Presentation on theme: "TRANSPORTATION WORKERS IDENTIFICATION CREDENTIAL"— Presentation transcript:
1TRANSPORTATION WORKERS IDENTIFICATION CREDENTIAL (Insert Company Logo)TRANSPORTATION WORKERS IDENTIFICATION CREDENTIAL(TWIC)Welcome to the Transportation Workers Identification Credential training program, better known as TWIC.I’m sure you’ve heard allot about TWIC in the last several months. The purpose of this session is to review the requirements of the TWIC regulation and comply.Please feel free to ask any questions as we go through the topics, my goal is to ensure that you understand the requirements and how they affect you as a terminal employee.
2TALKING POINTS HOW TWIC APPLIES TO THE FACILITY REQUIREMENT TO NOTIFY EMPLOYEESSECURE AND RESTRICTED AREASESCORTING REQUIREMENTSINTEGRATION OF TWIC INTO EXISTING ACCESS CONTROL SYSTEMNEW HIRE PROCEDURESACCESS TO INDIVIDUALS WITH LOST, STOLEN OR DAMAGED TWICSRECOGNITION OF A VALID TWICRESOLUTION OF VIOLATIONSThese are the various topics we will be discussing in this presentation:There are approximately (60) slides and the presentation will take about ___ minutes.
3HOW TWIC APPLIES TO THE FACILITY MARITIME TRANSPORTATION SECURITY ACT OF 2002 (MTSA)MTSA ESTABLISHED CERTAIN REQUIREMENTS ON MARINE FACILITIESREGULATORY OVERSIGHT FOR THESE REQUIREMENTS ARE THROUGH:TRANSPORTATION SECURITY ADMINISTRATION (TSA)UNITED STATES COAST GUARD (USCG)As background, following the September 11, 2001 terrorist attacks in New York, Washington and Pennsylvania, Congress enacted the Maritime Transportation Security Act of 2002 – otherwise known as MTSA.The purpose of MTSA was to increase security at our nation’s port facilities and the vessels that visit our facilities.The type of facilities we are talking about are, container terminals, oil/gasoline terminals, chemical plants and even off shore oil platforms.The vessels we are talking about are barges and US Flagged ships.MTSA has mandated new security requirements for our facilities to be administered by both the Transportation Safety Administration (TSA) and the Coast Guard..Let’s talk a bit about these requirements.
4HOW TWIC APPLIES TO THE FACILITY FACILITY REQUIREMENTSDEVELOPMENT OF A FACILITY SECURITY PLAN (FSP)CONTROL ACCESS TO THE FACILITYESTABLISH RESTRICTED AREAS WITHIN THE FACILITYCONDUCT VEHICLE INSPECTIONS PRIOR TO ENTRYThese are just a few of the requirements established by MTSA:Facility Security Plans – Each marine terminal covered by MTSA is required to have a Facility Security Plan (FSP). These Plans have been developed to meet the requirements of MTSA and have been submitted to the USCG for review and approval. As a result, we must operate our MTSA regulated terminals in compliance with our FSPs.Control Access to the Facility – Gone are the days when the gates to the docks and tankfields were left open. As a result of MTSA, hundreds of thousands of dollars have been spent on upgrading fencing, installing new fence and gates. Each year we spend thousands of dollars to make sure that security is maintained.MTSA required the designation of Restricted Areas within the terminal. Are we all familiar with restricted areas? Typically, these areas are the docks, tankfields and dispatch office.MTSA requires that we perform vehicle inspections prior to entry into the terminal’s restricted areas. Are we familiar with this requirement? Marsec Level 1: one inspection in 20 entries, Marsec Level 2: 5 inspections in 20 entries, and Marsec Level 3: all vehicles are inspected.This is not an all-inclusive list of requirements, but just a few.
5HOW TWIC APPLIES TO THE FACILITY TRANSPORTATION SECURITY ADMINISTRATION REQUIREMENTSTRANSPORTATION WORKERS IDENTIFICATION CREDENTIAL (TWIC) PROGRAMPURPOSE: TO BETTER CONTROL ACCESS MARITIME FACILITIESREQUIREMENT: ANY INDIVIDUAL PERMITTED UNESCORTED ACCESS TO A FACILITY’S SECURE OR RESTRICTED AREAS MUST POSSESS A TWICLet’s talk about MTSA’s requirement imposed through the Transportation Security Administration (TSA) for what is called the “TWIC” Program.Remember, the purpose of the TWIC program is to better control access at our facilities, therefore making each facility more secure.TWIC imposes the requirement that ANY individual permitted unescorted access to a facility’s secure or restricted area MUST posses a valid TWIC. In order to possess a TWIC, the individual must pass a series of government background checks. This applies to everyone: company employees, company executives, terminal visitors, contractors, vendors and drivers.Are there any questions as to who is required to have a TWIC or whether you will be required to have a TWIC?
6HOW TWIC APPLIES TO THE FACILITY TWIC REQUIREMENTSCOLLECTION OF PERSONAL AND BIOMETRIC INFORMATIONBACKGROUND CHECKSISSUANCE OF A TAMPER-RESISTANT BIOMETRIC CARDThis is how the TWIC program is supposed to work:TSA will collect certain personal and biometric information from each applicant.They will then conduct a number of background checksThey will then issue a tamper-resistant biometric card.What tamper-resistant means is that there are a number of security features that cannot be easily forged or duplicated embedded on the card.Biometric means that the card will hold some sort of physical feature that will positively identify you. In this case the physical feature that identifies you is your fingerprint template.
7HOW TWIC APPLIES TO THE FACILITY COLLECTION OF PERSONAL AND BIOMETRIC INFORMATIONCOLLECTED THROUGH THE PRE-ENROLLMENT AND ENROLLMENT PROCESSTYPE OF INFORMATION:NAME, ADDRESS, DATE OF BIRTH, BIRTH LOCATION, WEIGHT & HEIGHTEMPLOYER INFORMATIONFINGERPRINTS, PHOTOGRAPHPersonal and Biometric data from the applicant is collected through two methods, the pre-enrollment process and the enrollment process.We’ll speak in greater detail about each of these methods, but basically the type of information that is collected through the pre-enrollment process is biographical in nature, name, address, date of birth, where were you born, and you will also be asked who your employer is among other things.During the enrollment process when you visit the enrollment center you will have to provide your fingerprints and sit for a photograph.
8HOW TWIC APPLIES TO THE FACILITY BACKGROUND CHECKSCRIMINAL HISTORYTIES TO TERRORISMLEGAL IMMIGRATION STATUSOnce the information is collected during the pre-enrollment and enrollment processes, TSA will complete some background checks.The checks they’ll perform are criminal history, ties to terrorism, and legal immigration status.Once the three background checks are completed, they’ll be in a position to issue a TWIC card.
9HOW TWIC APPLIES TO THE FACILITY ISSUANCE OF A TAMPER-RESISTANT BIOMETRIC CARDNAMEPHOTOGRAPHEXPIRATION DATEBAR CODESMART CHIPMAGNETIC STRIPESECURITY FEATURESThe card that they will issue will have the following features:Your name, your photograph, the card’s expiration date, a bar code, a smart chip , magnetic stripe and lastly it will have certain security features that cannot be easily duplicated.
10HOW TWIC APPLIES TO THE FACILITY Transportation WorkerIdentification CredentialTSA issued biometric ID cardThis is a prototype version of the card:The card that you will actually get may not look exactly like this, but it will have the same features I just mentioned:Your picture, name, expiration date, and computer “smart” chip that contains your fingerprints and other information.
11HOW TWIC APPLIES TO THE FACILITY These are some of the security features that are embedded into the card:You’ll have a background of fine lines, and twinkling stars and the words TWIC throughout the face of the card.We’ll talk a lot more about the actual security features of the card as we go along.
12HOW TWIC APPLIES TO THE FACILITY The back of the card has a magnetic stripe and bar code, along with a return address in case the card is lost.
13HOW TWIC APPLIES TO THE FACILITY ENROLLMENT PROCESSSIX STEPSPRE-ENROLLMENT (OPTIONAL)ENROLLMENTFEE COLLECTIONSECURITY THREAT ASSESSMENTNOTIFICATION OF RESULTSISSUANCE OF TWICLet’s talk about the enrollment process:Enrolling for the TWIC card is a six step process:Pre-Enrollment – Although it is optional, you are strongly urged to pre-enroll as this will be a time saver when you actually visit the enrollment center.(2) Enrollment at the Enrollment Center – You will be required to physically go to an enrollment center and apply for the TWIC.(3) You will pay a fee for the TWIC(4) Once enrolled, TSA will conduct a Security Threat Assessment to determine if you qualify for it(5) You will be notified of the results and if you qualify;(6) The TWIC will be issued
14HOW TWIC APPLIES TO THE FACILITY PRE-ENROLLMENTTSA WEBSITE OR TELEPHONEOR DHS-TWICPROVIDE MUCH OF THE REQUIRED BIOGRAPHIC INFORMATIONSELECT AN ENROLLMENT CENTERSCHEDULE AN APPOINTMENT FOR ENROLLMENTLet’s talk about each step in greater detail:(1) Pre-Enrollment – As I said before, pre-enrollment is not a requirement, but you are strongly urges to do it, by doing so, you will save time at the enrollment center.Pre-Enrollment can be done on line at the TSA website or over the telephone. The link to the website is You can pre-enroll from home or using one of the terminal’s computers. We have access to the site and also there are step by step directions.By pre-enrolling you will provide much of the required biographical information thereby saving yourself a few minutes of time at the enrollment center. More importantly, by pre-enrolling you can choose your enrollment center and schedule an appointment.When complete, you will want to print your pre-enrollment receipt with the barcode as it may be helpful when you get to the enrollment center.The pre-enrollment process was designed to save you time at the enrollment center and streamline the process.
15HOW TWIC APPLIES TO THE FACILITY ENROLLMENTVISIT THE ENROLLMENT CENTERPROVIDE ALL REQUIRED INFORMATIONPROOF OF IDENTITYFINGERPRINTSDIGITAL PHOTOGRAPHSIGN DISCLOSURE FORM AND CERTIFICATIONS STATEMENTPAY THE FEE - $ OR $105.25(2) Enrollment actually takes place at the enrollment center where you will provide the rest of the enrollment information.Be sure that you have the proper identification documents when you show up at the center. A list of necessary documents is in the dispatch office, but if you have a valid passport, that is all you will need for identification. If you don’t have a valid passport, then please check the list so that you are prepared.Also, remember to bring your pre-enrollment receipt.At the enrollment center you will provide a full set of fingerprints. Your fingerprint template will then be stored on the card.You will sit for a photograph, sign the Disclosure and Certifications Statement and pay the fee.(3) The fee is $ for an applicant who needs to have a complete background check and $ for any CDL holder that has already had a background check done.
16HOW TWIC APPLIES TO THE FACILITY ACCEPTABLE FORMS OF IDENTIFICATION ARE LISTED ON THE TSA WEBSITE –ONE DOCUMENT FROM “LIST A” ORTWO DOCUMENTS FROM “LIST B”I want to stress the importance of having the proper identification when going to the enrollment center because if anything can derail this process, this will.You may look in the dispatch office or the TSA website for both List A and List B. The rule is that you need one item from List “A” OR two items from List “B” but one of the items has to be a government issued photo id.
17HOW TWIC APPLIES TO THE FACILITY SECURITY THREAT ASSESSMENTTSA WILL CONDUCT A SECURITY THREAT ASSESSMENT CONSISTING OF:FINGERPRINT-BASED CRIMINAL HISTORY CHECKINTELLIGENCE-RELATED CHECK FOR POTENTIAL TIES TO TERRORISMIMMIGRATION STATUS CHECK(4) Once you’ve completed the enrollment process at the center, TSA will conduct a Security Threat Assessment consisting of:Fingerprint-based criminal history checkIntelligence-related check for potential ties to terrorism, andAn immigration status check
18HOW TWIC APPLIES TO THE FACILITY SECURITY THREAT ASSESSMENTEXPECTED TO BE COMPLETED WITHIN TEN DAYS OR LESSDETERMINATION OF NO SECURITY THREAT:TWIC IS ISSUEDAPPLICANT IS NOTIFIEDAPPLICANT PICKS UP THE TWICThe Security Threat Assessment is expected to be completed within 10 days or lessOnce this is done, hopefully the outcome will be that you do not pose a threat to security, the TWIC will be issued and you will be notified when it is ready to be picked up at which time you return to the enrollment center to pick it up and get it activated.
19HOW TWIC APPLIES TO THE FACILITY SECURITY THREAT ASSESSMENTDETERMINATION OF A THREATAPPLICANT IS NOTIFIED OF THE DENIALTHE BASIS FOR THE DENIALINFORMATION ON THE APPEAL & WAIVER PROCESSESIf by chance the Security Threat Assessment determines that you DO present a threat to security you will be notified by TSA.The notification provided to you will include the basis for the denial and will also include information on the Appeal and Waiver processes.
20HOW TWIC APPLIES TO THE FACILITY SECURITY THREAT ASSESSMENTGENERALLY SPEAKING, IF AN APPLICANT IS DENIED A TWIC, TSA WILL NOT PROVIDE THE REASONS FOR DISQUALIFICATION TO AN EMPLOYER UNLESS TSA FEELS THAT THE APPLICANT PRESENTS AN IMMINENT THREAT AND PROVIDING LIMITED INFORMATION TO AN EMPLOYER WILL MITIGATE THAT THREAT.Generally speaking, if you are denied a TWIC, your employer will not be notified of the denial UNLESS TSA feels that you present such a great threat to security AND providing some limited information to the employer will mitigate that threat.This is intended to safeguard your privacy.
21HOW TWIC APPLIES TO THE FACILITY CARD ISSUANCEAPPLICANT PICKS UP THE TWIC AT THE ENROLLMENT CENTERPRESENT PROPER IDENTIFICATIONFINGERPRINTS ARE VERIFIEDSELECTS A SIX-EIGHT DIGIT NUMBERCARD IS ACTIVATED(6) As I said earlier, when your card is issued you will be notified of when to pick it up. The card will be delivered to the same enrollment center you enrolled at…this means you have to go back a second time, and NO you don’t need to make an appointment.Once again, you need to have the proper identification credentialsOnce there your identification and fingerprints are verifiedYou select a 6 – 8 digit number which will be stored on the card and the card is activated and given to you.A few words about this 6 – 8 digit number. This number should be a number that you readily remember because during USCG inspections USCG personnel will ask you for that number to verify the authenticity of the card. This is just one of the ways in which they will verify the authenticity of the card.
22HOW TWIC APPLIES TO THE FACILITY CARD ISSUANCEENROLLMENT TO CARD ISSUANCE – 30 DAYSCARD IS VALID FOR 5 YEARSDURING THE 5 YEARS – PERPETUAL VETTINGThe entire process is expected to take no more than 30 days from the date of enrollment to date of issue.For most people the card will be valid for five years from the date of the completion of the background checks.For CDL holders that don’t have a new background check done the expiration date will be 5 years from the date of the current background check.During the next 5 years there will be perpetual vetting done by TSA…This means that TSA will periodically check to make sure that you still qualify for the card.
23HOW TWIC APPLIES TO THE FACILITY CARD USAGEREQUIRED TO VISUALLY INSPECT THE CARD PRIOR TO GRANTING ACCESSCARD VERIFICATION MUST INCLUDE:PHOTO VERIFICATIONVALID EXPIRATION DATEVISUAL CHECK OF THE SECURITY FEATURESLet’s talk a bit about how the TWIC will be used.Until actual card readers are installed, the card will simply be used as an identification badge. What this means is that you must inspect the card prior to granting someone unescorted access to the facility.The inspection must include a verification of the holder’s face, that the expiration date is current and you must also do a visual check of the card’s security features.We’ll talk more about the security features later.
24HOW TWIC APPLIES TO THE FACILITY CARD USAGEUSGC PERSONNEL WILL USE HAND-HELD CARD READERS TO:VALIDATE THE AUTHENTICITY OF THE CARDPHOTOGRAPHSIX – EIGHT DIGIT NUMBERFINGERPRINT TEMPLATEVERIFY THAT THE CARD HAS NOT BEEN REVOKEDTEN MINUTE RULEAs I said earlier, the USCG will ask to see the card during facility inspections….They will be using a portable card reader to verify the authenticity of the card.The way in which they will be validating the card’s authenticity is by matching the photo on the card to your face, asking you for the six to eight digit number and they will match your fingerprint template. The will also verify that the card is still a valid card and that it has not been revoked by TSA.There is a 10 minute rule…The rule is that you need not wear the card or display it on your person, when asked for it, you simply need to present the card within a reasonable amount of time….10 minutes.
25HOW TWIC APPLIES TO THE FACILITY CARD USAGE – DRIVERSTWIC CARD TO BE LINKED TO AN EXISTING ACCESS CONTROL SYSTEMFor drivers, the rule allows the TWIC to linked to an existing access control system…Using this method, each driver’s TWIC card will be linked to their driver’s number so that the card verification can be done automatically.We’ve covered a lot in this section, are there any questions?
26REQUIREMENT TO NOTIFY EMPLOYEES OWNERS/OPERATORS NOTIFICATION REQUIREMENTS TO EMPLOYEES:YOUR RESPONSIBILITY TO POSSESS A TWICWHICH PARTS OF THE FACILITY ARE:SECURE AREASRESTRICTED AREASThe regulation requires that owners/operators of terminals notify their employees of TWIC requirements.Owners/operators are required to notify their employees of……their responsibility to obtain a TWIC, which parts of the terminal are sure and restricted areas…We’ll talk more about these areas in a moment.
27REQUIREMENT TO NOTIFY EMPLOYEES OWNERS/OPERATORS NOTIFICATION REQUIREMENTS TO EMPLOYEES:LOCATION OF ENROLLMENT CENTERSWHEN COMPLIANCE WILL BEGINOwners/Operators are also required to let their employees know the location of enrollment centers and when compliance with TWIC will begin.Location of enrollment centers will be posted at the terminalAs far as compliance dates go, the only sure date that is known at this time is September 25, This is a mandated date by which time all port areas within the country need to be in compliance….However earlier dates may be published depending on which area you are in. If earlier dates are published, they will be published a minimum of 90 days prior to compliance.
28REQUIREMENT TO NOTIFY EMPLOYEES OWNERS/OPERATORS ADDITIONAL REQUIRENENTSPROVIDE EMPLOYEES WITH THE REQUIRED TRAINING TO COMPLY WITH 33 CFR 105DEVELOP AND ADMINISTER A PROGRAM THAT ENSURES COMPLIANCE WITH 33 CFR 105 AND SPECIFICALLY COMPLY WITH TWICAdditional requirements imposed on Owners/Operators of facilities include…..
29REQUIREMENT TO NOTIFY EMPLOYEES ACCEPTABLE FORMS OF NOTIFICATION INCLUDESIGNS POSTED IN COMMON AREASCOMPANY NEWSLETTERANNOUNCEMENTS BY COMPANY OFFICIALSCOMPANY WEBSITESINSERTS IN WAGE AND SALARY STATEMENTSThese are acceptable methods of notification….After today’s training, you can consider yourself “duly notified”.This is also why we had you sign into this session.
30SECURE AND RESTRICTED AREAS SECURE AREAAN AREA OVER WHICH AN OWNER/OPERATOR HAS IMPLEMENTED SECURITY MEASURES FOR ACCESS CONTROLFACILITIES: ALL THE AREA INSIDE THE OUTERMOST PERIMETERLOADING RACK AREAS ARE CONSIDERED TO BE SECURE AREASMoving on, let’s talk about Secure and Restricted AreasThe regulation defines Secure Area as….The regulation further goes on to say that for facilities the entire area inside the outermost perimeter is considered to be a secure area.The loading racks are specifically cited in guidance documents as being Secure Areas
31SECURE AND RESTRICTED AREAS A LOCATION OR LOCATIONS IDENTIFIED BY THE OPERATOR THAT REQUIRE LIMITED ACCESS AND A HIGHER DEGREE OF SECURITYRESTRICTED AREAS ARE PART OF THE SECURE AREADOCK, TANKFIELDS AND DISPATCH OFFICE ARE CONSIDERED TO BE RESTRICTED AREASRestricted Area is defined as…. “ “These are part of the Secure AreaPicture if you will….An entire pie is considered to be the Secure Area while individual pieces of the pie can be considered Restricted Areas…In our case, docks, tankfields and dispatch offices are Restricted Areas
32SECURE AND RESTRICTED AREAS FOR ALL PRACTICAL PURPOSES THERE IS NO DIFFERRENCE BETWEEN SECURE AREAS AND RESTRICTED AREAS OTHER THAN MONITORING AND ESCORTING REQUIREMENTSFor all practical purposes, there is NO DIFFERENCE between Secure Areas and Restricted Areas other than monitoring requirements…Regardless of whether an are is considered Secure or Restricted, an individual still needs a TWIC in order to gain unescorted access.Let’s talk more about monitoring and escorting.
33ESCORTING REQUIREMENTS ESCORT – ENSURING THAT THE INDIVIDUAL IS CONTINUOUSLY ACCOMPANIED WHILE WITHIN A SECURE AREA IN A MANNER SUFFICIENT TO OBSERVE WHETHER THE ESCORTED INDIVIDUAL IS ENGAGED IN ACTIVITIES OTHER THAN THOSE FOR WHICH THE ESCORT WAS GRANTED.SIDE-BY-SIDE OR REMOTE MONITORINGEscorting is defined by the regulation as….. “ “There are two methods in which escorting can be accomplished:Side-by-Side Monitoring – meaning a TWIC holder is assigned as an escort ORRemote Monitoring – typically done by video surveillanceThese requirements differ for Secure & Restricted Areas
34ESCORTING REQUIREMENTS ESCORT – SECURE AREASREMOTE MONITORINGMUST BE OF SUFFICIENT OBSERVATION OF THE INDIVIDUAL WITH A MEANS TO RESPOND IF THEY ARE OBSERVED TO BE ENGAGED IN UNAUTHORIZED ACTIVITIES OR IN AN UNAUTHORIZED AREASIDE-BY-SIDE ACCOMPANIMENTONE TWIC TO TEN NON-TWICSFor Secure Areas Escorting may be accomplished by one of two ways:Remote Monitoring – Again, done by video surveillance – However, remote monitoring must be of sufficient observation of the individual…..The second method of accomplishing escorting in Secure Areas is through Side-by-Side accompaniment – When you do it using this method, one TWIC holder is permitted to escort up to ten non-TWIC holders, No more than 10.
35ESCORTING REQUIREMENTS ESCORT – RESTRICTED AREASSIDE-BY-SIDE ACCOMPANIMENTONE TWIC TO FIVE NON-TWICSIn Restricted Areas, Escorting can only be accomplished through Side-by-Side Accompaniment.In this case One TWIC holder is permitted to escort up to five non-TWIC holders.Are there any questions on Escorting???
36INTEGRATION OF TWIC INTO EXISTING ACCESS CONTROL SYSTEM NVIC ALLOWS FACILITY OWNERS/OPERATORS TO LINK A TWIC HOLDER’S TWIC CARD TO AN EXISTING ACCESS CONTROL SYSTEMNext, we’ll talk about Integrating TWIC into our existing Access Control SystemSpecific guidance issued in NVIC allows the facility to link a TWIC holder’s TWIC card to an existing access control system…In our case this will allow our card reader at the main gate to make the TWIC verification thus alleviating the need to conduct a physical check of the TWIC.Let’s talk about how this will work….
37INTEGRATION OF TWIC INTO EXISTING ACCESS CONTROL SYSTEM EACH FACILITY MAY HAVE ITS OWN UNIQUE ACCESS CONTROL SYSTEM. THESE SLIDES SHOULD BE CUSTOMIZED AS APPLICABLE ON A SITE-BY-SITE BASIS.
38INTEGRATION OF TWIC INTO EXISTING ACCESS CONTROL SYSTEM
39INTEGRATION OF TWIC INTO EXISTING ACCESS CONTROL SYSTEM
40NEW HIRES PROVISIONSNEW HIRES MAY BE GRANTED “ACCOMPANIED ACCESS” TO SECURE AREAS FOR A PERIOD OF THIRTY (30) CONSECUTIVE CALENDAR DAYS PROVIDED CERTAIN REQUIREMENTS ARE METTHIRTY (30) DAYS MAY BE EXTENDED AN ADDITIONAL THIRTY (30) DAYS BY THE APPROVAL OF THE COTPLet’s talk about new hires and what the requirements are for them…The regulation allows new hires “accompanied access” to secure areas for a period of 30 consecutive calendar days provided certain conditions are met…we’ll talk about those conditions in a moment.The initial thirty days may be extended an additional thirty by the approval of the COTP.
41NEW HIRES PROVISIONS ACCOMPANIED ACCESS WORK UNIT IN WHICH THE NEW EMPLOYEE IS ASSIGNED TO IS TWENTY-FIVE (25) EMPLOYEES OR LESSNEW HIRES CANNOT MAKE UP MORE THAN 25% OF THE WORK UNITThere is no pure definition of “Accompanied Access” however the regulation states that “Accompanied Access” is achieved when….These two conditions ensure that we don’t have too many employees within the terminal without TWIC cards.
42NEW HIRES PROVISIONS NEW HIRE REQUIREMENTS EMPLOYEE HAS APPLIED FOR THE TWICHE/SHE IS NOT ENGAGED IN A WAIVER OR APPEAL PROCESSHE/SHE MUST SIGN A STATEMENT TO THAT EFFECTFSO HAS ENTERED THE NEW HIRE’S PERSONAL INFORMATION IN THE USCG’s HOMEPORT WEBSITEThese are the conditions that must be complied with in order for a new hire to obtain “Accompanied Access”….
43NEW HIRES PROVISIONS NEW HIRE REQUIREMENTS HE/SHE HAS PASSED A NAME-BASED BACKGROUND CHECKHE/SHE HAS ALTERNATIVE FORMS OF IDENTIFICATIONNO OTHER CIRCUMSTANCES THAT WOULD CAUSE REASONABLE SUSPICION REGARDING THE INDIVIDUAL’S ABILITY TO OBTAIN A TWICFSO MUST BE ABLE TO ARTICULATE AN ADVERSE IMPACT TO THE FACILTY OPERATION IF THE INDIVIDUAL IS DENIED ACCOMPANIED ACCESS
44NEW HIRES PROVISIONS NEW HIRE REQUIREMENTS WHEN WORKING IN RESTRICTED AREAS, THE NEW HIRE MUST BE ESCORTED AND MONITORED SIDE-BY-SIDENew Hires are not permitted to be left alone in a Restricted Area…When in a restricted area, the new individual must be escorted.
45NEW HIRES PROVISIONS NEW HIRE REQUIREMENTS FOR OUR PURPOSES ALL NEW HIRES SHALL BE ESCORTED BY A TWIC HOLDER AT ALL TIMES REGARDLESS OF CIRCUMSTANCES AND AREA OF THE TERMINALONLY EXCEPTION TO THIS RULE IS NEW DRIVERSNEW DRIVERS NEED NOT BE ESCORTED WHEN IN THE LOADING RACK AREA ONLYRegardless of what the regulation has to say about new hires, Management has decided that all new hires shall be escorted by a TWIC holder at all times…The only exception to this rule is if the new hire is a driver…A new driver need not be escorted when in the loading rack area…however, if that driver has to access a restricted area, he then needs to be escorted.
46LOST, STOLEN, DAMAGED TWICs LOST, STOLEN, DAMAGED TWICs REQUIREMENTSEMPLOYEE MUST REPORT THE LSD TWIC TO THE FSO AND DHS IMMEDIATELY UPON DISCOVERYDHS WILL INVALIDATE THE CARD AND PLACE IT ON THE “HOT LIST”DHS WILL ORDER THE PRODUCTION OF A REPLACEMENT TWICREPLACEMENT TWIC WILL BE SENT TO THE ENROLLMENT CENTER DESIGNATED BY THE EMPLOYEELet’s talk about Lost, Stolen or Damaged TWICsThese are the requirements..The loss of the TWIC must be reported immediately to DHS and the FSOThe HOT LIST is simply a list of revoked or invalidated cards, this list will be made available to the FSOOnce reported, a replacement TWIC will be produced and be shipped to the enrollment center designated by the employee.
47LOST, STOLEN, DAMAGED TWICs LOST, STOLEN, DAMAGED TWICs REQUIREMENTSEMPLOYEE IS NOTIFIED OF THE ARRIVAL OF THE REPLACEMENT TWICEMPLOYEE GOES TO THE ENROLLMENT CENTERPAYS FOR THE REPLACEMENT TWICPROVIDES REQUIRED IDENTIFICATION DOCUMENTSREPLACEMENT TWIC IS ACTIVATED AND ISSUED TO THE EMPLOYEEWhen ready, the employee is notified and he goes to the enrollment center to pick it up.At the enrollment center, he pays for the replacement card, provides the necessary identification credentials, the card is activated and issued to the employee
48LOST, STOLEN, DAMAGED TWICs LOST, STOLEN, DAMAGED TWICs REQUIREMENTSINDIVIDUAL MAY BE GRANTED ACCESS TO SECURE AND RESTRICTED AREAS OF THE FACILITY FOR A PERIOD OF SEVEN (7) CONSECUTIVE CALENDAR DAYS PROVIDED:OWNER/OPERATOR VERIFIES THAT THE EMPLOYEE HAD A VALID TWICEMPLOYEE CAN PRESENT AN ALTERNATIVE FORM OF IDENTIFICATIONTHE EMPLOYEE HAS REPORTED IT LOST, STOLEN OR DAMAGED TO DHS AND FSOTHERE ARE NO SUSPICIOUS CIRCUMSTANCES ASSOCIATED WITH THE EMPLOYEE’S CLAIM OF LOSS, THEFT OR DAMAGEThe individual may be granted access to secure and restricted areas of the facility for a period of seven consecutive calendar days provided the following conditions are met….
49RECOGNITION OF A VALID TWIC GENERAL DESCRIPTION – FRONTEMPLOYEE’S PICTUREEMPLOYEE’S NAME“TWIC”EXPIRATION DATESMART CHIP“TRANSPORTATION WORKER IDENTIFICATION CREDENTIAL”SECURITY FEATURESLet’s talk about how we will recognize a valid TWIC and the various security features that are embedded into the card.This is An image of an actual card issued at the Port of Wilmington, DE.The front of the card has the following information…..
50RECOGNITION OF A VALID TWIC GENERAL DESCRIPTION – BACKMAGNETIC STRIPEAUTHORIZATION STATEMENTRETURN ADDRESSBAR CODECONTROL NUMBERS (8 DIGIT & 4 DIGIT)TWIC vThe back of the card has the following…..
51RECOGNITION OF A VALID TWIC SECURITY FEATURES – FRONTBACKGROUNDFINE LINESRED, WHITE & BLUE BANDSTWICVARYING COLOR INKT & I SHIFT FROM RED TO GOLDW & C – SHIFT FROM GREEN TO PURPLENow let’s talk about the security features..
52RECOGNITION OF A VALID TWIC SECURITY FEATURES – FRONTSTAR PATTERNLOWER LEFT CORNER TO THE UPPER RIGHT CORNERUPPER 3 STARS ARE SOLIDREMAINING STARS ARE OUTLINESTRIANGLE WITH THREE CIRCLESCENTER OF THE CARDTWICPRIVACYCOMMERCESECURITY
53RECOGNITION OF A VALID TWIC SECURITY FEATURES – FRONTEIGHT POINT CRESTLOWER RIGHT CORNERTWIC ON FOUR OF THE EIGHT CORNERSMOVING CIRCLE IN THE CENTER OF THE CRESTTWO ELIPTICAL FIGURES IN THE CENTER
54RESOLUTION OF VIOLATIONS INVALID/FRAUDULENT TWICS – THE FOLLOWING ACTIONS SHOULD BE TAKEN:ASK THE INDIVIDUAL FOR ALTERNATIVE FORMS OF IDENTIFICATIONCAREFULLY INSPECT ALTERNATIVE FORMS OF IDENTIFICATIONCOLLECT THE INDIVIDUAL’S INFORMATION:NAMEADDRESSVEHICLE DESCRIPTION & LICENSE PLATE NUMBERDESCRIPTION OF THE INDIVIDUALLet’s now talk about what we need to do if we suspect someone is trying to get access to the facility using a fraudulent TWICIf you suspect that someone is using a fraudulent TWIC, ask the individual for alternative forms of identification and carefully inspect those forms of identification, chances are they too may be fraudulent.Collect the individual’s information…..
55RESOLUTION OF VIOLATIONS INVALID/FRAUDULENT TWICS – THE FOLLOWING ACTIONS SHOULD BE TAKEN:MAKE A PHOTOCOPY OF THE TWIC IF POSSIBLEDENY THE INDIVIDUAL ENTRYCALL USCG DUTY OFFICER AND REPORT THE INCIDENTFOLLOW ALL INSTRUCTIONS GIVEN BY THE DUTY OFFICERMake a photocopy of the TWIC if possible and absolutely deny the individual entry into the terminal.Advise the USCG Duty Officer of the attempted entry and follow all instructions given to you by the duty officer
56RESOLUTION OF VIOLATIONS INVALID/FRAUDULENT TWICS – THE FOLLOWING ACTIONS SHOULD BE TAKEN:IF DIRECTED BY THE DUTY OFFICER, ASK THE INDIVIDUAL TO REMAIN UNTIL A USCG REPRESENTATIVE ARRIVESYOU ARE NOT REQUIRED TO RESTRAIN THE INDIVIDUAL OR INFORM HIM/HER THAT HE/SHE CANNOT LEAVEDO NOT CONFISCATE THE TWIC AS THIS MAY BE CONTRARY TO YOUR STATE’S LAWIf directed by the duty officer, ask the individual to remain until the USCG representative arrives to investigate the incidentYou are not required to restrain the individualDo not confiscate the TWIC
57RESOLUTION OF VIOLATIONS POSSIBLE USCG ACTIONSUSCG MAY RESPOND TO INVESTIGATEATTEMPT TO MATCH THE BIOMETRIC TEMPLATE STORED ON THE TWIC TO THE INDIVIDUALIF THIS CANNOT BE DONE THE USCG MAY CONFISCATE THE TWIC AND YOU WILL BE ADVISED OF ANY ADDITIONAL ACTIONS TO TAKEIF THE USCG WILL NOT DISPATCH AN INDIVIDUAL TO INVESTIGATE YOU WILL BE SO ADVISEDUSCG may respond to your report, in doing so, they will attempt to match…..If the USCG will not respond they will advise you.
58RESOLUTION OF VIOLATIONS SUSPICIOUS ACTIVITIES RELATIVE TO TWIC MUST BE REPORTED TO THE NATIONAL RESPONSE CENTERSUSPICIOUS ACTIVITIES RELATED TO TWIC INCLUDE:MULTIPLE TWICS SUSPECTED TO BE FRAUDULENT PRESENTED BY DIFFERENT INDIVIDUALS FOR ACCESS IN A SHORT PERIOD OF TIME (FIVE TO SEVEN DAYS)AN INDIVIDUAL ATTEMPTING TO GAIN ACCESS MULTIPLE TIMES WITH THE SAME TWIC WHICH IS SUSPECTED TO BE FRAUDULENTMANY DIFFERENT APPEARANCES OF TWICS WHICH ARE SUSPECTED TO BE FRAUDULENTSuspicious activities MUST be reported to the National Response Center.Suspicious activities related to TWIC include….