SUPPLY CHAIN SECURITY – CTPAT STANDARDS COMPLIANCE
INTRODUCTION FOR SUPPLY CHAIN SECURITY – CTPAT STANDARDS COMPLIANCE
The increase in statistics of loss related to company assets, namely cargo related crimes warrants an immediate methodological approach on how an organization may need to prepare itself with Total Prevention Methodology ensuring it does not fall prey to such losses that may influence Business Continuity.
This program, provides an insight to the organization on the importance of Supply Chain Security, namely the control and management methodologies, which includes a wide spectrum of elements, through a Supply Chain Risk Management Plan, focusing namely on CTPAT (Customs Trade Partnership Against Terrorism Standards).
COURSE OBJECTIVE
- Recognize the prevention methodologies based on the Standards of C-TPAT (Customs Trade Partnership Against Terrorism)
- Understand the benefits of implementing Supply Chain Security Risk Management Plan, absorbing the requirements laid out in ISO 28000 (Supply Chain Security Management) & ISO 31000 (Risk Management)
- Identify the change of trend in warehousing, transportation and logistics Security Management
- Identify pro active approaches Supply Chain Security Management – Compliance Programme
- Address the challenges of balancing security needs and economic efficiency
- Developing an effective Risk Management Plan for Supply Chain Security
- To be guided on internal audit skills and technique in conducting risk based auditing on CTPAT Compliance
COURSE CONTENT
- ISO 28000 – Security Management System for the Supply Chain
- An Overview
- How to synergies with ISO 31000 Risk Management Standards
- Security Policy
- Compliance Framework (Legal, Standard & Best Practices)
- Management of assets (People & Property)
- Threat & Risk Analysis (An Overview)
- Risk Matrix (Basic Introduction and Understanding)
- Assessment methodology of threat and risk to the organization / business
- Impact of Risk
- Management of threat and risk – Damage Control and Mitigation Plan
- Case Study
- Customs Trade Partnership Against Terrorism (C-TPAT)
- Background
- Definition
- Objective
- Security Requirements (In General)
- Container Security Requirement – Condition and Sealing Points
- Benefits
- Transport Security Management – Background & Statistical Facts
- Supply Chain Security (Cargo Security)
- Cargo Crime Statistics (Hijacks in Malaysia), Hijack Modus Operandi, Target Products, Laws in relation to Hijack and Cargo Crimes.
- Case Study.
- Supply Chain Security Management – Focus is on CTPAT Validation Programme
- Supply Chain Security (Cargo Security)
- Security Requirements Pre-Shipment
- Incoming Area / Storage Area / Loading Bay (Outgoing)
- (Basic Understanding)
- Access Control Management
- Facility Dock and Warehouse Access Control Management
- High Value Storage Area Security Requirements and Inventory Management
- Standard Operating Procedure
- Process Review (Frequency)
- Close Circuit Television (CCTV) – Quantity, Type, Coverage Angle
- Lighting
- Intrusion Detection System
- Alarm System
- Incoming Area / Storage Area / Loading Bay (Outgoing)
-
- Transportation Security
- Standard Operating Procedure
- Recommended mode of transportation – Security features for transportation vehicle, inclusive of Global Positioning System (GPS)
- Transportation Crew Management i.e:- Driver and Escorts (Armed / Unarmed) – Training / Background checks (Vetting)
- Routing, Scheduling, Pre-Alerts, Audits (Route, Airport Cargo, Warehouse, Ground Handlers)
- Transportation Security
-
- Transport / Trucking Crew Standards
- Selection process and grooming requirements.
- Crew Management – Weekly Meetings, Training Programme, Awareness Programme
- Armed Escort Standards and Legal Requirement (Including Rules of Engagement)
- Third Party Escort
- Transport / Trucking Crew Standards
-
- Transport Vehicle / Trucking Inspection for Compliance
- Physical Features / Condition
- Security and Safety Standards
- Roadworthiness
- Inspection Checklist
- Transport Vehicle / Trucking Inspection for Compliance
-
- Armoury Security Requirements and Management
- Access Control
- Inventory Management
- Issuance / Withdrawal of Weapons
- License and Permit
- Armoury Security Requirements and Management
- Security Requirements During Shipment
- Crew’s Roles and Responsibilities (Driver and Armed Escort)
- Vigilance
- Point to point delivery (Non-stop)
- Refuelling security requirements for long distance travelling
- Environmental Change Identification – elements to look out for during Shipment
- Security during vehicle breakdown / other emergencies
- How to manage an attempt to hijack shipment.
- Facility Security
- Security Officers Standards
- Selection process and grooming requirements.
- Perception Management
- Security Officers Management – Weekly Meetings, Training Programme, Awareness Programme
- Enforcement Methodology
- Security Officers Standards
-
- Security Equipment Management
- Walkie – Talkies
- Key Management system.
- Alarm System
- CCTV Management system
- Security Seal Management
- Security Equipment Management
-
- Perimeter Security
- Office and Vehicle (Trucks) Parking Security
- Standards
- Facility Access Control, Employee / Visitor / Vendor / Contractor Management
- Patrolling requirements and procedures
- Perimeter Security / Patrolling Methodology
- Access Control, Visitor / Contractor / Vendor Management in / out of X- Fab building & internal movement controls.
- Patrolling and Audit Methodology (Routine Patrolling, Daily Audits, Perimeter Audits and Recording Findings)
- Inspection Methodology (People, Bags, Vehicles) – Legal Rights and Limitations
- Close Circuit Television (CCTV) Management
- Introduction to CCTV
- Management, Surveillance Methodology, Intrusion Detection system
- Perimeter Security
- Shop Floor Security Risk Management
- Escalation Processes
- Effective Inventory Controls of WIP materials and
- Products
- Human Resources and Procurement Standards for Supply Chain Security
- Hiring and Selection
- Risk Management Plan
- Due Diligence
- Procurement Process
- Engagement of 3rd party
- Due Diligence
- Information Security
- Personal Data Protection Act 2010 and its related requirement.
- Enforcement, Non-Disclosure Documents and Practices.
- Basic Security Protocols (Username, Password, OTP)
- Social Compliance
- No Forced Labour involved in Cargo Process (Sorting, Storage, Packing, Loading, Transportation)
Leave a Reply