The Supply Compliance Audit Network (SCAN), literally translated as the Supply Compliance Audit Network, is an industry association established by large and small importers in the United States. Its goal is to reduce supply chain security audits and allow importers to share audit report information. The audit fee for SCAN Anti-Terrorism Factory Audit in China is 1045USD. The biggest benefit is that you can share the SCAN Anti-Terrorism Factory Audit report with other customers to avoid repeated factory audits. What are the key issues in SCAN factory inspection? 1. When international shipping cargo is loaded or unloaded, is the container or trailer immediately sealed with a high-security seal that complies with the ISO 17712:2013 standard? 2. Are security seals kept in a safe place? 3. Does the factory perform a seven-point inspection using a documented checklist before loading a container or trailer? 4. Is the driver information for each shipment recorded and retained? 5. Is there a written procedure outlining access control to facilities, property and buildings? The procedure should include details of issuing, revoking and changing access control devices and identification documents. 6. Is there a written and verifiable procedure to monitor and restrict access to key operating areas of the factory, such as warehouse picking areas, final packaging and packaging areas, shipping and receiving areas? Access should be limited to authorized employees only. 7. Is there a written, verifiable procedure for requiring visitors to produce identification upon arrival and for their information to be entered into a visitor register? 8. Are there written, verifiable procedures to prevent the introduction of unauthorized and undisplayed materials during container and trailer loading and shipment? 9. Is there a written, verifiable procedure for notifying local law enforcement and customers when illegal shipping activity or anything unusual is suspected or detected? SCAN factory inspection document list Please prepare the following documents (but not limited to) for the auditor to review and allow the auditor to scan or take photos of necessary documents. Business Partner Requirements 1. Written procedures for selecting business partners (such as material suppliers, manufacturers and material service providers) 2 Contracts with business partners 3. Annual self-risk assessment report for business partners 4 Minimum supply chain security requirements for logistics companies Container and trailer security 1 Specifications of ISO17712 high security seals 2 Procedures for seal control and use 3 Bills of lading for the past year 4. Written procedures for unplanned stays, damaged cargo, and unattended cargo 5. Written procedures on how to identify a suspicious or broken security seal, tampering with the container or trailer structure and how to report the issue to the freight forwarder and appropriate local law enforcement 6 Procedure for Verifying Security Seal Number 7 Photo of the loaded container or trailer with the seal affixed 8 Written procedures for reporting unauthorized entry into containers, trailers, or product storage areas and who to notify 9 Written procedures for inspecting containers or trailers before loading 10 7-point checklist 11. 7-point inspection training records Transport safety 1 Driver information register 2 Written procedures to guide drivers on designated routes 3. Use technology to monitor the process of transporting goods to the port or next destination 4. What are the written safety procedures for the contracted bulk service company? (NA if the facility does not ship bulk internationally) 5. Procedures requiring that bulk containers or trailers be locked with seals or padlocks each time they stop to load additional cargo. 6 For air cargo, outline the procedures required to record the movement of cargo from the factory to the freight forwarder or airline Physical access control 1. Outline the control of access to facilities, property, and buildings, including procedures for issuing, removing, and changing access control devices and identification cards. 2. Procedures to monitor and limit access to key production areas of the facility (such as warehouse picking, finished product packaging or packing, shipping and receiving) to authorized employees only 3. Visitors are required to show photo identification upon arrival at the factory and register in the visitor registration book/visitor registration form 4. Procedures for checking visitors’ bags and packages before they enter and leave the facility 5. Procedures for inspecting suspicious packages and checking mail for hazardous materials prior to delivery 6. Procedures for identifying, challenging and removing unauthorized personnel within the facility Personnel safety 1. Staff recruitment procedures 2. Background check of employee’s criminal history and drug abuse history 3. Employee’s personnel files 4. Procedures for verifying information on job applications such as address, previous work experience, education, personal or professional references, and credentials 5. Written procedures for conducting background checks on job applicants and employees working in sensitive areas (e.g., personnel, shipping, computer systems, or contract work). 6. Remove factory access privileges, such as procedures to remove factory-issued ID cards and computer access passwords from employees who have left, been terminated, or are on extended leave. Program security 1. Procedures requiring that all information used in goods and cargo declarations be clear, complete and accurate 2. Written procedures to limit access to shipping and receiving documents to authorized personnel only 3. Requires the communication of necessary business information for customs clearance within 24 hours of the goods leaving the factory. 4 Commercial Invoice and Bill of Lading 5. Procedures to prevent the receipt of unauthorized or undocumented goods during loading into containers, trailers and shipments 6. Procedures for resolving short shipments, over shipments, or documentation issues discovered after the goods are loaded into containers, trailers, or transported away from the facility 7. Establish procedures for notifying local law enforcement and customers when illegal shipping activities or unusual circumstances are suspected or detected Physical Security 1. Procedures requiring regular inspections of all perimeter fences or other barriers, buildings, and structures. 2. Control the procedures for issuing, removing, and changing access devices such as ID badges, door keys, access cards, and alarm codes. 3 Procedures for testing and inspecting security alarm systems 4 Procedures for testing and inspecting CCTV 5. Maintenance/Service Records Security Training and Threat Awareness 1 Security Threat Awareness Training Program 2 New employee training records and annual training records Information Technology Security 1 Information Technology System Security Policy 2. Requires that IT procedures restrict maintenance and control of the system to authorized personnel only 3 Ways to back up IT systems to prevent loss of data important to their business 4 IT system backup records 5. Records of attempts to illegally access IT systems 6. Computer system access awareness training, including training on IT system policies, procedures and security standards 7 Computer system login awareness training records 8 Record of disciplinary action against employees who violated IT security procedures Are you still worried about not passing the factory inspection? Don’t worry! Chaowang Consulting has been engaged in factory inspection and certification consulting for many years. We have rich experience and connections, and are familiar with the process and steps of factory inspection and certification. We can help companies solve certification problems at any time, easily deal with them, and pass them smoothly! Consultation phone: 021-51029391! |
<<: SQE experience: How to conduct factory inspection seriously
>>: Summary: The success and failure of foreign trade factory inspection
Key requirements for GMP factory inspection 1. Wa...
It's clear that, with more than 171 million a...
JCPenney's social responsibility policy mainly...
How about Agile Express? Agile Express is a membe...
What is Currenciesdirect? Currencie Direct is a c...
Cassini - eBay's internal search engine. When...
What is Otto? Otto has 9 million registered users...
VF Corporation is one of the world's largest ...
The purpose of the training is to help franchisee...
AVE Certified Work Clothing Certificate Issuance a...
KeywordInspector provides sellers with the functi...
Many new sellers are concerned about whether thei...
Sedex factory audit document list 1.1 Company Ins...
The document control procedure controls the proces...
AVE Declaration Concerning A Code of Conduct for ...