0% found this document useful (0 votes)
191 views13 pages

Security Questionnaire BP Agreement

Security Questionnaire + BP Agreement

Uploaded by

Anand Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
191 views13 pages

Security Questionnaire BP Agreement

Security Questionnaire + BP Agreement

Uploaded by

Anand Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 13

C-TPAT SECURITY QUESTIONNAIRE

COMPANY NAME: Blueweiss Exports Unit II


STREET ADDRESS: SF No 712, EB Nagar, 60 Feet Road, Velliyankadu, Tirupur
CITY: Tirupur STATE: Tamilnadu POSTAL CODE: 641 604
COUNTRY: INDIA OTHER:

NAME OF PERSON COMPLETING FORM: KANNAN P


TITLE: HR MANAGER TELEPHONE: 7358060471
E-MAIL:

IS YOUR COMPANY CURRENTLY C-TPAT CERTIFIED? YES NO


IF YES, INITIATE AN SVI MONITORING REQUEST BY DOING THE FOLLOWING: 1) Log in to your C-TPAT Portal
account, 2) Select the “Status Verification” link, 3) Select the “Request Monitoring” tab, 4) Enter our company’s name
in the search box (you mustr enter at least 3 characters) 5) Our company name will in the list that appears, 6) Click the
“Select Box” next to our company name.

HAS YOUR COMPANY STARTED THE PROCESS OF BECOMING C-TPAT CERTIFIED? YES NO
IF YES, HAVE YOU:
MADE AN ANALYSIS OF YOUR EXISTING SECURITY CRITERIA AND PROCEDURES? YES NO
SUBMITTED THE ON-LINE BUSINESS PROFILE ON THE C-TPAT WEB PORTAL? YES NO
STARTED THE PROCESS OF COMPLETING THE ON-LINE SECURITY PROFILE ON THE YES NO
C-TPAT WEB PORTAL?
SUBMITTED THE ON-LINE SECURITY PROFILE ON THE C-TPAT WEB PORTAL? YES NO

DOES YOUR COMPANY PARTICIPATE IN ANY GOVERNMENT SPONSORED SUPPLY CHAIN SECURITY
PROGRAMS? INDICATED BELOW BY SELECTING APPROPRIATE CHECKBOX.

 EXPORT SCHEME PROGRAM (NEW ZEALAND)?


 PARTNERS IN PROTECTION (CANADA)?
 GOLDEN LIST PROGRAM (JORDAN)?
 AUTHORIZED ECONOMIC OPERATOR (JAPAN)?
 AUTHORIZED ECONOMIC OPERATOR (KOREA)?
 AUTHORIZED ECONOMIC OPERATOR (EUROPEAN UNION)?
 AUTHORIZED ECONOMIC OPERATOR (TAIWAN)?
 AUTHORIZED ECONOMIC OPERATOR (ISRAEL)?
 OEA (AUTHORIZED ECONIMIC OPERATOR (MEXICO)
 SECURE TRADE PARTNERSHIP (SINGAPORE)
 AUTHORIZED ECONOMIC OPERATOR (DOMINICAN REPUBLIC)?
 AUTHORIZED ECONOMIC OPERATOR (PERU)?
 AUTHORIZED ECONOMIC OPERATOR (UNITED KINGDOM)?
 AUTHORIZED ECONOMIC OPERATOR (INDIA)?
 AUTHORIZED ECONOMIC OPERATOR (BRAZIL)?
 AUTHORIZED ECONOMIC OPERATOR (URUGUAY)?
 AUTHORIZED ECONOMIC OPERATOR (COLOMBIA)?
 AUTHORIZED ECONOMIC OPERATOR (GUATEMALA)?

NO, WE DO NOT PARTICIPATE IN ANY OF THESE PROGRAMS:

IF YOU ANSWERED YES, PLEASE PROVIDE COPIES OF ALL CERTIFICATES AND PERTINENT DOCUMENTS
AND DO NOT COMPLETE THE REMAINDER OF THIS SECURITY QUESTIONNAIRE.
20/07/2024
NAME OF PERSON COMPLETING THIS QUESTIONNAIRE DATE
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
I. PHYSICAL ACCESS CONTROL

QUESTION CORRECTIVE CORRECTIVE


ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
1) DOES ACCESS CONTROL INCLUDE POSITIVE YES
IDENTIFICATION OF ALL EMPLOYEES, VISITORS, AND
VENDORS AT ALL POINTS OF ENTRY? NO

2) IS THE ISSUANCE AND REMOVAL OF EMPLOYEE, YES


VISITOR, AND VISITOR BADGES ADEQUATELY
CONTROLLED? NO

3) ARE VISITORS AND VENDORS REQUIRED TO YES


PRESENT PHOTO IDENTIFICATION FOR
DOCUMENTATION PURPOSES UPON ARRIVAL? NO

4) ARE VISITORS ESCORTED AND REQUIRED TO VISIBLY YES


DISPLAY TEMPORARY IDENTIFICATION?
NO
5) ARE PROCEDURES IN PLACE ON HOW TO PROCEED YES
IN CHALLENGING UNAUTHORIZED PERSONS?
NO
6) ARE THERE PROCEDURES FOR ISSUING, REMOVING, YES
AND CHANGING ACCESS DEVICES (E.G. KEY CARDS,
ETC.)? NO

7) ARE EMPLOYEES ONLY GIVEN ACCESS TO THOSE YES


SECURE AREAS NEEDED TO PROVIDE THEIR DUTIES?
NO

II. PHYSICAL SECURITY

1) IS PERIMETER FENCING REGULARLY INSPECTED FOR YES


INTEGRITY AND DAMAGE?
NO
2) DOES THE FACILITY HAVE SECURITY GUARDS? YES

NO
2A) IF YES, ARE THE SECURITY GUARDS UNIFORMED? YES

NO
2B) HOW MANY GUARDS ARE ASSIGNED TO EACH 1 N/A
SHIFT?
2C) ARE THE SECURITY GUARDS CONTRACTED OR EMPLOYED N/A
EMPLOYED?
2D) IF CONTRACTED, PROVIDE THE COMPANY NAME N/A
AND PRIMARY CONTACT PERSON.
3) IS THE BUILDING CONSTRUCTED WITH STURDY YES
MATERIALS TO RESIST UNLAWFUL ENTRY AND IS THE
INTEGRITY OF THE STRUCTURE MAINTAINED BY NO
PERIODIC INSPECTION AND REPAIR?

 2024 C-TPAT Security Services, Inc. – All Rights Reserved


QUESTION CORRECTIVE CORRECTIVE
ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
4) ARE THE GATES IN WHICH VEHICLES AND/OR YES
PERSONNEL ENTER/EXIT MANNED AND/OR
MONITORED? NO

5) DOES THE FACILITY HAVE ADEQUATE LIGHTING YES


INSIDE AND OUTSIDE INCLUDING, ENTRANCES AND
EXITS, CARGO HANDLING AND STORAGE AREAS, FENCE NO
LINES AND PARKING AREAS?

6) DOES THE FACILITY HAVE A 24/7 MONITORED ALARM YES


SYSTEM?
NO
6A) IF YES, WHAT IS THE
NAME OF THE ALARM
COMPANY?

7) DOES THE FACILITY HAVE VIDEO SURVEILLIANCE YES


CAMERAS?
NO

7A) IF YES, WHATAREAS ARE GATES CARGO LOADING (INTERIOR)


MONITORED BY THE
CAMERAS? FENCE LINES CARGO LOADING (EXTERIOR)

PARKING LOT WAREHOUSE

TRACTOR/TRAILER/CONTAINER STORAGE

8) DOES MANAGEMENT OR SECURITY CONTROL THE YES


ISSUANCE OF KEYS?
NO
8A) NAME & TITLE OF PERSON Mr, ANBALAGAN
WHO ISSUES KEYS:

III. CONTAINER INSPECTION & SECURITY


1) PRIOR TO STUFFING, ARE THERE CONTAINER YES
INSPECTION PROCEDURES TO VERIFY THE PHYSICAL
INTEGRITY OF THE CONTAINER AND LOCKING NO
MECHANISMS OF THE DOORS?

2) IS AN 8-POINT INSPECTION CHECKLIST USED TO YES


DOCUMENT CONTAINER/TRAILER INSPECTIONS?
NO

2A) ARE PALLETS, REUSEABLE PACKAGING YES


MATERIALS AND THE CONTAINER/TRAILER CHECKED
FOR CLEANLINESS, DEBRIS, WEEDS, SEEDS, PESTS, NO
PEST DROPPINGS OR ANY FOREIGN MATERIALS THAT
COULD TRANSFER BACTERIA OR DISEASES RO THE
US?

 2024 C-TPAT Security Services, Inc. – All Rights Reserved


QUESTION CORRECTIVE CORRECTIVE
ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
3) FOR FOREIGN LOADING SITES, IS THE 8-POINT YES
CONTAINER CHECKLIST TRANSMITTED TO THE US
DESTINATION WHERE THE CARGO WILL BE NO
UNLOADED?
4) FOR FOREIGN LOCATIONS, ARE DIGITAL PHOTOS YES
TAKEN OF THE LOADING PROCESS?
NO

5) ARE EMPTY OR FULL CONTAINERS STORED IN A YES


SECURE AREA TO PREVENT UNAUTHORIZED ACCESS
AND/OR MANIPULATION? NO

6) ARE PROCEDURES IN PLACE FOR REPORTING AND YES


NEUTRALIZING UNAUTHORIZED ENTRY INTO
CONTAINER STORAGE AREAS? NO

IV. SEAL SECURITY

1) ARE THERE WRITTEN PROCEDURES IN PLACE TO YES


SPECIFY HOW TO AFFIX SEALS TO MAINTAIN
CONTAINERS INTEGRITY? NO

2) DO THE WRITTEN PROCEDURES INCLUDE YES


RECOGNIZING AND REPORTING COMPROMISED OR
MISMATCHED SEALS TO APPROPRIATE AUTHORITIES? NO

3) ARE ALL HIGH SECURITY SEALS THAT MEET OR YES


EXCEED THE MOST RECENT ISO PAS 17712 STANDARDS
AFFIXED TO ALL CONTAINERS BOUND FOR THE US? NO

4) FOR SEALS MEETING THE ISO STANDARDS, ARE YES


THERE COPIES OF THE LAB CERTIFICATION WITH THE
TEST REPORT? NO

5) IS THE INVENTORY OF HIGH SECURITY SEALS YES


MAINTAINED IN A SECURE MANNER TO IDENTIFY AND
CONTROL THE ISSUANCE OF SEALS? NO

6) IS A SEAL LOG USED TO AND TRACK & CONTROL HIGH YES


SECURITy SEAL SEALS?
NO

7) ARE ONLY DESIGNATED EMPLOYEES ALLOWED TO YES


DISTRIBUTE AND MAINTAIN CONTAINER SEALS?
NO
8) IS THE SEAL NUMBER VERIFIED & DOCUMENTED YES
PRIOR TO AFFIXING THE SEAL TO THE CONTAINER?
NO
9) IS AN INVENTORY PERFORMED ON STORED SEALS YES
AND ARE CUT SEALS DISPOSED OF IN A SECURE
MANNER? NO
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
V. CONVEYANCE / DRAYAGE SECURITY

QUESTION CORRECTIVE CORRECTIVE


ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
1) ARE TRUCKING COMPANYS & OWNER OPERATORS YES
SCREENED BEFORE BEING ALLOWED TO TRANSPORT
CARGO? NO

2) PRIOR TO ACCEPTING OR RELEASING CARGO, ARE YES


THERE PROCEDURES IN PLACE TO POSITIVELY
IDENTIFY THE DRIVER OF THE TRUCKING COMPANY? NO

3) IS A LOG SHEET USED TO DOCUMENT DRIVER ID, YES


DRIVER NAME, TRUCKING COMPANY NAME, DATE,
TIME, CONTAINER NUMBER, SEAL NUMBER, ETC.? NO

4) ARE THE HIGHWAY CARRIER’S CONTRACTED? YES

NO
5) ARE THE HIGHWAY CARRIER’S ALLOWED TO SUB- YES
CONTRACT?
NO
5A) IF SO, ARE THE CARRIER’S REQUIRED TO NOTIFY YES
YOUR COMPANY?
NO

6) ARE TRUCKERS/CARRIERS BEING DILIGENT IN YES


PHYSICALLY INSPECTING ALL ACCESSIBLE AREAS,
INTERNAL/EXTERNAL COMPARTMENTS AND PANELS, NO
OF THE TRANSPORT VEHICLE?
7) ARE INSPECTIONS OF THE TRACTORS CONDUCTED YES
(INCLUDING PASSENGER COMPARTMENT AND
SLEEPING AREA)? NO

8) ARE WRITTEN PROCEDURES IN PLACE FOR YES


REPORTING INCIDENTS WHERE UNAUTHORIZED
PERSONS, UNMANIFESTED CARGO, OR SIGNS OF NO
TAMPERING OF A CONVEYANCE ARE DISCOVERED?

9) TO DEFEND AGAINST THE INTRODUCTION OF YES


FOREIGN MATTER OR THEFT, ARE VEHICLES LOCKED
OR OTHERWISE FULLY SECURED? NO

10) ARE THERE DISPATCH LOGS TO TRACK THE YES


EXITING OF CONTAINERS & TRANSPORT VEHICLES?
NO
10A) IF SO, DOES MANAGEMENT CHECK AND REVIEW YES
THE DISPATCH LOGS?
NO
10B) IF YES, HOW OFTEN ARE REVIEWED BY: HR Manager
THE LOGS REVIEWED & BY
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
QUESTION CORRECTIVE CORRECTIVE
ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
WHO?
DAILY WEEKLY BI-WEEKLY MONTHLY
11) ARE TRANSPORT VEHICLES INSPECTED UPON YES
ENTERING AND EXITING FACILITY WITH THE USE OF A
DETAILED INSPECTION CHECKLIST TO IDENTIFY ANY NO
MODIFICATIONS OR DAMAGES?

12) ARE LOCKS AND SEALS USED TO SECURE YES


CONVEYANCE OF CARGO?
NO

13) FOR TRACKING PURPOSES, IS THERE A YES


COMMUNICATION LINK WITH THE DRIVER? (I.E. RADIO,
CELLULAR PHONE, OR EQUIVALENT)? NO

14) ARE DRIVERS REQUIRED TO DRIVE KNOWN YES


ROUTES?
NO
15) ARE ROUTES SELECTED BY SOMEONE OTHER YES
THAN THE DRIVER (MANAGEMENT, ETC.)?
NO
16) IS THE DRIVER GIVEN THE ASSIGNED ROUTE YES
IMMEDIATELY BEFORE DEPARTURE?
NO
17) ARE DRIVERS REQUIRED TO REPORT ROUTE YES
CHANGES AND DELAYS WHILE ENROUTE?
NO

17A) IF YES, TO WHOM DO NAME OF PERSON: Exports Manager (Documentation)


THEY REPORT THE
DELAY/ROUTE CHANGE AND
BY WHAT MEANS? CELL PHONE RADIO GPS LINK OTHER

VI. PROCEDURAL SECURITY

1) ARE SECURITY MEASURES IN PLACE TO ENSURE THE YES


INTEGRITY AND SECURITY OF PROCESSES RELEVANT
TO THE TRANSPORTATION, HANDLING AND STORAGE NO
OF CARGO IN THE SUPPLY CHAIN?

2) ARE PROCEDURES IN PLACE TO ENSURE THAT ALL YES


INFORMATION USED IN THE CLEARING OF
MERCHANDISE IS LEGIBLE, ACCURATE, COMPLETE, AND NO
VERIFIED TO PROTECT AGAINST THE EXCHANGE OR
LOSS OF INFORMATION?

3) DOES CARGO ACCURATELY GIVE THE DESCRIPTION, YES


WEIGHT, LABELS, MARKS AND PIECE COUNT AS
VERIFIED AGAINST THE CARGO MANIFEST DELIVERY OR NO
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
PURCHASE ORDER?

QUESTION CORRECTIVE CORRECTIVE


ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
4) ARE SHORTAGES, OVERAGES, AND OTHER YES
SIGNIFICANT DISCREPANCIES RESOLVED OR
INVESTIGATED? NO

5) HOW DOES YOUR COMPANY The whole package is dismandled and checked if the packaging contains any
HANDLE PACKAGING THAT foreign, suspicious materials other than the materials we packed. If so, further
APPEARS TO HAVE BEEN investication is initiated. Otherwise, the materials are repacked in a untampered
TAMPERED WITH? package.

6) DOES YOUR COMPANY USE ANY TAMPERED-EVIDENT YES


PACKAGING?
NO

7) WHEN ILLEGAL OR SUSPICIOUS ACTIVITIES ARE YES


DETECTED, ARE CUSTOMS AND/OR OTHER
APPROPRIATE LAW ENFORCEMENT AGENCIES NO
NOTIFIED?

VII. PERSONNEL SECURITY

1) ARE WRITTEN HIRING PROCEDURES IN PLACE?? YES

NO
2) ARE STAFFING AGENCIES USED FOR AVAILABLE YES
TEMPORARY POSITIONS?
NO
3) PRIOR TO EMPLOYMENT, DOES MANAGEMENT YES
VERIFY APPLICATION INFORMATION, SUCH AS EMPLOYMENT
HISTORY, AND REFERENCES? NO

4) ARE BACKGROUND CHECKS CONDUCTED, PRIOR YES


TO EMPLOYMENT?
NO

5) ARE DRUG TESTS CONDUCTED, PRIOR TO YES


EMPLOYMENT?
NO
6) ARE EMPLOYEES REQUIRED TO SIGN A CODE OF YES
CONDUCT?
NO

7) ARE EMPLOYEES REQUIRED TO SIGN A CODE OF YES


CONDUCT THAT ADDRESSESS COMPUTER SECURITY & IT
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
CYBER SECURITY? NO

8) ARE EMPLOYEES ISSUED PHOTO ID BADGES? YES

NO

8A) IF SO, ARE EMPLOYEES REQUIRED TO WEAR YES


BADGES IN PLAIN SIGHT AT ALL TIMES WHEN ON
COMPANY PREMISES? NO

8B) IS THE BADGE ISSUANCE DATE NOTATED ON/IN YES


THE EMPLOYEE’S FILE?
NO

9) DURING EMPLOYMENT, DOES YOUR COMPANY YES


RESERVE THE RIGHT TO CONDUCT PERIODIC
CHECKS AND REINVESTIGATIONS BASED ON CAUSE, NO
AND/OR THE SENSITIVITY OF THE EMPLOYEE’S POSITION?

10) ARE PROCEDURES IN PLACE TO REMOVE YES


IDENTIFICATION, FACILITY, AND SYSTEM ACCESS
CODES FOR TERMINATED EMPLOYEES? NO

11) ARE NEW HIRES INTRODUCED TO THE COMPANY’S YES


C-TPAT PROGRAM?
NO

12) ARE NEW HIRES REQUIRED TO COMPLETE A YES


C-TPAT TRAINING COURSE, INCLUDING A WEITTEN
TEST TO MEASURE COMPREHENSION? NO

VIII. SECURITY TRAINING AND THREAT AWARENESS

11) DO EMPLOYEES RECEIVE TRAINING ON HOW TO YES


RECOGNIZE AND REPORT THREATS TERRORISTS
POSE? NO

2) HAVE ALL EMPLOYEES RECEIVED TRAINING ON YES


HOW TO RECOGNIZE AND DEFEND AGAINST
TERRORIST THREATS? NO

3) ARE DESIGNATED THREAT AWARENESS TRIGGERS FOR ADDITIONAL SCRUTINY


EMPLOYEES REQUIRED TO BUSINESS PARTNER SECURITY IT SCURITY
COMPLETE INITIAL SUPPLY RISK ASSESSMENT FACILITY/PHYSICAL ACCESS SECURITY
CHAIN SECURITY TRAINING OPERATIONS & DESP PROCEDURES CONTAINER SEALING
AND REFRESHER TRAINING CONTAINER SECURITY CONVEYANCE SECURITY
AT LEAST ANNUALLY(CHECK REPORTING PROCEDURES WAREHOUSE SECURITY
ALL THAT APPLY)?
OTHER (DESCRIBE):

4) ARE WRITTEN TESTS USED TO ENSURE YES


COMPREHENSION?
NO
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
5) IS A TRAINING LOG USED TO DOCUMENT TRAINING? YES

NO

IX. INFORMATION TECHNOLOGY (IT) SECURITY

QUESTION CORRECTIVE CORRECTIVE


ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
1) ARE USERS REQUIRED TO OR ENCOURAGED TO USE YES
STONG PASSWORDS OR PASSPHRASES?
NO
2) ARE INDIVIDIUAL USERS ASSIGNED A UNIQUE YES
NETWORK ACCOUNT?
NO
3) ARE USERS REQUIRED TO SELECT THEIR OWN YES
PASSWORDS?
NO
4) DO COMPUTER USERS RECEIVE TRAINING IN YES
IT/COMPUTER SECURITY?
NO
5) DO COMPUTER USERS RECEIVE TRAINING IN CYBER YES
SECURITY INCLUDING HOW TO RECOGNIZE SOCIAL
ENGINEERING ATTACKS? NO

6) DOES THE COMPUTER OR SYSTEM, AUTOMATICALLY YES


LOCK OR TURN OFF WHEN INCORRECT PASSWORDS
ARE ENTERED MULTIPLE TIMES? NO

6A) DESCRIBE THE PROCESS The system will be loced. The user needs to inform HR Manager about the
FOR RESTORING USER system lock. The HR Manager will investigate the Root Cause of the system lock.
ACCESS WHEN THE If he is satisfied, he will request IT Department to unlock the system. The event
COMPUTER LOCKS DUE TO willl be recorded.
MULTIPLE FAILED LOG-IN
ATTEMPTS

7) IS THE COMPUTER SET SO THAT IT WILL YES


AUTOMATICALLY LOCK OR TURN OFF WHEN THERE IS
NO ACTIVITY FOR A PERIOD OF TIME? NO

7A) DESCRIBE THE PROCESS IF the userr gives correct password the system will be unlocked.
FOR RESTORING USER
ACCESS WHEN THE
COMPUTER LOCKS DUE TO A
PERIOD OF INACTIVITY

8) ARE THERE IT SECURITY POLICIES, PROCEDURES YES


AND STANDARDS IN PLACE?

 2024 C-TPAT Security Services, Inc. – All Rights Reserved


QUESTION CORRECTIVE CORRECTIVE
ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
NO
9) DOES THE COMPANY HAVE A WRITTEN POLICY FOR YES
COMPUTER USE?
NO
9A) IF SO, DOES THE POLICY INCLUDE A DISCIPLINARY YES
ACTION CLAUSE FOR ABUSE OF SYSTEMS?
NO
9B) ARE EMPLOYEES REQUIRED TO SIGN THE POLICY YES
INDICATING THEIR WILLINGNESS TO COMPLY?
NO
10) IS THERE A SYSTEM IN PLACE TO IDENTIFY THE YES
ABUSE OF IT INCLUDING IMPROPER ACCESS, TAMPERING,
OR THE ALTERING OF BUSINESS DATA? NO
11) DOES THE COMPANY HAVE A POLICY/PROCEDURE YES
FOR CONTROLLING THE INVENTORY OF HARDWARE
& MEDIA? NO
12) DOES THE COMPANY HAVE A POLICY/PROCEDURE YES
FOR SECURELY DISPOSING OF HARDWARE &
MEDIA? NO
13) TO MAINTAIN THE SYSTEM INTEGRITY, ARE THERE YES
VIRUS PROTECTIONS, FIREWALLS, AND SYSTEM
RECOVERY PLANS IN PLACE? NO

X. BUSINESS PARTNER REQUIREMENTS

1) DOES YOUR COMPANY HAVE A WRITTEN AND YES


VERIFIABLE PROCESS FOR THE SELECTION OF THEIR
SUPPLY CHAIN BUSINESS PARTNERS? NO

2) DOES YOUR COMPANY REQUIRE A WRITTEN YES


ACKNOWLEDGEMENT FROM BUSINESS PARTNERS
INDICTING THAT THEY AGREE TO MEET C-TPAT NO
MINIMUM SECURITY CRITERIA, SIGNED BY ONE OF THE
BUSINESS PARTNERS’ SENIOR MANAGER?

3) DOES YOUR COMPANY SEND OUT SECURITY YES


QUESTIONNAIRES TO ITS BUSINESS PARTNERS TO
CONFIRM THAT PROPER SECURITY MEASURES ARE IN NO
PLACE?

4) ARE RETURNED SECURITY QUESTIONNAIRES YES


REVIEWED TO ENSURE ACCEPTABLE ANSWERS?
NO
5) IS THERE A FOLLOW UP PROCEDURE FOR RETURNED YES
SECURITY QUESTIONNAIRES WITH UNACCEPTABLE
ANSWERS (INTERACT WITH BUSINESS PARTNERS TO NO
GET DEFICIENCIES CORRECTED)?

6) DOES YOUR COMPANY CONDUCT FACILITY SURVEYS YES


FOR THOSE BUSINESS PARTNERS DEEMED TO BE A
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
HIGH RISK? NO

7) HOW OFTEN ARE BUSINESS Once in Six months


PARTNERS RE-SCREENED?

X. CORPORATE SUPPORT FOR SUPPLY CHAIN SECURITY

QUESTION CORRECTIVE CORRECTIVE


ACTION PLAN & ACTION
TARGET DATE COMPLETED &
DATE
1) DOES THE COMPANY’S SENIOR MANAGEMENT YES
ACTIVELY SUPPORT THE COMPANY’S SUPPLY CHAIN
SECURITY PROGRAM? NO

2) DOES THE COMPANY HAVE A STATEMENT OF YES


SUPPORT FOR THE COMPANY’S SUPPLY CHAIN
SECURITY PROGRAM, WHICH HAS BEEN SIGNED BY NO
MEMBERS OF THE COMPANY’S SENIOR MANAGEMENT
TEAM AND WHICH IS POSTED IN STRATEGIC LOCATIONS
AROUND THE FACILITY?

 2024 C-TPAT Security Services, Inc. – All Rights Reserved


BUSINESS PARTNER AGREEMENT
MINIMUM SUPPLY CHAIN SECURITY CRITERIA

NOTE: Non-C-TPAT/ non-AEO certified business partners are subject to verification of


compliance with C-TPAT minimum security criteria, to include digital photographs and
on-site visits, prioritized by risk.

1. We require all of our supply chain business partners to be:


1.1 a member of C-TPAT or a member of a U.S. Customs-approved mutual
recognition supply chain security program administered by a foreign
government.
1.2 Or minimally, agree to follow all of the C-TPAT minimum security requirements.

2. C-TPAT MINIMUM SECURITY CRTERIA IS:


2.1 Business partners must complete and return our Security Questionnaire.
Responses to the questionnaire will determine our company’s potential future
relationship with the business partner. We will focus on the business partner’s
commitment, as revealed by the questionnaire, demonstrating adherence to the
C-TPAT guidelines.
2.2 The senior management of our business partners must be committed to supply
chain security.
2.3 Business partners must train their employees to recognize and report potential
threats related to terrorist plots, human smuggling, contraband smuggling and
illegal activities.
2.4 Business partners must have documented procedures that address personnel
and hiring procedures, IT security, business partner screening, container/trailer
security and container/trailer sealing.
2.5 Business partners must adhere to our company’s documentation requirements.
This includes providing accurate shipping documents promptly, in good order
and legibly written.
2.6 Those foreign business partners who are loading containers bound for the US
are required to complete a documented 8-point container inspection checklist
using a checklist for each container bound for the U.S.
2.7 The 8-point container inspection checklist should become a standard part of the
shipping documents package and must be transmitted (in advanace of arrival in
the U.S.) with all of the other shipment documents.
2.8 Business partners must screen potential employees to include review of the
employment application for accuracy, verification of listed references and 7-
year criminal background check (where allowed by local laws).
2.9 Business partners must have procedures in place to report shipment-related
security incidents to our company and to the appropriate government
authorities.
2.10 Business partner’s staff members who are involved in loading or unloading
containers and those processing shipment-related documents must be trained
to recognize and report potential threats and suspicious conditions/
persons/behavior.
2.11 Business partners must have IT security measures in place to include
forced network password changes (not to exceed 90 days), lock-out after 3
failed log-in attemps (admin intervention required to restore access) and lock-
out after 15 minutes of inactivity (user log-in required to regain access).
2.12 Business partners must have employee and visitor identification
procedures in place.

I acknowledge that I have received this agreement and the accompanying Supply Chain
Security Standard Operating Procedures (SOPSs) and that our company agrees to comply
 2024 C-TPAT Security Services, Inc. – All Rights Reserved
with all of the stated requirements.

Company Name: Blueweiss Exports Unit II

Country: India

Business Type: Foreign Factory Foreign Shipper Foreign Trucking

Foreign Agent Foreign CFS US Freight Forwarder US Trucking

US CHB US CFS / Foreign Trade Zone / Customs Bonded Warehouse

US Importer US Exporter

Name of Person signing this document: KANNAN P

Title of Person signing this document: HR MANAGER

Signature:

Date: 20/07/2024

 2024 C-TPAT Security Services, Inc. – All Rights Reserved

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy