Intertek GSV Final 2
Intertek GSV Final 2
Intertek GSV Final 2
Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The Global Security Verication Criteria Implementation Guidance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. Records and Documentation . . . . . . . . . . . . . . . . . . . . . 5 2. Personnel Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3. Physical Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4. Information Access Controls . . . . . . . . . . . . . . . . . . . . 24 5. Shipment Information Controls . . . . . . . . . . . . . . . . . . 26 6. Storage & Distribution . . . . . . . . . . . . . . . . . . . . . . . . . 27 7. Contractor Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 8. Export Logistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 9. Transparency in Supply Chain .. . . . . . . . . . . . . . . . . . . 35 Appendix Intertek Country Supply Chain Security Risk Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
INTRODUCTION
9 Security Modules
1. Records and Documentation 2. Personnel Security 3. Physical Security 4. Information Access Controls 5. Shipment Information Controls 6. Storage and Distribution 7. Contractor Controls 8. Export Logistics 9. Transparency in Supply Chain
BENEFITS
Saving time and money by undergoing few security andits Saving cost and time and reducing business disruptions by facilitating quicker customs clearance through GSV which is well recognized Enhancing reputation with a world-recognized program that confirms compliance with global supply chain criteria Enabling importers and suppliers to leverage efforts through a common industry platform and collaboration Engaging with a Global Security Program which covers best practice from C-TPAT, PIP & AEO
INTRODUCTION
Sub-Section
1.1 Records and Documentation 2.1 Documented Personnel Security Policies/ Procedures 2.2 Personnel Screening 2.3 Identication System 2.4 Education/ Training/ Awareness
3. Physical Security
3.1 Plant Security 3.2 Perimeter Security 3.3 Outside Lighting 3.4 Container Storage 3.5 Security Force 3.6 Access Controls 3.7 Visitor Controls 3.8 Entering/ Exiting Deliveries 3.9 Employee/ Visitor Parking 3.10 Production, Assembly, Packing Security
4.1 Information-Access Controls 5.1 Shipment-Information Controls 6.1 Storage 6.2 Loading for Shipment
7.1 Contractor Controls 8.1 Export Logistics 9.1 Transparency in Supply Chain
RESOURCES / REFERENCES
Minimum security criteria for foreign manufacturers
DEFINITIONS
Contractors - Contractors refer to business partners of a facility, including other subcontracted manufacturers, product suppliers, and vendors, as well as service providers, e.g., catering, security guards, computer/ ofce-machine maintenance, cleaning staff, repairmen, etc.
Program Requirements
Facility has a policy that requires that all security procedures be documented Facility has a security department/ personnel and has designated a security chief
Facility has conducted a site security assessment Facility has documented procedure to conduct periodic security checks to ensure that the security procedures are being performed properly
- Internal security audit performed by facility or second- or third-party security assessment (e.g., GSV) - A documented procedure for conducting an internal security audit which includes the following: Personnel Security Physical Security Information Access Control Shipment Information Controls Storage and Distribution Contractor Controls Export Logistics
Facility has documented security improvement action plan summarizing identied vulnerabilities and their relevant corrective
- A documented improvement plan from completed assessments/ audits, and evidence that the plan is reviewed by management and security departments periodically
Good Practices
Internal security audit every three months for high-risk countries and every twelve months for medium-risk countries. Security plan is reviewed every six months for high-risk countries and every twelve months for medium-risk countries.
2. PERSONNEL SECURITY
Program Requirements
Facility has written personnel security guidelines for hiring
Security guidelines for hiring are evaluated periodically to ensure their effectiveness Written personnel security guidelines and requirements are being applied to contracting temporary and part time employees
- The documented personnel security guidelines that apply to the hiring of contracted, temporary, and part-time employees are the same as those that apply to the hiring of full-time employees
Good Practices
Hiring guidelines to be evaluated every six months to ensure their effectiveness.
Program Requirements
Employment applications are required of applicants Facility has a process for interviewing applicants
2. PERSONNEL SECURITY
Program Requirements
Background checks are conducted on all applicants
Facility has a process for examining and verifying an applicants ofcial identication Periodic and follow-up background checks are conducted on employees based on circumstances and/ or sensitivity/ scope of employee responsibility Facility maintains a permanent employee personnel le for each employee
- Periodic follow-up background checks conducted on employees based on circumstances and/ or sensitivity/ scope of employee responsibility
- Personnel le maintained for each employee which includes the full name, date of birth and the national identication number of the employee
Good Practices
Criminal background check and drug test.
Program Requirements
Company identication is required for entry of personnel
Security guards monitor employee arrival at the facility for positive identication to ensure that only those with a company issued ID badge are allowed entry
- Presence of security guard or personnel at employee entrance who checks ID of incoming employees
2. PERSONNEL SECURITY
Program Requirements
Identication has unique identiers
- A designated department (e.g. human resources or admin department) in facility to issue, retrieve and control the employees ID - The related written procedure or the record for issuance of employee ID shows that it is centralized and controlled by a specic department
The control over distribution and inventory of employee ID badges and facility access keys/ cards/ codes is restricted to a limited number of authorized employees Documented procedures and records in place for employees to return their IDs when they leave the facility permanently
- Identication of authorized employees who can issue the IDs, keys, cards and codes
- Procedures that include those employees are required to return their badges when they leave the company - Record to support the return of badge after employees resign and leave from company
Documented Employee Termination policy and procedures in place to retrieve IDs and deactivate access as needed
- Procedures for the issuance, removal, and changing of access devices (e.g., keys, key cards) must be documented - Procedures in place to retrieve IDs and/ or deactivate access as needed
- List of terminated employees issued to security department or security guards. - Facility must be able to demonstrate that access has been terminated such as posted notice in the main entrance
Lost IDs are replaced and recorded as missing in the employees personnel le before a replacement badge is issued
- Procedures for the issuance, removal, and changing of access devices (e.g., ID access cards) must be documented - Lost ID record or similar records showing the missing ID are replaced and recorded as missing such as letter or afdavit from employees stating that their IDs were lost or application for replacement
Lost or stolen keys are replaced and recorded as missing and/ or is reported immediately to the factory management The security staff informed of such losses (name, ID number, etc) to prevent unauthorized use
- Procedures for the issuance, removal, and changing of access devices (e.g., keys, key cards) must be documented - Records showing reported missing keys and key replacement - The security staff are informed of missing IDs through records or written notice
2. PERSONNEL SECURITY
Program Requirements
IDs are required to access restricted areas
Good Practices
Facility-employee identification centralized and controlled by a specific department. Guards monitor access to the restricted areas by checking employee IDs. Posted signs stating Restricted Areas - For Authorized Personnel Only. Records maintained of all persons entering a restricted area.
2. PERSONNEL SECURITY
Program Requirements
Facility requires new employee orientation
Facility has written security awareness program covering awareness of current terrorist threat(s), smuggling trends, and seizures in place to ensure employees understand the threat posed by terrorist at each point of the supply chain
- The facility has a security awareness program in place and requiring all personnel to participate and maintaining training plan and records - Periodic security program update training required every six months for high-risk countries and twelve months for medium risk-countries and records maintained - Methods for increasing security awareness such as posters, e-mail bulletins, newsletter, stickers, meetings, certications, e-learning tools and TV ads are all effective tools for creating an environment in which employees actively participate in keeping the workplace secure
10
2. PERSONNEL SECURITY
Program Requirements
Facility has a process in place to publicize the security procedures throughout the facility
- Documented security procedures publicized throughout the facility i.e. posters, bulletin boards, media wall, publications
Good Practices
Employees are encouraged to report irregularities through incentives. Facility maintains an employee code of conduct such as an employee handbook.
11
3. PHYSICAL SECURITY
Program Requirements
The facility has intrusion detection or alarm system
Locking devices secure facility access points and are used to control access to restricted areas
- Locking devices protect External doors Internal doors Windows Gates - Locking devices activated through use of: Key Card Code Others - Locking devices are in working order and are inspected regularly and inspection records are maintained
Facility has key control program that establishes an individual responsible for distributing and maintaining keys/ cards
- Written key control program includes issuing record shows the keys, codes, cards are distributed by individual person(s) - Key control program includes a control log that accounts for all keys/ access cards on-hand, issued, and returned (name, date out, date in, reason, name of issuing person) - A monthly record of the inventory of the facilitys access keys, codes, cards to employees is maintained - Approved list of employees with special access to controlled or sensitive areas
When an employee leaves the company, keys/ cards are returned and codes are changed and a record is maintained of these actions
- Written termination procedure to remove identication of facility (e.g., company badge) and system access (IC card access right) for terminated and resigned employees or employees transferred to another position - Records of returned keys/ cards and deactivation of codes
12
3. PHYSICAL SECURITY
Program Requirements
Buildings must be constructed of materials that resist unlawful entry
Good Practices
Facility management reviews and approves a list of employees with special access to controlled or sensitive areas every month for high risk countries and every three months for medium risk countries.
Program Requirements
The perimeter of the property is secured
The perimeter barrier and gates regularly inspected to check for damage and attempted illegal access, properly maintained and repaired
- Perimeter fencing inspection records or similar showing that all fencing and gate must be inspected for integrity and damage on daily basis for high-risk countries and weekly basis for medium-risk countries
13
3. PHYSICAL SECURITY
Program Requirements
The perimeter barrier and gates are properly maintained and repaired
- All gates are manned and/ or monitored - Only facility management and designated security guard supervisor have keys or other controls necessary to open/ close facility gates
Good Practices
Facility management and designated security-guard supervisor only have keys or other controls necessary to open/ close facility gates.
Program Requirements
The facility has outside lighting and the entire perimeter of the facility (including gates) is lighted
Good Practices
Access to the lighting switches restricted to authorized personnel only.
14
3. PHYSICAL SECURITY
Program Requirements
The loaded stored containers/ trailers are sealed with high security seals that meet or exceed ISO/ PAS 17712 standard
Containers are stored in a designated container storage area surrounded by a secure fence or wall
- Containers or trailers should be placed well away from the perimeter fence otherwise they could constitute adjoining structures that might enable unauthorized entry into the facility - The container storage area is surrounded by a secure fence or wall
Facility has documented procedures in place for reporting and neutralizing unauthorized entry to container storage areas
Good Practices
Container/ trailer-storage area surrounded by a secure fence or wall.
15
3. PHYSICAL SECURITY
Program Requirements
Facility has a designated security guard force
- The records of the security guard should log incidents or daily issues while the security guard is on duty
Security guards report incidents related to compromised seals and/ or containers/ trailers to appropriate local authorities
- Procedure or instruction that customs and/ or other appropriate law enforcement agencies are notied if illegal or suspicious activities are detected, as appropriate (The incidents related to cargo security, broken seal, etc.) - Security guards job description that includes procedure on how illegal or suspicious activities should be reported to local authorities
Security guards should report any securityviolation incidents, including tampering involving a loaded or empty container/ trailer to management personnel
- Incident log or written procedure showing that the guard reported the incidents to management personnel - Number of management personnel should be available to the guard to report emergency cases - Security guards job description that includes procedure on how illegal or suspicious activities should be reported to the management
Available communication system between the central security ofce and the exterior guard posts Guards receive specic security training
- Internal communications system in place to contact security personnel such as walkie-talkie or two-way radio and mobile phones
- Specic training should be offered to guard or security personnel in maintaining cargo integrity, recognizing internal conspiracies, and protecting access controls; training materials and records are maintained, and should include: Terrorism threat awareness Unauthorized access Internal conspiracy Firearm handling (if required by law) Customs-Trade Partnership Against Terrorism (C-TPAT) or other security standard awareness such as PIP (Partners in Protection), AEO (Authorized Economic Operator) - Periodic refresher and/ or update training material and records
16
3. PHYSICAL SECURITY
Program Requirements
Facility has proper communication mechanism to local law enforcement authorities
Good Practices
The facility should have a designated security guard force that staffs the facility 24 hours a day, 7 days a week (24/7).
Program Requirements
Gates for employees and vehicle entrances/ exits must be guarded and/ or monitored during operating hours and during non-operating hours
Employees entries and exits must be logged Employees must be observed and/ or subject to security inspection when entering the building Guards should patrol the interior of the facility buildings Closed circuit television cameras (CCTVs) should be used to monitor activity in the facility, including fence/ wall and entrance gates
- Time keeping system for entry and exit to facility - Checking of belonging, body frisk, magnetometer screening
- The guard on duty patrol inside buildings during operation and/ or non-operation hours - Video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling/ storage areas - Cameras located in cargo handling/ packing areas - Positioning of the cameras should provide adequate views of activities in relevant areas
17
3. PHYSICAL SECURITY
Program Requirements
CCTV recordings (e.g., tapes or electronic les) should be kept for a minimum of 30 days or according to clients specic requirements, whichever is longer
CCTVs monitored
- Availability of staff to monitor the real-time activities captured by CCTV constantly on all shifts preferably by full-time security personnel with no other duties - CCTV monitor is in secured and controlled area
Good Practices
Gates locked and/ or monitored during non-operating hours by Patrolling Guards and CCTV. CCTVs monitored and access to CCTV monitors controlled.
Program Requirements
Same security control points applied to employees and visitors when entering and exiting the factory
- Relevant record showing the notication in advance of visit with visitor name, company representing, date and time of arrival, purpose of visit
Facility maintains up-to-date list of names and addresses of all contractor (e.g., canteen staff), vendor, repair personnel
- A list of all contractor (if applicable), vendor, and repairmen (if applicable) and must include the name and address - The security guard house or the point of visitor access should maintain an up-to-date list
18
3. PHYSICAL SECURITY
Program Requirements
Photo identication required of all visitors
A positive identication process for recording all vendors and repair personnel and facility have a written procedure to challenge, identify, and remove unauthorized/ unidentied persons
- Access controls must include the positive identication of all visitors, and vendors at all entry points - For deliveries, proper vendor ID and/ or photo ID must be presented documentation purposes upon arrival by all vendors - Written procedures in place to challenging, identifying, and removing unauthorized/ unidentied persons - Authorized employee nominated to supervise contractors while at the facility - All visitors escorted and monitored while accessing facility specically on restricted areas (e.g., loading/ unloading, IT, nance)
- Visitors log maintained includes recording date and time of entries and/ or exits, visitors name, purpose of visit and escort name
- All visitors should wear visibly displayed temporary ID - The visitor badge shall have numbering/ coding - If reusable visitors badge is used, it should be tamper proof such as bearing company logo with original signature of management representative and laminated - The visitor badge issue/ return should be controlled by the issue/ return log which could be combined together with visitor registration logbook
Good Practices
Same security control points applied to employees and visitors when entering and exiting the factory. Advance information from a vendor required before the visit, including visitor name, company representing, date and time of arrival, purpose of visit.
19
3. PHYSICAL SECURITY
Program Requirements
Documented procedures implemented to periodically screen arriving packages and mail prior to distribution
Both incoming and outgoing cargo vehicles checked Advance notice required for a pick-up or delivery transport company Conveyance drivers required to show positive identication
- Inspection of incoming and outgoing goods whether loaded in containers, trailers or trucks done by security staff - Record of notice from forwarder, trucking or 3PL including driver name, company, date and time of arrival and purpose of trip - Positive ID can include the National ID cards, driver license, company badge, etc. - Conveyance driver should show the ID at the entrance every time when they pick-up or deliver the cargo, regardless of their frequency of visiting the facility - Information of personal ID (e.g. ID number, employees number, etc.) should be recorded in the cargo vehicles in-out log or similar record
Conveyance drivers required to show a truck manifest upon entry and/ or exit Cargo log in and out maintained
- The log at the point of the entering/ exit (gate) includes: Truck license Drivers name Time and date of entry/ exit Manifest check Container number Name of guard Seal number
- A record showing the seal is inspected when containers or trailers are entering/ leaving the faciltity - A record showing the seal number is recorded when containers or trailers are entering/ leaving the faciltity
20
3. PHYSICAL SECURITY
Program Requirements
Documented procedure for handling cases of broken seals
- Documented procedure to verify seal number against facility documentation and whether the seal is intact when the container/ trailer is turned over to the next supply chain link (applicable to trucks and closed vans)
Shipping/ receiving parking lots separated from all other parking lots
- The parking lot for the truck, container, trailer etc should be separated from other parking like employees or visitor private car parking - The shipping/ receiving parking lots are not mixed with employees or visitor parking lots - No Parking for Private Vehicles signage
Good Practices
Seals on incoming containers/trailers are inspected and seal numbers recorded.
21
3. PHYSICAL SECURITY
Program Requirements
Vehicles prohibited/ prevented from parking near cargo conveyances
Vehicles prohibited/ prevented from parking near the perimeter fencing If allowed to enter the facility area, vendor and visitor vehicles should be inspected prior to admission Visitor and employee personal-vehicle parking lots should be monitored by security guards during facility operating hours Facility require the use of visual identication for visitor and employee parking
- Warning sign posted near the perimeter fencing which prohibits the vehicles from parking near the perimeter - General inspection such as visual inspection of inside of car and use of under mirror for under the vehicle
- Parking lots include the employees parking and visitor parking - Monitoring means observed by guards or have the CCTV coverage/ monitored - Use of visual identication for parking - Visual identication means the coded parking sticker, tag, decal or cards which are issued by facility and placed on the visitor vehicle for identication
Good Practices
If available, the parking lots for visitors should be separated from those for employees. Visitor and employee parking lots should be located away from entrances and exits.
22
3. PHYSICAL SECURITY
Program Requirements
Security measures in place to prevent tampering of goods during production
Security measures in place to prevent the introduction of foreign material(s) into the assembly area and packing area
- Facility has clear access control system in such area and has the policy prohibiting the employees to carry the foreign material(s) into the packing area - Providing lockers for employees personal belongings before their entry is one of the security measures which is acceptable
Good Practices
Locker areas separated from production area.
23
Program Requirements
Procedures for identifying which employees are allowed access to computers and information
- Automated systems must use individually assigned accounts that require a periodic change of password - Password changes required by policy or enforced in a systematic manner at least every six weeks for high-risk countries and eight weeks for medium-risk countries - The change of password is forced by computer setting or forced by the procedural system with supporting document provided (The system/ server setting should be capable to show that the password needs to be changed regularly)
- Relevant written procedure addressing the adjust or rescind of access right of computer user - Login user ID suspended after three failed access attempts - Desktops automatically locked after a designated period of inactivity
- The system administrator is responsible for: Setting up individually assigned IT system accounts and passwords of relevant employees Receives and reviews a daily report of invalid password attempts and le access Conducts meetings with senior management to review system security concerns
24
Program Requirements
A system in place to identify IT abuses, including improper access, tampering, or the altering of business data
- The facility should back up data in order to ensure that records still exist even if the main IT system is disabled (virus attack, re at the factory, etc.) through hard disk, CD, back-up server, etc. - Back-ups stored in a re-resistant safe or at an off-site facility (Off site could be outside of the facility or another building inside the facility; back-up records can be outside the IT room such as the General Managers room but should be in a re-proof vault) - Established written plan to restore data in the case of a failure
Good Practices
Desktops automatically lock after a designated period of inactivity.
25
Program Requirements
Facility has designated company representative responsible for shipment information control
Records maintained on all shipments for at least twelve months Facility conducts a review of shipment information and documentation controls to verify accuracy and security
- Shipment records maintained on all shipments for at least twelve months - Records of review of shipment information at least every three months for high-risk countries and at least every six months for medium-risk countries
Good Practices
Automation of information requirements
26
6.1 STORAGE
Intent
Containers are stored in a secure area to prevent unauthorized access and/ or manipulation.
Program Requirements
Doors secured for empty stored containers/ trailers
Facility uses fencing or other barrier materials to enclose cargo handling and storage areas to prevent unauthorized access Dangerous cargo, including hazardous materials, ammunition and explosives, secured and stored separately High value cargo marked, segregated and stored separately within a fenced area or secured room International and domestic cargo segregated and stored separately within a fenced area or secured room
- Cargo handling and storage areas secured with perimeter walls, fencing or other barrier materials to prevent unauthorized access
- Interior fencing within a cargo handling structure should be used to segregate hazardous cargo - Dangerous cargo are labeled when necessary - Interior fencing within a cargo handling structure should be used to segregate high value cargo - Interior fencing within a cargo handling structure should be used to segregate domestic and international cargo
Good Practices
High-value cargo marked, segregated, and stored separately within a fenced area or secured room.
27
Program Requirements
Loading and departure of containers /trailers are supervised by a security ofcer or other designated supervisor Loading and departure of containers/ trailers is captured on CCTV and the recording is kept for forty-ve days Shipping area and loading dock access restricted to authorized personnel only
- The loading area shall be restricted and the process must be in place to identify, challenge, and address unauthorized/ unidentied persons - Sign of Authorized Person Only at the loading dock area
Security controls in place, to prevent the introduction of foreign material(s) or nonmanifested items at point of loading, and to prohibit employees bringing in their personal items into the shipping area
- Only authorized cargo and personnel is allowed in the loading area. Employees are not permitted to bring into the loading area their personal items such as lunch box, backpack, ice container/ water cooler - Facility has clear access control system in such area and has a policy (e.g. a sign posted at loading area) of prohibiting the employees to carry the foreign material(s) into the loading area
Cargo moved directly from the storage facility/ assembly line to the conveyance without intermediate staging Documented and implemented procedures to ensure that accurate, legible, and complete cargo documents and packing slips prepared
- The packing area and loading area should be closed off to all transit activities and transfer of nished goods should be without intermediate staging - Procedures must be in place to ensure that all information used in the clearing of merchandise/ cargo, is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information - Export or shipping records should be legible, complete and accurate. - Documents are prepared electronically
Documented system in place to ensure that management, customs and/ or local law are informed of and investigates all anomalies found in shipments and/ or the accompanying documents Procedures for tracking goods for shipment
- Documented procedure in place for reporting anomalies found in cargo and shipment information documentation
- Written procedure showing the tracking of goods for shipment such as Outbound Shipment Procedure
Cargo verication procedure in place to prevent non-manifested cargo from being loaded
- Written procedure related to cargo verication before loading - Procedure should include that all product counts conducted by at least two persons to ensure accuracy - A loading checklist is another tool to promote product count accuracy
28
Program Requirements
Detect and report cargo shortages and overages during container/ trailer loading, and ensure cargo is identied and labeled, weighed, and counted before loading All containers checked for tampering, false compartments, and other evidence of unauthorized access before loading Procedures in place to verify the integrity of the container structure through 7-point inspection
- Related records showing the container/ truck are checked for tampering, false compartments, and other evidence of unauthorized access - Documented 7-point inspection procedure, include: Front wall Left side Right side Floor Ceiling/ roof Doors Undercarriage - Related records showing 7-point container inspection kept for fortyve days and records indicate when modications have been made to the container - Training record in-charge for conducting the inspection - Actual demonstration of 7-point container inspection of the assigned personnel
All trailers checked for tampering, false compartments, and other evidence of unauthorized access before loading
- Documented 15-point inspection procedure for non-refrigerated trailer, include: Bumper Engine Tires (trailer and truck) Truck oor Cab/ storage compartments Air tanks Drive shafts Fifth wheel Front wall Side walls Trailer oor Ceiling/ roof Inside/ outside walls Undercarriage - Documented 17-point for refrigerated trailer and tractor inspection, include: All 15-point inspection procedure Refrigerated unit Exhaust
29
Program Requirements
- Documented procedure and records of truck inspection that includes verifying that the transportation document is complete, indicates the departing container/ trailer number, and veries that the actual security seal number is the same seal number listed on the shipping document
Procedure to afx a high-security seal which meets or exceeds ISO/ PAS 17712 on each container/ trailers bound for the US ISO/ PAS 17712 compliant high security seals used on each outbound container/ trailers Procedures for afxing, replacing, recording, and tracking the seals placed on containers, trailers, trucks, and/ or railcars For pick-ups from multiple manufacturers, the facility requires transportation providers to use secure locking devices (e.g., padlocks) for lessthan-full-load containers There is designated individual responsible for issuing, accessing and tracking seals Unused seals kept in a locked cabinet and access restricted to authorized employee(s) Outgoing cargo veried against transportation/ shipping document before departure and facility keep records of verication
- The facility needs to provide the written certicate/ test report to prove high security seals are ISO/ PAS 17712 compliant - Written procedures must stipulate how seals are controlled, afxed and tracked to loaded containers, trailers, trucks and/ or railcars
- The facility has the related document like carrier procedure, contract etc stating that the transportation providers to use locking devices for less-than-full-load container
- Identied authorized personnel through memo, announcement, job description, etc. - Physical storage of unused seals and measures must be in place to access the storage - Verication records or seal control log includes the following information: Truck license Driver name Time and date of loading or unloading Container/ cargo conveyance number Seal number with name of person using the seal and date of use of seal
Trucks sealed as soon as loading is complete Seal numbers veried at time of nal sealing before departure
- Photos of sealing or seal records and transport information - Verication of seal numbers should be stipulated in procedure, implemented and recorded
30
Good Practices
Cargo moved directly from the storage facility/ assembly line to the conveyance without intermediate staging. All documents prepared electronically. For pick-ups from multiple manufacturers, the facility requires transportation providers to use secure locking devices (e.g., padlocks) for LCL (less-than-full-load) containers.
31
7. CONTRACTOR CONTROLS
Program Requirements
The facility should have a veriable process for selecting contractors
Written security standards and documented procedures for selection of contractors (contracts, manuals, etc.)
- Written security standards and documented procedures for selection of contractors according to security controls, nancial stability, corporate history and hiring practices - Written contractor procedures include security standards for the contractors employees while at the facility
Contractors with access to restricted areas should undergo a background investigation Facility or third party auditor conduct on-site inspections of the contractors implementation of the above standards/ procedures Facility requires its contractors to conduct self-assessment of their security policies and procedures and share the results of those assessments with the facility Contractors retained through legally binding contracts
- Record of background investigation for contractor or contractors employees - Audit reports of contractor assessments. - Communication history for the schedule of assessments and request for corrective action - Completed self-assessment forms of contractors - Communication history for completing self-assessments
Good Practices
Facility requires Customs-Trade Partnership Against Terrorism (C-TPAT) enrollment of its contractors or other relavent security standards such as PIP (Partners in Protection) or AEO (Authorized Economic Operator).
32
8. EXPORT LOGISTICS
Program Requirements
Facility select the land carriers, sea carriers, rail carriers, consolidators, freight forwarders, NVOCCs (Non-Vessel Operating Common Carriers), or other third party logistics providers hired to transport goods
Facility requires eligible carriers to demonstrate C-TPAT, AEO, PIP certication and/ or ineligible carriers to demonstrate compliance with C-TPAT, AEO, PIP equivalent standards
- For eligible carriers, any evidence that facility is requiring the carriers to provide their eligibility such as C-TPAT, AEO, PIP certicate or Status Verication Token is acceptable showing facility name and SVI (Status Verication Interface) - Eligible Carriers for C-TPAT member: U.S./ Canada Highway Carriers U.S./ Mexico Highway Carriers Rail Carriers Sea Carriers Air Carriers Third Party Logistics Providers (3PL) Long Haul Highway Carriers in Mexico - Proof of nomination by C-TPAT member US importers - For non-eligible carriers, any evidence that facility is participating compliance with C-TPAT requirements such as second and third party audits - Third Party Logistics Provider Eligibility Requirements. In order to be eligible for participation in the C-TPAT program, the 3PL must: Be directly involved in the handling and management of the cargo throughout any point in the international supply chain, from point of stufng, up to the rst U.S. port of arrival (Entities which only provide domestic services and are not engaged in cross border activities are not eligible)
33
8. EXPORT LOGISTICS
Program Requirements
- In-country transport services should: Vary routes Employ security guards Require goods be transported within dened time-limits Record transport times Provide vehicle escort Use Global Positioning Satellite (GPS) Use truck convoys Document procedure to report security violations to facility management Require that the driver report any incident of attempted cargo theft, load tampering, or other security violations
Security measures in place when facility use carrier services Written or electronic conrmation of partners compliance with C-TPAT or C-TPAT-equivalent security criteria Facility has written legal contract with a transport company who moves a container/ trailer from the facility to the next destination in the supply chain Facility conducts a periodic unannounced security check to ensure that transport company is in compliance with the contract
- Carrier has intermediate staging/ rest period/ layover of cargo conveyances prior to reaching the consolidation center/ port/ border - Contract language, a letter of commitment signed at management level or above, signed acknowledgement of receiving the facilitys C-TPAT participation announcement - Signed contracts with transport company
- Procedures of unannounced security check are available - Records of security check kept for at least twelve months
34
8. EXPORT LOGISTICS
Good Practices
When selecting carriers, the facility considers Financial Stability and Corporate History. In-country transport services: vary routes, employ security guards, provide vehicle escort, use Global Positioning Satellite (GPS) and truck convoy.
35
Program Requirements
System in place to ensure that management is informed of and investigates all anomalies found in shipments including human trafcking Cargo verication procedure in place to prevent un-manifested cargo and/ or illegal aliens from being loaded Facility or a third party auditor conduct on-site inspections of the contractors implementation of the security standards/ procedures including compliance with human trafcking and slavery policies Facility requires its contractors to conduct self-assessment of their security policies and procedures including status of their compliance with human trafcking and slavery policies and share the results of those assessments with the facility facility have written or electronic conrmation of its partners compliance with Business Transparency on Human Trafficking and Slavery Act (e.g., contract language, a letter of commitment signed at the management level or above, signed acknowledgement of receiving the facilitys participation announcement) Facility have written security standards and documented procedures for selection of its contractors (contracts, manuals, etc.) and handling contractors failing to meet company standards regarding security and slavery and trafcking Written security awareness program covering awareness of current terrorist threat(s), human trafcking, smuggling trends, and seizures in place to ensure employees understand the threat posed by terrorist at each point of the supply chain
- Audit reports of external security and social compliance assessments which includes slavery and human trafcking and some checkpoints related to migrated workers or forced labor in social audit report
- Completed self-assessment forms of contractors which include slavery and human trafcking
- Certication or email conrmation with Business Transparency on Human Trafficking and Slavery Act such as contract language, a letter of commitment signed at the management level or above, signed acknowledgement of receiving the facilitys participation announcement
- Contractor selection procedure which includes selection of supplier who complies with Business Transparency on Human Trafficking and Slavery Act
- Program outline, training plan and training records - The facility has the records to show that human trafcking and slavery as a topic is included in the regular security awareness training/ brieng
36
Country Argentina Australia Austria Bahrain Bangladesh Belgium Brazil Bulgaria Cambodia Canada Chile China Costa Rica Croatia Cyprus Czech Republic Denmark Dominican Rep. Ecuador Egypt El Salvador Finland France Germany Greece Guatemala Haiti Honduras Hong Kong Hungary India Indonesia Ireland Israel Italy Japan Jordan Kenya Korea, South Kuwait
Intertek Country Supply Chain Security Risk Index high low low high high low medium medium high low high high medium medium medium medium low medium medium high medium low low low medium high high high medium low high high low high low low high medium medium high
Country Latvia Lebanon Lesotho Madagascar Malaysia Mauritius Mexico Morocco Netherlands New Zealand Norway Pakistan Panama Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Serbia Singapore Slovakia South Africa Spain Sri Lanka Swaziland Sweden Switzerland Taiwan Thailand Turkey Ukraine United Arab Em United Kingdom USA Venezuela Vietnam
Intertek Country Supply Chain Security Risk Index low high medium high high low medium high low low low high medium high high medium low low medium medium high medium low medium medium low medium low low low low medium medium medium high low low high high
The Intertek Country Supply Chain Security Risk Index predicts the supply chain security risk associated with a number of parameters in each country including but not limited to: 1. Practice for cargo logistics 2. Clearance and Customs process 3. Political and economic condition 4. Historical country performance in security verifications for the last 10 years.
37