We Offer Free Garment ERP and Consultency on Compliance

C-TPAT A Security Guidelines for Manufacturers

Definition of C-TPAT: 


The C-TPAT initiative recognizes that CBP can provide the highest level of security to the public and to other stakeholders only through close cooperation with the ultimate owners of the supply chain: importers, carriers, brokers, warehouse operators and manufacturers.

Through this initiative, Customs is asking businesses to ensure the integrity of their security practices and communicate their security guidelines to their business partners within the supply chain

C-TPAT Audits


Audits will be used to access overall trade compliance. The CBP Customs Regulatory Audit will play the new “Focused Assessment” methodology, a risk-based audit program, in conducting audits. Companies will not be required to undergo a Focused Assessment in order to participate in C-TPAT. Importers, however, must be C-TPAT participants to take advantages of the Customs Regulatory Audit by Importer Self Assessment (ISA) program.

Security Procedures:


For those business partners eligible for C-TPAT certification (carriers, U.S. ports, terminals, importers, brokers, consolidators, etc.) the Manufacturer must have documentation (e.g., C-TPAT certificate, SVI number, etc.) to determine if these business partners are C-TPAT certified.
For those business partners not eligible for C-TPAT certification, Manufacturers must require their business partners to demonstrate that they are meeting C-TPAT security guidelines via written/electronic confirmation (e.g., contractual obligations; via a letter from a senior business partner officer attesting to compliance; a written statement from the business partner demonstrating their compliance with C-TPAT security guidelines or an equivalent World Customs Organization (WCO) accredited security program administered by a Foreign Customs Authority; or, by providing a completed Manufacturer security questionnaire). Based upon a documented risk assessment process, non-C-TPAT eligible business partners must be subject to verification of compliance with C-TPAT security guidelines by the Manufacturer.
C-TPAT A Security Guidelines for Manufacturers

1.Container Security

Container integrity must be maintained to protect against the introduction of unauthorized material and/or persons. At point of stuffing, procedures must be in place to properly seal and maintain the integrity of the shipping containers. A high security seal must be affixed to all loaded containers bound for the U.S. All seals must meet or exceed the current PAS ISO 17712 standards for high security seals.

1.1 Container Inspection

Procedures must be in place to verify the physical integrity of the cargo container structure prior to loading, to include the reliability of the locking mechanisms of the doors. An inspection process is recommended for all full and empty containers;

1.2Container Seals

written procedures must stipulate how seals are to be controlled and affixed to loaded containers. Procedures must be in place for recognizing and reporting compromised seals and/or containers to US Customs and Border Protection or the appropriate foreign authority. Only designated employees should distribute container seals for integrity purposes. 1.3 Container Storage
Containers must be stored in a secure area to prevent unauthorized access and/or manipulation. Procedures must be in place for reporting and neutralizing unauthorized entry into containers or container storage areas.

2. Physical Access Controls


Access controls prevent unauthorized entry to conveyances and facilities, maintain control of employees, visitors and protect company assets. Access controls must include the positive identification of all employees, visitors and vendors at all points of entry.

2.1 Employees

An employee identification system must be in place for positive identification and access. Employees should only be given access to those secure areas needed for the performance of their duties. Company management or security personnel must adequately control the issuance and removal of employee, visitor and vendor identification badges. Procedures for the issuance, removal and changing of access devices (e.g. keys, key cards, etc.) must be documented.

2.2 Visitors Controls

Visitors must present photo identification for documentation purposes upon arrival. All visitors should be escorted and visibly display temporary identification.

2.3 Deliveries (including mail)

Proper vendor ID and/or photo identification must be presented for documentation purposes upon arrival by all vendors. Arriving packages and mail should be periodically screened before being disseminated.

2.4 Challenging and Removing Unauthorized Persons

Procedures must be in place to identify, challenge and address unauthorized/unidentified persons.


3. Personnel Security


Processes must be in place to screen prospective employees and to periodically check current employees. Maintain a current permanent employee list, which includes the name, date of birth, national identification number or social security number, position held, and submit such information to CBP upon written request, to the extent permitted by law.

3.1 Pre-Employment Verification

Application information, such as employment history and references must be verified prior to employment.

3.2 Background checks / investigations

Consistent with foreign, federal, state and local regulations, background checks and investigations should be conducted for prospective employees. Periodic checks and reinvestigations should be performed based on cause and/or the sensitivity of the employee’s position.

3.3 Personnel Termination Procedures

Companies must have procedures in place to remove identification, facility, and system access for terminated employees.

4. Procedural Security


Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling and storage of cargo in the supply chain

4.1 Documentation Processing

Procedures must be in place to ensure that all documentation used in the clearing of merchandise/cargo, is legible, complete, accurate and protected against the exchange, loss or introduction of erroneous information. Documentation control must include safeguarding computer access and information.

4.2 Manifesting Procedures

To help ensure the integrity of cargo received from abroad, procedures must be in place to ensure that information received from business partners is reported accurately and timely. Ensure that all bills of lading and other documentation submitted for cargo is complete and a system in place to verify the accuracy of the weight marks and quantity of the shipment.

4.3 Shipping & Receiving

Arriving cargo should be reconciled against information on the cargo manifest. The cargo should be accurately described, weighed, labeled, marked, counted and verified. Departing cargo should be checked against purchase or delivery orders. Drivers delivering or receiving cargo must be positively identified before cargo is received or released.

4.4 Cargo Discrepancies

All shortages, overages and other significant discrepancies or anomalies must be resolved and/or investigated appropriately. CBP and/or other appropriate law enforcement agencies must be notified if illegal or suspicious activities are detected.

5. Security Training and Threat Awareness


A threat awareness program should be established and maintained by security personnel to recognize and foster awareness of the threat posed by terrorists at each point in the supply chain. Employees must be made aware of the procedures the company has in place to address a situation and how to report it. Additional training should be provided to employees in the shipping and receiving areas, as well as those receiving and opening mail.
Additionally, specific training should be offered to assist employees in maintaining cargo integrity, recognizing internal conspiracies and protecting access controls. These programs should offer incentives for active employee participation. Conduct periodic unannounced security checks to ensure that all procedures are being performed in accordance with defined guidelines

6. Physical Security


Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. U.S./Canada Highway Carriers should incorporate the following C-TPAT physical security guidelines throughout their supply chains as applicable.

6.1 Fencing

Perimeter fencing should enclose the areas around cargo handling and storage facilities. Interior fencing within a cargo handling structure should be used to segregate domestic, international, high value, and hazardous cargo. All fencing must be regularly inspected for integrity and damage.

6.2 Gates and Gate Houses

Gates through which vehicles and/or personnel enter or exit must be manned and/or monitored. The number of gates should be kept to the minimum necessary for proper access and safety.

6.3 Parking

Private passenger vehicles should be prohibited from parking in or adjacent to cargo handling and storage areas.

6.4 Building Structure

Buildings must be constructed of materials that resist unlawful entry. The integrity of structures must be maintained by periodic inspection and repair.

6.5 Locking Devices and Key Controls

All external and internal windows, gates and fences must be secured with locking devices. Management or security personnel must control the issuance of all locks and keys.

6.6 Lighting

Adequate lighting must be provided inside and outside the facility including the following areas: entrances and exits, cargo handling and storage areas, fence lines and parking areas.

6.7 Alarms Systems & Video Surveillance Cameras

Alarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling and storage areas.

7. Information Technology Security


Information Technology (IT) integrity must be maintained to protect data from unauthorized access or manipulation.

7.1 Password Protection

Automated systems must use individually assigned accounts that require a periodic change of password. IT security policies, procedures and standards must be in place and provided to employees in the form of training.

7.2 Accountability

A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data. All system violators must be subject to appropriate disciplinary actions for abuse.

7.3 Total Solution and Security Software Management

To establish the C-TPAT management system comprehensive software should be needed for the manufacturers. Regarding the issue there are number of international or national software developer working. So, manufacturer to be choose any of the options according his convenience.

Share :

Facebook Twitter Google+ LinkedIn

About Author:

He is top ranked RMG Digital Marketing Consultant. He is Open Source Software Implementation Expert. He is certified professional from NCC, Aptech and New Horizons .Completed B.Sc.and M.Sc.in Software Engineering from London Metropolitan University. You can Hire Him.


Contact:Cell#+8801792525354 Email:apparelsoftware@gmail.com
0 Comments on "C-TPAT A Security Guidelines for Manufacturers "

Back To Top