Sei sulla pagina 1di 28

C-TPAT TRAINING

This is a sample PowerPoint on Security and general Threat Awareness.


All images and clip art were taken from open sources. We suggest you
consider using images of your employees within your faculty. This PowerPoint
is meant to be a guide and should be tailored and edited to suit your needs. It
is also suggested that you use your own slide background and colors scheme.

Security Training and


Threat Awareness
Program
for
All Employees

We have recently joined with U.S. Customs and


Border Protection to help secure the
international supply chain. As a member of the
Customs-Trade Partnership Against
Terrorism (C-TPAT) program, we have
committed ourselves to new and improved
security procedures throughout our operations.
These new procedures are designed to enhance
the security of our facilities, people, cargo
shipping, cargo receiving and cargo tracking
processes. Our goal is to prevent cargo loss and
cargo tampering including the introduction of
illegal merchandise such as drugs and weapons
of mass destruction into our cargo boxes and
containers. As a part of our commitment to
supply chain security, we now require all of our
employees to seriously consider supply chain
security as a significant risk to our business.

Topics
Suspicious Persons
Suspicions Activities
Suspicious Objects or
Packages
Employee Identification
Visitor Controls
Computer Security
Document Security

Suspicious Persons

LOOK FOR..
Any person without
an employee
badge, visitor
badge or uniform.

These are stock photos, take and use actual photos


of your employees walking down a hallway. Or use
images from a surveillance camera

Suspicious Persons

and ACT

Determine if the person is an


employee or a visitor
If an employee, remind them
always to display their ID
badge and uniform.
If a visitor, escort them to the
reception area or to the
person with whom they are
visiting.
Report the incident to your
immediate supervisor.

Suspicious Persons

LOOK FOR..

Any person in
unauthorized/restricted areas

Suspicious Persons

AND ACT..
Get them out of the area
If a visitor, escort them to the
reception area.
Report the incident to your
immediate supervisor

Suspicious Persons

Cam 7

1:17:23AM

8/02/06

Look for .

Any person:
wearing an overcoat on
a 95 degree day, or any
kind of inappropriate
clothing
waiting or loitering in
an area or hallway
asking for an unknown
department, person or
employee

Suspicious Persons
LOOK FOR.

Any person:
who
seems not to
belong in the area
going door to door,
office to office
entering
a
private
office unescorted
selling items
who seems lost
Cam 7

1:17:23AM

8/02/06

Suspicious Persons

LOOK FOR ..

Any person:
Tampering with somebodys desk,
boxes, personal items, equipment,
vehicles, cameras, lights
running,
especially if carrying
something
hiding
behind doors, fences,
desks,

Cam 7

1:17:23AM

8/02/06

Suspicious Persons

AND ACT
Immediately report
the incident to your
immediate supervisor

LOOK FOR

Objects obstructing access


points

Disconnected or obstructed
cameras

Broken locks or access control


systems

Unexplained clutter or debris

Objects thrown from a vehicle,


especially while traveling at a
high speed.

ACT
Immediately report any
suspicious activity to
your supervisor.

Suspicious Objects
or Packages

LOOK FOR.
Unexplained objects or packages that look
strange or do not belong to the area
Strange markings on boxes (unknown code,
color) or strange characteristics (weight,
number, odd shape)
Strange leaking substance (powder, liquid,
etc)
Suspicious objects in the middle of an area
(e.g., hallway, lobby, etc.)

Suspicious Objects
or Packages

Suspicious Objects
or Packages

AND ACT
Immediately report any
suspicious packages or
objects to your
supervisor, security,
local police, 911 and/or
FBI.

Suspicious Objects
or Packages

AND ACT.

Employee Identification

Your
Responsibilities
While
on company property

Your company identification


badge must be properly
displayed and worn at all
times.
Your company uniform (if
applicable) must be worn at
all times.
Properly secure and protect
your ID badge, uniform, keys
and access control card, etc.

Visitor Pre-meeting Requirements


Inform
your
visitor
of
the
companys visitor policies including
photo identification, check in with
receptionist prior to their visit.
Visitor Entrance Requirements
Ensure that your visitor has logged
in and has been issued a visitor
badge

Visitor Escort Requirements


You must escort your
visitors at ALL times
Do not leave your visitor
unattended
Visitor Exit Requirements
Ensure that your visitor
has logged out and has
returned
the
visitor
badge to the guard or
receptionist

Visitor Entrance
Document
arrival on
Visitor Log

Notify
hosting
employee

Check
photo
identification

Issue
visitor
badge

Visitor Exit
Collect
visitor
badge

Document
departure
on Visitor
Log

Use colors and shapes of


you choosing.

Computer Security

Do not share access to your


computer with strangers

Log-off when you leave your


computer

Passwords should be
changed every 60 to 90
days

Do not share your password


with anyone

Do not write down your


password.

Selecting a Password

Use hard-to-guess passwords

Do not use the same password in


more than one place

A password should have a mix of


letters, numbers and symbols

I Love to be Secure

iL2bs@

Always on time to work


AoT2wx

My Password is Very Secure


MyP1VS#

Yo Quiero Taco Bell

yqtb!10

Electronic Mail
Restrictions

Do not use company e-mail for


private business activities,
amusement or entertainment.
Do not send e-mail containing
racist, sexist, threatening or other
objectionable language.
Do not join mailing lists.
Do not open unknown or
unexpected
e-mail
attachments.

Lets review

Suspicious persons
Suspicious activity
Suspicious objects or packages
Employee identification
Visitor controls
Computer security
Document security
Information technology security

Security is not
out of reach if
you practice it
every day.

QUESTIONS?
Refer to Customs & Border Protection Website:
http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/

or www.cbp.gov

Potrebbero piacerti anche