Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Security Training and Threat Awareness Program for All Employees.

Similar presentations

Presentation on theme: "1 Security Training and Threat Awareness Program for All Employees."— Presentation transcript:

1 1 Security Training and Threat Awareness Program for All Employees

2 2 Sealed Air and C-TPAT We have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.

3 3 Impact of Security Breaches on C-TPAT Status Suspension and Removal from C-TPAT Loss of C-TPAT related benefits Possibility of increased examinations Delays That could lead to: Loss of Business Default on contractual obligations Brand name damaged or compromised

4 4 Employee Identification Visitor Controls Suspicious Persons Suspicious Activities Internal Conspiracies Suspicious Objects or Packages Computer Security Document Security Container Security/Seal Integrity Topics

5 5 While on company property – Your company identification badge must be properly displayed and worn at all times. – Your company uniform (if applicable) must be worn at all times. – Properly secure and protect your ID badge, uniform, keys and access control card, etc. Employee Identification Your Responsibilities

6 6 Visitor Controls Visitor Pre-meeting Requirements – Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements – Ensure that your visitor has logged in and has been issued a visitor badge

7 7 Visitor Controls Visitor Escort Requirements – You must escort your visitors at ALL times – Do not leave your visitor unattended Visitor Exit Requirements – Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist

8 8 Visitor Controls – Reception Desk Responsibilities Visitor Entrance Visitor Exit Notify hosting employee Document arrival on Visitor Log Collect visitor badge Document departure on Visitor Log Issue visitor badge Check photo identification

9 9 Suspicious Persons LOOK FOR….. Any person without an employee badge, visitor badge or uniform.

10 10 Suspicious Persons Determine if the person is an employee or a visitor –If an employee, remind them always to display their ID badge and uniform. –If a visitor, escort them to the reception area or to the person with whom they are visiting. –Report the incident to your immediate supervisor. …and ACT

11 11 LOOK FOR…..  Any person in unauthorized/restricted areas Suspicious Persons

12 12 AND ACT…..  Get them out of the area  If a visitor, escort them to the reception area.  Report the incident to your immediate supervisor Suspicious Persons

13 13 Look for ….  Any person:  wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing  waiting or loitering in an area or hallway  asking for an unknown department, person or employee Suspicious Persons Cam 7 1:17:23AM 8/02/06

14 14 LOOK FOR….  Any person:  who seems not to belong in the area  going door to door, office to office  entering a private office unescorted  selling items  who seems lost Suspicious Persons Cam 7 1:17:23AM 8/02/06

15 15 LOOK FOR …..  Any person:  Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights…  running, especially if carrying something  hiding behind doors, fences, desks, … Suspicious Persons Cam 7 1:17:23AM 8/02/06

16 16 AND ACT……… Immediately report the incident to your immediate supervisor Suspicious Persons

17 17 Suspicious Activity LOOK FOR … Objects obstructing access points Disconnected or obstructed cameras Broken locks or access control systems Unexplained clutter or debris Objects thrown from a vehicle, especially while traveling at a high speed.

18 18 Suspicious Activity ACT … Immediately report any suspicious activity to your supervisor.

19 19 Internal Conspiracies Definition - when people work together by agreement to commit an illegal act. A conspiracy may exist when the parties use legal means to accomplish an illegal result, or to use illegal means to achieve something that is unlawful. Company personnel should be on the lookout for suspicious people hanging around the facility – have your staff challenge and report unauthorized individuals to management Identify the threat not only from the point of origin – but to destination Identify areas that may pose a threat to your employees and supply chain security – employees may be targeted in the form of bribes and/or intimidation

20 20 Conspiracy Indicators Conspirators (internal & external) may conduct surveillance and gather information about facilities and operations: May take photographs - (entrances, fencing, warehouse and hours of operation) Focus on weak and/or non-existing security measures - throughout the supply chain line (origin, transit, security and at destination – distribution center) to focus on the opportunity to initiate breach Assess the company’s vulnerabilities – the conspirator can create the opportunity for the breach to occur. Transit routes and stops are of particular interest. Stow plans of the cargo will also allow for quick and easy access to introduce illegal contraband. Collect/gather information on employees - schedules, work habits, off- duty social life, address, etc. Will focus on employees that have previous criminal records and/or weak in moral character. May seek information about security procedures - Will ask questions on how shipment routes are monitored, GPS system utilized, document routing, manifests, changing their work schedules in order to facilitate the breach, etc.

21 21 Conspiracy Indicators, Cont. Target employees with a “need” to make money and those in financial distress - These employees are prime targets for recruitment by the conspirators. The weaker employees may end up working as “lookouts”. May use social engineering tools - to gather information about the company and employees Make unusual inquiries - about the cargo flow and method of shipment Attempt to access unauthorized systems - to manipulate manifests, shipping documents, bill of lading, load plans, etc. Bogus information may be entered and/or altered in shipping documents in order to facilitate the introduction of unmanifested materials “Dry-run” or Test – May ship an un-related item with legitimate cargo – Entering false information in the documents such as a bogus address, name, “fictitious" company, etc. – Attempting to pick-up cargo without appropriate documentation and identification – Unique markings on legitimate cargo boxes/crates

22 22 Conspiracy Indicators, Cont. Probe the company’s security: – May show up to work on day off – Enter restricted and/or unauthorized zones without proper access/identification – Drivers may stray off the authorized route to test GPS geo-fencing – Enter the warehouse with unauthorized personal items (backpacks, large gym bags, etc.) – Activate alarms and check for reaction time Acquire company equipment: – Company uniforms, identification, access cards & codes to enter in sensitive areas – Stolen high-security seals and or disposed cut seals – Collecting company boxes/crates with branded logo to conceal the contraband

23 23 LOOK FOR…. Unexplained objects or packages that look strange or do not belong to the area Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) Strange leaking substance (powder, liquid, etc…) Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.) Suspicious Objects or Packages

24 24 Suspicious Objects or Packages

25 25 AND ACT……… Immediately report any suspicious packages or objects to your supervisor or security Suspicious Objects or Packages

26 26 Suspicious Objects or Packages AND ACT…….

27 27 Do not share access to your computer with strangers Log-off when you leave your computer Passwords should be changed every 60 to 90 days Do not share your password with anyone Do not write down your password. Computer Security

28 28 Computer Security Use hard-to-guess passwords Do not use the same password in more than one place A password should have a mix of letters, numbers and symbols – I Love to be Secure iL2bs@ – Always on time to work !AoT2wx – My Password is Very Secure MyP1VS# – Yo Quiero Taco Bell yqtb!10 Selecting a Password

29 29 Do not use company e-mail for private business activities, amusement or entertainment. Do not send e-mail containing racist, sexist, threatening or other objectionable language. Do not join mailing lists. Do not open unknown or unexpected e-mail attachments. Electronic Mail Restrictions Computer Security

30 30 Document Security ALWAYS shred sensitive documents – anything with prices, customer names, purchase order and financial information, just to name some examples NEVER leave sensitive documents on your desk when you are away - store in a locked drawer or cabinet Don’t forget about information stored on disc – treat these just as you would paper documents Don’t leave sensitive documents at the printer - use the locked print feature, if available

31 31 Container/Trailer Inspection Utilize the 7-Point Inspection for all US Imports from outside the US, excluding Mexico Utilize the 17-Point Inspection for all US Imports from Mexico ONLY Container/Trailer integrity must be maintained to protect against the introduction of unauthorized material and/or persons. Begin and end your inspection at the same point every time. To ensure a systematic and consistent process, a checklist is used for documentation and verification. Checklists are important to establish chain of custody.

32 32 17-Point Truck & Trailer/Container Inspection 1. Bumper 2. Engine 3. Tires (truck & trailer) 4. Floor (inside truck) 5. Fuel Tanks 6. Cab/ Storage Compartments 7. Air Tanks 8. Drive Shafts 9. Fifth Wheel 10. Outside/ Undercarriage 11. Floor (inside) 12. Outside/ Inside Doors 13. Side Walls 14. Ceiling/ Roof 15. Front Wall 16. Refrigeration Unit

33 33 7-Point Container/Trailer Inspection Process 1. Outside/ Undercarriage (before entering facility) 2. Inside/ Outside doors 3. Right side 4. Left Side 5. Front Wall 6. Ceiling/Roof 7. Floor (Inside)

34 34 Importance of Container/Trailer Inspections Step up to get inside…WHY?? To make room for 1,300 lbs. of cocaine!

35 35 Importance of Container/Trailer Inspections Normal block and air vent Short distance between block and vent Wall colors are different!

36 36 Importance of Container Inspections False wall = 1,290 lbs. Marijuana.

37 37 Importance of Container/Trailer Inspections Tires – What to look for: Recently Mounted Tampered Bolts Water Streaks

38 38 Importance of Container/Trailer Inspections Exhaust / Air Deflector:

39 39 Seal Integrity A seal inspection process should be implemented throughout the supply chain. The VVTT Seal Inspection Process is a good example of one: V – View seal & container locking mechanisms. V – Verify seal number for accuracy. T – Tug on seal to make sure it is affixed properly. T – Twist & Turn seal to make sure it does not unscrew.

40 40 Employee Identification Visitor Controls Suspicious Persons Suspicious Activities Internal Conspiracies Suspicious Objects or Packages Computer Security Document Security Container Security/Seal Integrity Let’s review…

41 41 Security is not out of reach if you practice it every day.

42 42 QUESTIONS? Contact: Sheri Wolf For more information, refer to Customs & Border Protection Website: or

Download ppt "1 Security Training and Threat Awareness Program for All Employees."

Similar presentations

Ads by Google