C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are...

13

Transcript of C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are...

Page 1: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria
Page 2: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

2Presenter’s Name June 17, 2003

C-TPAT Best Practices

Wayne KornmannDirector, Long Beach C-TPAT Field Office

Page 3: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

3Presenter’s Name June 17, 2003

C-TPAT Best Practices

Overview

What are Best Practices?

C-TPAT Best Practice Catalog

How Do Importers Achieve Tier 3 Status?

Page 4: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

4Presenter’s Name June 17, 2003

What are C-TPAT Best Practices?Security measures that exceed C-TPAT Minimum Security

Criteria

Have written policies and procedures that govern their use

Employ a system of checks and balances

Incorporate management support

Permanent part of a company’s business processes

Best Practices do not have to be costly to business

Page 5: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

5Presenter’s Name June 17, 2003

C-TPAT Best Practice CatalogWhere did the best practices come from?

Best practices were identified by Supply Chain SecuritySpecialists during C-TPAT validations and site visits made from2003-2005

Over 1,000 validation reports reviewed

Developed for the trade to use in strengtheningtheir company’s supply chain security program

Page 6: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

6Presenter’s Name June 17, 2003

Best Practices - ExamplesManagement SupportA Supply Chain Security Committee was established by senior

company executives to evaluate the company’s overall supplychain security and make recommendations for improvement

The Supply Chain Security Committee included seniormanagement from key departments such as IT, Shipping &Receiving, Human Resources, Security, Finance, Traffic, etc.

Some committees included operational supervisors and lineemployees

On-going committee meetings held to discuss findings &recommendations, prepare policies and brief seniormanagement

Page 7: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

7Presenter’s Name June 17, 2003

Best Practices - ExamplesBusiness Partner RequirementsSecurity requirements were incorporated into contracts with

foreign service providers. Language required that:Security vulnerabilities and weakness must be addressed

immediatelyCompanies were subject to random security audits

A vendor manual is completed and given to each factory. Thevendor must acknowledge that they received the manual andunderstand the requirements addressed in the manualThe manual contains supply chain security requirements,

labor practices and other business policiesThe manufacturer can only use freight forwarders approved

by the company

Page 8: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

8Presenter’s Name June 17, 2003

Best Practices - ExamplesContainer SecurityAn air carrier will not accept containers or ULDs from unknown

customersKnown customers are advised that cargo is subject to random

inspectionsCarrier conducts and documents inspections on all empty

containers and places a seal on the container

Container seals are placed on container by shipping manager.Seal number(s) documented on the bill of lading (BOL)A guard and driver witness the sealing and initial BOLThe factory sends the seal number(s) electronically to the

highway carrier and importerGuard at outbound gate verifies the seal number against BOLImporter verifies seal number when container arrives in U.S.

Page 9: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

9Presenter’s Name June 17, 2003

Not a C-TPAT Best Practice

Page 10: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

10Presenter’s Name June 17, 2003

Best Practices - ExamplesConveyance MonitoringA highway carrier installed panic buttons in each tractor. In caseof emergency, the driver can press the button which sends analarm signal to the the dispatch office and 5 managers cell phonesThe dispatch office will determine driver location via GPSCompany personnel or local law enforcement are dispatched

A truck driver must check-in with dispatcher at various pointsduring routeDispatcher notates times and locationRoute times were previously established by companyIf there are time discrepancies or driver fails to check in, the

company will send out security, notify CBP/lawenforcement or take other actions (per SOP/management)Company has a truck disabler that can shut off engine

Page 11: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

11Presenter’s Name June 17, 2003

Do You Know How Your Cargo IsHandled and Moved Overseas?

Page 12: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

12Presenter’s Name June 17, 2003

How Can My Company AchieveTier 3 Status?Importer must be a C-TPAT certified and validated member

Must meet all C-TPAT Importer minimum security criteria

Review and adopt actions required and recommendationsfound in C-TPAT Validation Report

Review the “Best Practice” Catalog and discuss securityimprovements within your company and with businesspartners and service providers

Consult with your assigned Supply Chain Security Specialist

Implement security improvements or Best Practices andintegrate into standard business processes

Ensure security procedures are documented, tested, audited,and reviewed on a periodic basis

Page 13: C-TPAT Best Practices - Meadows Wye · 2010-10-15 · Presenter’s Name June 17, 2003 4 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria

Thank You