Supply Chain Security Self-Assessment – Transportation
(Carrier/Forwarder/Broker, Air Freight Consolidator/Ocean Intermediary, NVOCC, etc.)
Supply Chain Security Self-Assessment
Transportation Service Provider
Forwarder, Broker, Carriers (Ocean, Air, Rail, Truck), Air Freight Consolidator, Ocean Transportation Intermediary, NVOCC, etc.
Introduction:
As a result of the events of September 11th the United States has undertaken a number of initiatives to improve US Border Security. One of these initiatives is the Customs Trade Partnership Against Terrorism, referred to as C-TPAT. C-TPAT is a joint government and business initiative to improve supply chain security. Customs has recognized that protecting our borders from terrorism requires the close cooperation of importers, foreign manufacturers, and transportation and distribution service providers.
The C-TPAT program is voluntary. C-TPAT provides importers and their trade partners the opportunity to join in the war against terrorism and to ensure the timely delivery of imported goods into the United States. Through this initiative US Customs is asking businesses to ensure the integrity of their security practices and to communicate these practices to their business partners within the supply chain. Further information is available at
Zanes has signed an agreement with United States Customs and is committed to assessing and improving supply chain security. It is our intent to work with our business partners as a team to improve supply chain security practices. The first step in the process is the attached supply chain self-assessment. Please complete the attached supply chain self-assessment and return it to Zanes. Please contact us if you have any questions regarding this request.
Reply To:
An electronic copy of the completed document (in English) attached to an email is preferred. Fax number is provided below. Please respond to:
W. R. ZANES & CO. OFLA., INC
223 TCHOUPITOULAS ST
NEW ORLEANS, LA 70130
PH: 504-524-1301
FX: 504-524-1309
Email: ZANES DATA SERVICES
Company Name:Respondent’s Name:
Respondent’s Title:
Line of Business:
Does your company participate in any of the following U. S. Customs and Border Protection security programs:
C-TPAT / CIP / SCIP / BASC / FAST
Partner I.D. Number:
Does your company participate in any foreign government customs security program(s)?
PIP / AEO / OTHER:
Certification Number:
- Security Management System
- Is there a manager responsible for implementing security within the company? Please provide the security manager’s name and contact information.
- Is there a designated security officer at each company location to supervise security practices and review the introduction and removal of cargo in the receiving and shipping process?
- Do written security policies and procedures exist to include physical security, access controls, personnel security, education and awareness, manifest and conveyance security and the handling of incoming and outgoing goods to identify overages and shortages or the introduction of unmanifested or illegal goods?
- Is there a documented process for reporting and investigating security related incidents and to report them on a timely basis to Customs or law enforcement officials?
- Are close working relationships maintained with local law enforcement authorities?
- Are periodic internal audits/reviews conducted of security operations?
Company Name:
- Is there a documented security improvement plan? Please provide a summary of all identified security vulnerabilities and action plans to correct.
- Do your contacts with sub-contract transportation and distribution service providers specify the minimum security requirements expected from them?
- Do the minimum security requirements placed on sub-contractors contain all the C-TPAT requirements?
- Physical Security and Access Controls
- Do written physical security standards exist?
- Are the premises protected from unauthorized access by perimeter fencing or natural barriers?
- Are controls in place to prevent unauthorized vehicles from entering the premises?
- Is the facility equipped with adequate security warning signage?
- Are controls in place to positively identify drivers through photo identification or other means?
- Are all buildings constructed of materials that resist unlawful entry and protected against outside intrusion?
- Is driver access to the interior of the facility limited to a secure, segregated waiting area?
- Are controls in place to prevent unauthorized individuals from entering the facility or conveyances?
- Are employees and authorized visitors positively identified with photo identification or other means?
- Are visitors/contractors logged in, badged and escorted?
- Is adequate lighting provided inside and outside the facility to include parking areas?
Company Name:
- Are all doors/windows/openings locked to prevent unauthorized access to the facility and are same monitored by an intrusion detection/burglar alarm system that is monitored 24/7 by police or a central control station?
- Is there a working CCTV system that covers the exterior of the buildings including the personnel entrances, the interior and exterior of the docks, and yards where trailers and containers are loaded/unloaded and stored that is monitored and recorded?
- Do you utilize security officers on site? If yes, are the post procedures documented, comprehensive and current?
- Are personal belongings inspected upon ingress or egress to the facility to prevent the introduction or removal of unauthorized material?
- Are controls in place to prevent unauthorized access to computer systems?
- Human Resources (Personnel Security, Education & Awareness)
- Are pre-employment background checks conducted that includes criminal checks and application verification to the fullest extent allowed by law?
- Are the same background checks required of temporary and contract personnel?
- Are employees (temporary and permanent) and contractors subject to drug testing?
- Do all employees receive security training both during new employee orientation and on an ongoing basis that covers unauthorized access, maintaining cargo integrity, and the recognition of internal conspiracies?
- Do you have a documented Code of Conduct?
- Do you have an employee hotline to enable anonymous reporting of wrongdoing?
Company Name:
- Are employees encouraged and rewarded to report anomalies and wrongdoing & participate in security controls?
- Do key personnel receive training in document fraud and computer security?
- Is there a process for handling terminated employees or contractors and preventing subsequent access to the premises?
- Do you have additional human resource security procedures in place? Please describe.
- Shipping and Receiving Procedures (Manifest Procedures)
- Are procedures in place to ensure that manifests are complete, legible, accurate and submitted in a timely manner to Customs?
- Are manifest and purchase order reconciliation procedures available, evident and adequate at shipping and receiving locations?
- Does the company participate in the Automated Manifest System?
- Are first and second parties or logistics provider’s information properly received, accurate and shipper and consignee details available, accurate and legible?
- Conveyance Security
- Are there written security procedures covering receipt, loading and unloading of containers/trailers to prevent cargo loss or the introduction of unauthorized or unmanifested material?
- Is conveyance integrity maintained to prevent the introduction of unauthorized personnel or material into an aircraft/vessel/ container/trailer/rail car including physical searches and the securing of all readily accessible internal and external areas?
- Do these procedures ensure the timely reporting to law enforcement in case of an incident, signs of tampering or suspected illegal activities?
Company Name:
- Are procedures in place to ensure unauthorized and unidentified persons are challenged and prevented access to the premises, yards and conveyances?
- Are all trailers/containers/rail sealed and or locked to prevent the introduction of unauthorized personnel or unmanifested materials?
- Are all conveyances inspected upon arrival or at transfer points for signs of tampering?
- Is the loading/unloading of conveyances supervised, if so by whom?
- Are incoming/outgoing vehicles, drivers and trailers verified and logged?
- Are the yards, airfields and trailer/container storage yards monitored by CCTV and recorded?
- Are adequate records kept of incoming/outgoing goods?
- Are domestic, international, high-value and dangerous goods segregated and access restricted “as needed” by a cage, safe or fencing and properly marked with adequate control and access prevention?
- Are all trailers/containers, etc. of solid walled construction and in good condition?
- Are trailers/containers/railcars properly sealed so tampering would be evident and/or locked prior to departure?
- Are seal numbers recorded on the shipping instructions and records kept of seal numbers, and verified at arrival point?
- Are seals kept under lock and key to prevent unauthorized access and misuse?
- Is there secure storage of empty and full containers to prevent theft or the introduction of unmanifested or unauthorized materials?
Company Name:
- Are international, domestic, high-value and dangerous goods properly segregated by fence, safe or cage with access restricted to need and properly marked?
- Do in-transit procedures provide for effective contingency plans that address unscheduled stops, communications protocols and incident reporting to Customs and local law enforcement?
- Are there procedures that exist for control of in-transit cargo and seal integrity, or reporting new seal applications following removal of existing seals by authorized inspectors at borders/ports?
- Are random, unannounced security assessments and inspections of company controlled material within the company’s supply chain conducted, recommended or welcomed?
- Is there a system evident to monitor and track the timely movement of all cargo conveyances?
- Do conveyances or operators utilize written contingency plans for reporting unscheduled events in transit and are routes, schedules and planned stops negotiated in advance and approved by clients?
- Does proof of loading/unloading operation audits occur and how long are the audit records retained?
- Do proof of shipping and receiving records provide adequate details regarding time, date, driver, shipping/receiving personnel, shipment details and quantities?
- Do conveyance operators have adequate training in robbery response detailing safe and secure actions to be taken in the event the operator is threatened?
- Are escorts, covert or overt, provided with high-risk shipments and does this include real time communications to base and local law enforcement? Is written procedural documentation evident?
- Does the conveyance operator have a methodology to distinguish or segregate secure and non-secure materials in transit? Describe.
Company Name:
- Is vehicle/conveyance tracking, tracing and intrusion detection available in real time? Describe system attributes.
- Broker/Forwarder/Consolidator/Ocean Intermediary/NVOCC Security Requirements should answer these questions as well as those in Section A (Security Management System), Section C (Human Resource), Section D (Shipping/Receiving) and any questions in Section B (Physical Security) or Section E (Conveyance Security) that may apply.
- Do written procedures and practices exist that ensure all information provided by the importer/exporter or freight forwarder and used in the clearing of merchandise/cargo is legible, and protected against exchange, loss or introduction of erroneous information?
- Do procedures exist for maintaining the accuracy of information received, including the shipper, consignee name and address, first and second notify parties, description, weight, quantity and unit of measure (i.e. boxes, cartons, etc.) of the cargo being cleared?
- Do procedures exist for recording, reporting and investigating shortages and overages of merchandise/cargo?
- Do procedures exist for tracking the movement of incoming and outgoing goods?
- Do you participate in Automated Manifest System (AMS)?
- Do procedures exist to safeguard and prevent unauthorized access to the computer systems and information?
Company Name:
- Other Security Measures
W. R. Zanes & Co. of La., Inc. Page 1 of 10