3. This Course Serves as a Practical Training Module For:
Non-CTPAT Member companies seeking to augment their supply chain security
knowledge and understanding of the CTPAT program.
Prospective CTPAT Member companies seeking program overview, best practices,
and expert insights before/during the CTPAT application process.
CTPAT Member companies onboarding additional personnel in maintaining CTPAT
compliance.
Course Content
What the CTPAT program is and how it benefits your company.
How to successfully apply for membership by understanding key requirements.
What to do after certification and maintaining your certification
Expert insights from former CTPAT directors.
4. SYNOPSIS
THIS COURSE SERVES AS A TRAINING PROGRAM TO CREATE
AWARENESS AMONG THE PARTICIPANTS ON CUSTOMS TRADE
PARTNERSHIP AGAINST TERRORISM (CTPAT) SECURITY
REQUIREMENTS IN THE SUPPLY CHAIN DOMAIN. THE FOCUS OF
SUCH REQUIREMENT IS FOR FOREIGN MANUFACTURERS
SUPPLYING GOODS TO UNITED STATES TO OBSERVE SPECIFIC
SECURITY GUIDANCE TO ENSURE A SECURE SUPPLY CHAIN FROM
THE POINT OF PACKAGING TO THE POINT OF RECEIPT.
5. HENCE, THIS TRAINING IS DELIVERED TO PROVIDE KNOWLEDGE AND
UNDERSTANDING ON THE SECURITY PROCESSES AND PROCEDURES INVOLVED
IN ENSURING THE SAFE MANUFACTURE, PACKAGING AND TRANSPORTING OF
GLOVES FROM COMFORT GLOVES TO ITS TRADE PARTNER IN UNITED STATES.
THE SECURITY PROCESSES AND PROCEDURES DISCUSSED SHALL BE WITHIN
THE CONFINES OF STIPULATED CTPAT SECURITY GUIDANCE THAT NEEDS TO BE
COMPLIED WITH INORDER TO ENSURE THREATS ARE ADDRESSED AND RISK
MINIMIZED, FAST TRACK AND SAFE ARRIVAL OF GOODS AT THE INTENDED
DESTINATION IN UNITED STATES.
6. A SAFE, STABLE AND SECURED ENVIRONMENT IN WHICH AN
ORGANIZATION CAN CARRY OUT ITS OPERATIONS WITHOUT
ANY INTERFERENCE FROM INTERNAL AND EXTERNAL
THREATS WITH THE EXISTENCE OF ADEQUATE SECURITY
CONTROL MEASURES.
“AN EXPECTED IDEAL SITUATION”
What is Security?
8. A Supply Chain (SC) is a system of organizations, people,
activities, information and resources involved in moving a
product or service from supplier to customer.
What is a Supply Chain?
9. An Organization in the SC:
An entity that manufactures, handles, processes,
loads,consolidates, unloads or receives goods
satisfying a purchase order that at some point cross an
international or eonomy border;
10. An entity that transports goods by any mode in the
international SC regardless of whether their particular
segment of the SC crosses national (or economy)
boundaries;
11. Or
An entity that provides, manages or conducts the
generation, distribution or flow of shipping
information used by customs agencies or in
business practices.
12. Besides Criminal and Terrorist activities, the key
factors
that may engender Security Risks in SC that disrupts
business goals are:
SC involves many players
Multiple modes of transport
Various types of Intermediaries
Several government agencies globally
Complexity of the system leads to challenges
Security Directors need C-suite support
The human element.
13. Therefore in BUSINESS context, SECURITY is a CRITICAL
component which MUST ensure a SAFE, STABLE and SECURE
environment to conduct business operations throughout
Supply Chain.
14. INTRODUCTION
TO
CTPAT
(CTPAT: CUSTOMS TRADE PARTNERSHIP AGAINST
TERRORISM)
From its inception in November 2001, CTPAT continued
to grow. Today, more than 11,400 certified partners
spanning the gamut of the trade community, have
been accepted into the program.
15. The US Customs Trade Partnership Against Terrorism seeks
to safeguard the world’s vibrant trade industry from
terrorists, maintaining the economic health of the US and
its neighbours. The partnership develops and adopts
collaboration that add security value across SC.
CTPAT
16. Aim: C-TPAT, which stands for Customs Trade Partnership
Against Terrorism, was established in 2001 with the intention of
being a strong layer within U.S. Customs and Border Protection’s
(CBP) multi-layered cargo enforcement defensive system. C-
TPAT is a voluntary partnership program which is recognized by
CBP as being one of the highest levels of SC security designed
to prevent and mitigate threat and risk.
https://divineflavor.com/2020/06/01/c-tpat-minimum-security-requirements/
17. SC Threshold: CTPAT defines the SC link as
beginning at the point of origin - where cargo
destined for export to the United States has been
made, assembled, grown and/or packed for export -
and ending at point of distribution in the United
States.
18. Thus, CTPAT Members must ensure the security of their
cargo at every point in their supply chain link. The
following SC link map demonstrates potential 16
locations where cargo could be compromised.
Importantly, these are all locations where a validation
site visit by SCSS could take place to ensure that a
Member or business partner is meeting the CTPAT
security criteria.
19. The Supply Chain Link Map
Comfort Gloves
US Importer
Point of Origin -Exporter
Destination
21. Benefits: Members who participate in the C-TPAT
program are considered to be low-risk, these
sectors can be exempt or partake in a variety of
benefits including: A reduction of CBP
examinations, front of the line inspections for
carriers, shorter wait times at the border, and
probably most important- stronger SC security.
23. Basis for Security Model: In order to engender the defined
benefits, CTPAT recognizes the complexity of international SC
and endorses the application of security measures based
upon risk. The program allows for flexibility and the
customization of security plans based on the Member’s
business model. Hence, it is expected, that appropriate and
effective Security Model be implemented and maintained
based on threat and risk throughout the Member’s SC link.
24. Inevitably, the global SC continues to be targeted by
terrorists and criminal organizations, underscoring
the need for increased security measures to secure
their supply chains. Besides, cyberattacks or other
types of data breaches too continue to increase and
all sizes and types of companies are at risk.
26. CTPAT Key Security Objectives
Security Awareness: Opportunity of having
employees understand how smuggling, theft,
organized crime networks work including terrorist
contraband infilitration into the SC . It will help
identify the potential threats and risks.
Security and Efficiency: Efficient SC is a more
secured environment, which helps overall in
conveying your commitment amongst the
international community. Reputation is enhanced.
27. CTPAT AS THE ANCHOR IN LAYERED SECURITY MODEL
1. WCO Framework of Standards
2. ISO/PAS 28000 Outlines Security Management for SC
3. ICAO Annex 17 for Regulated Agents Regime
4. TAPA Freight Security Requirements
5. Customs-Trade Partnership against Terrorism (CTPAT).
29. Since SC Domain is multi-faceted and is beleagured by
multiple challenges and risk from point of packaging to
point of receipt. The CTPAT approach to address the SC risks
has been structured in such a manner, covering the key
security processes in order to ensure that the entire SC
link is mitigated to RESIDUAL RISK, ensuring business
operational continuity is uninterrupted.
34. In promoting and instilling a culture of security, CTPAT
Members should demonstrate their commitment to SC
security and the CTPAT program by satisfying the New CTPAT
Minimum Security Criteria (MSC) Requirements through a
statement of support.
Introduction
35. Incorporating MSC as an integral part of a company’s
security culture conforming to CTPAT program, it is
company-wide priority and in large part the responsibility
of the company’s top leadership to make a comprehensive
security vision statement to ensure the SC security
program remains visible and effective.
Introduction....Cont’d
36. Promoting a work culture of security
Building a robust supply-chain security program
Creating a written and documented program
Having a team knowledgeable of the CTPAT program and
its requirements
Implementation of the CTPAT program must satisfy the
customers requirements.
Factors to Consider Vision Statement
37. Activity No.1
As a potential member of CTPAT, write a vision statement of SC
security support for your company.
Statement of support should highlight the importance of
protecting the supply chain from criminal activities such as drug
trafficking, human smuggling, and illegal contraband from
terrorist initiatives.
38. The following criteria and implementation guidance
shall facilitate the development of appropriate
procedural security measures in satisfying CTPAT
Minimum Security Criteria requirements.
39. Criteria and Implementation Guidance:
Senior company officials who should support
and sign the statement may include the
President, CEO, General Manager, or Security
Director. Areas to display the statement of
support include the company's website, on
posters in key areas of the company (reception;
packaging; warehouse; etc.), and/or be part of
company security seminars, etc.
40. To build a robust SC security program, a company
should incorporate representatives from all of
the relevant departments into a cross-functional
team.
These new security measures developed for the
SC security program should be included in
existing company procedures, which creates a
more sustainable structure and emphasizes that
supply chain security is everyone's responsibility.
41. Security programs built on a more traditional,
security department-based model may be less
viable over the long run because the
responsibility to carry out the security measures
are concentrated among fewer employees, and,
as a result,may be susceptible to the loss of key
personnel.
42. The SC security program must be implemented by an
appropriate written review component for the purpose of
holding personnel accountable for their responsibilities
and all security procedures outlined by the security
program. The review plan must be updated as needed
based on pertinent changes in an organization’s
operations and level of risk.
43. The company’s point(s) of contact (POC) to CTPAT must
be knowledgeable about CTPAT program requirements.
These individuals need to provide regular updates to
upper management on issues related to the program,
including the progress or outcomes of any audits,
security related exercises, and CTPAT validations.
44. CTPAT expects the designated POC to be a proactive
individual who engages and is responsive to his or her
SC Security Specialist. Members may identify
additional individuals who may help support this
function by listing them as contacts in the CTPAT Portal.
45. 2. RISK ASSESSMENT
The new MSC employs a risk-based approach, explicitly
designating each criteria within the 12 categories as a
"must" or a "should" based on risk.
46. 2. RISK ASSESSMENT
The continuing threat of terrorist groups and criminal
organizations targeting supply chains underscores the
for Members to assess existing and potential exposure to
evolving threats.
CTPAT recognizes that when a company has multiple
chains with numerous business partners, it faces greater
complexity in securing those supply chains due to
risk factor.
47. CTPAT recognizes that when a company has multiple supply
chains with numerous business partners, it faces greater
complexity in securing those SC. Terrorist groups and
criminal organizations targeting SC expose these members
to multiple threats and attendant risks. Hence members
should focus on vulnerable areas that have higher risk and
carry out risk management process involving preventive
and mitigation measures.
Introduction
48. CTPAT Members must conduct and document the
amount of risk in their supply chains. CTPAT Members
must conduct an overall risk assessment (RA) to identify
where security vulnerabilities may exist. The RA must
identify threats, assess risks, and incorporate
sustainable measures to mitigate vulnerabilities. The
Member must take into account CTPAT requirements
specific to the Member’s role in the supply chain.
Implementation Guidance:
49. The overall risk assessment (RA) is made up of two
key parts. The first part is a self-assessment of the
the Member’s SC security practices, procedures, and
procedures, and policies within the facilities that it
that it controls to verify its adherence to CTPAT’s
CTPAT’s minimum-security criteria, and an overall
overall management review of how it is managing
managing risk.
50. The second part of the RA is the international risk
assessment. This portion of the RA includesthe
identification of geographical threat(s) based on the
Member’s business model and role in the SC.
When looking at the possible impact of each threat on
the security of the Member’s SC, the Member needs a
method to assess or differentiate between levels of risk.
A simple method is assigning the level of risk between
low, medium, and high (risk matrix).
52. CTPAT developed the Five Step Risk Assessment guide as an aid to
conducting the international risk assessment portion of a
Member’s overall risk assessment, and it can be found on U.S.
Customs and Border Protection’s website at:
https://www.cbp.gov/sites/default/files/documents/CTPAT%27s
%20Five%20Step%20Risk%20Assessment%20Process.pdf.
Note: For Members with extensive supply chains, the primary focus is
expected to be on areas of higher risk.
53. To Ensure the Workplace (Components of Your Supply Chain Domain)
is ADEQUATELY SAFE with LIMITED EXPOSURE to RISK from its Operating
Environment. CTPAT members are to OBSERVE the following
PROTOCOLS:
Promoting a work culture of security in the organization
Building a robust supply-chain security program
Creating a written and documented program
Having a team knowledgeable of the CTPAT program and its
requirements for effective implementation.
56. When a company has numerous supply chains, it should focus on
geographical areas/supply chains that have higher risk. When
determining risk within their supply chains, Members must consider
various factors such as the business model, geographic location of
suppliers, and other aspects that may be unique to a specific supply
chain. Therefore Risk Mitigation Initiatives shall at all times focus on
strategies to limit RISK exposure at workplace.
57. To mitigate a risk really means to limit the exposure in some way. This
could include reducing the likelihood of occurence, decreasing the
severity of the impact . Mitigation does not imply a complete
elimination of risk , just a reduction to an acceptable level. Thus, as
part of risk management, CTPAT members are expected to initiate the
following in the process of mitigation:
Document the risk in the SC and conduct an assessment
Map out the movement of cargo
Review annually
Have written procedures
59. Components of the 5-Step Risk Assessment
1. Mapping cargo flow and identifying business partners
(both direct or indirect)
2. Conducting a threat assessment
3. Conducting a vulnerability assessment
4. Preparing an action plan
5. Documenting the risk assessment process
60.
61. 1.1 Identify ALL parties involved in the following processes:
Procurement
Production
Packing
Storage
Loading/Unloading
Transportation
Document Preparation
1.0 Map Cargo Flow and Business Partners
62. 1.2 Methods
Request information from supply chain partners
Review documentation (BOLs, manifests, invoices, etc.) to
determine routing
On site visits/audits of the supply chain
63. 2.1 Identify and rate the risk of threat (High, Medium, Low) for the
country and region for each international supply chain, using the
following (at a minimum):
Terrorism (political, bio, agro, cyber)
Contraband Smuggling
Human Smuggling
Organized Crime
Conditions fostering above threats
2.0 Threat Assessment
64. 2.2 - Methods
Open source internet information (government and private
organizations)
Representative/Contacts “on the ground” at origin
Law enforcement (foreign/domestic), local state,
federal/national
Trade and security organizations
Assigned C-TPAT SCSS
65. 3.0 Conduct Vulnerability Assessment
3.1 For all business partners in the international supply chain
(directly contracted or sub-contracted):
Identify the process they perform
Verify partners meet applicable minimum security criteria
Rate their compliance within each applicable minimum-security
criteria category (High, Medium, Low)
66. 3.2 Methods:
SVI Number/C-TPAT Membership
Membership in “Mutual Recognition Program”
Security Surveys
Site visits by company representative
Site visits by overseas personnel/agents
Business reports
Security certifications covering C-TPAT minimum-security criteria
3rd party supply chain security assessments
67. 4.0 Prepare Action Plan
4.1 Establish a corrective action plan to address gaps or
vulnerabilities found in business partner’s security programs.
4.2 Methods:
Word Document
Excel Spreadsheet
Project Management Software
68. 5.0 Document How Risk Assessments are Conducted
5.1 A description of the company’s approach, policies, and
procedures for conducting an international Supply Chain security
risk assessment
5.2 Methods:
Document company’s Policy for conducting International
Supply Chain Security Risk Assessment
Document Procedures used to conduct International Supply
Chain Security Risk Assessments
70. 3.0 BUSINESS PARTNERS
CTPAT Members engage with a variety of business partners, both
domestically and internationally. For those business partners who
directly handle cargo and/or import/export documentation, it is crucial
for the Member to ensure that these business partners have
appropriate security measures in place to secure the goods throughout
the international supply chain.
71. 3.1 BUSINESS PARTNERS REQUIREMENTS:
Screen new business partners
Being a valid member of the CTPAT Program or Authorized Economic
Operator (AEO) with a Mutual Recognition Agreement (MRA) with the
United States.
Exercise due diligence and confirm outsourced partners are also
screened.
Working with Cargo carriers which either have CTPAT or meet the
minimum requirements
72. 3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:
Have a written and verifiale process for the selection of Business
Partners including , carriers, other manufacturers, product suppliers
and vendors ( parts & raw materials suppliers, etc.)
Security Procedures for those Business Partners eligible for CTPAT
certification (carriers, importers, ports, terminals, brokers,
consolidators, etc.) must obtain documentation (such as the
CTPAT SVI (Status Verification Interface) Number indicating whether
these business partners are or not CTPAT certified. If not then
documentation proving they meeting an equivalent World Customs
Organization accredited security program administered by a foreign
customs authority.
73. 3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:
If neither a SVI or other certified security program is available then the
certification the partner isdemonstrating that they are meeting the CTPAT
security criteria via written/electronic confirmation (contractual
obligationn statement from the business partner demonstrating their
compliance withCTPAT criteria.
A risk assessment process, non CTPAT eligible business partners must be
subject to verification of compliance with CTPAT security criteria by
foreign manufacturer.
74. You must ensure that business partners develop security
processes and procedures consistent with CTPAT security criteria
to enhance the integrity of the shipment at point of origin,
assembly, or manufacturing and review the business parner
based on risk and that are maintaining the security tandards
required by YOU.
US bound shipments should be monitored that CTPAT carriers
being used or non CTPAT carriers that they are meeting the CTPAT
security criteria as outlined above for business partner
requirements.
3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:
75.
76. 4. CYBERSECURITY
In today’s digital world, cybersecurity is the key to safeguarding a
company’s most precious assets:
intellectual property
customer information
financial and trade data
employee records, among others
With increased connectivity to the internet comes the risk of a
breach of a company’s information systems.
77. CYBERSECURITY...... Cont’d
Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These cyberattacks are usually aimed
at accessing, changing, or destroying sensitive information; extorting
money from users; or interrupting normal business processes.
78. Cybersecurity is the activity or process that focuses on:
protecting computers
networks, programs
data from unintended or unauthorized access
change or destruction.
CYBERSECURITY...... Cont’d
79. It is the process of identifying, analyzing, assessing, and
communicating a cyber-related risk and accepting, avoiding,
transferring, or mitigating it to an acceptable level, considering costs
and benefits taken.
CYBERSECURITY...... Cont’d
Cybersecurity threat pertains to businesses of all types and sizes.
Measures to secure a company’s information technology (IT) and data
are of paramount importance, and the listed CTPAT criteria provide a
foundation for an overall cybersecurity program for Members.
80. Listed Criteria include:
Must have written procedures on how to protect information
technology (IT).
Having sufficient software to defend IT systems against threats
(viruses, spyware, etc.)
Regularly test IT for vulnerabilities and test for abuse of policies
(Check cyber security annually)
Restrict users or have certain user limited to access private
company information.
Having protection for remote access. Provide users
usernames/passwords/VPNs
CYBERSECURITY..... Cont’d
99. 5. CONVEYANCE AND INSTRUMENTS OF INTERNATIONAL TRAFFIC SECURITY
Smuggling schemes often involve the modification of conveyances
and Instruments of International Traffic (IIT), or the hiding of
contraband inside IIT.
This criteria category covers security measures designed to prevent,
detect, and/or deter the altering of IIT structures or surreptitious entry
into them, which could allow the introduction of unauthorized material
or persons.
100.
101. Cargo/Trucks, also known as Conveyances and Instruments of
International Traffic (IIT) must be stored in a secure area to
prevent unauthorized personnel.
Must have written procedures for security and agricultural
inspections
Ensuring inspections are being carried out.
Alerting Business Partners of any threats to the shipment
102.
103. C-TPAT and ISO 17712 Compliant - Container Barrier Seals
104. 6. SEAL SECURITY
The sealing of trailers and containers, to include continuous
seal integrity, continues to be a crucial element of a secure
supply chain. Seal security includes having a
comprehensive written seal policy that addresses:
All aspects of seal security
Using the correct seals per CTPAT requirements
Properly placing a seal on an IIT
Verifying that the seal has been affixed properly
105. Must have a written high-security seal procedure.
Control access to seals (Inventory, distributing, tracking
(Seal log).
Sealing each container sent to a CTPAT member.
Seals used are the ISO 17712 ( CTPAT Standard).
Notifying CTPAT partners when seals are broken for
inspection.
SEAL SECURITY..... Cont’d
106. Seals must be compliant with ISO 17712 standards for high
security seals.
Documentation regarding the compliance standard must be
maintained on file for verification.
Upon receipt of seals, an inventory must be conducted and the
seals must be logged in a seal log book.
Seal inventories must be conducted at least once per year
during the internal audit.
Seals must be assigned to a designated employee/department
and stored in a secured storage container.
Manufacturers – Point of Sealing
107. Upon issuance of seals, the seal log should be updated with the
seal usage information.
A designated person who has received seal security training
must affix the seal to the loaded container/trailer, witnessed by
another person to ensure it has been properly affixed.
View, Verify, Twist, and Tug (VVTT) method to ensure the seal is
the correct seal number.
uncompromised, and properly affixed to the loaded
container/trailer.
Compromised seals and/or containers must be reported to CBP or
the appropriate foreign authority.
Manufacturers – Point of Sealing.....Cont’d
108. Exporters – Point of Sealing
Seals must be compliant with ISO 17712 standards for high security seals.
Documentation regarding the compliance standard must be maintained on
file for verification.
Upon receipt of seals, an inventory must be conducted and the seals must
be logged in a seal log book.
Seal inventories must be conducted at least once per year during the
internal audit.
Seals must be assigned to a designated employee/department and stored
in a secured storage container.
109. Upon issuance of seals, the seal log should be updated with the seal
usage information.
A designated person who has received seal security training must
affix the seal to the loaded
container/trailer, 1) witnessed by another person to ensure it
has been properly affixed and 2) using CBP’s
View, Verify, Twist, and Tug (VVTT) method to ensure the seal is the
correct seal number, uncompromised, and properly affixed to the
loaded container/trailer.
Compromised seals and/or containers must be reported to CBP or the
appropriate foreign authority.
Exporters – Point of Sealing...Cont’d
112. Procedural Security involves security controls that mitigate
identified risks by way of policies, procedures or guidelines.
As opposed to other controls, procedural controls rely on
users to follow RULES or perform certain steps that are not
necessarily enforced by technical or physical means.
Introduction
113. Introduction .....Cont’d
Procedural Security encompasses many aspects of the
import-export process, documentation, and cargo storage and
handling requirements. Other vital procedural criteria pertain
to reporting incidents and notification to pertinent law
enforcement.
114. Additionally, CTPAT often requires that procedures be
written because it helps maintain a uniform process over
time. Nevertheless, the amount of detail needed for these
written procedures will depend upon various elements
such as a company’s business model or what is covered
by the procedure.
Introduction .....Cont’d
115. The following criteria and implementation guidance
shall facilitate the development of appropriate
procedural security measures in satisfying CTPAT
Minimum Security Criteria requirements.
135. When cargo is stored overnight, secure measures must be taken to
prevent unauthorized access.
Cargo/shipping containers must be inspected for pest
continuously.
Loading and unloading must be supervised by a manager or
security staff member.
There must be procedures in place for properly manifesting
product being shipped.
Brokers or agents must verify BOLs/Manifest are properly recorded
and accurate.
138. Introduction
Agriculture is the largest industry and employment sector
in the U.S. Dating back to last century, the Plant Quarantine
Act of 1912 authorized the U.S. Department of Agriculture
(USDA) to inspect agricultural products, to organize border
quarantines and to restrict entry of infested agricultural
goods.
139. Of late the industry is threatened by the introduction of
foreign animal and plant contaminants such as soil,
manure, seeds, and plant and animal material which may
harbour invasive and destructive pests and diseases
posing great RISK.
Introduction.... Cont’d
140. Eliminating contaminants thereby reducing risks in all
conveyances and in all types of cargo may decrease CBP
cargo holds, delays, and commodity returns or
treatments.
It is envisaged that, incorporating eliminating
procedures in compliance with CTPAT’s agricultural
requirements will also help protect from risks affecting
the key industry in the U.S. and the overall global food SC.
Introduction.... Cont’d
141. Pest Contamination & Risk
Pest contamination as visible forms of animals, insects or
other invertebrates (alive or dead), or any organic material of
animal origin (including blood, bones, hair, flesh, secretions,
excretions bear risks when left unattended.
142. Similarly, viable or non-viable plants or plant products
(including fruit, seeds, leaves, twigs, roots, bark); or
other organic material, including fungi; or soil, or water;
where such products are not the manifested cargo
within instruments of international traffic also shall
bear risks.
143. The following criteria and implementation guidance
shall facilitate the development of appropriate
procedural security measures in satisfying CTPAT
Minimum Security Criteria requirements.
144. Criteria & Implementation Guidance
Visible pest prevention measures must be adhered
to throughout the SC. Measures regarding WPM
must meet the International Plant Protection
Convention’s (IPPC) International Standards for
Phytosanitary (health of plants) Measures No. 15
(ISPM 15).
145. CTPAT Members must, in accordance with their business
model, have written procedures designed to prevent
visible pest contamination to include compliance with
Wood Packaging Materials (WPM) regulations.
146. Additionally, CTPAT Members must have written
procedures to prevent pest and to include wood
compliance with the packing materials. International
standards for Phytosanitary Measures.
147. Note:
WPM includes items such as pallets, crates, boxes, reels,
and dunnage. Frequently, these items are made of raw wood
that may not have undergone sufficient processing or
treatment to remove or kill pests, and therefore remain a
pathway for the introduction and spread of pests. Dunnage
in particular has been shown to present a high risk of
introduction and spread of pests
148.
149.
150.
151. 9. PHYSICAL SECURITY
Cargo handling and storage facilities, Instruments of International
Traffic storage areas, and facilities where import/export
documentation is prepared in domestic and foreign locations must
have physical barriers and deterrents that guard against unauthorized
access.
152. Offices and facilities must have physical barriers to prevent
unauthorized access.
Gates where employees/guest enter/exit must be monitored
frequently.
Private parking shall not be adjacent to cargo parking
Facilities and offices have adequate lighting outside the facility
and in the parking section.
Cameras are highly recommended and encouraged.
PHYSICAL SECURITY.... Cont’d
157. 10. PHYSICAL ACCESS CONTROLS
Access controls prevent unauthorized access into facilities/areas,
help maintain control of employees and visitors, and protect
company assets. Access controls include the positive identification
of all employees, visitors, service providers, and vendors at all points
of entry.
Identification badges and special keys to access the
facility/offices.
Drivers delivering packages must be identified before delivering.
Visitors must be screened and show identification.
Using security guards and having written policies.
170. 11. PERSONNEL SECURITY
A company’s human resource force is one of its most critical assets,
but it may also be one of its weakest security links. The criteria in this
category focus on issues such as employee screening and pre-
employment verifications. Screen employees before hire (Background
checks, employment history, etc.). Have an employee code of conduct
policy in place.
Many security breaches are caused by internal conspiracies, which is
where one or more employees collude to circumvent security
procedures aimed at allowing an infiltration of the supply chain.
171. Therefore, CTPAT members must exercise due diligence to verify that
employees filling sensitive positions are reliable and trustworthy.
Sensitive positions include staff working directly with cargo or its
documentation, as well as personnel involved in controlling access to
sensitive areas or equipment.
Such positions include, but are not limited to, shipping, receiving,
mailroom personnel, drivers, dispatch, security guards, any individuals
involved in load assignments, tracking of conveyances, and/or seal
controls.
PERSONNEL SECURITY.... Cont’d
172. As a supplier and or exporter of goods to the Unites States, QCWintess plays a critical role in the security of the international
supply chain.
173. 12.0 EDUCATION, TRAINING, AND AWARENESS
CTPAT’s security criteria are designed to form the basis of a layered
security system. If one layer of security is overcome, another layer
should prevent a security breach, or alert a company to a breach.
Implementing and maintaining a layered security program needs
the active participation and support of several departments and
various personnel.
174.
175.
176. One of the key aspects to maintaining a security program is training.
Educating employees on what the threats are and how their role is
important in protecting the company’s supply chain is a significant
aspect to the success and endurance of a supply chain security
program.
Moreover, when employees
understand why security
procedures are in place,
they are much more
likely to adhere to them.
TRAINING, AND AWARENESS.... Cont’d
179. 12.3 DEVELOP TRAINING PROGRAM
Aim of the program
Objectives of the program
Learning Outcomes of the program
Assessment Strategies
Training Report (Program Evaluation)
180.
181.
182.
183.
184.
185.
186.
187.
188.
189.
190.
191.
192.
193.
194.
195.
196.
197.
198.
199.
200.
201.
202. SYNOPSIS
THIS COURSE IS AIMED AT CREATING AWARENESS AMONG THE PARTICIPANTS ON
CUSTOMS AND TRADE PARTNERSHIP AGAINST TERRORISM (CTPAT) SECURITY
REQUIREMENTS IN THE SUPPLY CHAIN DOMAIN. THE FOCUS OF SUCH
REQUIREMENT IS FOR FOREIGN MANUFACTURERS SUPPLYING GOODS TO UNITED
STATES TO OBSERVE SPECIFIC SECURITY GUIDANCE TO ENSURE A SECURE SUPPLY
CHAIN FROM THE POINT OF PACKAGING TO THE POINT OF RECEIPT.
HENCE, THIS TRAINING IS DELIVERED TO PROVIDE KNOWLEDGE AND
UNDERSTANDING ON THE SECURITY PROCESSES AND PROCEDURES INVOLVED IN
ENSURING THE SAFE MANUFACTURE, PACKAGING AND TRANSPORTING OF
GLOVES FROM COMFORT GLOVES TO ITS TRADE PARTNER IN UNITED STATES. THE
SECURITY PROCESSES AND PROCEDURES DISCUSSED SHALL BE WITHIN THE
CONFINES OF STIPULATED CTPAT SECURITY GUIDANCE THAT NEEDS TO BE
COMPLIED WITH INORDER TO ENSURE RISK MINIMIZED, FAST TRACK AND SAFE
ARRIVAL OF GOODS AT THE INTENDED DESTINATION IN UNITED STATES.