SlideShare a Scribd company logo
1 of 4
Download to read offline
GENERAL OVERVIEW
1 There is a policy that requires that all security procedures are documented?
2 The facility has a security department/personnel?
3 There is a designated security chief at the facility?
4
5 An appointed facility official is responsible for security audits or evaluations?
6 A facility security plan is developed and is reviewed/updated semi-annually?
7
PERSONNEL SECURITY
8 Personnel security procedures are written and evaluated quarterly?
9 Personnel security procedures are evaluated in response to security failures?
10 Personnel security requirements apply to contracting temporary and part time employees?
11 Employment applications are required for all applicants?
12 All applicants are interviewed?
13 When allowed by law, background checks are conducted on all applicants?
14
15
16
17
18 The facility retains a copy of the employee's official identification?
19 A facility issued photo-badge is required for employee access?
20
21 Procedures are used to retrieve an employee ID and/or deactivate access as needed?
22 Lost IDs are recorded as missing before replacement and security staff informed?
23
24 Security guards monitor access to facility restricted areas?
25
26
27
28
29
30 Security procedures are publicized throughout the facility on posters and bulletin boards?
PHYSICAL SECURITY
Level 1 Country (High Risk)
A site security assessment is conducted quarterly to identify vulnerabilities and necessary corrective
actions?
WAL-MART STORES, INC.
Factory Security Assessment
An appointed company official is responsible for facility, employee, and transport security?
Applicant background check includes employment history, reference check, and criminal records
check?
The applicant's examined identification includes a National ID Card and birth certificate?
When allowed by law, background checks are updated on all employees?
A permanent personnel file is maintained for each employee with the employee's name, date of birth,
and a National ID number?
Issue of employee identification is centralized and controlled by a specific department and restricted to
limited authorized employees?
A specific color coded ID is required to access restricted areas to include the receiving and shipping
areas?
New employee orientation includes confirming that anytime onsite the facility requires wearing an ID
badge?
New employee orientation includes reporting unidentified persons, breach of computer security, and
internal conspiracies?
New employees are asked to report compromised to security infrastructure such as broken locks,
windows, facility structure?
The facility has a documented security awareness program in place for all employees to include
training participation?
Employees are encouraged to report irregularities, suspicious activity, and security violations through
an incentive program?
Factory Security Assessment - Level 1
31 The facility has an intrusion detection or an alarm system?
32 The intrusion detection/alarm system has back-up power and is tested regularly?
33 A record is maintained of employee access to keys, cards or codes?
34 Facility utilizes card or code activated locking devices to protect controlled areas?
35 Keys/cards are returned or codes are changed when an employee leaves the company?
36
37
38
39
40
41
42
43
44
45 The entire facility and perimeter fence/wall is lighted during darkness?
46 The cargo conveyances/shipping area is lighted?
47 Lighting has an emergency power source/generator?
48 Access to the lighting switches is restricted to only authorized personnel?
49 Empty and loaded containers are stored in a designated area guarded by security at all times?
50 Containers stored on-site, in a designated area, are secured with a high security seal or lock?
51 There is a designated security guard force on duty to protect the facility 24/7?
52 There is radio communication between the central security office and the exterior guard posts?
53 Security guards have training specific to facility security?
54
55
56 The facility has direct communication to local law enforcement authorities?
57 Security guards and/or security supervisor reports incidents to facility management?
58 Facility gates are protected during operating hours with guards and cameras?
59 Facility gates are protected during non-operating hours with guards and cameras?
60 Employee entries and exits are recorded?
61 Security guards patrol the interior of buildings of the facility?
62
63 CCTV recordings which are kept for 45 days?
64
65 Advance information from a vendor is required before the visit?
66 A positive identification process is used to record all visitors and vendors?
67 A visitors log is maintained which records all entries and exits?
68
69 Visitors are escorted throughout their visit to the facility?
70 Procedures are used to screen arriving packages and mail prior to distribution?
Procedures exist to immediately terminate existing physical access when an employee terminates
employment or transfers to another position?
Management is provided with an current list of all employee access privileges on a monthly basis?
All facility buildings are constructed of materials that prevent unlawful entry and are kept in good repair?
As applicable, the facility perimeter is secured with either a chain-link fence, masonry, steel wall or an
equivalent barrier capable to deter illegal access?
Schedule daily inspections are performed of the perimeter including checking for damage, attempted
illegal access, and needed repair?
The perimeter fence/wall has concertina wire, barbed wire, or an equivalent substance as an additional
security element?
There are no adjoining/overhanging structures or foliage which would facilitate illegal and unnoticed
entry into the facility?
Underground access points such as culverts, utility tunnels, sewers are secured to prevent
unauthorized access?
Only the security guard supervisor and designated facility management have keys or access controls
to facility gates?
Security guards have training specific to Threat Awareness, Unauthorized Access and Internal
Conspiracy?
The facility provides an employee threat awareness program to recognize a security threat?
Closed circuit television cameras (CCTV) is used to monitor activity inside/outside the facility?
CCTVs are monitored constantly on all shifts by guards or security personnel with no other
assignments?
Visitor badges are controlled through a numbering system when issued and verified upon return?
Factory Security Assessment - Level 1
71 There is a procedure to conduct a security check of incoming and outgoing cargo vehicles?
72
73 Conveyance drivers are required to show personal photo identification?
74
75
76
77 Shipping and receiving parking lots are separated from all other parking lots?
78 Visitor and employee vehicles are prevented from parking near cargo conveyance vehicles?
79
80 Vehicles are prohibited/prevented from parking near the perimeter fencing?
81
82
83 Methods exist to detect and report cargo shortages and overages during container loading?
INFORMATION ACCESS CONTROLS
84
85
86
87 There are procedures to identify which employees have access to High Security Seals?
88 Information systems passwords are protected?
89 Only relevant employees are provided with individually assigned IT system accounts?
90
91 The facility has procedures to adjust or rescind computer access?
92 There is a designated system administrator responsible to establish a user ID?
93
94 Incidents of unauthorized IT system access is investigated and recorded?
95 The facility has implemented into its computer network an intrusion warning system?
96
SHIPMENT INFORMATION CONTROLS
97
98
99 Records are maintained on all shipments?
100
STORAGE AND DISTRIBUTION
101 International and domestic cargo is segregated at the facility?
102
103 Loading dock access is restricted to only authorized employees?
A person is trained on the information requirements for shipments to the United States?
A conveyance truck arrival and departure log is maintained with the driver's name, truck license
number and reason for visit?
Outbound conveyance inspection includes a manifest check and recording the container number and
seal number?
Any outbound conveyance seal number discrepancy or a broken seal is reported to security
management immediately and the container examined?
Written procedures exist to identify which employees are allowed access to Automated systems?
Computer access passwords are subject to regular forced changes and suspended after three failed
access attempts.
There are security logs kept and reviewed weekly that report invalid password attempts and file
access?
Computer information is saved on a back-up system and a plan exists to restore data in case of a
failure?
Procedures exist to select which employees are allowed access to cargo shipping documents?
The container seal number is verified for accuracy when turned over to the next supply chain link?
Visitors and employee vehicle parking lots are monitored by security guards and are separate from
facility entrances?
Facility requires use of visual identification for visitor parking? (color coded parking sticker,
tag, decal)
Methods exist to prevent tampering with goods during production, during assembly, and
during packaging?
Procedures exist to select which employees are allowed access to shipping/cargo movement?
The facility has a designated employee responsible to provide accurate information on shipped
company products?
The facility conducts quarterly and unannounced checks to ensure that shipment information controls
are properly performed?
Container loading and departure is supervised by a security officer and/or a facility management?
Factory Security Assessment - Level 1
104
105 Accurate, legible and complete cargo documents and packing slips are prepared?
106
107 There are automated procedures for tracking goods/containers during domestic shipment?
108 Cargo cartons are properly labeled and weighed before loading?
109
110
111
112
113
114 Seal control logs are kept for 6 months.
115
116
117
118
119 Contractors are retained through legally binding contracts?
EXPORT LOGISTICS - TRANSPORTER/CARRIER
120
121
122
123
124
125 Records of the security check is kept on file for 12 months.
Security controls are in place to prevent the introduction of non-manifested cargo into the container
during stuffing?
Procedures are utilized to report to management anomalies found in shipments and/or the
accompanying documents?
Container integrity is inspected by using the 7-point inspection process prior to stuffing and records are
kept for 45 days?
There are procedures to identify which employees have access to High Security Seals and the Seal
Control Log?
The facility conducts periodic unannounced procedure security checks to ensure that the transport
security contract is followed?
There is a procedure for contractors to report security violations to the facility management?
When selecting a domestic land carrier, the facility consider security history, hiring practice and
corporate history?
An in-country transport service contract restricts the driver's route to the seaport or consolidator and
defines the transit time-limits?
An in-country transport service contract requires container tracking, intermediate staging/rest period or
layover requirements?
An in-country transport service contract indicates reporting in-transit security violations to factory
management?
The facility has written procedures regarding selection of contractors to perform services which require
access to the facility?
The company has written security standards and procedures for its contractors (contracts, manuals,
etc.)?
A written procedure ensures that only an ISO-17712 High Security Cable Seal is placed on a container
bound for the US?
When selecting a contractor, the facility consider the contractor's security controls, hiring practice and
corporate history?
Only appointed facility management or security supervisor have access to High Security Seals and the
Seal Control Log?
Procedure for affixing, replacing, recording, and tracking container seals, to include maintaining a seal
control log, is utilized?
Factory Security Assessment - Level 1

More Related Content

Similar to Points to cover for scs audit

SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docxSectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
kenjordan97598
 
Yusheng Wal-Mart Audit Report
Yusheng Wal-Mart Audit ReportYusheng Wal-Mart Audit Report
Yusheng Wal-Mart Audit Report
Simon .
 
Enterprise_Bank_Security_Manual_2.doc
Enterprise_Bank_Security_Manual_2.docEnterprise_Bank_Security_Manual_2.doc
Enterprise_Bank_Security_Manual_2.doc
richardkimlopez
 

Similar to Points to cover for scs audit (20)

Birdeyesurveillance
BirdeyesurveillanceBirdeyesurveillance
Birdeyesurveillance
 
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docxSectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
SectionxIS Security Policiesmmddyy-Effectivemmddyy-.docx
 
Chapter 07 Managing Front Office Operations HOT 333
Chapter 07 Managing Front Office Operations HOT 333Chapter 07 Managing Front Office Operations HOT 333
Chapter 07 Managing Front Office Operations HOT 333
 
Securitas Generic Mobile
Securitas Generic MobileSecuritas Generic Mobile
Securitas Generic Mobile
 
Ken's Security Vulnerability Survey ....
Ken's  Security Vulnerability Survey ....Ken's  Security Vulnerability Survey ....
Ken's Security Vulnerability Survey ....
 
A Security Vulnerability Survey
A Security Vulnerability SurveyA Security Vulnerability Survey
A Security Vulnerability Survey
 
A Security Vulnerability Survey
A Security Vulnerability SurveyA Security Vulnerability Survey
A Security Vulnerability Survey
 
Access Control for Physical Security and
Access Control for Physical Security andAccess Control for Physical Security and
Access Control for Physical Security and
 
Data Center Security: Always a Main Concern for Businesses
Data Center Security:  Always a Main Concern for BusinessesData Center Security:  Always a Main Concern for Businesses
Data Center Security: Always a Main Concern for Businesses
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-final
 
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
Beyond Firewalls: The Unsung Hero of Cybersecurity - Physical Architecture By...
 
Strengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdfStrengthening Transportation Logistic Facility Security.pdf
Strengthening Transportation Logistic Facility Security.pdf
 
Safety Audit and Safety Survey.pptx
Safety Audit and Safety Survey.pptxSafety Audit and Safety Survey.pptx
Safety Audit and Safety Survey.pptx
 
Security White Paper From Paychex
Security White Paper From PaychexSecurity White Paper From Paychex
Security White Paper From Paychex
 
Yusheng Wal-Mart Audit Report
Yusheng Wal-Mart Audit ReportYusheng Wal-Mart Audit Report
Yusheng Wal-Mart Audit Report
 
Secure physical infrastructure
Secure physical infrastructureSecure physical infrastructure
Secure physical infrastructure
 
Enterprise_Bank_Security_Manual_2.doc
Enterprise_Bank_Security_Manual_2.docEnterprise_Bank_Security_Manual_2.doc
Enterprise_Bank_Security_Manual_2.doc
 
Geust safety and security in Hotel
Geust safety and security in HotelGeust safety and security in Hotel
Geust safety and security in Hotel
 
10. Process: ocp cfops security and access
10. Process: ocp cfops security and access10. Process: ocp cfops security and access
10. Process: ocp cfops security and access
 
Commissioning of New Hospital
Commissioning  of New Hospital Commissioning  of New Hospital
Commissioning of New Hospital
 

More from Rakib Sarowar (9)

Dr v. abdur rahim. madinah arabic reader 7 (2015)
Dr v. abdur rahim. madinah arabic reader   7 (2015)Dr v. abdur rahim. madinah arabic reader   7 (2015)
Dr v. abdur rahim. madinah arabic reader 7 (2015)
 
Dr v. abdur rahim. madinah arabic reader 6 (2013)
Dr v. abdur rahim. madinah arabic reader   6 (2013)Dr v. abdur rahim. madinah arabic reader   6 (2013)
Dr v. abdur rahim. madinah arabic reader 6 (2013)
 
Madina Arabic Book vocabulary
Madina Arabic Book vocabulary Madina Arabic Book vocabulary
Madina Arabic Book vocabulary
 
Madinah arabic book 3
Madinah arabic book  3Madinah arabic book  3
Madinah arabic book 3
 
Madinah arabic reader 2
Madinah arabic reader  2Madinah arabic reader  2
Madinah arabic reader 2
 
Madinah arabic reader bangla 1
Madinah arabic reader bangla 1Madinah arabic reader bangla 1
Madinah arabic reader bangla 1
 
The rules for madina book-1 with an explanation
The rules for madina book-1 with an explanationThe rules for madina book-1 with an explanation
The rules for madina book-1 with an explanation
 
Discipline Action
Discipline Action Discipline Action
Discipline Action
 
Eti basecode
Eti basecodeEti basecode
Eti basecode
 

Recently uploaded

Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
daisycvs
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
CaitlinCummins3
 

Recently uploaded (20)

SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjwSCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
SCI9-Q4-MOD8.1.pdfjttstwjwetw55k5wwtwrjw
 
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
Pay after result spell caster (,$+27834335081)@ bring back lost lover same da...
 
Mastering The Art Of 'Closing The Sale'.
Mastering The Art Of 'Closing The Sale'.Mastering The Art Of 'Closing The Sale'.
Mastering The Art Of 'Closing The Sale'.
 
Should Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their BookkeepingShould Law Firms Outsource their Bookkeeping
Should Law Firms Outsource their Bookkeeping
 
Pitch Deck Teardown: Goodcarbon's $5.5m Seed deck
Pitch Deck Teardown: Goodcarbon's $5.5m Seed deckPitch Deck Teardown: Goodcarbon's $5.5m Seed deck
Pitch Deck Teardown: Goodcarbon's $5.5m Seed deck
 
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdfProgress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
Progress Report - UKG Analyst Summit 2024 - A lot to do - Good Progress1-1.pdf
 
Unlocking Growth The Power of Outsourcing for CPA Firms
Unlocking Growth The Power of Outsourcing for CPA FirmsUnlocking Growth The Power of Outsourcing for CPA Firms
Unlocking Growth The Power of Outsourcing for CPA Firms
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertainty
 
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
 
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
Abortion pills in Muscut<Oman(+27737758557) Cytotec available.inn Kuwait City.
 
10 Easiest Ways To Buy Verified TransferWise Accounts
10 Easiest Ways To Buy Verified TransferWise Accounts10 Easiest Ways To Buy Verified TransferWise Accounts
10 Easiest Ways To Buy Verified TransferWise Accounts
 
Powerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metricsPowerpoint showing results from tik tok metrics
Powerpoint showing results from tik tok metrics
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
WAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdfWAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdf
 
Beyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic AccountingBeyond Numbers A Holistic Approach to Forensic Accounting
Beyond Numbers A Holistic Approach to Forensic Accounting
 
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdfThe Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
The Vietnam Believer Newsletter_May 13th, 2024_ENVol. 007.pdf
 

Points to cover for scs audit

  • 1. GENERAL OVERVIEW 1 There is a policy that requires that all security procedures are documented? 2 The facility has a security department/personnel? 3 There is a designated security chief at the facility? 4 5 An appointed facility official is responsible for security audits or evaluations? 6 A facility security plan is developed and is reviewed/updated semi-annually? 7 PERSONNEL SECURITY 8 Personnel security procedures are written and evaluated quarterly? 9 Personnel security procedures are evaluated in response to security failures? 10 Personnel security requirements apply to contracting temporary and part time employees? 11 Employment applications are required for all applicants? 12 All applicants are interviewed? 13 When allowed by law, background checks are conducted on all applicants? 14 15 16 17 18 The facility retains a copy of the employee's official identification? 19 A facility issued photo-badge is required for employee access? 20 21 Procedures are used to retrieve an employee ID and/or deactivate access as needed? 22 Lost IDs are recorded as missing before replacement and security staff informed? 23 24 Security guards monitor access to facility restricted areas? 25 26 27 28 29 30 Security procedures are publicized throughout the facility on posters and bulletin boards? PHYSICAL SECURITY Level 1 Country (High Risk) A site security assessment is conducted quarterly to identify vulnerabilities and necessary corrective actions? WAL-MART STORES, INC. Factory Security Assessment An appointed company official is responsible for facility, employee, and transport security? Applicant background check includes employment history, reference check, and criminal records check? The applicant's examined identification includes a National ID Card and birth certificate? When allowed by law, background checks are updated on all employees? A permanent personnel file is maintained for each employee with the employee's name, date of birth, and a National ID number? Issue of employee identification is centralized and controlled by a specific department and restricted to limited authorized employees? A specific color coded ID is required to access restricted areas to include the receiving and shipping areas? New employee orientation includes confirming that anytime onsite the facility requires wearing an ID badge? New employee orientation includes reporting unidentified persons, breach of computer security, and internal conspiracies? New employees are asked to report compromised to security infrastructure such as broken locks, windows, facility structure? The facility has a documented security awareness program in place for all employees to include training participation? Employees are encouraged to report irregularities, suspicious activity, and security violations through an incentive program? Factory Security Assessment - Level 1
  • 2. 31 The facility has an intrusion detection or an alarm system? 32 The intrusion detection/alarm system has back-up power and is tested regularly? 33 A record is maintained of employee access to keys, cards or codes? 34 Facility utilizes card or code activated locking devices to protect controlled areas? 35 Keys/cards are returned or codes are changed when an employee leaves the company? 36 37 38 39 40 41 42 43 44 45 The entire facility and perimeter fence/wall is lighted during darkness? 46 The cargo conveyances/shipping area is lighted? 47 Lighting has an emergency power source/generator? 48 Access to the lighting switches is restricted to only authorized personnel? 49 Empty and loaded containers are stored in a designated area guarded by security at all times? 50 Containers stored on-site, in a designated area, are secured with a high security seal or lock? 51 There is a designated security guard force on duty to protect the facility 24/7? 52 There is radio communication between the central security office and the exterior guard posts? 53 Security guards have training specific to facility security? 54 55 56 The facility has direct communication to local law enforcement authorities? 57 Security guards and/or security supervisor reports incidents to facility management? 58 Facility gates are protected during operating hours with guards and cameras? 59 Facility gates are protected during non-operating hours with guards and cameras? 60 Employee entries and exits are recorded? 61 Security guards patrol the interior of buildings of the facility? 62 63 CCTV recordings which are kept for 45 days? 64 65 Advance information from a vendor is required before the visit? 66 A positive identification process is used to record all visitors and vendors? 67 A visitors log is maintained which records all entries and exits? 68 69 Visitors are escorted throughout their visit to the facility? 70 Procedures are used to screen arriving packages and mail prior to distribution? Procedures exist to immediately terminate existing physical access when an employee terminates employment or transfers to another position? Management is provided with an current list of all employee access privileges on a monthly basis? All facility buildings are constructed of materials that prevent unlawful entry and are kept in good repair? As applicable, the facility perimeter is secured with either a chain-link fence, masonry, steel wall or an equivalent barrier capable to deter illegal access? Schedule daily inspections are performed of the perimeter including checking for damage, attempted illegal access, and needed repair? The perimeter fence/wall has concertina wire, barbed wire, or an equivalent substance as an additional security element? There are no adjoining/overhanging structures or foliage which would facilitate illegal and unnoticed entry into the facility? Underground access points such as culverts, utility tunnels, sewers are secured to prevent unauthorized access? Only the security guard supervisor and designated facility management have keys or access controls to facility gates? Security guards have training specific to Threat Awareness, Unauthorized Access and Internal Conspiracy? The facility provides an employee threat awareness program to recognize a security threat? Closed circuit television cameras (CCTV) is used to monitor activity inside/outside the facility? CCTVs are monitored constantly on all shifts by guards or security personnel with no other assignments? Visitor badges are controlled through a numbering system when issued and verified upon return? Factory Security Assessment - Level 1
  • 3. 71 There is a procedure to conduct a security check of incoming and outgoing cargo vehicles? 72 73 Conveyance drivers are required to show personal photo identification? 74 75 76 77 Shipping and receiving parking lots are separated from all other parking lots? 78 Visitor and employee vehicles are prevented from parking near cargo conveyance vehicles? 79 80 Vehicles are prohibited/prevented from parking near the perimeter fencing? 81 82 83 Methods exist to detect and report cargo shortages and overages during container loading? INFORMATION ACCESS CONTROLS 84 85 86 87 There are procedures to identify which employees have access to High Security Seals? 88 Information systems passwords are protected? 89 Only relevant employees are provided with individually assigned IT system accounts? 90 91 The facility has procedures to adjust or rescind computer access? 92 There is a designated system administrator responsible to establish a user ID? 93 94 Incidents of unauthorized IT system access is investigated and recorded? 95 The facility has implemented into its computer network an intrusion warning system? 96 SHIPMENT INFORMATION CONTROLS 97 98 99 Records are maintained on all shipments? 100 STORAGE AND DISTRIBUTION 101 International and domestic cargo is segregated at the facility? 102 103 Loading dock access is restricted to only authorized employees? A person is trained on the information requirements for shipments to the United States? A conveyance truck arrival and departure log is maintained with the driver's name, truck license number and reason for visit? Outbound conveyance inspection includes a manifest check and recording the container number and seal number? Any outbound conveyance seal number discrepancy or a broken seal is reported to security management immediately and the container examined? Written procedures exist to identify which employees are allowed access to Automated systems? Computer access passwords are subject to regular forced changes and suspended after three failed access attempts. There are security logs kept and reviewed weekly that report invalid password attempts and file access? Computer information is saved on a back-up system and a plan exists to restore data in case of a failure? Procedures exist to select which employees are allowed access to cargo shipping documents? The container seal number is verified for accuracy when turned over to the next supply chain link? Visitors and employee vehicle parking lots are monitored by security guards and are separate from facility entrances? Facility requires use of visual identification for visitor parking? (color coded parking sticker, tag, decal) Methods exist to prevent tampering with goods during production, during assembly, and during packaging? Procedures exist to select which employees are allowed access to shipping/cargo movement? The facility has a designated employee responsible to provide accurate information on shipped company products? The facility conducts quarterly and unannounced checks to ensure that shipment information controls are properly performed? Container loading and departure is supervised by a security officer and/or a facility management? Factory Security Assessment - Level 1
  • 4. 104 105 Accurate, legible and complete cargo documents and packing slips are prepared? 106 107 There are automated procedures for tracking goods/containers during domestic shipment? 108 Cargo cartons are properly labeled and weighed before loading? 109 110 111 112 113 114 Seal control logs are kept for 6 months. 115 116 117 118 119 Contractors are retained through legally binding contracts? EXPORT LOGISTICS - TRANSPORTER/CARRIER 120 121 122 123 124 125 Records of the security check is kept on file for 12 months. Security controls are in place to prevent the introduction of non-manifested cargo into the container during stuffing? Procedures are utilized to report to management anomalies found in shipments and/or the accompanying documents? Container integrity is inspected by using the 7-point inspection process prior to stuffing and records are kept for 45 days? There are procedures to identify which employees have access to High Security Seals and the Seal Control Log? The facility conducts periodic unannounced procedure security checks to ensure that the transport security contract is followed? There is a procedure for contractors to report security violations to the facility management? When selecting a domestic land carrier, the facility consider security history, hiring practice and corporate history? An in-country transport service contract restricts the driver's route to the seaport or consolidator and defines the transit time-limits? An in-country transport service contract requires container tracking, intermediate staging/rest period or layover requirements? An in-country transport service contract indicates reporting in-transit security violations to factory management? The facility has written procedures regarding selection of contractors to perform services which require access to the facility? The company has written security standards and procedures for its contractors (contracts, manuals, etc.)? A written procedure ensures that only an ISO-17712 High Security Cable Seal is placed on a container bound for the US? When selecting a contractor, the facility consider the contractor's security controls, hiring practice and corporate history? Only appointed facility management or security supervisor have access to High Security Seals and the Seal Control Log? Procedure for affixing, replacing, recording, and tracking container seals, to include maintaining a seal control log, is utilized? Factory Security Assessment - Level 1