Change Funds. Inventories (Equipment and Supplies)

Petty Cash and Change Funds. Inventories (Equipment and Supplies) UCLA Policy 360 Page 1 of 8 ATTACHMENT A Guidelines for Application of Internal Control Principles The following are control activities, as described in section III.B.3. of Policy 360, for applying the

More information