Security Criteria for C-TPAT Foreign Manufacturers in English(五)
Adequate lighting must be provided inside and outside the facility including the following areas: entrances and exits, cargo handling and storage areas, fence lines and parking areas.
Alarms Systems and Video Surveillance Cameras
Alarm systems and video surveillance cameras should be utilized to monitor premmises and prevent unauthorized access to cargo handling and storage areas.
Information Technology Security
Automated systems must use individually assigned accounts that require a periodic change of password. IT security policies, procedures and standards must be in place and provided to employees in the form oftraining.
A system must be in place to identify the abuse ofIT including improper access, tampering or the altering of business data. All system violators must be subject to appropriate disciplinary actions for abuse.
Security Training and Threat Awareness
A threat awareness program should be established and maintained by security personnel to recognize and foster awareness ofthe threat posed by terrorists and contraband smugglers at each point in the supply chain. Employees must be made aware ofthe procedures the company has in place to address a situation and how to report it. Additional training should be provided to employees in the shipping and receiving areas, as well as those receiving and opening mail.
Additionally, specific training should be offered to assist employees in maintaining cargo integrity, recognizing internal conspiracies, and protecting access controls. These programs should offer incentives for active employee participation.
Foreign manufacturers shall have a documented and verifiableprocessfor determining risk throughout their supply chains based on their business model (i.e., volume, country of origin, routing, C-TPAT membership,potential terrorist threat via open source information, having inadequate security,past security incidents, etc.).
Foreign manufacturer shall have a documented and verifiableprocessfor determining risk throughout their supply chains based on their business model (i.e., volume, country of origin, routing,potential terrorist threat via open source information, etc.)