Chapter 10: Supply Chain Security

Ace your homework & exams now with Quizwiz!

Port security

-3D sonar to conduct routine hull and port inspection -Access Control and Container tracking devices and systems

Air cargo

-40% of the value of global trade -US and EU recognize each other's security procedures -Screen and x ray all cargo

Over the road Cargo

-Freight at rest is freight at risk common areas are truck stops, unsecured drop yards, and restaurant or shopping center parking lots -85% of all major cargo theft involves trucks ($10B) -Worst states: California, Georgia, Florida, Texas, Tennessee, New York, and Illinois

Monitor and improve security of supply chain

-Incident Management, Reporting and Investigations -Crisis Management and Disaster Recovery -Supply Chain Security Contractual Requirements for Suppliers/Business Partners -Supply Chain Security Measurement and Audit

Rail and hazardous materials

-Often carry hazardous chemicals -Must implements security plans to protect cars, tracks and bridges

Minimum security criteria

1. Choose a secure business partner 2. Container and trailer security and inspection 3. Personnel security 4. Secured procedures 5. Documentation control 6. Facility security 7. Information technology security 8. Security training and threat awareness

Strong supply chain security

1. Define potential risks 2. Determine what is needed to mitigate risk 3. Study and implement best practices 4. Audit risk mitigation process 5. Develop corrective action strategies 6. Offer risk mitigation training and remediation

Current cargo security technology

1. License plate recognition (verify trucks/open gates) 2. Geofencing (trailer moves in/out of preapproved coordinates) 3. Solar, wireless surveillance platform 4. Real time GPS locating systems 5. Hardened lock that withstands prying, cutting or impact tools 6. An integrated alarm that sends alerts when unauthorized attempts are made to access cargo 7. Knowing where the hotspots are in terms of cargo theft 8. Thieves are using duplicated container seals w 3D printing or use GPS jamming devices to overcome security efforts

CTPAT Benefits

1. Reduced number of CBP examinations 2. Front of the line inspections / Shorter wait times at the border 3. Access to the Free and Secure Trade (FAST) Lanes at the land borders 4. Business resumption priority following a natural disaster or terrorist attack 5. Access to the CTPAT web-based Portal system and training materials 6. Assignment of a supply chain security specialist to the company 7. Benefit by being recognized as a trusted trade partner by foreign customs administrations that have signed Mutual Recognition with the US 8. Eligibility for other US Government pilot programs, such as the Food and Drug Administration's Secure Supply Chain program 9. Eligibility to participate in the Importer Self-Assessment Program (ISA) 10. Priority consideration at CBP's Industry-focused Centers of Excellence and Expertise

Components of ISO 31000

1. Risk Assessment 2. Establishing and Measuring Supply Chain Security 3. Monitoring and Improving the Security of your Supply Chain

Areas of cargo security

1. Visibility 2. Validation 3. Performance 4. Risk mitigation 5. Efficiencies

ISO 31000

A management framework for building a resilient supply chain Includes an effective supply chain security program, including identifying, analyzing, and prioritizing supply chain security risks Risks from theft, product tampering, intro of contraband or weapons of terror into supply chain shipments

Customs Trade Partnership Against Terrorism (C-TPAT)

A voluntary supply chain security program led by US Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrorism

Facility security

All cargo and storage facilities must have physical barriers and deterrents, including fencing, gates, secured parking, alarm systems, proper light, locking systems and video surveillance

Documentation control

All cargo documents must be legible and accurate. Outgoing and incoming cargo must also be verified against purchase and delivery orders, and all drivers must be positively identified

Container and trailer security and inspection

All containers and trailers require security and inspection procedures, including ensuring proper sealing, reliability of locking mechanisms and doors; and reporting and resolving unauthorized entry into containers/trailers or container/trailer storage areas

Secure business partner

All foreign manufacturers and partners must demonstrate CTPAT security criteria via written/electronic confirmation

Risk Assessment

An effective supply chain security program ensures that your company's supply chains are secure from point of origin to point of destination Most basic and important element of any supply chain security program is first ensuring you have an in-depth understanding and mapping of what your company's supply chain is Country of Origin Quantity, Value and Mode of Transportation of Shipments Historical data

Risk mitigation

Awareness and prevention of criminal activity, law enforcement engagement and assistance with recovery

Validation

Chain of custody, regulatory compliance, loss and incident forensics

Security training and threat awareness

Create a threat awareness program for employees so they can identify possible threats posed by terrorists and contraband smugglers

Information technology security

Create and implement IT security procedures and policies, such as password protection and employee training

Establish and measure supply chain security

Ensure that partners involved in your supply chain practice basic security measures to prevent unauthorized access and to fully secure your cargo from point of origin to your destination including: -Physical security and access controls -Personnel security, education, and training -Procedural security -Shipment security -IT security -Conveyance security -Sub contractor or partner selection criteria -Security monitoring of your supply chain

Cargo security

Fleets creating "positive lane and logistics" performance Five areas

Personnel security

Implement an employee identification system, as well as regular, detailed background checks for new and current employees

Efficiencies

Least cost/time/risk routing, targeted areas for supply chain improvement, carrier evaluation, shipment history and exception analytics based on the shippers' business rules

Secured procedures

Make sure security measures and procedures are in place to track and manage cargo transportation, handling and storage

Visibility

Real time cargo/asset location with environmental sensing capability for cargo integrity

Cargo Theft

Supply chain disruptions, delays and loss of goods in transit are global problems from a variety of threats -14% in Brazil -30% increase in South Africa -Daring vehicle shipment thefts in China

Performance

Transit time, estimated time of arrival, destination acknowledgment and notification

CTPAT process

When an entity joins, an agreement is made to work with CBP to protect the supply chain, identify security gaps and implements specific security measures and best practices. Applicants must address a broad range of security topics and present security profiles that list action plans to align security throughout the supply chain Members are considered to be of low risk, and are therefore less likely to be examined at a US port of entry 11,400 certified partners US importers/exporters, highway, rail and sea carriers, licensed US customs brokers, US marine port authority/terminal operators, US freight consolidators, ocean transportation intermediaries and non-operating common carriers, NAFTA manufacturers and long haul carriers


Related study sets

Living Environment - Multiple Choice

View Set

Common Skin Conditions (unfinished)

View Set

66 Books of the Bible (5,12,5,5,12)

View Set

American Constitution and Government

View Set

Mastering Chemistry: Chapter 5- Post Lecture HW

View Set