Presentation is loading. Please wait.

Presentation is loading. Please wait.

Customs Brokers Break Bulk Facilities Shipper Logistics Provider Government Entities Transport Carriers Final Destination Copyright – 2009 – Sealock Security.

Similar presentations


Presentation on theme: "Customs Brokers Break Bulk Facilities Shipper Logistics Provider Government Entities Transport Carriers Final Destination Copyright – 2009 – Sealock Security."— Presentation transcript:

1 Customs Brokers Break Bulk Facilities Shipper Logistics Provider Government Entities Transport Carriers Final Destination Copyright – 2009 – Sealock Security Systems, Inc. – All Rights Reserved Powered by Sealock Security Systems, Inc. SEALTRAX Click here to Continue

2 Copyright – Developed & Powered by Sealock Security Systems, Inc.

3 Introduction SEALTRAX is a fully comprehensive Web Enabled Software Solution which ties in all aspects of asset management from the vendor/supplier & factory level all the way through to the End Users final destination. User names & passwords are assigned to all authorized business partners involved in the distribution process. Once logged in, these entities can access this proprietary tool which provides complete visibility throughout the transportation and supply chain processes. SEALTRAX incorporates all stakeholders such as: Government Entities (USDHS, USCBP, and TSA), Manufacturers/Suppliers, Logistic Providers (3PLs), Freight Forwarders, Couriers, Ocean Carriers, NVOCCs, FTL & LTL Truckers, Custom Brokers, and Shippers & Consignees. SEALTRAX provides the End User an online capability to review, monitor and educate their business partners on the proper deployment of Container Security Devices (CSDs) throughout the entire supply chain from their origin to final disposition.

4 Provides End Users CSD inventory controls & verification processes Provides End Users the capability to monitor/control the administration & deployment of CSDs to transportation service providers & to origin vendor/shipping locations simultaneously or on an as needed basis Provides authorized users a controlled methodology for reporting & administering CSDs to multiple origin shipping locations as per End User disbursement guidelines Establishes & verifies disbursement details prior to shipping Provides online access and Electronic Data Interchange (EDI) capabilities on a worldwide basis Records, cross references & reports vital shipment details that will support & verify internal company shipping documents such as Air Way Bills (AWBs), Bill of Ladings (B/Ls), and Company Shipping Manifests. Features an Online Learning & Communication Center which facilitates the dissemination of established internal policies and procedures. This will ensure that all business partners are kept informed & educated on a real time basis, ensuring continued compliance with dynamic government mandates such as CTPATs Container Inspection Protocols, 10 plus 2, 24 Hour Manifest Rule, and TSAs Indirect Air Carrier Security (IAC) Guidelines Key Points * Introduction

5 Phase I – Order and Disbursement Approval Process End User determines all Rollout/Disbursement requirements End User details & designates total number of units per destination/country CSD supplier accepts the Purchase Order (P.O.) then proceeds to manufacture, package, segregate, stage, & record all assigned serial numbered units per destination as per disbursement guidelines Program administrator uploads order details into system Rollout notification is now sent to End User for approval Rollout changes, comments, updates are made at this point End Users verify & certify that all Rollout requirements are met, giving the CSD supplier final approval to proceed with disbursement. End User generates & submits a Purchase Order to the CSD supplier which triggers the following sequence of events:

6 Phase 2 – Factory/Supplier Shipping Procedures Inventory is now placed into a Pending Arrival Status Origin Logistic provider logs in to the system to Accept & Confirm receipt of designated/assigned inventory Once the inventory has been accepted, the Designated Logistics Provider can now distribute the assigned inventory to the Origin In-Country Logistics Provider/De-consolidator for distribution. Once the Rollout has been approved by the End User Program Administrator, the CSD Manufacturer will now either coordinate the local pickup with the designated Logistics Provider/Providers or proceed with internal processes to arrange the transportation themselves on behalf of the End User.

7 Phase 3 – Logistics Provider Process Destination In-Country Logistics Provider/De-consolidator logs in to system, records & accepts bulk inventory as received. Origin In-Country Logistics Provider/De-consolidator can now further segregate, sort, assign & deliver units to In-Country Origin Points (Factories/Vendors). Inventory is once again placed into a Pending Arrival Status awaiting further updates by the Destination In-Country Origin (Vendor/Factory). Once an In-Country Logistic Provider/De-consolidator has acknowledged receipt of the bulk shipment at destination country, they can now further segregate, sort, assign & deliver units (by assigned carton number & corresponding numerical sequences) to In-Country Origin Points (Factories/Vendors).

8 Phase 4 – Origin Point Container Shipping Process In-Country Origin Vendor now logs in to the system to acknowledge receipt of their portion of the assigned inventory. In-Country Origin Vendor can now confirm total number of units received by carton numbers and corresponding numerical sequences. Individual CSD serial numbers are assigned to every Bill of Lading (B/L) for outbound shipments which can be cross- referenced with the B/L numbers, Shipment Manifests, Container & Chassis numbers, load sites & cargo master/supervisor information, dates & times. Once the inventory has been accepted, the In-Country Origin Vendor/Factory can now apply the Container Security Device (CSD) to the outbound container/conveyances and update the system to register the CSD to coincide with the shipment documents (B/L, Shipment Manifest, Container number, etc.).

9 Phase 4 – Origin Point Container Shipping Process (Continued) Once information has been uploaded, the Origin Vendor can then memorialize the information into record by clicking the disclaimer button not allowing any further changes to the information nor allowing it to be deleted. Authorized Business Partners can now log in to the system to view shipment details while in- transit and report any additional information, anomalies, or shipment discrepancies if necessary.

10 Phase 5 – Shipment to Destination Government Physical Inspections (USDHS/USCBP/C-TPAT/TSA) Government Mandated Information (Example: 10 plus 2, 24 Hour Manifest Rule, TSA Indirect Air carrier (IAC) Guidelines, and TSA CCSP/CCSF Security Criteria Additionally Utilized CSDs (Bolt Seals, Cable Seals, Plastic Seals, Tamper Indicative Tape, and Labels) Equipment Issues (Equipment Interior & Exterior Conditions, Availability, Types, Sizes, etc….) Departure & Arrival Information Overage, Shortage and Damage (OS&D) Reports Once all of the container information has been entered and it has been shipped, any authorized user can login and add additional information to the shipment records. A few examples of additional information are:

11 Process Flow

12 Learning Center Administration Manage all the learning material at the Learning Center. Uploads documents, spreadsheets, videos and more. Also, manage a complete FAQ section in order to interact with and answer all your users inquiries. Track all activity within the learning center with powerful reporting tools.

13 Learning Center Allow your users to register to view all of your learning material in one comprehensive learning center.

14 Questions and Answers Jeffrey Liroff CEO / President Phone: Fax: Sealock Security Systems NW 36 th Terrace Doral, FL Ray Fernandez Vice President Phone: Fax: Contacts


Download ppt "Customs Brokers Break Bulk Facilities Shipper Logistics Provider Government Entities Transport Carriers Final Destination Copyright – 2009 – Sealock Security."

Similar presentations


Ads by Google