SlideShare a Scribd company logo
1 of 207
This Course Serves as a Practical Training Module For:
 Non-CTPAT Member companies seeking to augment their supply chain security
knowledge and understanding of the CTPAT program.
 Prospective CTPAT Member companies seeking program overview, best practices,
and expert insights before/during the CTPAT application process.
 CTPAT Member companies onboarding additional personnel in maintaining CTPAT
compliance.
Course Content
 What the CTPAT program is and how it benefits your company.
 How to successfully apply for membership by understanding key requirements.
 What to do after certification and maintaining your certification
 Expert insights from former CTPAT directors.
SYNOPSIS
THIS COURSE SERVES AS A TRAINING PROGRAM TO CREATE
AWARENESS AMONG THE PARTICIPANTS ON CUSTOMS TRADE
PARTNERSHIP AGAINST TERRORISM (CTPAT) SECURITY
REQUIREMENTS IN THE SUPPLY CHAIN DOMAIN. THE FOCUS OF
SUCH REQUIREMENT IS FOR FOREIGN MANUFACTURERS
SUPPLYING GOODS TO UNITED STATES TO OBSERVE SPECIFIC
SECURITY GUIDANCE TO ENSURE A SECURE SUPPLY CHAIN FROM
THE POINT OF PACKAGING TO THE POINT OF RECEIPT.
HENCE, THIS TRAINING IS DELIVERED TO PROVIDE KNOWLEDGE AND
UNDERSTANDING ON THE SECURITY PROCESSES AND PROCEDURES INVOLVED
IN ENSURING THE SAFE MANUFACTURE, PACKAGING AND TRANSPORTING OF
GLOVES FROM COMFORT GLOVES TO ITS TRADE PARTNER IN UNITED STATES.
THE SECURITY PROCESSES AND PROCEDURES DISCUSSED SHALL BE WITHIN
THE CONFINES OF STIPULATED CTPAT SECURITY GUIDANCE THAT NEEDS TO BE
COMPLIED WITH INORDER TO ENSURE THREATS ARE ADDRESSED AND RISK
MINIMIZED, FAST TRACK AND SAFE ARRIVAL OF GOODS AT THE INTENDED
DESTINATION IN UNITED STATES.
A SAFE, STABLE AND SECURED ENVIRONMENT IN WHICH AN
ORGANIZATION CAN CARRY OUT ITS OPERATIONS WITHOUT
ANY INTERFERENCE FROM INTERNAL AND EXTERNAL
THREATS WITH THE EXISTENCE OF ADEQUATE SECURITY
CONTROL MEASURES.
“AN EXPECTED IDEAL SITUATION”
What is Security?
STABLE ENVIRONMENT
SECURE ENVIRONMENT
SECURITY IS A SAFE ENVIRONMENT
A Supply Chain (SC) is a system of organizations, people,
activities, information and resources involved in moving a
product or service from supplier to customer.
What is a Supply Chain?
An Organization in the SC:
 An entity that manufactures, handles, processes,
loads,consolidates, unloads or receives goods
satisfying a purchase order that at some point cross an
international or eonomy border;
 An entity that transports goods by any mode in the
international SC regardless of whether their particular
segment of the SC crosses national (or economy)
boundaries;
Or
 An entity that provides, manages or conducts the
generation, distribution or flow of shipping
information used by customs agencies or in
business practices.
Besides Criminal and Terrorist activities, the key
factors
that may engender Security Risks in SC that disrupts
business goals are:
 SC involves many players
 Multiple modes of transport
 Various types of Intermediaries
 Several government agencies globally
 Complexity of the system leads to challenges
 Security Directors need C-suite support
 The human element.
Therefore in BUSINESS context, SECURITY is a CRITICAL
component which MUST ensure a SAFE, STABLE and SECURE
environment to conduct business operations throughout
Supply Chain.
INTRODUCTION
TO
CTPAT
(CTPAT: CUSTOMS TRADE PARTNERSHIP AGAINST
TERRORISM)
From its inception in November 2001, CTPAT continued
to grow. Today, more than 11,400 certified partners
spanning the gamut of the trade community, have
been accepted into the program.
The US Customs Trade Partnership Against Terrorism seeks
to safeguard the world’s vibrant trade industry from
terrorists, maintaining the economic health of the US and
its neighbours. The partnership develops and adopts
collaboration that add security value across SC.
CTPAT
Aim: C-TPAT, which stands for Customs Trade Partnership
Against Terrorism, was established in 2001 with the intention of
being a strong layer within U.S. Customs and Border Protection’s
(CBP) multi-layered cargo enforcement defensive system. C-
TPAT is a voluntary partnership program which is recognized by
CBP as being one of the highest levels of SC security designed
to prevent and mitigate threat and risk.
https://divineflavor.com/2020/06/01/c-tpat-minimum-security-requirements/
SC Threshold: CTPAT defines the SC link as
beginning at the point of origin - where cargo
destined for export to the United States has been
made, assembled, grown and/or packed for export -
and ending at point of distribution in the United
States.
Thus, CTPAT Members must ensure the security of their
cargo at every point in their supply chain link. The
following SC link map demonstrates potential 16
locations where cargo could be compromised.
Importantly, these are all locations where a validation
site visit by SCSS could take place to ensure that a
Member or business partner is meeting the CTPAT
security criteria.
The Supply Chain Link Map
Comfort Gloves
US Importer
Point of Origin -Exporter
Destination
Prevention
&
Mitigation Benefits
Benefits: Members who participate in the C-TPAT
program are considered to be low-risk, these
sectors can be exempt or partake in a variety of
benefits including: A reduction of CBP
examinations, front of the line inspections for
carriers, shorter wait times at the border, and
probably most important- stronger SC security.
SC Security - Collateral Benefits
Basis for Security Model: In order to engender the defined
benefits, CTPAT recognizes the complexity of international SC
and endorses the application of security measures based
upon risk. The program allows for flexibility and the
customization of security plans based on the Member’s
business model. Hence, it is expected, that appropriate and
effective Security Model be implemented and maintained
based on threat and risk throughout the Member’s SC link.
 Inevitably, the global SC continues to be targeted by
terrorists and criminal organizations, underscoring
the need for increased security measures to secure
their supply chains. Besides, cyberattacks or other
types of data breaches too continue to increase and
all sizes and types of companies are at risk.
https://www.slideshare.net/guest031790/supply-chain-security?qid=db0dc057-4949-47f6-bafb-
d17b0c13ed1b&v=&b=&from_search=1
Current security threats causing SC disruptions are:
Terrorism
Organized Crime and Cargo Theft
Hijacking and Piracy
Drug/Human smuggling
Illegal Weapons/Contrabands
Counterfeit Goods
Illegal exports of licensed materials/technology
Cyber attacks
CTPAT Key Security Objectives
Security Awareness: Opportunity of having
employees understand how smuggling, theft,
organized crime networks work including terrorist
contraband infilitration into the SC . It will help
identify the potential threats and risks.
Security and Efficiency: Efficient SC is a more
secured environment, which helps overall in
conveying your commitment amongst the
international community. Reputation is enhanced.
CTPAT AS THE ANCHOR IN LAYERED SECURITY MODEL
1. WCO Framework of Standards
2. ISO/PAS 28000 Outlines Security Management for SC
3. ICAO Annex 17 for Regulated Agents Regime
4. TAPA Freight Security Requirements
5. Customs-Trade Partnership against Terrorism (CTPAT).
CTPAT OBLIGATIONS
THE MINIMUM SECURITY CRITERIA
Since SC Domain is multi-faceted and is beleagured by
multiple challenges and risk from point of packaging to
point of receipt. The CTPAT approach to address the SC risks
has been structured in such a manner, covering the key
security processes in order to ensure that the entire SC
link is mitigated to RESIDUAL RISK, ensuring business
operational continuity is uninterrupted.
Hence the Introduction of
= 12
New CTPAT Minimum Security Criteria
(February 2020)
The Key Areas in CTPAT
1. SECURITY VISION
&
RESPONSIBILITY
In promoting and instilling a culture of security, CTPAT
Members should demonstrate their commitment to SC
security and the CTPAT program by satisfying the New CTPAT
Minimum Security Criteria (MSC) Requirements through a
statement of support.
Introduction
Incorporating MSC as an integral part of a company’s
security culture conforming to CTPAT program, it is
company-wide priority and in large part the responsibility
of the company’s top leadership to make a comprehensive
security vision statement to ensure the SC security
program remains visible and effective.
Introduction....Cont’d
 Promoting a work culture of security
 Building a robust supply-chain security program
 Creating a written and documented program
 Having a team knowledgeable of the CTPAT program and
its requirements
 Implementation of the CTPAT program must satisfy the
customers requirements.
Factors to Consider Vision Statement
Activity No.1
As a potential member of CTPAT, write a vision statement of SC
security support for your company.
Statement of support should highlight the importance of
protecting the supply chain from criminal activities such as drug
trafficking, human smuggling, and illegal contraband from
terrorist initiatives.
The following criteria and implementation guidance
shall facilitate the development of appropriate
procedural security measures in satisfying CTPAT
Minimum Security Criteria requirements.
Criteria and Implementation Guidance:
 Senior company officials who should support
and sign the statement may include the
President, CEO, General Manager, or Security
Director. Areas to display the statement of
support include the company's website, on
posters in key areas of the company (reception;
packaging; warehouse; etc.), and/or be part of
company security seminars, etc.
To build a robust SC security program, a company
should incorporate representatives from all of
the relevant departments into a cross-functional
team.
These new security measures developed for the
SC security program should be included in
existing company procedures, which creates a
more sustainable structure and emphasizes that
supply chain security is everyone's responsibility.
Security programs built on a more traditional,
security department-based model may be less
viable over the long run because the
responsibility to carry out the security measures
are concentrated among fewer employees, and,
as a result,may be susceptible to the loss of key
personnel.
 The SC security program must be implemented by an
appropriate written review component for the purpose of
holding personnel accountable for their responsibilities
and all security procedures outlined by the security
program. The review plan must be updated as needed
based on pertinent changes in an organization’s
operations and level of risk.
The company’s point(s) of contact (POC) to CTPAT must
be knowledgeable about CTPAT program requirements.
These individuals need to provide regular updates to
upper management on issues related to the program,
including the progress or outcomes of any audits,
security related exercises, and CTPAT validations.
CTPAT expects the designated POC to be a proactive
individual who engages and is responsive to his or her
SC Security Specialist. Members may identify
additional individuals who may help support this
function by listing them as contacts in the CTPAT Portal.
2. RISK ASSESSMENT
The new MSC employs a risk-based approach, explicitly
designating each criteria within the 12 categories as a
"must" or a "should" based on risk.
2. RISK ASSESSMENT
The continuing threat of terrorist groups and criminal
organizations targeting supply chains underscores the
for Members to assess existing and potential exposure to
evolving threats.
CTPAT recognizes that when a company has multiple
chains with numerous business partners, it faces greater
complexity in securing those supply chains due to
risk factor.
CTPAT recognizes that when a company has multiple supply
chains with numerous business partners, it faces greater
complexity in securing those SC. Terrorist groups and
criminal organizations targeting SC expose these members
to multiple threats and attendant risks. Hence members
should focus on vulnerable areas that have higher risk and
carry out risk management process involving preventive
and mitigation measures.
Introduction
 CTPAT Members must conduct and document the
amount of risk in their supply chains. CTPAT Members
must conduct an overall risk assessment (RA) to identify
where security vulnerabilities may exist. The RA must
identify threats, assess risks, and incorporate
sustainable measures to mitigate vulnerabilities. The
Member must take into account CTPAT requirements
specific to the Member’s role in the supply chain.
Implementation Guidance:
 The overall risk assessment (RA) is made up of two
key parts. The first part is a self-assessment of the
the Member’s SC security practices, procedures, and
procedures, and policies within the facilities that it
that it controls to verify its adherence to CTPAT’s
CTPAT’s minimum-security criteria, and an overall
overall management review of how it is managing
managing risk.
 The second part of the RA is the international risk
assessment. This portion of the RA includesthe
identification of geographical threat(s) based on the
Member’s business model and role in the SC.
When looking at the possible impact of each threat on
the security of the Member’s SC, the Member needs a
method to assess or differentiate between levels of risk.
A simple method is assigning the level of risk between
low, medium, and high (risk matrix).
Risk Matrix
 CTPAT developed the Five Step Risk Assessment guide as an aid to
conducting the international risk assessment portion of a
Member’s overall risk assessment, and it can be found on U.S.
Customs and Border Protection’s website at:
https://www.cbp.gov/sites/default/files/documents/CTPAT%27s
%20Five%20Step%20Risk%20Assessment%20Process.pdf.
Note: For Members with extensive supply chains, the primary focus is
expected to be on areas of higher risk.
To Ensure the Workplace (Components of Your Supply Chain Domain)
is ADEQUATELY SAFE with LIMITED EXPOSURE to RISK from its Operating
Environment. CTPAT members are to OBSERVE the following
PROTOCOLS:
 Promoting a work culture of security in the organization
 Building a robust supply-chain security program
 Creating a written and documented program
 Having a team knowledgeable of the CTPAT program and its
requirements for effective implementation.
Nature of RISKS
When a company has numerous supply chains, it should focus on
geographical areas/supply chains that have higher risk. When
determining risk within their supply chains, Members must consider
various factors such as the business model, geographic location of
suppliers, and other aspects that may be unique to a specific supply
chain. Therefore Risk Mitigation Initiatives shall at all times focus on
strategies to limit RISK exposure at workplace.
To mitigate a risk really means to limit the exposure in some way. This
could include reducing the likelihood of occurence, decreasing the
severity of the impact . Mitigation does not imply a complete
elimination of risk , just a reduction to an acceptable level. Thus, as
part of risk management, CTPAT members are expected to initiate the
following in the process of mitigation:
 Document the risk in the SC and conduct an assessment
 Map out the movement of cargo
 Review annually
 Have written procedures
https://www.verootctpat.com/ctpat-resources/how-to-conduct-a-ctpat-five-step-risk-assessment
Components of the 5-Step Risk Assessment
1. Mapping cargo flow and identifying business partners
(both direct or indirect)
2. Conducting a threat assessment
3. Conducting a vulnerability assessment
4. Preparing an action plan
5. Documenting the risk assessment process
1.1 Identify ALL parties involved in the following processes:
 Procurement
 Production
 Packing
 Storage
 Loading/Unloading
 Transportation
 Document Preparation
1.0 Map Cargo Flow and Business Partners
1.2 Methods
 Request information from supply chain partners
 Review documentation (BOLs, manifests, invoices, etc.) to
determine routing
 On site visits/audits of the supply chain
2.1 Identify and rate the risk of threat (High, Medium, Low) for the
country and region for each international supply chain, using the
following (at a minimum):
 Terrorism (political, bio, agro, cyber)
 Contraband Smuggling
 Human Smuggling
 Organized Crime
 Conditions fostering above threats
2.0 Threat Assessment
2.2 - Methods
 Open source internet information (government and private
organizations)
 Representative/Contacts “on the ground” at origin
 Law enforcement (foreign/domestic), local state,
federal/national
 Trade and security organizations
 Assigned C-TPAT SCSS
3.0 Conduct Vulnerability Assessment
3.1 For all business partners in the international supply chain
(directly contracted or sub-contracted):
Identify the process they perform
Verify partners meet applicable minimum security criteria
Rate their compliance within each applicable minimum-security
criteria category (High, Medium, Low)
3.2 Methods:
 SVI Number/C-TPAT Membership
 Membership in “Mutual Recognition Program”
 Security Surveys
 Site visits by company representative
 Site visits by overseas personnel/agents
 Business reports
 Security certifications covering C-TPAT minimum-security criteria
 3rd party supply chain security assessments
4.0 Prepare Action Plan
4.1 Establish a corrective action plan to address gaps or
vulnerabilities found in business partner’s security programs.
4.2 Methods:
 Word Document
 Excel Spreadsheet
 Project Management Software
5.0 Document How Risk Assessments are Conducted
5.1 A description of the company’s approach, policies, and
procedures for conducting an international Supply Chain security
risk assessment
5.2 Methods:
 Document company’s Policy for conducting International
Supply Chain Security Risk Assessment
 Document Procedures used to conduct International Supply
Chain Security Risk Assessments
https://slideplayer.com/slide/2497665/
3.0 BUSINESS PARTNERS
CTPAT Members engage with a variety of business partners, both
domestically and internationally. For those business partners who
directly handle cargo and/or import/export documentation, it is crucial
for the Member to ensure that these business partners have
appropriate security measures in place to secure the goods throughout
the international supply chain.
3.1 BUSINESS PARTNERS REQUIREMENTS:
 Screen new business partners
 Being a valid member of the CTPAT Program or Authorized Economic
Operator (AEO) with a Mutual Recognition Agreement (MRA) with the
United States.
 Exercise due diligence and confirm outsourced partners are also
screened.
 Working with Cargo carriers which either have CTPAT or meet the
minimum requirements
3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:
 Have a written and verifiale process for the selection of Business
Partners including , carriers, other manufacturers, product suppliers
and vendors ( parts & raw materials suppliers, etc.)
 Security Procedures for those Business Partners eligible for CTPAT
certification (carriers, importers, ports, terminals, brokers,
consolidators, etc.) must obtain documentation (such as the
CTPAT SVI (Status Verification Interface) Number indicating whether
these business partners are or not CTPAT certified. If not then
documentation proving they meeting an equivalent World Customs
Organization accredited security program administered by a foreign
customs authority.
3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:
If neither a SVI or other certified security program is available then the
certification the partner isdemonstrating that they are meeting the CTPAT
security criteria via written/electronic confirmation (contractual
obligationn statement from the business partner demonstrating their
compliance withCTPAT criteria.
A risk assessment process, non CTPAT eligible business partners must be
subject to verification of compliance with CTPAT security criteria by
foreign manufacturer.
 You must ensure that business partners develop security
processes and procedures consistent with CTPAT security criteria
to enhance the integrity of the shipment at point of origin,
assembly, or manufacturing and review the business parner
based on risk and that are maintaining the security tandards
required by YOU.
 US bound shipments should be monitored that CTPAT carriers
being used or non CTPAT carriers that they are meeting the CTPAT
security criteria as outlined above for business partner
requirements.
3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:
4. CYBERSECURITY
In today’s digital world, cybersecurity is the key to safeguarding a
company’s most precious assets:
 intellectual property
 customer information
 financial and trade data
 employee records, among others
With increased connectivity to the internet comes the risk of a
breach of a company’s information systems.
CYBERSECURITY...... Cont’d
Cybersecurity is the practice of protecting systems, networks, and
programs from digital attacks. These cyberattacks are usually aimed
at accessing, changing, or destroying sensitive information; extorting
money from users; or interrupting normal business processes.
Cybersecurity is the activity or process that focuses on:
 protecting computers
 networks, programs
 data from unintended or unauthorized access
 change or destruction.
CYBERSECURITY...... Cont’d
It is the process of identifying, analyzing, assessing, and
communicating a cyber-related risk and accepting, avoiding,
transferring, or mitigating it to an acceptable level, considering costs
and benefits taken.
CYBERSECURITY...... Cont’d
Cybersecurity threat pertains to businesses of all types and sizes.
Measures to secure a company’s information technology (IT) and data
are of paramount importance, and the listed CTPAT criteria provide a
foundation for an overall cybersecurity program for Members.
Listed Criteria include:
Must have written procedures on how to protect information
technology (IT).
Having sufficient software to defend IT systems against threats
(viruses, spyware, etc.)
Regularly test IT for vulnerabilities and test for abuse of policies
(Check cyber security annually)
Restrict users or have certain user limited to access private
company information.
Having protection for remote access. Provide users
usernames/passwords/VPNs
CYBERSECURITY..... Cont’d
S
E
C
U
R
I
T
Y
5. CONVEYANCE AND INSTRUMENTS OF INTERNATIONAL TRAFFIC SECURITY
Smuggling schemes often involve the modification of conveyances
and Instruments of International Traffic (IIT), or the hiding of
contraband inside IIT.
This criteria category covers security measures designed to prevent,
detect, and/or deter the altering of IIT structures or surreptitious entry
into them, which could allow the introduction of unauthorized material
or persons.
 Cargo/Trucks, also known as Conveyances and Instruments of
International Traffic (IIT) must be stored in a secure area to
prevent unauthorized personnel.
 Must have written procedures for security and agricultural
inspections
 Ensuring inspections are being carried out.
 Alerting Business Partners of any threats to the shipment
C-TPAT and ISO 17712 Compliant - Container Barrier Seals
6. SEAL SECURITY
The sealing of trailers and containers, to include continuous
seal integrity, continues to be a crucial element of a secure
supply chain. Seal security includes having a
comprehensive written seal policy that addresses:
 All aspects of seal security
 Using the correct seals per CTPAT requirements
 Properly placing a seal on an IIT
 Verifying that the seal has been affixed properly
 Must have a written high-security seal procedure.
 Control access to seals (Inventory, distributing, tracking
(Seal log).
 Sealing each container sent to a CTPAT member.
 Seals used are the ISO 17712 ( CTPAT Standard).
 Notifying CTPAT partners when seals are broken for
inspection.
SEAL SECURITY..... Cont’d
Seals must be compliant with ISO 17712 standards for high
security seals.
 Documentation regarding the compliance standard must be
maintained on file for verification.
 Upon receipt of seals, an inventory must be conducted and the
seals must be logged in a seal log book.
 Seal inventories must be conducted at least once per year
during the internal audit.
 Seals must be assigned to a designated employee/department
and stored in a secured storage container.
Manufacturers – Point of Sealing
 Upon issuance of seals, the seal log should be updated with the
seal usage information.
 A designated person who has received seal security training
must affix the seal to the loaded container/trailer, witnessed by
another person to ensure it has been properly affixed.
 View, Verify, Twist, and Tug (VVTT) method to ensure the seal is
the correct seal number.
 uncompromised, and properly affixed to the loaded
container/trailer.
 Compromised seals and/or containers must be reported to CBP or
the appropriate foreign authority.
Manufacturers – Point of Sealing.....Cont’d
Exporters – Point of Sealing
 Seals must be compliant with ISO 17712 standards for high security seals.
 Documentation regarding the compliance standard must be maintained on
file for verification.
 Upon receipt of seals, an inventory must be conducted and the seals must
be logged in a seal log book.
 Seal inventories must be conducted at least once per year during the
internal audit.
 Seals must be assigned to a designated employee/department and stored
in a secured storage container.
 Upon issuance of seals, the seal log should be updated with the seal
usage information.
 A designated person who has received seal security training must
affix the seal to the loaded
container/trailer, 1) witnessed by another person to ensure it
has been properly affixed and 2) using CBP’s
 View, Verify, Twist, and Tug (VVTT) method to ensure the seal is the
correct seal number, uncompromised, and properly affixed to the
loaded container/trailer.
 Compromised seals and/or containers must be reported to CBP or the
appropriate foreign authority.
Exporters – Point of Sealing...Cont’d
7. Procedural Security
PROCEDURAL
SECURITY
Procedural Security involves security controls that mitigate
identified risks by way of policies, procedures or guidelines.
As opposed to other controls, procedural controls rely on
users to follow RULES or perform certain steps that are not
necessarily enforced by technical or physical means.
Introduction
Introduction .....Cont’d
Procedural Security encompasses many aspects of the
import-export process, documentation, and cargo storage and
handling requirements. Other vital procedural criteria pertain
to reporting incidents and notification to pertinent law
enforcement.
Additionally, CTPAT often requires that procedures be
written because it helps maintain a uniform process over
time. Nevertheless, the amount of detail needed for these
written procedures will depend upon various elements
such as a company’s business model or what is covered
by the procedure.
Introduction .....Cont’d
The following criteria and implementation guidance
shall facilitate the development of appropriate
procedural security measures in satisfying CTPAT
Minimum Security Criteria requirements.
Criteria & Implementation Guidelines
Identifying/Reporting/Tracking Incidents
Brand Name/Identity Protection
Manifesting/Invoicing/EDI
Receiving
Shipping
Packing/Packaging
Cargo Discrepancies
Preventing Collusion
Procedural Control
When cargo is stored overnight, secure measures must be taken to
prevent unauthorized access.
Cargo/shipping containers must be inspected for pest
continuously.
Loading and unloading must be supervised by a manager or
security staff member.
There must be procedures in place for properly manifesting
product being shipped.
Brokers or agents must verify BOLs/Manifest are properly recorded
and accurate.
8. Agricultural Security
Introduction
 Agriculture is the largest industry and employment sector
in the U.S. Dating back to last century, the Plant Quarantine
Act of 1912 authorized the U.S. Department of Agriculture
(USDA) to inspect agricultural products, to organize border
quarantines and to restrict entry of infested agricultural
goods.
 Of late the industry is threatened by the introduction of
foreign animal and plant contaminants such as soil,
manure, seeds, and plant and animal material which may
harbour invasive and destructive pests and diseases
posing great RISK.
Introduction.... Cont’d
 Eliminating contaminants thereby reducing risks in all
conveyances and in all types of cargo may decrease CBP
cargo holds, delays, and commodity returns or
treatments.
 It is envisaged that, incorporating eliminating
procedures in compliance with CTPAT’s agricultural
requirements will also help protect from risks affecting
the key industry in the U.S. and the overall global food SC.
Introduction.... Cont’d
Pest Contamination & Risk
 Pest contamination as visible forms of animals, insects or
other invertebrates (alive or dead), or any organic material of
animal origin (including blood, bones, hair, flesh, secretions,
excretions bear risks when left unattended.
 Similarly, viable or non-viable plants or plant products
(including fruit, seeds, leaves, twigs, roots, bark); or
other organic material, including fungi; or soil, or water;
where such products are not the manifested cargo
within instruments of international traffic also shall
bear risks.
The following criteria and implementation guidance
shall facilitate the development of appropriate
procedural security measures in satisfying CTPAT
Minimum Security Criteria requirements.
Criteria & Implementation Guidance
 Visible pest prevention measures must be adhered
to throughout the SC. Measures regarding WPM
must meet the International Plant Protection
Convention’s (IPPC) International Standards for
Phytosanitary (health of plants) Measures No. 15
(ISPM 15).
 CTPAT Members must, in accordance with their business
model, have written procedures designed to prevent
visible pest contamination to include compliance with
Wood Packaging Materials (WPM) regulations.
 Additionally, CTPAT Members must have written
procedures to prevent pest and to include wood
compliance with the packing materials. International
standards for Phytosanitary Measures.
Note:
WPM includes items such as pallets, crates, boxes, reels,
and dunnage. Frequently, these items are made of raw wood
that may not have undergone sufficient processing or
treatment to remove or kill pests, and therefore remain a
pathway for the introduction and spread of pests. Dunnage
in particular has been shown to present a high risk of
introduction and spread of pests
9. PHYSICAL SECURITY
Cargo handling and storage facilities, Instruments of International
Traffic storage areas, and facilities where import/export
documentation is prepared in domestic and foreign locations must
have physical barriers and deterrents that guard against unauthorized
access.
 Offices and facilities must have physical barriers to prevent
unauthorized access.
 Gates where employees/guest enter/exit must be monitored
frequently.
 Private parking shall not be adjacent to cargo parking
 Facilities and offices have adequate lighting outside the facility
and in the parking section.
 Cameras are highly recommended and encouraged.
PHYSICAL SECURITY.... Cont’d
STOP
10. PHYSICAL ACCESS CONTROLS
Access controls prevent unauthorized access into facilities/areas,
help maintain control of employees and visitors, and protect
company assets. Access controls include the positive identification
of all employees, visitors, service providers, and vendors at all points
of entry.
 Identification badges and special keys to access the
facility/offices.
 Drivers delivering packages must be identified before delivering.
 Visitors must be screened and show identification.
 Using security guards and having written policies.
Identification badges
11. PERSONNEL SECURITY
A company’s human resource force is one of its most critical assets,
but it may also be one of its weakest security links. The criteria in this
category focus on issues such as employee screening and pre-
employment verifications. Screen employees before hire (Background
checks, employment history, etc.). Have an employee code of conduct
policy in place.
Many security breaches are caused by internal conspiracies, which is
where one or more employees collude to circumvent security
procedures aimed at allowing an infiltration of the supply chain.
Therefore, CTPAT members must exercise due diligence to verify that
employees filling sensitive positions are reliable and trustworthy.
Sensitive positions include staff working directly with cargo or its
documentation, as well as personnel involved in controlling access to
sensitive areas or equipment.
Such positions include, but are not limited to, shipping, receiving,
mailroom personnel, drivers, dispatch, security guards, any individuals
involved in load assignments, tracking of conveyances, and/or seal
controls.
PERSONNEL SECURITY.... Cont’d
As a supplier and or exporter of goods to the Unites States, QCWintess plays a critical role in the security of the international
supply chain.
12.0 EDUCATION, TRAINING, AND AWARENESS
CTPAT’s security criteria are designed to form the basis of a layered
security system. If one layer of security is overcome, another layer
should prevent a security breach, or alert a company to a breach.
Implementing and maintaining a layered security program needs
the active participation and support of several departments and
various personnel.
One of the key aspects to maintaining a security program is training.
Educating employees on what the threats are and how their role is
important in protecting the company’s supply chain is a significant
aspect to the success and endurance of a supply chain security
program.
Moreover, when employees
understand why security
procedures are in place,
they are much more
likely to adhere to them.
TRAINING, AND AWARENESS.... Cont’d
12.1 TRAINING NEED ANALYSIS MODEL
12.2 Bloom’Taxonomy
12.3 DEVELOP TRAINING PROGRAM
 Aim of the program
 Objectives of the program
 Learning Outcomes of the program
 Assessment Strategies
 Training Report (Program Evaluation)
SYNOPSIS
THIS COURSE IS AIMED AT CREATING AWARENESS AMONG THE PARTICIPANTS ON
CUSTOMS AND TRADE PARTNERSHIP AGAINST TERRORISM (CTPAT) SECURITY
REQUIREMENTS IN THE SUPPLY CHAIN DOMAIN. THE FOCUS OF SUCH
REQUIREMENT IS FOR FOREIGN MANUFACTURERS SUPPLYING GOODS TO UNITED
STATES TO OBSERVE SPECIFIC SECURITY GUIDANCE TO ENSURE A SECURE SUPPLY
CHAIN FROM THE POINT OF PACKAGING TO THE POINT OF RECEIPT.
HENCE, THIS TRAINING IS DELIVERED TO PROVIDE KNOWLEDGE AND
UNDERSTANDING ON THE SECURITY PROCESSES AND PROCEDURES INVOLVED IN
ENSURING THE SAFE MANUFACTURE, PACKAGING AND TRANSPORTING OF
GLOVES FROM COMFORT GLOVES TO ITS TRADE PARTNER IN UNITED STATES. THE
SECURITY PROCESSES AND PROCEDURES DISCUSSED SHALL BE WITHIN THE
CONFINES OF STIPULATED CTPAT SECURITY GUIDANCE THAT NEEDS TO BE
COMPLIED WITH INORDER TO ENSURE RISK MINIMIZED, FAST TRACK AND SAFE
ARRIVAL OF GOODS AT THE INTENDED DESTINATION IN UNITED STATES.
CTPAT  PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum security
CTPAT  PPTX Presentation.pptx - minimum security

More Related Content

Similar to CTPAT PPTX Presentation.pptx - minimum security

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurestorm
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesCorporater
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docxevonnehoggarth79783
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016CBIZ, Inc.
 
CTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdfCTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdfdemingcertificationa
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Ollie Whitehouse
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7Hong Sin Kwek
 
Navigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryNavigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryCitrin Cooperman
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfEnterprise Insider
 

Similar to CTPAT PPTX Presentation.pptx - minimum security (20)

Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Security Framework for Digital Risk Managment
Security Framework for Digital Risk ManagmentSecurity Framework for Digital Risk Managment
Security Framework for Digital Risk Managment
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
 
CISO as a service in India | Senselearner
CISO as a service in India | SenselearnerCISO as a service in India | Senselearner
CISO as a service in India | Senselearner
 
C-TPAT
C-TPATC-TPAT
C-TPAT
 
Emcp guidelines
Emcp guidelinesEmcp guidelines
Emcp guidelines
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx8242015 Combating cyber risk in the supply chain ­ Print Art.docx
8242015 Combating cyber risk in the supply chain ­ Print Art.docx
 
AICPA Introduces the SOC Report for Cybersecurity
AICPA Introduces the SOC Report for CybersecurityAICPA Introduces the SOC Report for Cybersecurity
AICPA Introduces the SOC Report for Cybersecurity
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
 
CTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdfCTPAT Customs Trade Partnership Against Terrorism.pdf
CTPAT Customs Trade Partnership Against Terrorism.pdf
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...Assuring the Security of the Supply Chain - Designing best practices for cybe...
Assuring the Security of the Supply Chain - Designing best practices for cybe...
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7
 
Navigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services IndustryNavigating COVID's Impact on the Financial Services Industry
Navigating COVID's Impact on the Financial Services Industry
 
IoB_PC_Financial_Crime_Prevention 2015-16
IoB_PC_Financial_Crime_Prevention 2015-16IoB_PC_Financial_Crime_Prevention 2015-16
IoB_PC_Financial_Crime_Prevention 2015-16
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Tft2 Task3 Essay
Tft2 Task3 EssayTft2 Task3 Essay
Tft2 Task3 Essay
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
 

More from Major K. Subramaniam Kmaravehlu

BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...Major K. Subramaniam Kmaravehlu
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityMajor K. Subramaniam Kmaravehlu
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareMajor K. Subramaniam Kmaravehlu
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesMajor K. Subramaniam Kmaravehlu
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Major K. Subramaniam Kmaravehlu
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONMajor K. Subramaniam Kmaravehlu
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMMajor K. Subramaniam Kmaravehlu
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical SecurityMajor K. Subramaniam Kmaravehlu
 
DLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENT
DLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENTDLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENT
DLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENTMajor K. Subramaniam Kmaravehlu
 

More from Major K. Subramaniam Kmaravehlu (19)

u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.pptu2-lect-1-to-9-mtd-pvb-1801161758710.ppt
u2-lect-1-to-9-mtd-pvb-1801161758710.ppt
 
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSMBLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
BLE 1213 PSM (SESSION 5).pptx-key Concepts in PSM
 
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
BLE 1213 PSM (SESSION 4).pptx- Contextual principles of Physical Security Man...
 
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical securityBLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
BLE 1213 MUST (SESSION 3).pptx- basic principles of physical security
 
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning GuideBLE 1213 MUST (SESSION 2).pptx-Student learning Guide
BLE 1213 MUST (SESSION 2).pptx-Student learning Guide
 
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in WarfareAI GENERATIVE.pptx- Introduction to AI generative in Warfare
AI GENERATIVE.pptx- Introduction to AI generative in Warfare
 
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principlesAVI SAFETY CULTURE.pptx- maintenance engineers safety principles
AVI SAFETY CULTURE.pptx- maintenance engineers safety principles
 
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
 
SECURITY PLANNING DESIGN (SESSION 3).ppt
SECURITY PLANNING  DESIGN (SESSION 3).pptSECURITY PLANNING  DESIGN (SESSION 3).ppt
SECURITY PLANNING DESIGN (SESSION 3).ppt
 
Physical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.pptPhysical_Security_Historical_perspective.ppt
Physical_Security_Historical_perspective.ppt
 
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSIONBLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
BLE 1213 PSM-Rosaini Gp 2.pptx- GROUP DISCUSSION
 
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATIONBLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
BLE 1213 PSM Fitri Gp 3.pptx- STUDENT GROUP PRESENTATION
 
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesxBLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
BLE 1213 PSM - GP 1,2,3 PRSTN.ppt-Presentation slidesx
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
 
BLE 1213 MUST.pptx- basics principles of Physical Security
BLE 1213 MUST.pptx- basics  principles of Physical SecurityBLE 1213 MUST.pptx- basics  principles of Physical Security
BLE 1213 MUST.pptx- basics principles of Physical Security
 
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
BLE 1213 MUST (PSY - Session 1).pptx-Student HO.
 
DLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slidesDLE 1013-ISM REV.pptx - This note covers 20 over slides
DLE 1013-ISM REV.pptx - This note covers 20 over slides
 
DLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENT
DLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENTDLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENT
DLE 1013-CHP 4.pptx - INTRODUCTION TO SECURITY MANAGEMENT
 
Drone Instr Induction Program.pptx
Drone Instr Induction Program.pptxDrone Instr Induction Program.pptx
Drone Instr Induction Program.pptx
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 

Recently uploaded (20)

Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 

CTPAT PPTX Presentation.pptx - minimum security

  • 1.
  • 2.
  • 3. This Course Serves as a Practical Training Module For:  Non-CTPAT Member companies seeking to augment their supply chain security knowledge and understanding of the CTPAT program.  Prospective CTPAT Member companies seeking program overview, best practices, and expert insights before/during the CTPAT application process.  CTPAT Member companies onboarding additional personnel in maintaining CTPAT compliance. Course Content  What the CTPAT program is and how it benefits your company.  How to successfully apply for membership by understanding key requirements.  What to do after certification and maintaining your certification  Expert insights from former CTPAT directors.
  • 4. SYNOPSIS THIS COURSE SERVES AS A TRAINING PROGRAM TO CREATE AWARENESS AMONG THE PARTICIPANTS ON CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM (CTPAT) SECURITY REQUIREMENTS IN THE SUPPLY CHAIN DOMAIN. THE FOCUS OF SUCH REQUIREMENT IS FOR FOREIGN MANUFACTURERS SUPPLYING GOODS TO UNITED STATES TO OBSERVE SPECIFIC SECURITY GUIDANCE TO ENSURE A SECURE SUPPLY CHAIN FROM THE POINT OF PACKAGING TO THE POINT OF RECEIPT.
  • 5. HENCE, THIS TRAINING IS DELIVERED TO PROVIDE KNOWLEDGE AND UNDERSTANDING ON THE SECURITY PROCESSES AND PROCEDURES INVOLVED IN ENSURING THE SAFE MANUFACTURE, PACKAGING AND TRANSPORTING OF GLOVES FROM COMFORT GLOVES TO ITS TRADE PARTNER IN UNITED STATES. THE SECURITY PROCESSES AND PROCEDURES DISCUSSED SHALL BE WITHIN THE CONFINES OF STIPULATED CTPAT SECURITY GUIDANCE THAT NEEDS TO BE COMPLIED WITH INORDER TO ENSURE THREATS ARE ADDRESSED AND RISK MINIMIZED, FAST TRACK AND SAFE ARRIVAL OF GOODS AT THE INTENDED DESTINATION IN UNITED STATES.
  • 6. A SAFE, STABLE AND SECURED ENVIRONMENT IN WHICH AN ORGANIZATION CAN CARRY OUT ITS OPERATIONS WITHOUT ANY INTERFERENCE FROM INTERNAL AND EXTERNAL THREATS WITH THE EXISTENCE OF ADEQUATE SECURITY CONTROL MEASURES. “AN EXPECTED IDEAL SITUATION” What is Security?
  • 8. A Supply Chain (SC) is a system of organizations, people, activities, information and resources involved in moving a product or service from supplier to customer. What is a Supply Chain?
  • 9. An Organization in the SC:  An entity that manufactures, handles, processes, loads,consolidates, unloads or receives goods satisfying a purchase order that at some point cross an international or eonomy border;
  • 10.  An entity that transports goods by any mode in the international SC regardless of whether their particular segment of the SC crosses national (or economy) boundaries;
  • 11. Or  An entity that provides, manages or conducts the generation, distribution or flow of shipping information used by customs agencies or in business practices.
  • 12. Besides Criminal and Terrorist activities, the key factors that may engender Security Risks in SC that disrupts business goals are:  SC involves many players  Multiple modes of transport  Various types of Intermediaries  Several government agencies globally  Complexity of the system leads to challenges  Security Directors need C-suite support  The human element.
  • 13. Therefore in BUSINESS context, SECURITY is a CRITICAL component which MUST ensure a SAFE, STABLE and SECURE environment to conduct business operations throughout Supply Chain.
  • 14. INTRODUCTION TO CTPAT (CTPAT: CUSTOMS TRADE PARTNERSHIP AGAINST TERRORISM) From its inception in November 2001, CTPAT continued to grow. Today, more than 11,400 certified partners spanning the gamut of the trade community, have been accepted into the program.
  • 15. The US Customs Trade Partnership Against Terrorism seeks to safeguard the world’s vibrant trade industry from terrorists, maintaining the economic health of the US and its neighbours. The partnership develops and adopts collaboration that add security value across SC. CTPAT
  • 16. Aim: C-TPAT, which stands for Customs Trade Partnership Against Terrorism, was established in 2001 with the intention of being a strong layer within U.S. Customs and Border Protection’s (CBP) multi-layered cargo enforcement defensive system. C- TPAT is a voluntary partnership program which is recognized by CBP as being one of the highest levels of SC security designed to prevent and mitigate threat and risk. https://divineflavor.com/2020/06/01/c-tpat-minimum-security-requirements/
  • 17. SC Threshold: CTPAT defines the SC link as beginning at the point of origin - where cargo destined for export to the United States has been made, assembled, grown and/or packed for export - and ending at point of distribution in the United States.
  • 18. Thus, CTPAT Members must ensure the security of their cargo at every point in their supply chain link. The following SC link map demonstrates potential 16 locations where cargo could be compromised. Importantly, these are all locations where a validation site visit by SCSS could take place to ensure that a Member or business partner is meeting the CTPAT security criteria.
  • 19. The Supply Chain Link Map Comfort Gloves US Importer Point of Origin -Exporter Destination
  • 21. Benefits: Members who participate in the C-TPAT program are considered to be low-risk, these sectors can be exempt or partake in a variety of benefits including: A reduction of CBP examinations, front of the line inspections for carriers, shorter wait times at the border, and probably most important- stronger SC security.
  • 22. SC Security - Collateral Benefits
  • 23. Basis for Security Model: In order to engender the defined benefits, CTPAT recognizes the complexity of international SC and endorses the application of security measures based upon risk. The program allows for flexibility and the customization of security plans based on the Member’s business model. Hence, it is expected, that appropriate and effective Security Model be implemented and maintained based on threat and risk throughout the Member’s SC link.
  • 24.  Inevitably, the global SC continues to be targeted by terrorists and criminal organizations, underscoring the need for increased security measures to secure their supply chains. Besides, cyberattacks or other types of data breaches too continue to increase and all sizes and types of companies are at risk.
  • 25. https://www.slideshare.net/guest031790/supply-chain-security?qid=db0dc057-4949-47f6-bafb- d17b0c13ed1b&v=&b=&from_search=1 Current security threats causing SC disruptions are: Terrorism Organized Crime and Cargo Theft Hijacking and Piracy Drug/Human smuggling Illegal Weapons/Contrabands Counterfeit Goods Illegal exports of licensed materials/technology Cyber attacks
  • 26. CTPAT Key Security Objectives Security Awareness: Opportunity of having employees understand how smuggling, theft, organized crime networks work including terrorist contraband infilitration into the SC . It will help identify the potential threats and risks. Security and Efficiency: Efficient SC is a more secured environment, which helps overall in conveying your commitment amongst the international community. Reputation is enhanced.
  • 27. CTPAT AS THE ANCHOR IN LAYERED SECURITY MODEL 1. WCO Framework of Standards 2. ISO/PAS 28000 Outlines Security Management for SC 3. ICAO Annex 17 for Regulated Agents Regime 4. TAPA Freight Security Requirements 5. Customs-Trade Partnership against Terrorism (CTPAT).
  • 28. CTPAT OBLIGATIONS THE MINIMUM SECURITY CRITERIA
  • 29. Since SC Domain is multi-faceted and is beleagured by multiple challenges and risk from point of packaging to point of receipt. The CTPAT approach to address the SC risks has been structured in such a manner, covering the key security processes in order to ensure that the entire SC link is mitigated to RESIDUAL RISK, ensuring business operational continuity is uninterrupted.
  • 30.
  • 31. Hence the Introduction of = 12 New CTPAT Minimum Security Criteria (February 2020)
  • 32. The Key Areas in CTPAT
  • 34. In promoting and instilling a culture of security, CTPAT Members should demonstrate their commitment to SC security and the CTPAT program by satisfying the New CTPAT Minimum Security Criteria (MSC) Requirements through a statement of support. Introduction
  • 35. Incorporating MSC as an integral part of a company’s security culture conforming to CTPAT program, it is company-wide priority and in large part the responsibility of the company’s top leadership to make a comprehensive security vision statement to ensure the SC security program remains visible and effective. Introduction....Cont’d
  • 36.  Promoting a work culture of security  Building a robust supply-chain security program  Creating a written and documented program  Having a team knowledgeable of the CTPAT program and its requirements  Implementation of the CTPAT program must satisfy the customers requirements. Factors to Consider Vision Statement
  • 37. Activity No.1 As a potential member of CTPAT, write a vision statement of SC security support for your company. Statement of support should highlight the importance of protecting the supply chain from criminal activities such as drug trafficking, human smuggling, and illegal contraband from terrorist initiatives.
  • 38. The following criteria and implementation guidance shall facilitate the development of appropriate procedural security measures in satisfying CTPAT Minimum Security Criteria requirements.
  • 39. Criteria and Implementation Guidance:  Senior company officials who should support and sign the statement may include the President, CEO, General Manager, or Security Director. Areas to display the statement of support include the company's website, on posters in key areas of the company (reception; packaging; warehouse; etc.), and/or be part of company security seminars, etc.
  • 40. To build a robust SC security program, a company should incorporate representatives from all of the relevant departments into a cross-functional team. These new security measures developed for the SC security program should be included in existing company procedures, which creates a more sustainable structure and emphasizes that supply chain security is everyone's responsibility.
  • 41. Security programs built on a more traditional, security department-based model may be less viable over the long run because the responsibility to carry out the security measures are concentrated among fewer employees, and, as a result,may be susceptible to the loss of key personnel.
  • 42.  The SC security program must be implemented by an appropriate written review component for the purpose of holding personnel accountable for their responsibilities and all security procedures outlined by the security program. The review plan must be updated as needed based on pertinent changes in an organization’s operations and level of risk.
  • 43. The company’s point(s) of contact (POC) to CTPAT must be knowledgeable about CTPAT program requirements. These individuals need to provide regular updates to upper management on issues related to the program, including the progress or outcomes of any audits, security related exercises, and CTPAT validations.
  • 44. CTPAT expects the designated POC to be a proactive individual who engages and is responsive to his or her SC Security Specialist. Members may identify additional individuals who may help support this function by listing them as contacts in the CTPAT Portal.
  • 45. 2. RISK ASSESSMENT The new MSC employs a risk-based approach, explicitly designating each criteria within the 12 categories as a "must" or a "should" based on risk.
  • 46. 2. RISK ASSESSMENT The continuing threat of terrorist groups and criminal organizations targeting supply chains underscores the for Members to assess existing and potential exposure to evolving threats. CTPAT recognizes that when a company has multiple chains with numerous business partners, it faces greater complexity in securing those supply chains due to risk factor.
  • 47. CTPAT recognizes that when a company has multiple supply chains with numerous business partners, it faces greater complexity in securing those SC. Terrorist groups and criminal organizations targeting SC expose these members to multiple threats and attendant risks. Hence members should focus on vulnerable areas that have higher risk and carry out risk management process involving preventive and mitigation measures. Introduction
  • 48.  CTPAT Members must conduct and document the amount of risk in their supply chains. CTPAT Members must conduct an overall risk assessment (RA) to identify where security vulnerabilities may exist. The RA must identify threats, assess risks, and incorporate sustainable measures to mitigate vulnerabilities. The Member must take into account CTPAT requirements specific to the Member’s role in the supply chain. Implementation Guidance:
  • 49.  The overall risk assessment (RA) is made up of two key parts. The first part is a self-assessment of the the Member’s SC security practices, procedures, and procedures, and policies within the facilities that it that it controls to verify its adherence to CTPAT’s CTPAT’s minimum-security criteria, and an overall overall management review of how it is managing managing risk.
  • 50.  The second part of the RA is the international risk assessment. This portion of the RA includesthe identification of geographical threat(s) based on the Member’s business model and role in the SC. When looking at the possible impact of each threat on the security of the Member’s SC, the Member needs a method to assess or differentiate between levels of risk. A simple method is assigning the level of risk between low, medium, and high (risk matrix).
  • 52.  CTPAT developed the Five Step Risk Assessment guide as an aid to conducting the international risk assessment portion of a Member’s overall risk assessment, and it can be found on U.S. Customs and Border Protection’s website at: https://www.cbp.gov/sites/default/files/documents/CTPAT%27s %20Five%20Step%20Risk%20Assessment%20Process.pdf. Note: For Members with extensive supply chains, the primary focus is expected to be on areas of higher risk.
  • 53. To Ensure the Workplace (Components of Your Supply Chain Domain) is ADEQUATELY SAFE with LIMITED EXPOSURE to RISK from its Operating Environment. CTPAT members are to OBSERVE the following PROTOCOLS:  Promoting a work culture of security in the organization  Building a robust supply-chain security program  Creating a written and documented program  Having a team knowledgeable of the CTPAT program and its requirements for effective implementation.
  • 54.
  • 56. When a company has numerous supply chains, it should focus on geographical areas/supply chains that have higher risk. When determining risk within their supply chains, Members must consider various factors such as the business model, geographic location of suppliers, and other aspects that may be unique to a specific supply chain. Therefore Risk Mitigation Initiatives shall at all times focus on strategies to limit RISK exposure at workplace.
  • 57. To mitigate a risk really means to limit the exposure in some way. This could include reducing the likelihood of occurence, decreasing the severity of the impact . Mitigation does not imply a complete elimination of risk , just a reduction to an acceptable level. Thus, as part of risk management, CTPAT members are expected to initiate the following in the process of mitigation:  Document the risk in the SC and conduct an assessment  Map out the movement of cargo  Review annually  Have written procedures
  • 59. Components of the 5-Step Risk Assessment 1. Mapping cargo flow and identifying business partners (both direct or indirect) 2. Conducting a threat assessment 3. Conducting a vulnerability assessment 4. Preparing an action plan 5. Documenting the risk assessment process
  • 60.
  • 61. 1.1 Identify ALL parties involved in the following processes:  Procurement  Production  Packing  Storage  Loading/Unloading  Transportation  Document Preparation 1.0 Map Cargo Flow and Business Partners
  • 62. 1.2 Methods  Request information from supply chain partners  Review documentation (BOLs, manifests, invoices, etc.) to determine routing  On site visits/audits of the supply chain
  • 63. 2.1 Identify and rate the risk of threat (High, Medium, Low) for the country and region for each international supply chain, using the following (at a minimum):  Terrorism (political, bio, agro, cyber)  Contraband Smuggling  Human Smuggling  Organized Crime  Conditions fostering above threats 2.0 Threat Assessment
  • 64. 2.2 - Methods  Open source internet information (government and private organizations)  Representative/Contacts “on the ground” at origin  Law enforcement (foreign/domestic), local state, federal/national  Trade and security organizations  Assigned C-TPAT SCSS
  • 65. 3.0 Conduct Vulnerability Assessment 3.1 For all business partners in the international supply chain (directly contracted or sub-contracted): Identify the process they perform Verify partners meet applicable minimum security criteria Rate their compliance within each applicable minimum-security criteria category (High, Medium, Low)
  • 66. 3.2 Methods:  SVI Number/C-TPAT Membership  Membership in “Mutual Recognition Program”  Security Surveys  Site visits by company representative  Site visits by overseas personnel/agents  Business reports  Security certifications covering C-TPAT minimum-security criteria  3rd party supply chain security assessments
  • 67. 4.0 Prepare Action Plan 4.1 Establish a corrective action plan to address gaps or vulnerabilities found in business partner’s security programs. 4.2 Methods:  Word Document  Excel Spreadsheet  Project Management Software
  • 68. 5.0 Document How Risk Assessments are Conducted 5.1 A description of the company’s approach, policies, and procedures for conducting an international Supply Chain security risk assessment 5.2 Methods:  Document company’s Policy for conducting International Supply Chain Security Risk Assessment  Document Procedures used to conduct International Supply Chain Security Risk Assessments
  • 70. 3.0 BUSINESS PARTNERS CTPAT Members engage with a variety of business partners, both domestically and internationally. For those business partners who directly handle cargo and/or import/export documentation, it is crucial for the Member to ensure that these business partners have appropriate security measures in place to secure the goods throughout the international supply chain.
  • 71. 3.1 BUSINESS PARTNERS REQUIREMENTS:  Screen new business partners  Being a valid member of the CTPAT Program or Authorized Economic Operator (AEO) with a Mutual Recognition Agreement (MRA) with the United States.  Exercise due diligence and confirm outsourced partners are also screened.  Working with Cargo carriers which either have CTPAT or meet the minimum requirements
  • 72. 3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:  Have a written and verifiale process for the selection of Business Partners including , carriers, other manufacturers, product suppliers and vendors ( parts & raw materials suppliers, etc.)  Security Procedures for those Business Partners eligible for CTPAT certification (carriers, importers, ports, terminals, brokers, consolidators, etc.) must obtain documentation (such as the CTPAT SVI (Status Verification Interface) Number indicating whether these business partners are or not CTPAT certified. If not then documentation proving they meeting an equivalent World Customs Organization accredited security program administered by a foreign customs authority.
  • 73. 3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d: If neither a SVI or other certified security program is available then the certification the partner isdemonstrating that they are meeting the CTPAT security criteria via written/electronic confirmation (contractual obligationn statement from the business partner demonstrating their compliance withCTPAT criteria. A risk assessment process, non CTPAT eligible business partners must be subject to verification of compliance with CTPAT security criteria by foreign manufacturer.
  • 74.  You must ensure that business partners develop security processes and procedures consistent with CTPAT security criteria to enhance the integrity of the shipment at point of origin, assembly, or manufacturing and review the business parner based on risk and that are maintaining the security tandards required by YOU.  US bound shipments should be monitored that CTPAT carriers being used or non CTPAT carriers that they are meeting the CTPAT security criteria as outlined above for business partner requirements. 3.1 BUSINESS PARTNERS REQUIREMENTS.....Cont’d:
  • 75.
  • 76. 4. CYBERSECURITY In today’s digital world, cybersecurity is the key to safeguarding a company’s most precious assets:  intellectual property  customer information  financial and trade data  employee records, among others With increased connectivity to the internet comes the risk of a breach of a company’s information systems.
  • 77. CYBERSECURITY...... Cont’d Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
  • 78. Cybersecurity is the activity or process that focuses on:  protecting computers  networks, programs  data from unintended or unauthorized access  change or destruction. CYBERSECURITY...... Cont’d
  • 79. It is the process of identifying, analyzing, assessing, and communicating a cyber-related risk and accepting, avoiding, transferring, or mitigating it to an acceptable level, considering costs and benefits taken. CYBERSECURITY...... Cont’d Cybersecurity threat pertains to businesses of all types and sizes. Measures to secure a company’s information technology (IT) and data are of paramount importance, and the listed CTPAT criteria provide a foundation for an overall cybersecurity program for Members.
  • 80. Listed Criteria include: Must have written procedures on how to protect information technology (IT). Having sufficient software to defend IT systems against threats (viruses, spyware, etc.) Regularly test IT for vulnerabilities and test for abuse of policies (Check cyber security annually) Restrict users or have certain user limited to access private company information. Having protection for remote access. Provide users usernames/passwords/VPNs CYBERSECURITY..... Cont’d
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87.
  • 88.
  • 89.
  • 90.
  • 91.
  • 92.
  • 93.
  • 94.
  • 95.
  • 96.
  • 98.
  • 99. 5. CONVEYANCE AND INSTRUMENTS OF INTERNATIONAL TRAFFIC SECURITY Smuggling schemes often involve the modification of conveyances and Instruments of International Traffic (IIT), or the hiding of contraband inside IIT. This criteria category covers security measures designed to prevent, detect, and/or deter the altering of IIT structures or surreptitious entry into them, which could allow the introduction of unauthorized material or persons.
  • 100.
  • 101.  Cargo/Trucks, also known as Conveyances and Instruments of International Traffic (IIT) must be stored in a secure area to prevent unauthorized personnel.  Must have written procedures for security and agricultural inspections  Ensuring inspections are being carried out.  Alerting Business Partners of any threats to the shipment
  • 102.
  • 103. C-TPAT and ISO 17712 Compliant - Container Barrier Seals
  • 104. 6. SEAL SECURITY The sealing of trailers and containers, to include continuous seal integrity, continues to be a crucial element of a secure supply chain. Seal security includes having a comprehensive written seal policy that addresses:  All aspects of seal security  Using the correct seals per CTPAT requirements  Properly placing a seal on an IIT  Verifying that the seal has been affixed properly
  • 105.  Must have a written high-security seal procedure.  Control access to seals (Inventory, distributing, tracking (Seal log).  Sealing each container sent to a CTPAT member.  Seals used are the ISO 17712 ( CTPAT Standard).  Notifying CTPAT partners when seals are broken for inspection. SEAL SECURITY..... Cont’d
  • 106. Seals must be compliant with ISO 17712 standards for high security seals.  Documentation regarding the compliance standard must be maintained on file for verification.  Upon receipt of seals, an inventory must be conducted and the seals must be logged in a seal log book.  Seal inventories must be conducted at least once per year during the internal audit.  Seals must be assigned to a designated employee/department and stored in a secured storage container. Manufacturers – Point of Sealing
  • 107.  Upon issuance of seals, the seal log should be updated with the seal usage information.  A designated person who has received seal security training must affix the seal to the loaded container/trailer, witnessed by another person to ensure it has been properly affixed.  View, Verify, Twist, and Tug (VVTT) method to ensure the seal is the correct seal number.  uncompromised, and properly affixed to the loaded container/trailer.  Compromised seals and/or containers must be reported to CBP or the appropriate foreign authority. Manufacturers – Point of Sealing.....Cont’d
  • 108. Exporters – Point of Sealing  Seals must be compliant with ISO 17712 standards for high security seals.  Documentation regarding the compliance standard must be maintained on file for verification.  Upon receipt of seals, an inventory must be conducted and the seals must be logged in a seal log book.  Seal inventories must be conducted at least once per year during the internal audit.  Seals must be assigned to a designated employee/department and stored in a secured storage container.
  • 109.  Upon issuance of seals, the seal log should be updated with the seal usage information.  A designated person who has received seal security training must affix the seal to the loaded container/trailer, 1) witnessed by another person to ensure it has been properly affixed and 2) using CBP’s  View, Verify, Twist, and Tug (VVTT) method to ensure the seal is the correct seal number, uncompromised, and properly affixed to the loaded container/trailer.  Compromised seals and/or containers must be reported to CBP or the appropriate foreign authority. Exporters – Point of Sealing...Cont’d
  • 112. Procedural Security involves security controls that mitigate identified risks by way of policies, procedures or guidelines. As opposed to other controls, procedural controls rely on users to follow RULES or perform certain steps that are not necessarily enforced by technical or physical means. Introduction
  • 113. Introduction .....Cont’d Procedural Security encompasses many aspects of the import-export process, documentation, and cargo storage and handling requirements. Other vital procedural criteria pertain to reporting incidents and notification to pertinent law enforcement.
  • 114. Additionally, CTPAT often requires that procedures be written because it helps maintain a uniform process over time. Nevertheless, the amount of detail needed for these written procedures will depend upon various elements such as a company’s business model or what is covered by the procedure. Introduction .....Cont’d
  • 115. The following criteria and implementation guidance shall facilitate the development of appropriate procedural security measures in satisfying CTPAT Minimum Security Criteria requirements.
  • 116. Criteria & Implementation Guidelines Identifying/Reporting/Tracking Incidents Brand Name/Identity Protection Manifesting/Invoicing/EDI Receiving Shipping Packing/Packaging Cargo Discrepancies Preventing Collusion
  • 117.
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124.
  • 125.
  • 126.
  • 127.
  • 128.
  • 129.
  • 130.
  • 131.
  • 132.
  • 133.
  • 135. When cargo is stored overnight, secure measures must be taken to prevent unauthorized access. Cargo/shipping containers must be inspected for pest continuously. Loading and unloading must be supervised by a manager or security staff member. There must be procedures in place for properly manifesting product being shipped. Brokers or agents must verify BOLs/Manifest are properly recorded and accurate.
  • 137.
  • 138. Introduction  Agriculture is the largest industry and employment sector in the U.S. Dating back to last century, the Plant Quarantine Act of 1912 authorized the U.S. Department of Agriculture (USDA) to inspect agricultural products, to organize border quarantines and to restrict entry of infested agricultural goods.
  • 139.  Of late the industry is threatened by the introduction of foreign animal and plant contaminants such as soil, manure, seeds, and plant and animal material which may harbour invasive and destructive pests and diseases posing great RISK. Introduction.... Cont’d
  • 140.  Eliminating contaminants thereby reducing risks in all conveyances and in all types of cargo may decrease CBP cargo holds, delays, and commodity returns or treatments.  It is envisaged that, incorporating eliminating procedures in compliance with CTPAT’s agricultural requirements will also help protect from risks affecting the key industry in the U.S. and the overall global food SC. Introduction.... Cont’d
  • 141. Pest Contamination & Risk  Pest contamination as visible forms of animals, insects or other invertebrates (alive or dead), or any organic material of animal origin (including blood, bones, hair, flesh, secretions, excretions bear risks when left unattended.
  • 142.  Similarly, viable or non-viable plants or plant products (including fruit, seeds, leaves, twigs, roots, bark); or other organic material, including fungi; or soil, or water; where such products are not the manifested cargo within instruments of international traffic also shall bear risks.
  • 143. The following criteria and implementation guidance shall facilitate the development of appropriate procedural security measures in satisfying CTPAT Minimum Security Criteria requirements.
  • 144. Criteria & Implementation Guidance  Visible pest prevention measures must be adhered to throughout the SC. Measures regarding WPM must meet the International Plant Protection Convention’s (IPPC) International Standards for Phytosanitary (health of plants) Measures No. 15 (ISPM 15).
  • 145.  CTPAT Members must, in accordance with their business model, have written procedures designed to prevent visible pest contamination to include compliance with Wood Packaging Materials (WPM) regulations.
  • 146.  Additionally, CTPAT Members must have written procedures to prevent pest and to include wood compliance with the packing materials. International standards for Phytosanitary Measures.
  • 147. Note: WPM includes items such as pallets, crates, boxes, reels, and dunnage. Frequently, these items are made of raw wood that may not have undergone sufficient processing or treatment to remove or kill pests, and therefore remain a pathway for the introduction and spread of pests. Dunnage in particular has been shown to present a high risk of introduction and spread of pests
  • 148.
  • 149.
  • 150.
  • 151. 9. PHYSICAL SECURITY Cargo handling and storage facilities, Instruments of International Traffic storage areas, and facilities where import/export documentation is prepared in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access.
  • 152.  Offices and facilities must have physical barriers to prevent unauthorized access.  Gates where employees/guest enter/exit must be monitored frequently.  Private parking shall not be adjacent to cargo parking  Facilities and offices have adequate lighting outside the facility and in the parking section.  Cameras are highly recommended and encouraged. PHYSICAL SECURITY.... Cont’d
  • 153.
  • 154.
  • 155.
  • 156. STOP
  • 157. 10. PHYSICAL ACCESS CONTROLS Access controls prevent unauthorized access into facilities/areas, help maintain control of employees and visitors, and protect company assets. Access controls include the positive identification of all employees, visitors, service providers, and vendors at all points of entry.  Identification badges and special keys to access the facility/offices.  Drivers delivering packages must be identified before delivering.  Visitors must be screened and show identification.  Using security guards and having written policies.
  • 159.
  • 160.
  • 161.
  • 162.
  • 163.
  • 164.
  • 165.
  • 166.
  • 167.
  • 168.
  • 169.
  • 170. 11. PERSONNEL SECURITY A company’s human resource force is one of its most critical assets, but it may also be one of its weakest security links. The criteria in this category focus on issues such as employee screening and pre- employment verifications. Screen employees before hire (Background checks, employment history, etc.). Have an employee code of conduct policy in place. Many security breaches are caused by internal conspiracies, which is where one or more employees collude to circumvent security procedures aimed at allowing an infiltration of the supply chain.
  • 171. Therefore, CTPAT members must exercise due diligence to verify that employees filling sensitive positions are reliable and trustworthy. Sensitive positions include staff working directly with cargo or its documentation, as well as personnel involved in controlling access to sensitive areas or equipment. Such positions include, but are not limited to, shipping, receiving, mailroom personnel, drivers, dispatch, security guards, any individuals involved in load assignments, tracking of conveyances, and/or seal controls. PERSONNEL SECURITY.... Cont’d
  • 172. As a supplier and or exporter of goods to the Unites States, QCWintess plays a critical role in the security of the international supply chain.
  • 173. 12.0 EDUCATION, TRAINING, AND AWARENESS CTPAT’s security criteria are designed to form the basis of a layered security system. If one layer of security is overcome, another layer should prevent a security breach, or alert a company to a breach. Implementing and maintaining a layered security program needs the active participation and support of several departments and various personnel.
  • 174.
  • 175.
  • 176. One of the key aspects to maintaining a security program is training. Educating employees on what the threats are and how their role is important in protecting the company’s supply chain is a significant aspect to the success and endurance of a supply chain security program. Moreover, when employees understand why security procedures are in place, they are much more likely to adhere to them. TRAINING, AND AWARENESS.... Cont’d
  • 177. 12.1 TRAINING NEED ANALYSIS MODEL
  • 179. 12.3 DEVELOP TRAINING PROGRAM  Aim of the program  Objectives of the program  Learning Outcomes of the program  Assessment Strategies  Training Report (Program Evaluation)
  • 180.
  • 181.
  • 182.
  • 183.
  • 184.
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195.
  • 196.
  • 197.
  • 198.
  • 199.
  • 200.
  • 201.
  • 202. SYNOPSIS THIS COURSE IS AIMED AT CREATING AWARENESS AMONG THE PARTICIPANTS ON CUSTOMS AND TRADE PARTNERSHIP AGAINST TERRORISM (CTPAT) SECURITY REQUIREMENTS IN THE SUPPLY CHAIN DOMAIN. THE FOCUS OF SUCH REQUIREMENT IS FOR FOREIGN MANUFACTURERS SUPPLYING GOODS TO UNITED STATES TO OBSERVE SPECIFIC SECURITY GUIDANCE TO ENSURE A SECURE SUPPLY CHAIN FROM THE POINT OF PACKAGING TO THE POINT OF RECEIPT. HENCE, THIS TRAINING IS DELIVERED TO PROVIDE KNOWLEDGE AND UNDERSTANDING ON THE SECURITY PROCESSES AND PROCEDURES INVOLVED IN ENSURING THE SAFE MANUFACTURE, PACKAGING AND TRANSPORTING OF GLOVES FROM COMFORT GLOVES TO ITS TRADE PARTNER IN UNITED STATES. THE SECURITY PROCESSES AND PROCEDURES DISCUSSED SHALL BE WITHIN THE CONFINES OF STIPULATED CTPAT SECURITY GUIDANCE THAT NEEDS TO BE COMPLIED WITH INORDER TO ENSURE RISK MINIMIZED, FAST TRACK AND SAFE ARRIVAL OF GOODS AT THE INTENDED DESTINATION IN UNITED STATES.