Your SlideShare is downloading. ×
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Vendor ctpat securityawareness2010
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Vendor ctpat securityawareness2010

200

Published on

C-TPAT Security and Threat Awareness Training

C-TPAT Security and Threat Awareness Training

Published in: Business, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
200
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. C-TPATSecurity and Threat AwarenessTrainingInternationalShippingandReceiving
  • 2. - 2 -Policy•  Committing to providing a safe andhealthful work environment for theemployees.•  Suspected threats or suspiciousincidents require prompt action bysafety, law enforcement and employeepersonnel.•  Coordination and communication areessential to protect employees.
  • 3. - 3 -What is C-TPAT?•  US Customs – Trade Partnership AgainstTerrorism•  Callaway Golf has been a certified membersince 2003•  First Validation completed September 2007•  Revalidation in 2010•  Program which opens the supply chainsecurity practices to US Customs forinspection and approval
  • 4. - 4 -C-TPAT ComponentsIT SecurityProcedural SecurityPersonnel Security,Training, and Security AwarenessPhysical Security &Access ControlContainer Security
  • 5. - 5 -Security Training and ThreatAwareness Training•  Purpose:– To train employees to recognize and beaware of the threat posed by terrorists at eachpoint in the supply chain.– Employees must know how to reportsituations that may compromise security (who,what, when).– Employees must be aware of emergencyprocedures the company has in place.•  evacuation procedures
  • 6. - 6 -Management Responsibilities•  It is management’s responsibility tominimize potential danger through quicksegregation of suspect cartons oridentification and isolation of suspiciouspersons.•  Advise of necessary evacuations•  Act on reports of suspicious activities
  • 7. - 7 -Management Responsibilities•  Ensure that all employees, throughsafety talks, threat awareness andemergency action-plan training, areinstructed on initial actions in theevent of a security threat introducedinto the factory’s environment.
  • 8. - 8 -Physical Security•  Fencing in active use around internationalshipping and receiving areas•  Door and gate locks used and functioningproperly.•  Camera surveillance equipment in place andin working order.•  Adequate lighting.•  No abandoned packages lying about. Free ofclutter.
  • 9. - 9 -Physical Security•  Employees should immediatelyreport:– Damage to exterior fencing, lighting and thebuilding structure;– Defective locking devices and signs oftampering or forcing locks in the building oralong the fence line;– Missing badges and access cards or the useof badges and cards by unauthorizedpersonnel;– Any damage to the alarm systems or videosurveillance systems.
  • 10. - 10 -Identifying Intruders•  Employees must wear badges at all times and shouldreport cases where:–  Visitors are not wearing identifying badges while on the facility premises–  Piggybacking–  Any proposed break in procedure•  “I just need to drop something off….” (follow reporting chain for each facility)•  Unauthorized/unaccompanied persons are not allowed inreceiving and storage areas.•  Delivery personnel must have proper paperwork andcompany ID.•  Unknown personnel or vehicles must be reported toSecurity department.
  • 11. - 11 -Physical Access Controls•  IMPORTANT AREA OF EMPLOYEEPARTICIPATION–  Employees should know fellow co-workers andchallenge unauthorized personnel to identifythemselves when seen on the premises.–  Employees should notify Security or their supervisorabout ANY unauthorized personnel on premises.–  Employees should immediately report if terminatedemployees try to access the facility premises.
  • 12. - 12 -Securing Current Inventory•  An accurate inventory procedure shouldbe in effect that accounts for all property.•  The records and inventory should besubject to periodic audit.•  Inventory counts should be subject tochecks and balances that allow fordiscrepancies to be discovered andinvestigated thoroughly.
  • 13. - 13 -Container and Seal Inspection•  Upon receipt of full ocean containers–  Complete the 7 Point ocean container checklist forevery full ocean container–  During this inspection you will be looking for securitybreaches in the container and the seals•  Container (or trailer) damage or alterations;•  Broken or compromised container (or trailer) seals;–  Complete the container checklist and file with the billof lading and seal records.
  • 14. - 14 -Container Security Conduct a 7 pointinspection of containers Have written seal controland usage procedures inplace Use high quality sealISO17712 Have proper reportingprocedure to localauthorities
  • 15. - 15 -
  • 16. - 16 -
  • 17. - 17 -What does a compromised container look like?Floor Should BeFlat – Don’t Stepup to get insideContraband In Floor
  • 18. - 18 -Undercarriage Support Beams Should Be Visible
  • 19. - 19 -Solid Plate – Support Beams are NOT Visible
  • 20. - 20 -Undercarriage Compromised
  • 21. - 21 -Contraband in Undercarriage
  • 22. - 22 -When to Notify Supervisor•  Unauthorized personnel in container/trailer storage areas;•  Any alterations to the trailer or seal•  Paperwork discrepancies (unaccountedfor cargo, missing cargo).•  Supervisor will notify SecurityDepartment, who will determinenotification Local Customs or other lawenforcement agency
  • 23. - 23 -Receiving Security•  A shift supervisor must be present duringany delivery.•  A 7 Point Container Checklist to becompleted prior to breaking seal andopening container•  Delivery personnel are required to producea proper packing list with a valid PO#.•  Shipments should be carefully checked forsigns of pilferage and damage.
  • 24. - 24 -Import Procedural Security•  Receiving employees must:– Verify that cargo specifications matchpaperwork– Verify seal number– Check for exterior signs of tampering– After unloading, check interior for tampering– Report any signs of tampering or suspiciousactivity– Make sure container/trailer is properlyreloaded or stored– Follow all written procedures: keep all logsupdated
  • 25. - 25 -What may be considered a possible“Security Threat”?•  Pallets or Packages that show signs oftampering.•  Sagging or loose shrink wrap.•  Missing boxes in a lot or too many boxes.•  A box that looks “out of place”.•  Protruding wires, stains, misspelled commonwords. Unusual marks.•  Excessive securing material such as tape orstring.
  • 26. - 26 -Further Indicators of PossibleThreatening Boxes/Packages•  Oily stains, strange odor, objects protruding•  Lopsided box.•  Wrong Title with Personnel Name•  No return address or badly typed or written•  Excessive postage•  Restrictive markings such as “Personal”
  • 27. - 27 -What should you do?•  Handle with care, do not shake or bump.•  Isolate and look for indicators.•  Don’t open, smell or taste.•  Treat it as suspect.•  Call Security
  • 28. - 28 -Export Procedural Security•  Shipping employees must:–  Inspect trailer before loading for any damage–  7-point Checklist on every container delivered forloading–  7 point Container Checklist if trailer was in storage atlocal facility prior to loading–  Verify paperwork and seal number•  Cargo integrity (correct quantity, weight, description)–  Properly affix seal–  Report any signs of tampering or suspicious activity–  Follow written procedures: keep logs updated
  • 29. - 29 -Recognizing Internal Conspiracies•  Employees not in appropriate work spacesat appropriate time–  Example: assembly line personnel in warehouse–  Terminated employees in the warehouse•  Excessive contact with outside personnel•  Parking violations–  Next to containers/trailers–  No employee parking permit displayed•  “Can you do me a favor…?”
  • 30. - 30 -Security Awareness and You•  Customs Trade Partnership AgainstTerrorism brings the responsibility forsupply chain security to each individual.•  All employees should participate inkeeping their part of the supply chain asstrong as possible at their facility.–  Always be aware of potential security threats–  Follow procedures–  Report suspicious activity

×