SlideShare a Scribd company logo
1 of 55
Download to read offline
C-TPAT:
Supply Chain Security
Follow us today! @Livingston_Intl
Agenda
●Current Trade Environment
●C-TPAT Overview
●Program Benefits
●Minimum Security Criteria
●Security Best Practices
●Annual Validation Process
●Trade Account Management
●Summary
Current Trade Environment
Current Trade Environment
Security and trade facilitation
●Known vs. unknown parties
●Partnership = Known party =
low risk = trade facilitation
●Low-risk partners provided
priority at all times
Current Trade Environment
Security initiatives
●C-TPAT: Customs – Trade Partnership Against Terrorism
●Cornerstone of CBP’s layered approach to security
●CSI: Container Security Initiative
●ATS: Automated Targeting System
●FAST: Free and Secure Trade
●Importer Security Filing (“10 + 2”): Pre shipment data sets
required for ocean imports
Current Trade Environment
C-TPAT: CBP and business working together for a safer world
●Partnership to enhance cargo security
●Securing the supply chain against terrorism
●Facilitating legitimate trade
●Communication, knowledge exchange and trade best practices
Current Trade Environment
C-TPAT: Mutual Recognition Arrangements (MRA)
●Signed document between CBP and a foreign Customs
Administration
●The security requirements, validation and audit procedures
of the foreign program are the same or similar to C-TPAT.
●Member of one program is afforded benefits of the other
program
Current Trade Environment
C-TPAT: Current MRAs (As of December 2014)
●New Zealand (2007)
●Canada (2008)
●Jordan (2008)
●Japan (2009)
●Korea (2010)
●European Union (2012)
●Taiwan (2012)
●Israel (2014)
●Mexico (2014)
●Singapore (2014)
C-TPAT Overview
C-TPAT – Overview
Supply chain security model:
Security within each
segment of the supply chain
 Production
 Transportation
 Importation
 Distribution
Security criteria specific
to each segment
 Foreign manufacturer
 Forwarder/consolidator
 Carrier
 Importer
 Broker
C-TPAT – Overview
●Goal –Enhance entire supply chain process for each trade
relationship, from point of origin to domestic point of
distribution
●Program respects that each business is unique, with
different needs and resources available, and takes this into
consideration as part of the certification and validation
process.
●Application process - structured to assist businesses to
develop a security program that considers differences, and
still meets the minimum security criteria.
C-TPAT – Overview
Eligible Trade Partners:
●Carriers
●Consolidators
●Customs Brokers
●Exporters
●Foreign Manufacturers
●Importers (including Canadian NRI)
●Port Authorities and Terminal Operators
●Third Party Logistics Providers
C-TPAT – Overview
Tier Structure
●Tier I: Certified members of C-TPAT
●Security profile reviewed and approved by SCSS
●Tier II: Validated members of C-TPAT
●Successfully passed annual validation by SCSS team
●Tier III: Validated member of C-TPAT
●Trade Partner exceeds the minimum security criteria and
has adopted best practices
C-TPAT – Overview
Minimum security criteria in these categories:
●Business partner security requirements
●Conveyance security
●Physical Access controls
●Personnel security
●Procedural security
●Physical security
●Information Technology Security
●Security Training and Threat Awareness
C-TPAT – Overview
Business partner risk-assessment process
1. Mapping cargo flow and identifying business partners
2. Conducting a threat assessment
3. Conducting a security vulnerability assessment
4. Preparing an action plan to address vulnerabilities
5. Document how security risk assessments are conducted
Program Benefits
C-TPAT Program Benefits
●Reduced examination rates
●Access to dedicated FAST
lanes
●Exemption from stratified
exams for Tier II and Tier III
(Must also be an ISA
participant)
●Front of the line processing
C-TPAT Program Benefits
●Business resumption
●In event of a significant disruption in cargo processing,
CBP maintains communication and coordination with
members for business resumption
●Expedited trade processing
●Trade compliance issues resolved on a priority basis.
●Assigned Supply Chain Security Specialist (SCSS)
●Eligibility for the Importer Self-Assessment Program (ISA)
●C-TPAT annual conference and seminars
C-TPAT Program Benefits
Additional considerations
●Reduced inspections and faster release times mean
greater ability to predict lead time and decreases in supply
chain disruptions
●Competitive advantage - potential for increase in number
of customers and revenues
●Potential for reduced insurance and transportation costs
●Improved security for workforce
C-TPAT Program Benefits
Cost considerations
●No application or membership fee
●Potential expenses to
meet/implement minimum criteria
●Costs associated with self
assessment process
●CBP validation expense
C-TPAT Program Benefits
Tangible benefits measured by:
●Improved release times
●Fewer inspections
●Reduced examination expenses
●Reduced transportation costs (rates/driver wait time)
●Better inventory turnover
●Reduced risk of loss, damage and theft in supply chain
●Satisfy supplier/customer requirements
C-TPAT Program Benefits
Intangible benefits measured by:
●Business relationship with CBP
●Business partner relationships (customers and service
providers)
●Enhanced company profile
Minimum Security Criteria
Minimum Security Criteria
●Eight security categories apply to
all Trade Partners
●Specific minimum criteria within
each security category
●Trade Partner must demonstrate
how they satisfy all criteria
Minimum Security Criteria
Some criteria are common to all Trade Partners
●Must have written and verifiable processes for selection of
business partners
●Positive identification of all employees, visitors, vendors
●Pre-employment screening, background checks
●Buildings constructed of materials that resist unlawful entry,
regularly maintained, inspected, repaired
●Restricted access to cargo handling areas
●Procedures for securing IT systems
●Employees trained in security procedures and threat awareness
Minimum Security Criteria
Flexibility in how you may satisfy the criteria
●“Must” vs. “Should
●There may be more than one way to satisfy a “Must” criteria
●Don’t automatically assume that a “Should” criteria is optional
●For example, under “Physical Security”
●Cargo handling and storage facilities must have physical
barriers and deterrents that guard against unauthorized
access.
●Alarm systems and video surveillance cameras should be
utilized to monitor premises
Best Practices
Best Practices
●Achieved through effective
utilization of people, processes
and technology.
●Incorporate a system of checks
and balances, oversight,
accountability, and verification of
reliability.
●A single Best Practice does not
constitute an effective security
program
Best Practices
●Best Practices are defined as:
●Security measures that exceed the minimum C-TPAT
security Criteria,
●incorporate management support,
●have written policies and procedures that govern their
use,
●employs a system of checks and balances, and
●have measures in place to ensure continuity
Best Practices
●Although Customs has provided a definition of what a Best
Practice is, it is the trade community who creates and
implements them
●Customs has compiled a Best Practices Catalog that
Contains examples of Best Practices they have identified
while conducting validations of Trade Partners
Examples of Best Practices
Best Practices
●Business Partner Requirements
●Require logistics providers to comply with CTPAT or MRA
program via contract or written agreement
●Container Security
●Only designated employees should distribute container
seals and all seals are logged into an inventory control
system
Best Practices
●Physical Access Controls
●Employees should only be allowed access to specific
work areas necessary to perform their duties
●Personnel Security
●Periodic background checks performed based on cause,
and/or the sensitivity of the employee’s position, such as
management, security, packing, shipping etc.
Best Practices
●Procedural Security
●Ensure documentation is available in languages besides
English if workforce is multi-lingual
●Security Training and Threat Awareness
●Incentives or recognition should be given to encourage
employee participation in reporting security issues and
recommending improvements
Best Practices
●Physical Security
●Conduct periodic inspections of security measures and
keep written records of inspections, repairs, and
improvements
●Information Technology Security
●Data access should be assigned per job function
●Data should be backed up to ensure that records still
exist even if the main IT system is disabled
Annual Validation Process
Annual Validation Process
Validation Purpose
● Verify supply chain security processes
and ensure they are followed
● Ensure the information entered in the
CTPAT Portal is accurate
● Further the cooperative relationship
between CBP and Trade Partners
● Share best practices
● Develop solutions to specific issues or
vulnerabilities
● Comply with the SAFE Port Act
Annual Validation Process
Annual Risk Assessment
●Five-Step Risk Assessment of Supply Chain
●Performed annually
●Results uploaded to Trade Account
●Major talking point during a validation
●Valuable information before a foreign validation of a
factory
●Global compliance or internal audit is often involved in
factory inspections (for issues such as safety and human
rights), leverage this team for security as well
Annual Validation Process
Step One – Map Cargo Flow - Identifying Business Partners
●Factories, suppliers
●Warehouses, consolidation facilities
●Freight forwarders
●International carriers
●Terminals, shipyards and deconsolidation facilities
●Inland carriers
●Customs brokers
●Distribution centers
Annual Validation Process
Step Two – Conduct a Threat Assessment
●Using reliable, authoritative sources, identify country and
region specific threats in these key areas:
●Terrorism (political, bio, agro, cyber)
●Smuggling (Human, Contraband)
●Organized Crime
●Conditions that fostering the above situations
●Rate level of risk – Low – Medium - High
Annual Validation Process
Step Three – Conduct a Vulnerability Assessment
●Based on the minimum security criteria, identify
weaknesses in business partner procedures that
would allow a terrorist or criminal access to cargo,
data, information.
●Send security questionnaires to business partners
●Conduct on-site audits when practicable
●Rate their level of compliance and vulnerability
Annual Validation Process
Step Four – Prepare an Action Plan
●Address vulnerabilities found in
business partner’s security
programs.
●Record identified weaknesses
●Who is responsible for action
items
●Due dates for action items
●Progress reports to company
management
Annual Validation Process
Step Five – Document Risk Assessments Procedures
●How often are risk assessments normally conducted
●Identify when risk assessments must be conducted out of
cycle (e.g. new supplier or service provider overseas)
●Process must be reviewed at least annually
●Identify process owners
●Methods used for conducting Threat and Vulnerability
Assessments
●Process for “action items”
●Management oversight and accountability
Annual Validation Process
Domestic Validation Goals and Outcomes
●A domestic validation will take place at a U.S. facility (an
office, factory, distribution center, etc.)
●30 days notice before a validation
●Review security profile and risk assessment
●Review any vulnerabilities and suggest corrective actions
●Focus on business partners and documentation
●Follow up actions or corrective action plans
●Validation Report will be written by the SCSS
Annual Validation Process
Foreign Validation Goals and Outcomes
●A foreign validation will usually take place at an overseas
factory (either a related-party facility or an unrelated
vendor’s facility)
●30 days notice before a validation
●Review of security measures with an emphasis on
conveyance, physical, and personnel security
●Focus on the minimum security criteria and
implementation
●Often the SCSS will visit venues in high-risk countries
●Validation Report will be written by the SCSS
Trade Account Management
Trade Account Management
Secure Web Portal
●Redesigned user interface
●Enhanced functionality
●Easier to navigate
Trade Account Management
●Portal 2.0 – Phase 1 (November 2014)
●Complete redesign of user interface
●Single Trade Account, multiple C-TPAT Accounts
●Document Libraries
●Messages
●SVI monitoring
Trade Account Management
●Portal 2.0 – Phase 2 (May 2015)
●Enhanced account management tools
●Combine multiple Trade accounts (single Trade
Organization)
●Merge multiple C-TPAT Accounts (single Security
Model)
●Reformatting of the Security Profile
●Corrected error messages, glitches in Phase 1
Trade Account Management
●Security Profile – Annual Review
●Automated email sent 90 days prior to anniversary date
●Must be completed within the 90 day window
●Conduct 5-Step Risk Assessment
●Update/revise supply chain security procedures if
necessary
Summary
Summary and wrap-up
●What is your current business activity in /with the United
States?
●What is your role in the supply chain process?
●Are you working with C-TPAT business partners?
●Not eligible? Consider participation in a security program
administered by government where you operate
●Security continues to be a primary focus for CBP
Summary and wrap-up
●C-TPAT program will continue to evolve
●Business partner requirement – driving market toward
mandatory participation
●Perform risk assessment for tighter security of business
activity
●Be proactive in your approach to trade security
Livingston news
Looking for more value-added customs
and trade information?
Subscribe today to begin receiving
updates directly to your inbox
www.livingstonintl.com/subscribe
This session, and more on-demand webinars
and great customs and trade resources can
be found at livingstonintl.com.
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security

More Related Content

What's hot

C-TPAT Security Training
C-TPAT Security TrainingC-TPAT Security Training
C-TPAT Security TrainingAdrian Spectre
 
Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Chris Morris
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Defining kpi in terms of unsafe acts/conditions and near miss
Defining kpi in terms of unsafe acts/conditions and near miss  Defining kpi in terms of unsafe acts/conditions and near miss
Defining kpi in terms of unsafe acts/conditions and near miss Faiz Khan
 
Behavior based safety
Behavior based safetyBehavior based safety
Behavior based safetyPrem kumar
 
New Employee Safety Orientation
New Employee Safety OrientationNew Employee Safety Orientation
New Employee Safety OrientationBeamer
 
Security training manual
Security training manualSecurity training manual
Security training manualANILDEVADKAR
 
Safety induction presentation
Safety induction presentationSafety induction presentation
Safety induction presentationLucy Reimer
 
Road map to safety ppt
Road map to safety pptRoad map to safety ppt
Road map to safety pptDoug Crann
 
Audit iso 9001-2015-checklist-
Audit iso 9001-2015-checklist-Audit iso 9001-2015-checklist-
Audit iso 9001-2015-checklist-Anand Vedpathak
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk ManagementRamiro Cid
 
Load restraint Safe (Loading and unloading on vehicles)
Load restraint Safe (Loading and unloading on vehicles)Load restraint Safe (Loading and unloading on vehicles)
Load restraint Safe (Loading and unloading on vehicles)Ammar Abdelgader, Ph.D.
 
Training for Handling Hazardous Materials
Training for Handling Hazardous MaterialsTraining for Handling Hazardous Materials
Training for Handling Hazardous MaterialsSyreil Jude
 
Qhse objective & target 2015
Qhse objective & target 2015Qhse objective & target 2015
Qhse objective & target 2015Fitri Ifony
 

What's hot (20)

C-TPAT Security Training
C-TPAT Security TrainingC-TPAT Security Training
C-TPAT Security Training
 
Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016
 
Security training module
Security training moduleSecurity training module
Security training module
 
Defining kpi in terms of unsafe acts/conditions and near miss
Defining kpi in terms of unsafe acts/conditions and near miss  Defining kpi in terms of unsafe acts/conditions and near miss
Defining kpi in terms of unsafe acts/conditions and near miss
 
Hse plan
Hse planHse plan
Hse plan
 
Behavior based safety
Behavior based safetyBehavior based safety
Behavior based safety
 
New Employee Safety Orientation
New Employee Safety OrientationNew Employee Safety Orientation
New Employee Safety Orientation
 
MRM - Management Review Meeting Presentation
MRM - Management Review Meeting PresentationMRM - Management Review Meeting Presentation
MRM - Management Review Meeting Presentation
 
Auditing supply chain logistics -CTPAT
Auditing supply chain logistics -CTPATAuditing supply chain logistics -CTPAT
Auditing supply chain logistics -CTPAT
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
Safety induction presentation
Safety induction presentationSafety induction presentation
Safety induction presentation
 
Road map to safety ppt
Road map to safety pptRoad map to safety ppt
Road map to safety ppt
 
Audit iso 9001-2015-checklist-
Audit iso 9001-2015-checklist-Audit iso 9001-2015-checklist-
Audit iso 9001-2015-checklist-
 
ISO 45001:2018 slide show
ISO 45001:2018 slide show ISO 45001:2018 slide show
ISO 45001:2018 slide show
 
ISO 31000 Risk Management
ISO 31000 Risk ManagementISO 31000 Risk Management
ISO 31000 Risk Management
 
Load restraint Safe (Loading and unloading on vehicles)
Load restraint Safe (Loading and unloading on vehicles)Load restraint Safe (Loading and unloading on vehicles)
Load restraint Safe (Loading and unloading on vehicles)
 
Behaviour Based Study: Practising Perfect Safety
Behaviour Based Study: Practising Perfect Safety  Behaviour Based Study: Practising Perfect Safety
Behaviour Based Study: Practising Perfect Safety
 
Safety Culture
Safety CultureSafety Culture
Safety Culture
 
Training for Handling Hazardous Materials
Training for Handling Hazardous MaterialsTraining for Handling Hazardous Materials
Training for Handling Hazardous Materials
 
Qhse objective & target 2015
Qhse objective & target 2015Qhse objective & target 2015
Qhse objective & target 2015
 

Similar to Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security

Industrial Security Service
Industrial Security ServiceIndustrial Security Service
Industrial Security ServiceJennifer Taylor
 
Global Consulting Services - For Clients
Global Consulting Services - For ClientsGlobal Consulting Services - For Clients
Global Consulting Services - For ClientsRobert N. Tullar, CPM
 
CTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdfCTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdfdemingcertificationa
 
Beyond Software: The Role of Content & Connectivity in Global Trade Management
Beyond Software: The Role of Content & Connectivity in Global Trade ManagementBeyond Software: The Role of Content & Connectivity in Global Trade Management
Beyond Software: The Role of Content & Connectivity in Global Trade ManagementIntegration Point
 
NAFCD Convention: Trinity Logistics Presentation
NAFCD Convention: Trinity Logistics PresentationNAFCD Convention: Trinity Logistics Presentation
NAFCD Convention: Trinity Logistics PresentationtrinitylogisticsNAFCD
 
Module 3 establishing a trade compliance program
Module 3 establishing a trade compliance programModule 3 establishing a trade compliance program
Module 3 establishing a trade compliance programVivien Cheong
 
PP C&A 3D process guide
PP C&A 3D process guidePP C&A 3D process guide
PP C&A 3D process guideTony Hague
 
A centralized approach to global trade management
A centralized approach to global trade managementA centralized approach to global trade management
A centralized approach to global trade managementARC Advisory Group
 
MODULE-3-Strategy-Dev-in-Intel-BUs.pptx
MODULE-3-Strategy-Dev-in-Intel-BUs.pptxMODULE-3-Strategy-Dev-in-Intel-BUs.pptx
MODULE-3-Strategy-Dev-in-Intel-BUs.pptxTrixieJoyTaglucop
 
A Roadmap for a Successful P2P Automation Journey
A Roadmap for a Successful P2P Automation JourneyA Roadmap for a Successful P2P Automation Journey
A Roadmap for a Successful P2P Automation JourneyKissflow
 
Simplifying trade compliance eliminating risk, reducing cost
Simplifying trade compliance   eliminating risk, reducing costSimplifying trade compliance   eliminating risk, reducing cost
Simplifying trade compliance eliminating risk, reducing costGrant Sernick
 
Understanding Entry Visibility: Explanations & Implications
Understanding Entry Visibility: Explanations & ImplicationsUnderstanding Entry Visibility: Explanations & Implications
Understanding Entry Visibility: Explanations & ImplicationsIntegration Point
 
Webinar | GE & Stork | APM Best Practices - Mechanical Integrity
Webinar | GE & Stork | APM Best Practices - Mechanical IntegrityWebinar | GE & Stork | APM Best Practices - Mechanical Integrity
Webinar | GE & Stork | APM Best Practices - Mechanical IntegrityStork
 
CTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdfCTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdfAntonioCharnichartMa1
 
Service Contract Analytics - Leverage analytics to improve revenue and profit...
Service Contract Analytics - Leverage analytics to improve revenue and profit...Service Contract Analytics - Leverage analytics to improve revenue and profit...
Service Contract Analytics - Leverage analytics to improve revenue and profit...Genpact Ltd
 
How Livingston's Global Trade Management Services Add Value To Your Business
How Livingston's Global Trade Management Services Add Value To Your Business How Livingston's Global Trade Management Services Add Value To Your Business
How Livingston's Global Trade Management Services Add Value To Your Business Livingston International
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for YouTrustArc
 

Similar to Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security (20)

Industrial Security Service
Industrial Security ServiceIndustrial Security Service
Industrial Security Service
 
Global Consulting Services - For Clients
Global Consulting Services - For ClientsGlobal Consulting Services - For Clients
Global Consulting Services - For Clients
 
CTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdfCTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdf
 
Beyond Software: The Role of Content & Connectivity in Global Trade Management
Beyond Software: The Role of Content & Connectivity in Global Trade ManagementBeyond Software: The Role of Content & Connectivity in Global Trade Management
Beyond Software: The Role of Content & Connectivity in Global Trade Management
 
NAFCD Convention: Trinity Logistics Presentation
NAFCD Convention: Trinity Logistics PresentationNAFCD Convention: Trinity Logistics Presentation
NAFCD Convention: Trinity Logistics Presentation
 
Module 3 establishing a trade compliance program
Module 3 establishing a trade compliance programModule 3 establishing a trade compliance program
Module 3 establishing a trade compliance program
 
Global x Assessor
Global x AssessorGlobal x Assessor
Global x Assessor
 
PP C&A 3D process guide
PP C&A 3D process guidePP C&A 3D process guide
PP C&A 3D process guide
 
A centralized approach to global trade management
A centralized approach to global trade managementA centralized approach to global trade management
A centralized approach to global trade management
 
CTPAT PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum securityCTPAT  PPTX Presentation.pptx - minimum security
CTPAT PPTX Presentation.pptx - minimum security
 
MODULE-3-Strategy-Dev-in-Intel-BUs.pptx
MODULE-3-Strategy-Dev-in-Intel-BUs.pptxMODULE-3-Strategy-Dev-in-Intel-BUs.pptx
MODULE-3-Strategy-Dev-in-Intel-BUs.pptx
 
A Roadmap for a Successful P2P Automation Journey
A Roadmap for a Successful P2P Automation JourneyA Roadmap for a Successful P2P Automation Journey
A Roadmap for a Successful P2P Automation Journey
 
Simplifying trade compliance eliminating risk, reducing cost
Simplifying trade compliance   eliminating risk, reducing costSimplifying trade compliance   eliminating risk, reducing cost
Simplifying trade compliance eliminating risk, reducing cost
 
Understanding Entry Visibility: Explanations & Implications
Understanding Entry Visibility: Explanations & ImplicationsUnderstanding Entry Visibility: Explanations & Implications
Understanding Entry Visibility: Explanations & Implications
 
Webinar | GE & Stork | APM Best Practices - Mechanical Integrity
Webinar | GE & Stork | APM Best Practices - Mechanical IntegrityWebinar | GE & Stork | APM Best Practices - Mechanical Integrity
Webinar | GE & Stork | APM Best Practices - Mechanical Integrity
 
CTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdfCTPAT Highway Carriers MSC March 2020.pdf
CTPAT Highway Carriers MSC March 2020.pdf
 
Service Contract Analytics - Leverage analytics to improve revenue and profit...
Service Contract Analytics - Leverage analytics to improve revenue and profit...Service Contract Analytics - Leverage analytics to improve revenue and profit...
Service Contract Analytics - Leverage analytics to improve revenue and profit...
 
GTSC Transportation Security Day - Enterprise Support
GTSC Transportation Security Day - Enterprise SupportGTSC Transportation Security Day - Enterprise Support
GTSC Transportation Security Day - Enterprise Support
 
How Livingston's Global Trade Management Services Add Value To Your Business
How Livingston's Global Trade Management Services Add Value To Your Business How Livingston's Global Trade Management Services Add Value To Your Business
How Livingston's Global Trade Management Services Add Value To Your Business
 
5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You5 Signs Your Privacy Management Program is Not Working for You
5 Signs Your Privacy Management Program is Not Working for You
 

More from Livingston International

Softwood Lumber Update: ADD & CVD (April 2017)
Softwood Lumber Update: ADD & CVD (April 2017)Softwood Lumber Update: ADD & CVD (April 2017)
Softwood Lumber Update: ADD & CVD (April 2017)Livingston International
 
Seven Questions to ask when Looking for a Customs Broker
Seven Questions to ask when Looking for a Customs BrokerSeven Questions to ask when Looking for a Customs Broker
Seven Questions to ask when Looking for a Customs BrokerLivingston International
 
Understanding the Risks of Supply Chain Breakdowns
Understanding the Risks of Supply Chain Breakdowns Understanding the Risks of Supply Chain Breakdowns
Understanding the Risks of Supply Chain Breakdowns Livingston International
 
The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready?
The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready? The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready?
The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready? Livingston International
 
Best practices for automating your import processes
Best practices for automating your import processesBest practices for automating your import processes
Best practices for automating your import processesLivingston International
 
10 questions to ask before you export from the U.S.
10 questions to ask before you export from the U.S.10 questions to ask before you export from the U.S.
10 questions to ask before you export from the U.S.Livingston International
 
How to take control of your export process
How to take control of your export processHow to take control of your export process
How to take control of your export processLivingston International
 
How to determine if your goods qualify for NAFTA
How to determine if your goods qualify for NAFTAHow to determine if your goods qualify for NAFTA
How to determine if your goods qualify for NAFTALivingston International
 

More from Livingston International (11)

Softwood Lumber Update: ADD & CVD (April 2017)
Softwood Lumber Update: ADD & CVD (April 2017)Softwood Lumber Update: ADD & CVD (April 2017)
Softwood Lumber Update: ADD & CVD (April 2017)
 
Seven Questions to ask when Looking for a Customs Broker
Seven Questions to ask when Looking for a Customs BrokerSeven Questions to ask when Looking for a Customs Broker
Seven Questions to ask when Looking for a Customs Broker
 
How to Make it in Mexico
How to Make it in MexicoHow to Make it in Mexico
How to Make it in Mexico
 
Understanding the Risks of Supply Chain Breakdowns
Understanding the Risks of Supply Chain Breakdowns Understanding the Risks of Supply Chain Breakdowns
Understanding the Risks of Supply Chain Breakdowns
 
Small Business and Free Trade Agreements
Small Business and Free Trade AgreementsSmall Business and Free Trade Agreements
Small Business and Free Trade Agreements
 
The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready?
The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready? The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready?
The CBSA Accounts Receivable Ledger System (ARL) - Are you Ready?
 
Manage your IMMEX challenges
Manage your IMMEX challengesManage your IMMEX challenges
Manage your IMMEX challenges
 
Best practices for automating your import processes
Best practices for automating your import processesBest practices for automating your import processes
Best practices for automating your import processes
 
10 questions to ask before you export from the U.S.
10 questions to ask before you export from the U.S.10 questions to ask before you export from the U.S.
10 questions to ask before you export from the U.S.
 
How to take control of your export process
How to take control of your export processHow to take control of your export process
How to take control of your export process
 
How to determine if your goods qualify for NAFTA
How to determine if your goods qualify for NAFTAHow to determine if your goods qualify for NAFTA
How to determine if your goods qualify for NAFTA
 

Recently uploaded

Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai MooreDubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moorehf8803863
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Delhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Delhi Call girls
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)Delhi Call girls
 
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607dollysharma2066
 
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai CfnmDubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnmkojalkojal131
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...Delhi Call girls
 
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai SiblingDubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Siblingkojalkojal131
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)Delhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)Delhi Call girls
 
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...rajputriyana310
 

Recently uploaded (20)

Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 15 Noida Escorts >༒8448380779 Escort Service
 
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai MooreDubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
Dubai Call Girls Will Eats O528786472 Call Girls Dubai Moore
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 66 (Gurgaon)
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 68 (Gurgaon)
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida  >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Surajpur Greater Noida >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Pari Chowk Escorts, Noida >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Mayur Vihar Delhi >༒8448380779 Escort Service
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 52 (Gurgaon)
 
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Huda City Centre Gurgaon >༒8448380779 Escort Service
 
GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607
GENUINE Babe,Call Girls IN Dwarka Delhi | +91-8377087607
 
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai CfnmDubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
Dubai Call Girls Centerfold O525547819 Call Girls Dubai Cfnm
 
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
call girls in Indirapuram (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service...
 
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai SiblingDubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
Dubai Call Girls Jumeirah O525547819 Call Girls Dubai Sibling
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 49 (Gurgaon)
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 53 (Gurgaon)
 
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
Genuine Escort ℂaℓℓ Giℜℓs In DoubleTree by Hilton Hotel Gurgaon - New Delhi N...
 

Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security

  • 1. C-TPAT: Supply Chain Security Follow us today! @Livingston_Intl
  • 2. Agenda ●Current Trade Environment ●C-TPAT Overview ●Program Benefits ●Minimum Security Criteria ●Security Best Practices ●Annual Validation Process ●Trade Account Management ●Summary
  • 4. Current Trade Environment Security and trade facilitation ●Known vs. unknown parties ●Partnership = Known party = low risk = trade facilitation ●Low-risk partners provided priority at all times
  • 5. Current Trade Environment Security initiatives ●C-TPAT: Customs – Trade Partnership Against Terrorism ●Cornerstone of CBP’s layered approach to security ●CSI: Container Security Initiative ●ATS: Automated Targeting System ●FAST: Free and Secure Trade ●Importer Security Filing (“10 + 2”): Pre shipment data sets required for ocean imports
  • 6. Current Trade Environment C-TPAT: CBP and business working together for a safer world ●Partnership to enhance cargo security ●Securing the supply chain against terrorism ●Facilitating legitimate trade ●Communication, knowledge exchange and trade best practices
  • 7. Current Trade Environment C-TPAT: Mutual Recognition Arrangements (MRA) ●Signed document between CBP and a foreign Customs Administration ●The security requirements, validation and audit procedures of the foreign program are the same or similar to C-TPAT. ●Member of one program is afforded benefits of the other program
  • 8. Current Trade Environment C-TPAT: Current MRAs (As of December 2014) ●New Zealand (2007) ●Canada (2008) ●Jordan (2008) ●Japan (2009) ●Korea (2010) ●European Union (2012) ●Taiwan (2012) ●Israel (2014) ●Mexico (2014) ●Singapore (2014)
  • 10. C-TPAT – Overview Supply chain security model: Security within each segment of the supply chain  Production  Transportation  Importation  Distribution Security criteria specific to each segment  Foreign manufacturer  Forwarder/consolidator  Carrier  Importer  Broker
  • 11. C-TPAT – Overview ●Goal –Enhance entire supply chain process for each trade relationship, from point of origin to domestic point of distribution ●Program respects that each business is unique, with different needs and resources available, and takes this into consideration as part of the certification and validation process. ●Application process - structured to assist businesses to develop a security program that considers differences, and still meets the minimum security criteria.
  • 12. C-TPAT – Overview Eligible Trade Partners: ●Carriers ●Consolidators ●Customs Brokers ●Exporters ●Foreign Manufacturers ●Importers (including Canadian NRI) ●Port Authorities and Terminal Operators ●Third Party Logistics Providers
  • 13. C-TPAT – Overview Tier Structure ●Tier I: Certified members of C-TPAT ●Security profile reviewed and approved by SCSS ●Tier II: Validated members of C-TPAT ●Successfully passed annual validation by SCSS team ●Tier III: Validated member of C-TPAT ●Trade Partner exceeds the minimum security criteria and has adopted best practices
  • 14. C-TPAT – Overview Minimum security criteria in these categories: ●Business partner security requirements ●Conveyance security ●Physical Access controls ●Personnel security ●Procedural security ●Physical security ●Information Technology Security ●Security Training and Threat Awareness
  • 15. C-TPAT – Overview Business partner risk-assessment process 1. Mapping cargo flow and identifying business partners 2. Conducting a threat assessment 3. Conducting a security vulnerability assessment 4. Preparing an action plan to address vulnerabilities 5. Document how security risk assessments are conducted
  • 17. C-TPAT Program Benefits ●Reduced examination rates ●Access to dedicated FAST lanes ●Exemption from stratified exams for Tier II and Tier III (Must also be an ISA participant) ●Front of the line processing
  • 18. C-TPAT Program Benefits ●Business resumption ●In event of a significant disruption in cargo processing, CBP maintains communication and coordination with members for business resumption ●Expedited trade processing ●Trade compliance issues resolved on a priority basis. ●Assigned Supply Chain Security Specialist (SCSS) ●Eligibility for the Importer Self-Assessment Program (ISA) ●C-TPAT annual conference and seminars
  • 19. C-TPAT Program Benefits Additional considerations ●Reduced inspections and faster release times mean greater ability to predict lead time and decreases in supply chain disruptions ●Competitive advantage - potential for increase in number of customers and revenues ●Potential for reduced insurance and transportation costs ●Improved security for workforce
  • 20. C-TPAT Program Benefits Cost considerations ●No application or membership fee ●Potential expenses to meet/implement minimum criteria ●Costs associated with self assessment process ●CBP validation expense
  • 21. C-TPAT Program Benefits Tangible benefits measured by: ●Improved release times ●Fewer inspections ●Reduced examination expenses ●Reduced transportation costs (rates/driver wait time) ●Better inventory turnover ●Reduced risk of loss, damage and theft in supply chain ●Satisfy supplier/customer requirements
  • 22. C-TPAT Program Benefits Intangible benefits measured by: ●Business relationship with CBP ●Business partner relationships (customers and service providers) ●Enhanced company profile
  • 24. Minimum Security Criteria ●Eight security categories apply to all Trade Partners ●Specific minimum criteria within each security category ●Trade Partner must demonstrate how they satisfy all criteria
  • 25. Minimum Security Criteria Some criteria are common to all Trade Partners ●Must have written and verifiable processes for selection of business partners ●Positive identification of all employees, visitors, vendors ●Pre-employment screening, background checks ●Buildings constructed of materials that resist unlawful entry, regularly maintained, inspected, repaired ●Restricted access to cargo handling areas ●Procedures for securing IT systems ●Employees trained in security procedures and threat awareness
  • 26. Minimum Security Criteria Flexibility in how you may satisfy the criteria ●“Must” vs. “Should ●There may be more than one way to satisfy a “Must” criteria ●Don’t automatically assume that a “Should” criteria is optional ●For example, under “Physical Security” ●Cargo handling and storage facilities must have physical barriers and deterrents that guard against unauthorized access. ●Alarm systems and video surveillance cameras should be utilized to monitor premises
  • 28. Best Practices ●Achieved through effective utilization of people, processes and technology. ●Incorporate a system of checks and balances, oversight, accountability, and verification of reliability. ●A single Best Practice does not constitute an effective security program
  • 29. Best Practices ●Best Practices are defined as: ●Security measures that exceed the minimum C-TPAT security Criteria, ●incorporate management support, ●have written policies and procedures that govern their use, ●employs a system of checks and balances, and ●have measures in place to ensure continuity
  • 30. Best Practices ●Although Customs has provided a definition of what a Best Practice is, it is the trade community who creates and implements them ●Customs has compiled a Best Practices Catalog that Contains examples of Best Practices they have identified while conducting validations of Trade Partners
  • 31. Examples of Best Practices
  • 32. Best Practices ●Business Partner Requirements ●Require logistics providers to comply with CTPAT or MRA program via contract or written agreement ●Container Security ●Only designated employees should distribute container seals and all seals are logged into an inventory control system
  • 33. Best Practices ●Physical Access Controls ●Employees should only be allowed access to specific work areas necessary to perform their duties ●Personnel Security ●Periodic background checks performed based on cause, and/or the sensitivity of the employee’s position, such as management, security, packing, shipping etc.
  • 34. Best Practices ●Procedural Security ●Ensure documentation is available in languages besides English if workforce is multi-lingual ●Security Training and Threat Awareness ●Incentives or recognition should be given to encourage employee participation in reporting security issues and recommending improvements
  • 35. Best Practices ●Physical Security ●Conduct periodic inspections of security measures and keep written records of inspections, repairs, and improvements ●Information Technology Security ●Data access should be assigned per job function ●Data should be backed up to ensure that records still exist even if the main IT system is disabled
  • 37. Annual Validation Process Validation Purpose ● Verify supply chain security processes and ensure they are followed ● Ensure the information entered in the CTPAT Portal is accurate ● Further the cooperative relationship between CBP and Trade Partners ● Share best practices ● Develop solutions to specific issues or vulnerabilities ● Comply with the SAFE Port Act
  • 38. Annual Validation Process Annual Risk Assessment ●Five-Step Risk Assessment of Supply Chain ●Performed annually ●Results uploaded to Trade Account ●Major talking point during a validation ●Valuable information before a foreign validation of a factory ●Global compliance or internal audit is often involved in factory inspections (for issues such as safety and human rights), leverage this team for security as well
  • 39. Annual Validation Process Step One – Map Cargo Flow - Identifying Business Partners ●Factories, suppliers ●Warehouses, consolidation facilities ●Freight forwarders ●International carriers ●Terminals, shipyards and deconsolidation facilities ●Inland carriers ●Customs brokers ●Distribution centers
  • 40. Annual Validation Process Step Two – Conduct a Threat Assessment ●Using reliable, authoritative sources, identify country and region specific threats in these key areas: ●Terrorism (political, bio, agro, cyber) ●Smuggling (Human, Contraband) ●Organized Crime ●Conditions that fostering the above situations ●Rate level of risk – Low – Medium - High
  • 41. Annual Validation Process Step Three – Conduct a Vulnerability Assessment ●Based on the minimum security criteria, identify weaknesses in business partner procedures that would allow a terrorist or criminal access to cargo, data, information. ●Send security questionnaires to business partners ●Conduct on-site audits when practicable ●Rate their level of compliance and vulnerability
  • 42. Annual Validation Process Step Four – Prepare an Action Plan ●Address vulnerabilities found in business partner’s security programs. ●Record identified weaknesses ●Who is responsible for action items ●Due dates for action items ●Progress reports to company management
  • 43. Annual Validation Process Step Five – Document Risk Assessments Procedures ●How often are risk assessments normally conducted ●Identify when risk assessments must be conducted out of cycle (e.g. new supplier or service provider overseas) ●Process must be reviewed at least annually ●Identify process owners ●Methods used for conducting Threat and Vulnerability Assessments ●Process for “action items” ●Management oversight and accountability
  • 44. Annual Validation Process Domestic Validation Goals and Outcomes ●A domestic validation will take place at a U.S. facility (an office, factory, distribution center, etc.) ●30 days notice before a validation ●Review security profile and risk assessment ●Review any vulnerabilities and suggest corrective actions ●Focus on business partners and documentation ●Follow up actions or corrective action plans ●Validation Report will be written by the SCSS
  • 45. Annual Validation Process Foreign Validation Goals and Outcomes ●A foreign validation will usually take place at an overseas factory (either a related-party facility or an unrelated vendor’s facility) ●30 days notice before a validation ●Review of security measures with an emphasis on conveyance, physical, and personnel security ●Focus on the minimum security criteria and implementation ●Often the SCSS will visit venues in high-risk countries ●Validation Report will be written by the SCSS
  • 47. Trade Account Management Secure Web Portal ●Redesigned user interface ●Enhanced functionality ●Easier to navigate
  • 48. Trade Account Management ●Portal 2.0 – Phase 1 (November 2014) ●Complete redesign of user interface ●Single Trade Account, multiple C-TPAT Accounts ●Document Libraries ●Messages ●SVI monitoring
  • 49. Trade Account Management ●Portal 2.0 – Phase 2 (May 2015) ●Enhanced account management tools ●Combine multiple Trade accounts (single Trade Organization) ●Merge multiple C-TPAT Accounts (single Security Model) ●Reformatting of the Security Profile ●Corrected error messages, glitches in Phase 1
  • 50. Trade Account Management ●Security Profile – Annual Review ●Automated email sent 90 days prior to anniversary date ●Must be completed within the 90 day window ●Conduct 5-Step Risk Assessment ●Update/revise supply chain security procedures if necessary
  • 52. Summary and wrap-up ●What is your current business activity in /with the United States? ●What is your role in the supply chain process? ●Are you working with C-TPAT business partners? ●Not eligible? Consider participation in a security program administered by government where you operate ●Security continues to be a primary focus for CBP
  • 53. Summary and wrap-up ●C-TPAT program will continue to evolve ●Business partner requirement – driving market toward mandatory participation ●Perform risk assessment for tighter security of business activity ●Be proactive in your approach to trade security
  • 54. Livingston news Looking for more value-added customs and trade information? Subscribe today to begin receiving updates directly to your inbox www.livingstonintl.com/subscribe This session, and more on-demand webinars and great customs and trade resources can be found at livingstonintl.com.