SUPPLY CHAIN SECURITY PROGRAMS. Customs-Trade Partnership Against Terrorism. Partners In Protection

Similar documents
Minimum-Security Criteria for C-TPAT Foreign Manufacturers

Foreign Manufacturer Eligibility Requirements

Please complete the questionnaire and fax it to

Security Procedure - Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs

Importers: C-TPAT Minimum Security Requirements

C-TPAT Security Standards. Importers

C-TPAT Minimum Security Requirements Importers

C-TPAT Security Guidelines for Air Freight Consolidators, Ocean Transportation Intermediaries and Non-Vessel Operating Common Carriers (NVOCC)

Xerox Supplier Security Requirements

C-TPAT Security Criteria. Sea Carriers

Proactive Approaches. To Minimize. Supply Chain Security. Breaches in the Rail, Air, Ocean and Land Environment

C-TPAT Expectations for Agents, Vendors & Manufacturers

AEO Safety and Security Guidelines: Freight Forwarder

Customs Trade Partnership Against Terrorism An Introduction

C-TPAT Requirements. Dated: July 1 st, Valued Suppliers. C-TPAT Security Recommendations and Requirements

Retail Food Establishment. Self-Assessment Checklist. for. Food Defense

FOOD DEFENCE SELF-ASSESSMENT CHECKLIST GRAIN HANDLING FACILITIES

SEAL INTEGRITY PROGRAMME APPENDIX TO ANNEX I FRAMEWORK OF STANDARDS TO SECURE AND FACILITATE GLOBAL TRADE

Food Defense Supplier Guidelines

TRAILER/CONTAINER SECURITY

AEO program. (Authorized Economic Operator) Customs & Tariff Bureau Ministry of Finance, Japan

Global Security Verification Report

Policies and Procedures

AM Retail Group, Inc. C-TPAT EVALUATION

FERRIBY MARINE SHIP SECURITY ASSESSMENT AUDIT CHECKLIST

Volume DELPHI CORPORATION. Delphi Supplier Profile Supplier Viewer

DEVELOPING A FOOD DEFENSE PLAN A GUIDE

Check Sheet for the Compliance Program

Creating a Secure Supply Chain

ICMI International Cyanide Management Code Summary Audit Report. Intermarine, LLC - Industrial Terminals Initial Certification Audit

Air Cargo & Air Supply Chain Security : Perspective From Integrators

Accounts Payable-Vendor Partnership

SIMPLE FUND 360: AN AUDITORS GUIDE. Australia s leading cloud SMSF admin solution AN AUDITORS GUIDE.

INTEGRATED LOGISTICS SOLUTIONS ANGOLA

GUIDANCE FOR INDUSTRY IMPORTERS AND FILERS: FOOD SECURITY PREVENTIVE MEASURES GUIDANCE

Cargo and Mail ( )

ANNEX 2 Security Management Plan

CARGO THEFT AND SMUGGLING

SNAP 2017 ENTRANCE TEST - TEST DAY GUIDE

SAMPLE SECURITY PLAN

FSIS Safety and Security Guidelines for the Transportation and Distribution of Meat, Poultry, and Egg Products

BRC Global Standard for Food Safety Position Statements

Purpose: To document a product and it s functionality for educating users. Page 1 of 34

MEASURES TO PREVENT UNLAWFUL ACTS AGAINST PASSENGERS AND CREWS ON BOARD SHIPS ***

STP358: Order Forecast Monitor in SNC

1. Principle of Solas + responsibility SOLAS: Safety Of Life At Sea.

Security Management. How do we implement the Regulations? Marc Volders - MAY 31, 2006

ACE Program Status, Portal and Reports Presentation. Professional Association of Exporters and Importers Webinar

Repair Station Training Repair Station Facility Security Providing Security Specifically for Repair Stations

The World Bank Audit Firm Assessment Questionnaire

IMMEX SERVICE. Non-Resident VMI Solution by NEMX

NOTIONAL FOR DISCUSSION PURPOSES ONLY. Achieving 100% Cargo Screening on Passenger Aircraft

SUPPLY CHAIN SECURITY

ORACLE HOSPITALITY CLOUD CONSULTING SERVICE DESCRIPTIONS October 19, 2017

Creating Alternatives to Fit Your Security Needs. Providing a full range of Guarding Services: On-site Remote Mobile Technology

Quality Clauses F Rev. I West Brooks Avenue North Las Vegas, NV Phone (702) Fax (702)

Customer Service Portal Overview

Supply Chain Security vs. Port Security. AAPA Terminal Management Seminar Long Beach, CA January 25, 2005

FACILITY SECURITY PLAN (FSP) REVIEW CHECKLIST

General Information on Authorised Economic Operator (AEO)

Guidance Document. Auditing the Cloud Controls Matrix

Automated Data Collection System

Bay District Schools HR Portal Instructions 5/8/2015

Hands of Thieves. Guarding Food. from the. Transportation. By kerry beach Product Transports

CORPORATE PROCUREMENT UNIT SITE & SECURITY PROCEDURES BOSTON SPA VERSION 7 APR09

Training for CSIRT staff

ENTERPRISE COMPLIANCE SOLUTIONS

Quality Management Systems - Requirements for Aviation, Space and Defense Organizations (AS9100)

Transportation Management Accounting Portal Invoice Upload

Physical Security Assessment Form

STUDY GUIDE. Milestone

Intermaritime Certification Services (ICS) QUALITY MANAGEMENT SYSTEM INSTRUCTIVE FOR ISM-CODE

FAQs about Advance Filing Rules on Maritime Container Cargo Information

Anti-Counterfeit Policy Mouser has adopted this Anti-Counterfeit Policy to eliminate the impact of counterfeit products on Mouser and its customers.

A Taste of What s Cooking at US Foods. Vendor Training Guide Food Fanatics Live App

WELCOME TO SANTANDER TREASURY LINK

Exporter account User's Guide Table of Contents

SOLAS VGM FAQs Frequently asked questions about the new verified gross mass requirement from the Safety of Life at Sea convention

A copy of this Policy Statement and our WPVP Program is readily available to all employees from each manager and supervisor.

Ingersoll Rand ERS and isupplier FAQ s

II. EXPORT FLOW FOR FULL CONTAINER LOAD (PORT KLANG)

MYMSC A SIMPLE GUIDE

Coffee Break: Overview of the Broker-Known Importer Program (BKIP)

Examining the New SQF Quality Code: How to Comply by the January Deadline

Jacksonville Aviation Authority (JAA)

Food Safety Modernization Act An Industry Perspective

SMARTFLEX TECHNOLOGY PTE LTD

SMe-Plug Software for SME Logistics Operations with e-freight Capability

Patients are Counting on Us: A Little Less Conversation It s Time to Act

Delphi Supplier Profile Supplier Administrator - E-Learning How To Enter Diversity Spend Data

Secure Trade Partnership: Singapore s Authorized Economic Operator Programme

Trade facilitation as a key to unlocking trade potential along OBOR

Quickstart Guide Online Payroll. The secure, convenient way to pay and manage payroll.

Guide to Wholesaling and Brokering of Medicinal Products for Human Use in Ireland

Visteon Corporation. Customer Specific Requirements Fifth Edition. For Use with ISO/TS 16949:2009

RIT ORACLE CAPITAL EQUIPMENT PHYSICAL INVENTORY

Level 2, 3 & 4 Diplomas in Customer Service ( ) August 2014 Version 3.0 (October 2016)

Living Our Purpose and Core Values CODE. Code of Business Ethics and Conduct for Vendors

Contracting with Transportation Intermediaries Practical Considerations and Formal Contracts

Transcription:

Customs Brokers Limited Global Logistics SERVICES OFFERED Customs-Trade Partnership Against Terrorism U.S. Customs and Border Protection Partners In Protection Contact: training@affiliated.ca

TRAINING: MODULE "MINIMUM SECURITY CRITERIA FOR C-TPAT IMPORTER" WHO: Personnel involved with the elaboration of the Security Plan DURATION: ½ day C-TPAT and/or PIP Programs Specifications. Please note that at a minimum, on a yearly basis or as circumstances dictate such as during periods of heightened alert, security breach or incident, the Importer must conduct a comprehensive assessment of their international supply chains based upon the C-TPAT Minimum Security Criteria, as described below, to ensure that pertinent security measures are in place and are adhered to throughout their supply chain. MINIMUM SECURITY CRITERIA 1. Business Partner Requirement: 1.1. Security Procedures 1.2. Point of Origin 1.3. Participation/Certification in a Foreign Customs Administration Supply Chain Security Program 1.4. Other Internal criteria for selection 2. Container Security: 2.1. Inspection 2.2. Seals 2.3. Storage 3. Physical Access Controls: 3.1. Employees 3.2. Visitors 3.3. Deliveries (including mail) 3.4. Challenging and Removing Unauthorized Persons 4. Personnel Security: 4.1. Pre-Employment Verification 4.2. Background checks / investigations 4.3. Personnel Termination Procedures 5. Procedural Security: 5.1. Documentation Processing 5.2. Manifesting Procedures 5.3. Shipping & Receiving 5.4. Cargo Discrepancies 1

TRAINING: MODULE "MINIMUM SECURITY CRITERIA FOR C-TPAT IMPORTER" cont d 6. Security Training and Threat Awareness: 6.1. Physical Security i. Fencing ii. Gate(s) and Gate House(s) iii. Parking iv. Building Structure(s) v. Locking Devices and Key Controls vi. Lighting vii. Alarms Systems & Video Surveillance Cameras 7. Information Technology Security: 7.1. Password Protection 7.2. Accountability 2

TRAINING: MODULE "SECURITY" WHO: All personnel DURATION: 1h30 Physical Access Control: 1.1. Employees 1.2. Visitors 1.3. Deliveries (including mail) CTPAT / PIP 1.4. Challenging and Removing Unauthorized Persons 2. Personnel Security: 2.1. Pre-Employment Verification 2.2. Background checks / investigations 2.3. Personnel Termination Procedures 3. Procedural Security: 3.1. Documentation Processing 3.2. Manifesting Procedures 3.3. Shipping & Receiving 3.4. Cargo Discrepancies 4. Security Training and Threat Awareness: 4.1. Physical Security i. Fencing ii. Gate(s) and Gate House(s) iii. Parking iv. Building Structure(s) v. Locking Devices and Key Controls vi. Lighting vii. Alarms Systems & Video Surveillance Cameras 5. Information Technology Security: 5.1. Password Protection 5.2. Accountability 3

TRAINING: MODULE "LOGISTICS" WHO: Personnel responsible for the Reception and Expedition of goods DURATION: 2h00 1. Business Partner: 1.1. Security Procedures 1.2. Point of Origin 1.3. Participation / Certification in Foreign Customs Administrations Supply Chain Security Programs 1.4. Other Internal criteria for selection 2. Container Security: 2.1. Inspection 2.2. Seals 2.3. Storage 3. Procedural Security: 3.1. Documentation Processing 3.2. Manifesting Procedures 3.3. Shipping & Receiving 3.4. Cargo Discrepancies 4

TRAINING: MODULE "C-TPAT PORTAL" WHO: Designated Personnel responsible for accessing and maintaining the C-TPAT Portal DURATION: 1h00 1. Accession to Portal: 1.1. Password 1.2. Navigation throughout the Portal 1.3. Routine Verification 1.4. Session Duration 2. Tab "Home": 2.1. Primary Point of Contact (PPC) and 1 substitute as backup 2.2. Request for Annual Review 2.3. Details of Registration 2.4. Print Security Profile 2.5. Print Company Profile 3. Tab "Search": 3.1. Partners Verification Status (Status Verification) 4. Tab "Partner": 4.1. Company Profile 4.2. Security Profile 4.3. Status Verification i. Company SVI # ii. E-mail of Company SVI # iii. Register Partners SVI # 4.4. Business Entities 4.5. Validation Response 5. Tab "Documents": 5.1. Public Document Library 5.2. File History (downloaded documents) 6. Tab "Discussion": 6.1. Partner Direct Messaging 5

TRAINING: MODULE "5-STEP RISK ASSESSMENT PROCESS" WHO: Designated Person (PPC) responsible for accessing and maintaining the C-TPAT Portal DURATION: ½ day 1. Building the Register 1.1. Mapping Cargo Flow and Identifying Business Partners 1.2. Conducting a Threat Assessment 1.3. Conducting and Measuring Vulnerability (according to C-TPAT Minimum Security Criteria) 1.4. Preparing an Action Plan 1.5. Documenting how Risk Assessments are conducted 2. Security Questionnaire Points covered: 2.1. Physical Security of premises (access control) 2.2. Personnel Security 2.3. Procedural Security 3. Following-up with Business Partners / Suppliers 4. Calculating the Risk Level 5. Answering to C-TPAT Required Recommendations/Actions 6. Managing the C-TPAT Portal 6