C-TPAT Awareness Training Program

Slides:



Advertisements
Similar presentations
C-TPAT SECURITY AWARENESS TRAINING
Advertisements

HEALTH, SAFETY AND SECURITY. HEALTH AND SAFETY POLICY This is a statement that sets out how a firm manages health and safety in the workplace. Shows the.
/0403 Copyright ©2004 Business and Legal Reports, Inc. BLRs Safety Training Presentations Transportation Security TrainingPart II 49 CFR
Emergency Preparedness and Response
Welcome to Telect’s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation.
Each Panel = 3 x 4.25 Official and Unofficial Travel Be Prepared for the Unexpected Prior to Travel: –Ensure your Level 1 AT Training is current. –OCONUS.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Customs-Trade Partnership Against Terrorism
Security Training and Threat Awareness Program for All Employees
SAFEGUARDING DHS CLIENT DATA PART 2 SAFEGUARDING PHI AND HIPAA Safeguards must: Protect PHI from accidental or intentional unauthorized use/disclosure.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
10 Essential Security Measures PA Turnpike Commission.
Field Operations U.S. Customs and Border Protection Customs-Trade Partnership Against Terrorism (C-TPAT) Texas Broker and Freight Forwarder Conference.
3.6.6 Student Book © 2004 Propane Education & Research CouncilPage 1 In the wake of the September 11 th attack and continuing terrorist threats, shippers,
Mail Handling & Screening
Protecting your Employees and Securing your Mail Center.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Occupational health and safety
Program Objective Security Basics
Company Overview | Marketing & Communication | Finance | Facilities |TIM | QMG | ISG | ESG | RMG | HR Stand-up Meetings for BT Project Employees Information.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
APPLY OCCUPATIONAL HEALTH AND SAFETY PROCEEDURES
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Thermo Fisher Scientific Technology Controls to Minimize Risk
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Infant Security 10 th floor & Security Staff Security Measures Locked Units Electronic Security System Photo ID Badges Infant Security Task Force Patient.
Hazardous Materials Company Anti-Terrorism Tips. Overview This presentation is designed to inform companies of the appropriate steps that should be taken.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
Protecting Your Assets By Preventing Identity Theft 1.
Course of Study 6. Security Management  Security and its Importance  Security of the Guest and their Property  Security Needs for the Staff and the.
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
Warehousing and Storage Principles Session 12 – Security Day 6 / PM.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
SGTM 6: Personal Security Awareness Slide 1 SGTM 6: Personal Security Awareness.
Protecting Your Assets By Preventing Identity Theft
ISMS Information Security Management System
Explaining strategies to ensure compliance with workplace legislation
Welcome to Crime Prevention Training.
Registration Audit Escort & Managers Information
TWIC Training & Maritime Security Awareness
Training for Employees
Administrative Practices Outcome 1
University of Miami Police Department
Unsafe personal conduct affecting the work of administrators
Driver Anti-Terrorism Tips
See Something? Say Something!
HIPAA Basic Training for Privacy and Information Security
NSW Construction Induction Green Card
Customs Trade Partnership Against Terrorism (C-TPAT) An Introduction
IWATCH Army Training for Contractors “See Something -- Say Something” 1 Unclassified Always Ready. Always Alert. Because someone is depending on you. Unclassified.
Transportation Security
Security of People, Property and Information
Provide reception services
Safety in the Workplace
Follow Health, Safety and Security Procedures
Unit 101 Element 4 Maintain a Secure environment for customers, staff and visitors. Maintaining effective security should be the concern of everyone working.
Clemson University Red Flags Rule Training
Child Sexual Exploitation and Refusals
Home Visitor Safety Deb Palmer.
PROGRAM POLICIES AND PROCEDURES
FOOD DEFENSE TRAINING Brigiotta’s Farmland Produce & Garden Center, Inc.
SECURITY TRAINING AND THREAT AWARENESS
HIPAA Do’s and Don'ts: What is Really Behind Protected Health Information (PHI) and Health Care Privacy Rules Paul Sisler, Director, Information Services;
Handling information 14 Standard.
Department of Public Safety
Port of Stockton Access Policy
Shipping and Receiving Hazardous Materials
Presentation transcript:

C-TPAT Awareness Training Program

Overview C-TPAT is an acronym for Customs-Trade Partnership Against Terrorism C-TPAT is a voluntary program offered by the U.S. Government. C-TPAT requires employees to: Advocate for adherence –wear your badge, secure your work location, remind others to ensure they comply Awareness – be alert for suspicious activity Reporting – all suspicious activity must be reported

Rationale Being a trusted partner with US Customs provides operational and financial benefits to Static Control such as: Fast lane processing for imports and exports Lower targeting score = less supply chain disruption due to Customs inspections Mitigation of fines and penalties in case of a Customs violation Brand protection and competitive advantages Additional Customs benefits

Major Areas of C-TPAT Business Partners Management Practices Supplier Risk Assessment C-TPAT-Certified Transportation Partners Management Practices Access Controls Written Procedures and Specific Employee Training Security Training & Threat Awareness (All Employees) Physical Security Facility Security Trailer/container Security High-Security Trailer/Container Seals

Topics Suspicious Persons Suspicious Activities Suspicious Objects and Packages Employee Identification Visitor Controls Computer Security Document Security

Suspicious Persons WHAT TO LOOK FOR… Any person(s): unescorted and without an employee badge, or visitor sticker; especially in an unauthorized/restricted area wearing unusual clothing such as an overcoat on a 95 degree day waiting or loitering in an area or hallway tampering with someone’s desk, equipment, vehicles, cameras, etc. running, especially if carrying something hiding behind doors, fences, desks, etc.

You look lost, may I help you? Suspicious Persons HOW TO ACT… Challenge the person; Ask if you can help them Determine if the person is an employee or a visitor: If an employee, remind them always to display their ID badge If a visitor, get them out of the restricted area and escort them to the reception area or to the person with whom they are visiting Report the incident to your immediate supervisor You look lost, may I help you?

Suspicious Activities WHAT TO LOOK FOR… Objects obstructing access points Cameras being disconnected or obstructed Broken locks or access control systems Objects thrown from a vehicle, especially while traveling at high speeds

Suspicious Activities HOW TO ACT… Immediately report any suspicious activity to your supervisor, so they can address the situation and call security, if necessary.

Suspicious Objects or Packages WHAT TO LOOK FOR… Unexplained objects or packages that look strange or do not belong to the area Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) Strange leaking substance (powder, liquid, etc.) Suspicious objects in the middle of an area (e.g. hallway, lobby, etc.)

Suspicious Objects or Packages

Suspicious Objects or Packages HOW TO ACT… Immediately report any suspicious packages or objects to your supervisor, security, local police, 911 and/or FBI. Concerning the Object/Package: Handle with care, DO NOT shake or bump Isolate and look for indicators (shape, color, & smell) DO NOT open, smell, lick or taste Treat is as suspect

Employee Identification Your Responsibilities While on Company Property: Your Static Control Components I.D./Security badge must be properly displayed and worn at all times Properly secure and protect your I.D./Security badge

VISITOR Visitor Controls Visitor Pre-Meeting Requirements Inform your visitor of the company’s visitor policies including the required photo identification, and check-in with receptionist prior to their visit Visitor Entrance Requirements Ensure that your visitor has logged in and has been issued a visitor badge Visitor Escort Requirements You must escort your visitors at ALL times Do not leave your visitor unattended Visitor Exit Requirements Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist

Computer Security Do not share access to your computer with strangers Log-off when you leave your computer Passwords should be changed every 60 to 90 days Do not share your password with anyone Do not write down your password

Computer Security Selecting a Password Use hard-to-guess passwords Do not use the same password in more than one place A password should have a mix of letters, numbers and symbols I Love to be Secure iL2bs@ Always on Time to Work !AoT2wx My Password is Very Secure MyP1VS# Yo Quiero Taco Bell yqtb!10

Document Security Follow all SOP documentation regulations Do not leave sensitive documents laying around, especially when you are away from your desk Once finished with sensitive documents, either file in a secure location (such as a locked room or filing cabinet), or shred the documents in predetermined area

To Review Always keep your eyes open for suspicious persons, activities or packages Challenge anyone without an ID card or Visitor sticker Keep your computer locked with a sufficient password when away from your desk Keep sensitive documents under lock and key Report anything unusual to your immediate supervisor

Questions? Ask your supervisor if you have any questions OR Refer to the Customs & Border Protection Website: www.cbp.gov or http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/