SlideShare a Scribd company logo
Container Security
1. Container integrity must be maintained to
protect against the introduction of
unauthorized material and/or persons.
2. At point of stuffing, procedures must be in
place to properly seal and maintain the
integrity of the shipping containers.
A high security seal must be affixed to all
loaded containers bound for the U.S. All
seals must meet or exceed the current
PAS ISO 17712 standards for high security
seals.
C-TPAT
(Customs-Trade Partnership
Against Terrorism)
C-TPAT is a joint government-business
initiative to build cooperative
relationships overall supply chain and
boarder security.
Container Inspection
Procedures must be in place to verify the physical integrity of
the container structure prior to stuffing, to include the reliability
of the locking mechanisms of the doors. A seven-point
inspection process is recommended for all containers:
 Front wall … dinding depan
 Left side ….sisikiri..
 Right side …sisi kanan
 Floor …. lantai
 Ceiling/Roof …..bagian atas/ atap
 Inside/outside doors … didalan/ diluar pintu
 Outside/Undercarriage …. Dibagian luar/ dibagian bawah
Container Seals
1. Written procedures must stipulate how seals
are to be controlled and affixed to loaded
containers - to include procedures for
recognizing and reporting compromised seals
and/or containers to the appropriate foreign
authority.
Only designated employees should distribute
container seals for integrity purposes.
Container Storage
1. Containers must be stored in a secure
area to prevent unauthorized access
and/or manipulation.
Procedures must be in place for
reporting and neutralizing unauthorized
entry into containers or container
storage areas.
Physical Access Controls
pengendali akses pisik
1. Access controls prevent unauthorized
entry to facilities, maintain control of
employees and visitors, and protect
company assets.
2. Access controls must include the
positive identification of all employees,
visitors, and vendors at all points of
entry.
Employees
1. An employee identification system must be in place for positive
identification and access control purposes.
Sistem indektitas pekerja harus ditujukan untuk indentifikasi + dan tujuan
pengendalian akses
1. Employees should only be given access to those secure areas needed for
the performance of their duties.
Pekerja harus seharusnya diberikan akses ke area yang dibutuhkan untuk
melaksanakan perkerjaan mereka
1. Company management or security personnel must adequately control the
issuance and removal of employee, visitor and vendor identification
badges.
2. Menejemen perusahaan untuk pengamanan personel harus dapat
mengendalikan permasalahan dan pemindahan indentitas pekerja.
Pengunjung dan pemasok
3. Procedures for the issuance, removal and changing of access devices
(e.g. keys, key cards, etc.) must be documented.
4. Prosedur untuk menjamin pemindahan dan perubahan dari peralatan
akses ( contoh: kunci.kartu kunci, dsb)harus di dokumentasikan
Visitors
1. Visitors must present photo identification
for documentation purposes upon arrival.
2. All visitors should be escorted and visibly
display temporary identification.
Deliveries (including mail)
1. Proper vendor ID and/or photo
identification must be presented for
documentation purposes upon arrival by
all vendors.
2. Arriving packages and mail should be
periodically screened before being
disseminated.
Challenging and Removing
Unauthorized Persons
Procedures must be in place to identify,
challenge and address
unauthorized/unidentified persons.
Personnel Security
Processes must be in place to screen
prospective employees and to
periodically check current employees.
Pre-Employment Verification
Application information, such as
employment history and references
must be verified prior to employment.
Background checks /
investigations
1. Consistent with foreign, federal, state,
and local regulations, background
checks and investigations should be
conducted for prospective employees.
2. Once employed, periodic checks and
reinvestigations should be performed
based on cause, and/or the sensitivity
of the employee’s position.
Personnel Termination
Procedures
Companies must have procedures in place
to remove identification, facility, and
system access for terminated
employees.
Procedural Security
Security measures must be in place to
ensure the integrity and security of
processes relevant to the
transportation, handling, and storage of
cargo in the supply chain.
Documentation Processing
1. Procedures must be in place to ensure
that all information used in the clearing
of merchandise/cargo, is legible,
complete, accurate, and protected
against the exchange, loss or
introduction of erroneous information.
2. Documentation control must include
safeguarding computer access and
information.
Manifesting Procedures
To help ensure the integrity of cargo
received from abroad, procedures must
be in place to ensure that information
received from business partners is
reported accurately and timely.
Shipping & Receiving
1. Arriving cargo should be reconciled against
information on the cargo manifest.
2. The cargo should be accurately described, and
the weights, labels, marks and piece count
indicated and verified.
3. Departing cargo should be verified against
purchase or delivery orders.
4. Drivers delivering or receiving cargo must be
positively identified before cargo is received or
released.
Cargo Discrepancies
1. All shortages, overages, and other
significant discrepancies or anomalies
must be resolved and/or investigated
appropriately.
2. Customs and/or other appropriate law
enforcement agencies must be notified if
illegal or suspicious activities are
detected - as appropriate.
Security Training and Threat
Awareness
1. A threat awareness program should be established
and maintained by security personnel to recognize
and foster awareness of the threat posed by
terrorists at each point in the supply chain.
2. Employees must be made aware of the procedures
the company has in place to address a situation and
how to report it.
3. Additional training should be provided to employees
in the shipping and receiving areas, as well as those
receiving and opening mail.
4. Additionally, specific training should be offered to
assist employees in maintaining cargo integrity,
recognizing internal conspiracies, and protecting
access controls. These programs should offer
incentives for active employee participation.
Physical Security
Cargo handling and storage facilities must
have physical barriers and deterrents that
guard against unauthorized access.
Fencing
1. Perimeter fencing should enclose the
areas around cargo handling and storage
facilities.
2. Interior fencing within a cargo handling
structure should be used to segregate
domestic, international, high value, and
hazardous cargo.
3. All fencing must be regularly inspected
for integrity and damage.
Gates and Gate Houses
1. Gates through which vehicles and/or
personnel enter or exit must be manned
and/or monitored.
2. The number of gates should be kept to
the minimum necessary for proper
access and safety.
Parking
Private passenger vehicles should be
prohibited from parking in or adjacent
to cargo handling and storage areas.
Building Structure
1. Buildings must be constructed of
materials that resist unlawful entry.
2. The integrity of structures must be
maintained by periodic inspection and
repair.
Locking Devices and Key
Controls
1. All external and internal windows,
gates and fences must be secured
with locking devices.
2. Management or security personnel
must control the issuance of all locks
and keys.
Lighting
Adequate lighting must be provided inside
and outside the facility including the
following areas: entrances and exits,
cargo handling and storage areas, fence
lines and parking areas.
Information Technology
Security
Password Protection
Automated systems must use
individually assigned accounts that
require a periodic change of password.
IT security policies, procedures and
standards must be in place and
provided to employees in the form of
training
Accountability
A system must be in place to identify the abuse of IT
including improper access, tampering or the
altering of business data.
All system violators must be subject to appropriate
disciplinary actions for abuse.

More Related Content

PDF
GSV_ C-TPAT- SCS_Presentation
PDF
PPTX
PPT
Road safety presentation(PPT) by Faisal
PPTX
Kirkpatrick's Four-Level Training Evaluation Model
PDF
C-TPAT Security Training
PDF
Trade Based Money Laundering
PPTX
Water Conservation
GSV_ C-TPAT- SCS_Presentation
Road safety presentation(PPT) by Faisal
Kirkpatrick's Four-Level Training Evaluation Model
C-TPAT Security Training
Trade Based Money Laundering
Water Conservation

What's hot (20)

PDF
Legal register
PPT
Supervisor Safety Training
PDF
PPTX
Security training manual
PPT
Non confirming products
PPTX
Safety Pillar internal audit
PPTX
Monthly Safety report Performance Report March 23.pptx
PDF
amfori BSCI.pdf
PDF
Health & Safety Induction Training
PPT
Safety presentation
PDF
Rigging & Slinging Training Course.pdf
PPTX
How to Inspire Your People to Work Safe
PDF
Session no. 5 roles and responsibilities in safety management system
PPTX
Ppt Site Security Management
PPT
General Safety Protocols on Manufacturing Plant
PDF
1. c tpat minimum security criteria
PPT
Basic Safety Officer's Course
DOC
Primark social audit check list
PPTX
ISO 45001 Workshop.pptx
PDF
Staff safety hand book
Legal register
Supervisor Safety Training
Security training manual
Non confirming products
Safety Pillar internal audit
Monthly Safety report Performance Report March 23.pptx
amfori BSCI.pdf
Health & Safety Induction Training
Safety presentation
Rigging & Slinging Training Course.pdf
How to Inspire Your People to Work Safe
Session no. 5 roles and responsibilities in safety management system
Ppt Site Security Management
General Safety Protocols on Manufacturing Plant
1. c tpat minimum security criteria
Basic Safety Officer's Course
Primark social audit check list
ISO 45001 Workshop.pptx
Staff safety hand book
Ad

Similar to CTPAT PRESENTATION.ppt (20)

PDF
Warehouse security best practices ctpat.pdf
PDF
Iwla best practices
PPTX
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
PPTX
Nipa c tpat security presentation-final
PDF
Points to cover for scs audit
PPTX
Digital & SIP Training Security Training Module.pptx
PDF
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
PDF
c-tpat security criteria for foreign manufacturers.pdf
PDF
c-tpat security criteria for foreign manufacturers.pdf
PDF
Vendor ctpat securityawareness2010
PDF
AIR CARGO MANAGEMENT UNIT NO.3.pdf
PPTX
SECURITY UPDATE.pptx
PPTX
Step 1 receiving bay ws
PDF
TYPES-OF-SECURITY-MEASURES-FOR-AN-EFFECTIVE-DEFENSE-AGAINST-CRIMES-1.ACTIVE-M...
PPTX
WDU GOOD WARE HOUSING PRACttttTICES.pptx
PPTX
GOOD WAREHOUSING PRACTICE.pptx
DOC
long resume, word Erica's
PDF
UnitII Organization and personnel theory and Basics.pdf
PPTX
Good practice in production
DOC
Security Plan CEIL-2015
Warehouse security best practices ctpat.pdf
Iwla best practices
Phy Sy CTPAT.pptx-ctpat training for supply chain managers.
Nipa c tpat security presentation-final
Points to cover for scs audit
Digital & SIP Training Security Training Module.pptx
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
c-tpat security criteria for foreign manufacturers.pdf
c-tpat security criteria for foreign manufacturers.pdf
Vendor ctpat securityawareness2010
AIR CARGO MANAGEMENT UNIT NO.3.pdf
SECURITY UPDATE.pptx
Step 1 receiving bay ws
TYPES-OF-SECURITY-MEASURES-FOR-AN-EFFECTIVE-DEFENSE-AGAINST-CRIMES-1.ACTIVE-M...
WDU GOOD WARE HOUSING PRACttttTICES.pptx
GOOD WAREHOUSING PRACTICE.pptx
long resume, word Erica's
UnitII Organization and personnel theory and Basics.pdf
Good practice in production
Security Plan CEIL-2015
Ad

Recently uploaded (20)

PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Laughter Yoga Basic Learning Workshop Manual
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PDF
Tata consultancy services case study shri Sharda college, basrur
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PPT
Lecture 3344;;,,(,(((((((((((((((((((((((
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PPTX
DMT - Profile Brief About Business .pptx
PDF
NEW - FEES STRUCTURES (01-july-2024).pdf
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
PDF
IFRS Notes in your pocket for study all the time
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
PDF
Nidhal Samdaie CV - International Business Consultant
PPT
Chapter four Project-Preparation material
PDF
Daniels 2024 Inclusive, Sustainable Development
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PPTX
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Laughter Yoga Basic Learning Workshop Manual
Power and position in leadershipDOC-20250808-WA0011..pdf
Tata consultancy services case study shri Sharda college, basrur
Solaris Resources Presentation - Corporate August 2025.pdf
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Lecture 3344;;,,(,(((((((((((((((((((((((
Digital Marketing & E-commerce Certificate Glossary.pdf.................
DMT - Profile Brief About Business .pptx
NEW - FEES STRUCTURES (01-july-2024).pdf
Belch_12e_PPT_Ch18_Accessible_university.pptx
NISM Series V-A MFD Workbook v December 2024.khhhjtgvwevoypdnew one must use ...
IFRS Notes in your pocket for study all the time
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Sales & Distribution Management , LOGISTICS, Distribution, Sales Managers
Nidhal Samdaie CV - International Business Consultant
Chapter four Project-Preparation material
Daniels 2024 Inclusive, Sustainable Development
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
svnfcksanfskjcsnvvjknsnvsdscnsncxasxa saccacxsax

CTPAT PRESENTATION.ppt

  • 1. Container Security 1. Container integrity must be maintained to protect against the introduction of unauthorized material and/or persons. 2. At point of stuffing, procedures must be in place to properly seal and maintain the integrity of the shipping containers. A high security seal must be affixed to all loaded containers bound for the U.S. All seals must meet or exceed the current PAS ISO 17712 standards for high security seals.
  • 2. C-TPAT (Customs-Trade Partnership Against Terrorism) C-TPAT is a joint government-business initiative to build cooperative relationships overall supply chain and boarder security.
  • 3. Container Inspection Procedures must be in place to verify the physical integrity of the container structure prior to stuffing, to include the reliability of the locking mechanisms of the doors. A seven-point inspection process is recommended for all containers:  Front wall … dinding depan  Left side ….sisikiri..  Right side …sisi kanan  Floor …. lantai  Ceiling/Roof …..bagian atas/ atap  Inside/outside doors … didalan/ diluar pintu  Outside/Undercarriage …. Dibagian luar/ dibagian bawah
  • 4. Container Seals 1. Written procedures must stipulate how seals are to be controlled and affixed to loaded containers - to include procedures for recognizing and reporting compromised seals and/or containers to the appropriate foreign authority. Only designated employees should distribute container seals for integrity purposes.
  • 5. Container Storage 1. Containers must be stored in a secure area to prevent unauthorized access and/or manipulation. Procedures must be in place for reporting and neutralizing unauthorized entry into containers or container storage areas.
  • 6. Physical Access Controls pengendali akses pisik 1. Access controls prevent unauthorized entry to facilities, maintain control of employees and visitors, and protect company assets. 2. Access controls must include the positive identification of all employees, visitors, and vendors at all points of entry.
  • 7. Employees 1. An employee identification system must be in place for positive identification and access control purposes. Sistem indektitas pekerja harus ditujukan untuk indentifikasi + dan tujuan pengendalian akses 1. Employees should only be given access to those secure areas needed for the performance of their duties. Pekerja harus seharusnya diberikan akses ke area yang dibutuhkan untuk melaksanakan perkerjaan mereka 1. Company management or security personnel must adequately control the issuance and removal of employee, visitor and vendor identification badges. 2. Menejemen perusahaan untuk pengamanan personel harus dapat mengendalikan permasalahan dan pemindahan indentitas pekerja. Pengunjung dan pemasok 3. Procedures for the issuance, removal and changing of access devices (e.g. keys, key cards, etc.) must be documented. 4. Prosedur untuk menjamin pemindahan dan perubahan dari peralatan akses ( contoh: kunci.kartu kunci, dsb)harus di dokumentasikan
  • 8. Visitors 1. Visitors must present photo identification for documentation purposes upon arrival. 2. All visitors should be escorted and visibly display temporary identification.
  • 9. Deliveries (including mail) 1. Proper vendor ID and/or photo identification must be presented for documentation purposes upon arrival by all vendors. 2. Arriving packages and mail should be periodically screened before being disseminated.
  • 10. Challenging and Removing Unauthorized Persons Procedures must be in place to identify, challenge and address unauthorized/unidentified persons.
  • 11. Personnel Security Processes must be in place to screen prospective employees and to periodically check current employees.
  • 12. Pre-Employment Verification Application information, such as employment history and references must be verified prior to employment.
  • 13. Background checks / investigations 1. Consistent with foreign, federal, state, and local regulations, background checks and investigations should be conducted for prospective employees. 2. Once employed, periodic checks and reinvestigations should be performed based on cause, and/or the sensitivity of the employee’s position.
  • 14. Personnel Termination Procedures Companies must have procedures in place to remove identification, facility, and system access for terminated employees.
  • 15. Procedural Security Security measures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo in the supply chain.
  • 16. Documentation Processing 1. Procedures must be in place to ensure that all information used in the clearing of merchandise/cargo, is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information. 2. Documentation control must include safeguarding computer access and information.
  • 17. Manifesting Procedures To help ensure the integrity of cargo received from abroad, procedures must be in place to ensure that information received from business partners is reported accurately and timely.
  • 18. Shipping & Receiving 1. Arriving cargo should be reconciled against information on the cargo manifest. 2. The cargo should be accurately described, and the weights, labels, marks and piece count indicated and verified. 3. Departing cargo should be verified against purchase or delivery orders. 4. Drivers delivering or receiving cargo must be positively identified before cargo is received or released.
  • 19. Cargo Discrepancies 1. All shortages, overages, and other significant discrepancies or anomalies must be resolved and/or investigated appropriately. 2. Customs and/or other appropriate law enforcement agencies must be notified if illegal or suspicious activities are detected - as appropriate.
  • 20. Security Training and Threat Awareness 1. A threat awareness program should be established and maintained by security personnel to recognize and foster awareness of the threat posed by terrorists at each point in the supply chain. 2. Employees must be made aware of the procedures the company has in place to address a situation and how to report it. 3. Additional training should be provided to employees in the shipping and receiving areas, as well as those receiving and opening mail. 4. Additionally, specific training should be offered to assist employees in maintaining cargo integrity, recognizing internal conspiracies, and protecting access controls. These programs should offer incentives for active employee participation.
  • 21. Physical Security Cargo handling and storage facilities must have physical barriers and deterrents that guard against unauthorized access.
  • 22. Fencing 1. Perimeter fencing should enclose the areas around cargo handling and storage facilities. 2. Interior fencing within a cargo handling structure should be used to segregate domestic, international, high value, and hazardous cargo. 3. All fencing must be regularly inspected for integrity and damage.
  • 23. Gates and Gate Houses 1. Gates through which vehicles and/or personnel enter or exit must be manned and/or monitored. 2. The number of gates should be kept to the minimum necessary for proper access and safety.
  • 24. Parking Private passenger vehicles should be prohibited from parking in or adjacent to cargo handling and storage areas.
  • 25. Building Structure 1. Buildings must be constructed of materials that resist unlawful entry. 2. The integrity of structures must be maintained by periodic inspection and repair.
  • 26. Locking Devices and Key Controls 1. All external and internal windows, gates and fences must be secured with locking devices. 2. Management or security personnel must control the issuance of all locks and keys.
  • 27. Lighting Adequate lighting must be provided inside and outside the facility including the following areas: entrances and exits, cargo handling and storage areas, fence lines and parking areas.
  • 28. Information Technology Security Password Protection Automated systems must use individually assigned accounts that require a periodic change of password. IT security policies, procedures and standards must be in place and provided to employees in the form of training
  • 29. Accountability A system must be in place to identify the abuse of IT including improper access, tampering or the altering of business data. All system violators must be subject to appropriate disciplinary actions for abuse.