Customs Trade Partnership Against Terrorism An Introduction

Similar documents
CBP Daily Operations

Customs-Trade Partnership Against Terrorism

Customs Trade Partnership Against Terrorism (C-TPAT) International Supply Chain Security Risk Assessment Frequently Asked Questions

Frequently Asked Questions Regarding Minimum Security Criteria for Importers 03/25/2005

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Foreign Manufacturer Eligibility Requirements

Trade Transformation. CBP Initiatives for 21 st Century Trade. September 2012

C-TPAT Security Questionnaire PASS FAIL 1

Security Model. Jointly implement a security model within each segment of the supply chain Production Transportation Importation Distribution

Colony Brands, Inc. Supply Chain Security Profile Customs-Trade Partnership Against Terrorism Service Provider Questionnaire

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

Maritime Security Council. AfrICANDO Security for Africa s Road & Rail Transportation Infrastructure

TRADE FACILITATION IN MEXICO

Supply Chain Security: Boeing's C-TPAT Program (Customs-Trade Partnership Against Terrorism) & Commercial Invoices

Minimum-Security Criteria for C-TPAT Foreign Manufacturers

A Message for Brokers Letter And Security Guidelines for Brokers

Rail Carrier Minimum-Security Criteria

C-TPAT Security Standards. Importers

C-TPAT Partner Application for Importers Instructions

Please complete the questionnaire and fax it to

Customs Concerns for the Motor Carrier and Transportation Intermediary

Supply Chain Questionnaire Business Partners

FOR OFFICIAL USE ONLY

Importers: C-TPAT Minimum Security Requirements

The Sept. 11 terrorist strikes were a wake-up call to the

C-TPAT Minimum Security Criteria

CUSTOMS COMMERCIAL COMPLIANCE IN THE SECURITY AGE*

SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

Supply Chain Security Management Systems The ISO Link

Air Carrier Eligibility Requirements

Secure and Transparent Cargo Supply Chain: Enabling Chain-of-Custody with Economical and Privacy Respecting Biometrics, and Blockchain Technology

AAPA. Terminal and Container Cargo Security. Mark Tierney Senior Director Security and Compliance Maersk Inc

C-TPAT Questionnaire. Type of Partner

Welcome Presenter s Name June 17,

CURRENT SECURITY ENVIRONMENT

DEPARTMENT OF HOMELAND SECURITY

Customs -Trade Partnership Against Terrorism (C-TPAT) Vendor Participation Overview

C-TPAT Security Criteria. Sea Carriers

Industry Recommendations to Create a 21 st Century Customs Regime in the Near and Long-Term

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

Beyond the Border Action Plan Integrated Cargo Security Strategy Prince Rupert Rail Pilot

DEPARTMENT OF HOMELAND SECURITY U.S. CUSTOMS AND BORDER PROTECTION. CBP Dec

Page 2 Cargo Control and Release Capabilities Entry Summary Processing Capabilities Future ACE Features Entry Summary, Accounts and Revenue

C-TPAT Minimum Security Requirements Importers

Introduction to Homeland Security

Universal Importer Profile (UIP)

Managing Trade Compliance with Importer Self-Assessment

Lowe s Corporate Cargo Security Guidelines for Manufacturing and Warehouse Facilities

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

SESSION V: Critical port security Issues Assuring cargo integrity prior to, during and post marine terminal operations

GUIDELINES FOR STRENGTHENING CONTROL OF CONTAINERS

Security Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006

Barriers to Global Trade Through Marine Ports Country Reports

CTPAT Security Requirements for Import Suppliers

Oral Testimony of Mr. Jonathan Gold : Vice President, Supply Chain and Customs Policy, National Retail Federation Mrs.

SUPPLY CHAIN SECURITY

Cabotage Rules for Canadian-Based Drivers

LEADERS THOUGHT. More importantly, these logistics thought leaders can give you guidance when considering improvements to your business processes.

CUSTOMS AND BORDER PROTECTION TRADE SYMPOSIUM 2003 REPORT ONE FACE AT THE BORDER NOVEMBER 19 21, FROM: Jim Phillips

Supply Chain Security IGTLC

CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM

U.S. Customs and Border Protection (CBP) Office of Field Operations (OFO) Agriculture Programs and Trade Liaison (APTL)

C-TPAT 5 Step Risk Assessment Process Guide

RE: Docket No. USTR Comments on the Transatlantic Trade and Investment Partnership

IN PRACTICE. Managing Risk in Customs. investment climate. Lessons from the New Zealand Customs Service

Tenneco is a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT). In the US,

Measuring Traffic Congestion at International Border Crossings

Milliken and Company CTPAT Security Profile. Guidelines and Procedures for maintaining compliance with the CTPAT minimum security requirements

International Supply Chain Security. Sean Moon Office of Policy Development Cargo, Maritime & Trade

Evaluation of the Partners in Protection (PIP) Program

Canada Border Services Agency

Compliance or Enhance the Competitiveness? The Most Secure Port - HKG

BV Security Assessment (Based on C-TPAT SCS Best Practice, US Customs and Border Protection) (1-day Assessment)

Menard, Inc. ( Menard, Inc. ) C-TPAT Protocols for Suppliers

10 REASONS WHY YOU SHOULD INVEST IN RESILIENCY

C-TPAT Expectations for Agents, Vendors & Manufacturers

DEPARTMENT OF HOMELAND SECURITY U.S. CUSTOMS AND BORDER PROTECTION. [CBP Dec. No ]

C-TPAT Expectations for

CUSTOMS-NOTES. December 13, Important Trade Security Measures

Effective Cargo and Vehicle Inspection and Enhanced. Border Security: Mexico SAT Accelerated Cargo Inspection Initiative.

Secure container transport: challenges & barriers in the complete stakeholder chain

Internal Conspiracies and PIA

ABSTACT 2016 GENERAL SECURITY GUIDELINES AND OPERATIONAL PROCEDURES

Locking Down the Supply Chain

TRUSTED TRADER APPLICATION (C-TPAT AND ISA)

GAO. HOMELAND SECURITY Key Cargo Security Programs Can Be Improved

Combining Commercial Benefits with Cargo Security Initiatives By: Captain Salloum, H.

Annex 6. LOGISTICS Movement Control Center (State Logistics Response Center)

Securing Your Cargo in an Increasingly Insecure World

CARGO THEFT AND SMUGGLING

Perspectives on FDA s Secure Supply Chain Pilot Program

SUPPLY CHAIN SECURITY

Supply Chain Security Guidelines

Supplier Quality Manual

Milestone AV Technologies TECHNICAL SPECIFICATION

Air Cargo & Air Supply Chain Security : Perspective From Integrators

U.S. Bonded Carrier Issues Are On The Rise? Why?

G LO S S A RY O F T E R M S

I-95 Corridor Coalition

---Submitted Electronically---

Transcription:

Customs Trade Partnership Against Terrorism An Introduction

WHO WE ARE Securing the Borders of the United States while simultaneously facilitating the flow of legitimate trade & travel

It s a challenging task 1,900 miles of border with Mexico. 5,000 miles of border with Canada. 327 ports of entry official entry or crossing points. 139 Border Patrol stations with 37 interior checkpoints.

On a typical day. 900K+ passengers and pedestrians 64,000 truck, rail and/or sea containers 61 criminal arrests 1400 inadmissible visitors 13,000lbs of narcotics

CBP Layered Enforcement Strategy Advance electronic information analysis and targeting Using advanced inspection technologies Pre-screening high-risk shipments prior to arrival in the U.S. Partnering with the trade community

What is C-TPAT CBP and Industry working together to enhance international supply chain security and facilitate legitimate compliant trade Strengthening of the Supply Chain Exchange of Ideas, Knowledge and Best Practices

C-TPAT Background Launched in November 2001 Started with seven companies Designed so all businesses, regardless of size, can participate in global supply chain security

C-TPAT Today Over 10,000 members Represents approximately 50% of the total value of merchandise imported into the United States Strives to set the Global standard for supply chain security

C-TPAT Membership - as of December 3, 2012 Importers 4340 Brokers and Consolidators 1739 Carriers (Air, Sea, Rail, Truck) 3013 Marine Port Authorities / Terminal Operators 60 Foreign Manufacturers 1273 Totals 10,425

C-TPAT Minimum Security Criteria The starting point for partners to develop and employ effective security practices. It is the responsibility of the member to study their supply chain(s), assess the risk, and develop security controls to deal with those risks.

Who can apply? Importers Carriers (truck, sea, air, rail) Foreign manufacturers (CA and MX) U.S. Customhouse Brokers Consolidators Port/terminal operators Third Party Logistics

Benefits for CBP and Partner Partner Reduced threat assessment score Access to the FAST lane Front-of-line inspections Access to SVI CBP Increased supply chain visibility Redirection of people and resources Seminars and training Assigned SCSS

Definitions Minimum Security Criteria What procedures the C-TPAT member is required to have in place Validation Where CBP visits the company and verifies the security policies and practices in place in relation to what has been represented in the security profile

Definitions Must vs. Should Must is a mandatory component. Although C-TPAT itself is voluntary, these points must be successfully addressed to obtain and maintain membership Should indicates recommended security practices

C-TPAT Minimum Security Criteria Nine Core Criteria Elements: Risk Assessment Business Partner Container Security Physical Access Controls Personnel Security Procedural Security Physical Security Information Technology Security Training & Threat Awareness

C-TPAT Minimum Security Criteria Fundamentally designed to be the building blocks for C-TPAT members to institute effective security practices The criteria is designed to optimize supply chain performance to reduce the possibility of a security breach Strong supply chain security measures reduce theft, loss, and smuggling

C-TPAT Validations Trust but verify SCSS serve as the principal advisors to companies SCSS perform validations to verify security profiles are reliable, accurate, and effective Identify deficiencies and best practices Suspend or Remove members not honoring their security commitment

Suspensions and Removals Voluntary program As such, CBP may suspend or remove members when deficiencies are discovered Can be for negative vetting, validation findings, or security incident(s)

Mapping Cargo Flow and Identifying Business Partners Key Business Partner Roles Procurement Production Packing Staging/Storing Loading/Unloading Transportation Document Preparation

Threats to the international supply chain Terrorism Narcotics Human smuggling Illegal weapons Economic conditions Natural disasters Political unrest Labor problems Industrial espionage Organized crime Theft.Threats are constantly evolving and changing

Mapping Cargo Flow and Identifying Business Partners Identify all parties involved from origin to destination Examine your business partner s key roles/processes Think about: What do you know about who is moving your cargo? Who is responsible for selecting the intermediaries? Who physically moves the cargo? Any transfers along the way? Is the cargo ever at rest?

Who is moving the cargo?..should I conduct a site visit?

What are the cargo handling procedures? Can you identify any security concerns?

How Secure is the Supply Chain A new feeder service

Patterns of risk : Management doesn t ensure that employees are following their own security procedures. The company and employees are not aware of the risks they encourage by having poor security practices. Pattern of pushing responsibility for security to others.

Disruptions to the supply chain

Big Picture Commitment to partnership to enhance supply chain security Benefits for Trade - Improved security, fewer inspections, expedited cargo processing Benefits for CBP - Tactical support for focus on high risk shipments, better allocation of resources