1. Security Management System 2. Develop written procedures to guide how to report and investigate security-related incidents and report to customs or law enforcement agencies regularly. 3. Prepare and regularly update emergency contact numbers for law enforcement, company management, customers, and contractors. 4. Sign a contract with a transportation company or other service company that meets the minimum security requirements of C-TPAT. 2. Physical Security and Access Control 5. Fences or natural barriers must be installed in cargo handling and storage areas to prevent unauthorized personnel from entering. 6. Strictly control the entry and exit of unauthorized vehicles into buildings, especially in cargo delivery, warehouse, loading and cargo storage areas. 7. The above-mentioned places need to be guarded by personnel and clear security guard job rules need to be formulated. 8. Establish measures to verify the identity of drivers entering and leaving. 9. Set up good control devices such as security personnel or CCTV to prevent unauthorized personnel from entering and leaving the factory area, especially the areas where goods are delivered, warehoused, loaded and stored. 10. Employees need to wear factory badges when entering the factory, and those who do not wear factory badges will be questioned. 11. Security guards should check the ID cards of all visitors and business partners, register them, issue visitor passes and arrange for staff to accompany them. 12. Establish policies to prevent employees from bringing personal belongings into the work area; properly check employees' personal belongings to prevent them from bringing in unknown items or taking away company property without permission. 13. Sufficient lighting equipment shall be installed at personnel entrances and exits, emergency exits, exits of loading and unloading areas, container storage areas and truck parking areas. 14. All buildings are well-structured and can effectively resist illegal intrusion, and are inspected regularly. 15. All doors and windows should be kept closed to prevent unauthorized entry, or appropriate devices such as burglar alarms/sensors should be installed and monitored by the local police or control center to prevent attack or damage. 16. Install computer system security devices, such as user passwords, system firewalls, virus protection devices, and server security monitoring software, etc.).
17. Ensure that the use and storage of locks and keys are safe. 18. Confirm the applicant’s application data, such as information about their introducers, previous employers, and citizenship. 19. Establish written codes of conduct. 20. Arrange employees to receive security awareness training so that they can consciously identify suspicious or illegal behavior and report it. 21. Set up an employee reporting hotline or other procedures to encourage employees to anonymously report any wrongdoing; and reward employees who report.
1. Establish a written container inspection procedure to verify its integrity. 2. The quality of the seals on the container or trailer must meet the standards of PAS ISO 17712. 3. Establish written procedures for the use and maintenance of seals. 4. The seal number must be clearly recorded on the shipping document. 5. Use and keep the seal properly and authorize designated personnel to use it. 6. All containers, trailers and other transport vehicles are structurally sound and in good condition.
7. Provide security measures to ensure the safety and accuracy of transportation, cargo handling and storage processes in the supply chain. 8. Provide written procedures to ensure that the document data of cargo transactions are clear, complete and accurate; avoid loss or submission of incorrect data and notify customs in real time. 9. Provide written procedures to ensure that the documents and data received by the cargo trading parties are accurate and timely. 10. Establish written regulations for computer system security. 11. All employees must receive IT security implementation training. 12. Computer servers are equipped with security programs to identify unauthorized access to the company's IT network at any time, and password policies and password management policies are regularly updated.
13. Develop written security procedures including the handling of incoming and outgoing goods to prevent the mixing of illegal items, substitution or other losses. 14. Separate loading and unloading areas and restrict access by unauthorized persons. 15. Establish written procedures to prevent unauthorized or unidentified persons from entering the factory and loading and unloading areas and conduct appropriate questioning. 16. Check the goods on the waybill and packing list and report any excess, shortage, loss or abnormality of goods to management in a timely manner. 17. Appoint a safety supervisor to monitor the cargo loading and unloading process. 18. Establish written procedures to detect and report incorrect or missing seals, as well as excess, damaged or irregular cargo. 19. Establish how to report unauthorized persons, unknown materials or illegal activities. 20. Empty or loaded containers must be stored in a safe place to prevent unknown items or dangerous goods from being placed in them, or the goods in the containers from being stolen. |
<<: Anti-Terrorism Container Security Management Guidelines
>>: ISO14000 series standard features
What is KUL? KUL is adopting a similar model to D...
What is Quikr? Quikr is one of the largest online...
Thousands of milk and beverage cartons are discar...
The security guard records show employees coming ...
1. Subcontractor Part: 1.1. Using contractors to ...
1. When is the business analysis report updated? ...
What is Speed 10? Speed 10 Group is committed...
LGA: Main test and certification mark GS-mark Intr...
Research from PayPal and Ipsos shows that cross-b...
Carrefour CAP Improvement Action Request Carrefou...
What is AsinKing? AsinKing is a one-stop Amazon b...
How about Youjiang Education? Youjiang Education ...
When new eBay sellers first start their business,...
It is no exaggeration to say that Southeast Asia ...
Using AnswerThePublic can help us get multi-dimen...