Presentation on theme: "My Powerpoint Presentation"— Presentation transcript:
1 My Powerpoint Presentation Changing role of Customs in the International supply chainMy Powerpoint PresentationWil van HeeswijkUnit B2 Risk management and Security
2 INDEX Changing role of Customs Update on EU Regulations Role of TechnologyConclusion
3 Role of Customs – Objectives Traditionally responsible for collection of duties and taxesBroadened to:Emphasis on protection of societySecurity of the supply chainTrade facilitationANYTHING TO DECLARE ?NO WMD ?333
4 Roles and Responsibilities Security is Central policy priority for customs in the European UnionCustoms are the primary national authorities that ensure the control of all goods entering and leaving the EU customs territoryDG TAXUD is competent for all customs areas that are exclusive EU competence ( former 1st pillar)Customs is now a service provider with a global mission to protect society and its citizens while on the other hand facilitating legitimate trade to faster and more streamlined control of merchandise
5 Role of Customs - Means Multi layered Risk management approach Information sharing (C2C & B2C)Partnership Trade – Customs (e.g AEO C-TPAT)Enhanced use of modern technologiesInternational cooperation555
6 Update on The EU Legislation Amendments to the Community Customs Code Regulation 648/2005 and ist implementing provisions Regulation 1875/2006)4 main elements :1. requiring trade to provide customs authorities with information on goods prior to arrival and exit from the European Union (Full implementation as of 01 January 2011) .2. uniform Community risk-selection criteria for Security and Safety Risk Analysis based controls, adopted in April 20093. Recognition of the AEO concept, providing reliable traders with trade facilitation measures (implemented 1 January 2008)4. Community Customs Risk Management Framework (CRMF)6
7 EU CRMF - Multilayered risk management approach Advance electronic data received from the business communityContinuous electronic based risk assessment of supply chain data at all points of entry based on the common risk criteria (security risk rules)Supported by application of appropriate tools, information channels and technology/control equipmentDeployment of resources to areas of highest risksAssessing and evaluating the effectiveness at EU levelObjective: to target, identify and mitigate risks posing threats to security and safety of the EU prior to arrival of goods and to facilitate legitimate trade by avoiding unnecessary controls at external border
8 CRMF - Multilayered risk management approach AEO context – securing the supply chain:Risk management is as much to target high risks as to avoid unnecessary controls of the legitimate tradea major component of the assessment and management of risk – reduced riskObjective: Mutual recognition with trading partners to maximise benefits to legitimate businesses and the security of the international supply chain
9 EC AEO - statistics Applications and certificates: 2008 the first year of implementation:Applications 1850;Certificates ;Total (as of ):ApplicationsCertificatesApplications received and certificates issued inAll 27 Member States.
10 CRMF – Customs risk management system (CRMS) CRMS provides for secure electronic environment:Communication network linking all major points of entry (airports, seaports, land frontier) and all 27 national risk analysis centresCommunication between the Commission and Member States and among the Member StatesExchange of risk related informationImplementation of the Priority Control Areas
11 Use of modern Technology - Policy and Approach 111111
12 The role of technologyTechnologies are essential tools for border and supply chain security - from a customs point of view, the following areas are of particular interest:Techniques for advanced and high speed data analysisTechniques for ensuring container integrity (e.g. E-seals, Container Security Device (CSD) and smart containers)Techniques for supervision and monitoring maritime and air container transport (tracking/tracing)Detection and radiation equipment121212
13 EU CONCERNS TOWARDS 100 % SCANNING AT EXPORT 100% scanning does not guarantee 100% securityDoes not address biological and chemicals threatsDoes not eliminate the possibility of tampering with cargo after the scan was performed.Focused on one transport mode onlyCreates additional burden for tradeNo adequate technology is availableRisk of diverting scarce resources131313
14 Use of modern Technology - Policy and Approach Supply chain Security is central policy priority for EU customsModern technology is one of the cornerstones to enable Customs to adopt modern risk management working methodsEU advocates comprehensive and effective multi layered risk management approach using a range of methods and technologies to focus on the risk associated with specific consignmentsResults in increased freight screening, reduction of physical inspections and a better deployment of sources to risk14
15 Use of modern Technology - Policy and Approach Customs administrations are encouraged to take advantage of emerging technologies to enhance security in the supply chain.NII and radiation detection equipment is necessary to inspect high-risk containers quickly without disrupting the flow of legitimate tradeCustoms community should monitor R&D of technologies and innovations and monitor the benefits customs can extract from its usage15
16 Use of modern Technology - Policy and Approach EU detection technology expert group created under Customs programme.Provide a platform for information sharing between customs technology expertsExplore and define the needs for new and improved tools or equipmentWork started in January 2011
17 Main drivers EU Policy on Supply chain Security Pre arrival and pre departure informationUniform Community risk-selection criteria for Security and Safety risk analysis based controlsAuthorized Economic OperatorEnhanced use of technologyThe EU and its 27 Member States are committed to implement the global standard set by the WCO SAFE Framework and its end-to-end supply chain security concept.
Your consent to our cookies if you continue to use this website.