C-TPAT-Seminar-2006-Best-Practices-Catalog
Transcription
C-TPAT-Seminar-2006-Best-Practices-Catalog
C-TPAT Best Practices Wayne Kornmann Director, Long Beach C-TPAT Field Office Presenter’s Name June 17, 2003 2 C-TPAT Best Practices Overview What are Best Practices? C-TPAT Best Practice Catalog How Do Importers Achieve Tier 3 Status? Presenter’s Name June 17, 2003 3 What are C-TPAT Best Practices? Security measures that exceed C-TPAT Minimum Security Criteria Have written policies and procedures that govern their use Employ a system of checks and balances Incorporate management support Permanent part of a company’s business processes Best Practices do not have to be costly to business Presenter’s Name June 17, 2003 4 C-TPAT Best Practice Catalog Where did the best practices come from? Best practices were identified by Supply Chain Security Specialists during C-TPAT validations and site visits made from 2003-2005 Over 1,000 validation reports reviewed Developed for the trade to use in strengthening their company’s supply chain security program Presenter’s Name June 17, 2003 5 Best Practices - Examples Management Support A Supply Chain Security Committee was established by senior company executives to evaluate the company’s overall supply chain security and make recommendations for improvement The Supply Chain Security Committee included senior management from key departments such as IT, Shipping & Receiving, Human Resources, Security, Finance, Traffic, etc. Some committees included operational supervisors and line employees On-going committee meetings held to discuss findings & recommendations, prepare policies and brief senior management Presenter’s Name June 17, 2003 6 Best Practices - Examples Business Partner Requirements Security requirements were incorporated into contracts with foreign service providers. Language required that: Security vulnerabilities and weakness must be addressed immediately Companies were subject to random security audits A vendor manual is completed and given to each factory. The vendor must acknowledge that they received the manual and understand the requirements addressed in the manual The manual contains supply chain security requirements, labor practices and other business policies The manufacturer can only use freight forwarders approved by the company Presenter’s Name June 17, 2003 7 Best Practices - Examples Container Security An air carrier will not accept containers or ULDs from unknown customers Known customers are advised that cargo is subject to random inspections Carrier conducts and documents inspections on all empty containers and places a seal on the container Container seals are placed on container by shipping manager. Seal number(s) documented on the bill of lading (BOL) A guard and driver witness the sealing and initial BOL The factory sends the seal number(s) electronically to the highway carrier and importer Guard at outbound gate verifies the seal number against BOL Importer verifies seal number when container arrives in U.S. Presenter’s Name June 17, 2003 8 Not a C-TPAT Best Practice Presenter’s Name June 17, 2003 9 Best Practices - Examples Conveyance Monitoring A highway carrier installed panic buttons in each tractor. In case of emergency, the driver can press the button which sends an alarm signal to the the dispatch office and 5 managers cell phones The dispatch office will determine driver location via GPS Company personnel or local law enforcement are dispatched A truck driver must check-in with dispatcher at various points during route Dispatcher notates times and location Route times were previously established by company If there are time discrepancies or driver fails to check in, the company will send out security, notify CBP/law enforcement or take other actions (per SOP/management) Company has a truck disabler that can shut off engine Presenter’s Name June 17, 2003 10 Do You Know How Your Cargo Is Handled and Moved Overseas? Presenter’s Name June 17, 2003 11 How Can My Company Achieve Tier 3 Status? Importer must be a C-TPAT certified and validated member Must meet all C-TPAT Importer minimum security criteria Review and adopt actions required and recommendations found in C-TPAT Validation Report Review the “Best Practice” Catalog and discuss security improvements within your company and with business partners and service providers Consult with your assigned Supply Chain Security Specialist Implement security improvements or Best Practices and integrate into standard business processes Ensure security procedures are documented, tested, audited, and reviewed on a periodic basis Presenter’s Name June 17, 2003 12 Thank You