Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular.

Slides:



Advertisements
Similar presentations
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Advertisements

Supply Chain Security and IT Governance Nainika Patnayakuni Department of Economics and Information Systems UAHuntsville Information Security and Computer.
 Long Island Import Export Association Impact of Trade Compliance on Importers & Exporters *connectedthinking.
The Evolution of the Trusted Traveler Concept September 2010.
NEW U.S. SECURITY PROGRAMS AFTER SEPTEMBER 11, 2001 FREEHILL HOGAN & MAHAR, LLP 80 PINE STREET NEW YORK, NY TEL: FAX:
>>> 1 November 22, 2004 Copyright © 2004 COTECNA S.A. All rights reserved. THE IMPACT OF SUPPLY CHAIN SECURITY ON TRADE FACILITATION AND.
FHWA Talking Freight Seminar: Security and the Trucking Industry October 19, 2005.
Food Safety Export Assurance System Requirements for Dairy Products Confidential to Fonterra Co-operative Group September 2014 Malcolm Bailey – Fonterra.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
Bryce Blegen September 5, 2013
“Think Security”. Supply Chain Security On the Southern Border.
Security Controls – What Works
Information Systems Security Officer
“Trade Facilitation in the WTO Context” High-Level Policy Segment of the Committee for Trade, Industry and Enterprise Development United Nations Economic.
International Organization for Standardization AIMS MANAGEMENT CONSULTANTS Vijay Garg ,
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Field Operations U.S. Customs and Border Protection Customs-Trade Partnership Against Terrorism (C-TPAT) Texas Broker and Freight Forwarder Conference.
Internal Auditing and Outsourcing
Customs-Trade Partnership Against Terrorism Working with Business and the Trade Community.
Bradd M. Skinner Assistant CBP Attaché ext. 4861
21st Century Customs Solution
UNITED NATIONS Economic and Social Commission for Asia and the Pacific Economic Commission for Europe Beijing, September 2005 Sub-regional Seminar.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
TKX Logistics TMACOG – Ohio Conference on Freight Tuesday September 18, 2007 Mr. James K. Baber Vice President.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
HIPAA COMPLIANCE WITH DELL
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Graham Bartlett Policy Director SITPRO Ltd UK Experience of Implementing WCO SAFE Framework of Standards.
SANDLER AND TRAVIS TRADE ADVISORY SERVICES, INC. © Sandler & Travis Trade Advisory Services, Inc. All Rights Reserved Trade Facilitation.
LOOKING AT BROKERAGE IN NORTH AMERICA: WHAT’S AHEAD FOR CANADA’S CUSTOMS BROKERS? 41st NCBFAA Annual Conference Carol West, President Canadian Society.
(Customs & Trade Partnership
Where Are We With Mutual Recognition US Performance and Progress Operating In A C-TPAT Environment.
Canadian Food Safety Standards May 2008 Austin, Texas.
Delivering Excellence Together ! 1 st National Conference on SAFE Trade & AEO An AEO Perspective Tyron Mangakahia – Country Security Manager DHL Express.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
U.S. Treatment of Remanufactured Goods at the Border Elif Eroglu Attorney-Advisor, Regulations and Rulings, Office of International Trade U.S. Customs.
UNITED STATES POSTAL INSPECTION SERVICE J. J. Rowan Acting Chief Postal Inspector MTAC May 16, 2002.
CBP National Trade Strategy Winter Presenter’s Name June 17, 2003 CBP’s Trade Vision  CBP’s trade vision is to develop a swift, safe, and secure.
Beyond the Border Canada – United States Transportation Border Working Group Buffalo, New York April 8-9, 2014.
What is C-TPAT? C-TPAT is a voluntary government-business initiative to build cooperative relationships that strengthen and improve overall international.
C-TPAT: Past, Present, & Future Presented by: Robert A. DeCamp, Director of Regulatory Affairs & Consulting A.N. Deringer, Inc.
QUALITY MANAGEMENT STATEMENT
Page 1 5th Meeting of the Inter-American Committee on Ports Organization of American States Wednesday, September 12, 2007 “Supply Chain Security and Trade.
Safeguards to Secure the Integrity of Container Movements in the Transport Chain.
RESPONSIBLE CARE ® SECURITY CODE Daniel Roczniak Senior Director, Responsible Care American Chemistry Council June 2010.
CROSS BORDER TRADE October, 2004 M O V I N G F O R W A R D 2004.
AUTHORIZED ECONOMIC OPERATORS
OTM 6.1 / GTM Update and Agility China Case Sharing.
Canada Border Services Agency Transportation Border Working Group (TBWG) April , 2010 Boston, Mass. CBSA OTTAWA UPDATE.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
V Global Forum on Fighting Corruption and Safeguarding Integrity – South Africa Trade and Customs Partnership to fight against corruption and safeguard.
China AEO Program China Customs August 2013.
Appropriate record of compliance with customs requirements Satisfactory system of managing commercial and, where appropriate, transport.
The WCO SAFE Framework of Standards Larry Burton Senior Technical Officer World Customs Organization.
Centers of Excellence and Expertise Department of Homeland Security  Customs and Border Protection 1.
Global Dialogue on Customs Capacity Building 04 April 2007 © 2007 IBM Corporation Benefits of Supply Chain Security and Trade Facilitation: The IBM Experience.
Michael Edgerton, CPP Good Harbour International, LLC Abu Dhabi, UAE
Maritime Security as an Integral Part of an
MEM Cybersecurity Working Group Update to PCD Technical Committee
MEM Cybersecurity Working Group Update to PCD Technical Committee
Container Security Initiative
The Security Conditions of the Authorised Economic Operator
Role of Industry Self-regulation in Phytosanitary Compliance
Operationalizing Export Certification and Regionalization Programmes
IS4680 Security Auditing for Compliance
Presentation transcript:

Global Marketing Overview of Supply Chain Security Assurance Certification/membership in supply chain security programs –Different programs focus on particular aspects of supply chain security –Programs enable best practice sharing across and within industries ›Requires adherence to customs and border agency security measures that result in preferential treatment when crossing specific borders ›Audits the compliance of contracted service providers against established global standards Dell-internal initiatives aim to continuously improve our supply chain security practices –Administrative, personnel and physical security policies –Manufacturing security and integrity measures –Specific programs to satisfy customer requirements Dell Confidential and Proprietary Information

Global Marketing Voluntary Supply Chain Security Programs Free and Secure Trade (FAST) –FAST Program supports cargo security initiatives ›Inspectors in 34 international ports ›Target and screen high-risk cargo before it is shipped to American ports Container Security Initiative (CSI) –CSI is led by US Customs and Border Protection (CBP) Section of DHS –Enforces security and prevents terrorist attacks coming through the supply chain using: ›Highly technical non-destructive scanning methods ›Tamper-evident containers ›Intelligence and automated information systems Customs Trade Partnership Against Terrorism (C-TPAT) –Dell is a top tier C-TPAT member –Private organizations voluntarily building cooperative government-business relationships to: ›Strengthen and improve the supply chain internationally ›Protect U.S. border security Partners in Protection (PIP) –Voluntary program sponsored by Canada’s Border Services Agency ›Enlists cooperation of private industry organizations to enhance border and supply chain security ›Partners follow strict standards for the high- security mechanical seals used for in-transit cargo within trailers and containers Dell Confidential and Proprietary Information

Global Marketing Voluntary Supply Chain Security Programs Authorized Economic Operators (AEO) –Dell follows the AEO framework of standards  Approved by the World Customs Organization  Requires Dell and Partners to use cargo seals that meet or exceed ISO standards Transported Asset Protection Association (TAPA) –Established security standards for the international supply chain –Focuses on loss prevention and tampering High Tech Supply Chain Security Consortium (HTSC 2 ) –Consolidates internationally recognized governmental security standards –Focuses on preventing the introduction of unauthorized articles or people into the supply chain Dell Confidential and Proprietary Information

Global Marketing Administrative Security Dell teams identify regional laws, policies, regulations and contractual requirements –Intellectual property of the company and our customers –Software licenses –Protection of employee and customer personal information –Proper data protection and data handling procedures –Trans-border data transmission –Financial and operational procedures –Regulatory export controls for certain technology Use of internal and external personnel and mechanisms –Control Self-Assessment (CSA) program ensures process compliance and review –External audits –Contract management –Security awareness –Risk management –Information Systems & Security ›Penetration testing ›Vulnerability testing ›Software verification ›Phased Review Process –System and Asset Management Dell Confidential and Proprietary Information

Global Marketing Software Security and Integrity Measures Software products enter a risk management framework as soon as they are defined Security, privacy, confidentiality, integrity and availability are all encompassed in this process Dell follows industry best practices for secure coding and a variety of manual and automated tools are used to verify code quality. Developers have mandatory annual training on secure coding practices All Dell-developed source code is subjected to both peer reviews and automated scans to identify security concerns Dell Confidential and Proprietary Information