Sei sulla pagina 1di 28

C-TPAT TRAINING

This is a sample PowerPoint on Security and general Threat Awareness.


All images and clip art were taken from open sources. We suggest you
consider using images of your employees within your faculty. This PowerPoint
is meant to be a guide and should be tailored and edited to suit your needs. It
is also suggested that you use your own slide background and colors scheme.
Security Training and Threat
Awareness Program
for
All Employees
We have recently joined with U.S. Customs and Border
Protection to help secure the international supply
chain. As a member of the Customs-Trade Partnership
Against Terrorism (C-TPAT) program, we have
committed ourselves to new and improved security
procedures throughout our operations. These new
procedures are designed to enhance the security of our
facilities, people, cargo shipping, cargo receiving and
cargo tracking processes. Our goal is to prevent cargo
loss and cargo tampering including the introduction of
illegal merchandise such as drugs and weapons of
mass destruction into our cargo boxes and containers.
As a part of our commitment to supply chain security,
we now require all of our employees to seriously
consider supply chain security as a significant risk to
our business.
Topics

Suspicious Persons
Suspicions Activities
Suspicious Objects or
Packages
Employee Identification
Visitor Controls
Computer Security
Document Security
Suspicious Persons

LOOK FOR…..
• Any person without
an employee
badge, visitor badge
or uniform.
• These are stock photos, take and use actual photos of
your employees walking down a hallway. Or use
images from a surveillance camera
Suspicious Persons

…and ACT

• Determine if the person is an


employee or a visitor
– If an employee, remind them
always to display their ID
badge and uniform.
– If a visitor, escort them to the
reception area or to the
person with whom they are
visiting.
– Report the incident to your
immediate supervisor.
Suspicious Persons

LOOK FOR…..
 Any person in
unauthorized/restricted areas
Suspicious Persons

AND ACT…..
 Get them out of the area
 If a visitor, escort them to the
reception area.
 Report the incident to your
immediate supervisor
Suspicious Persons

Look for ….
 Any person:

 wearing an overcoat on a
95 degree day, or any kind
of inappropriate clothing
 waiting or loitering in an
area or hallway
 asking for an unknown
department, person or
employee
Cam 7 1:17:23AM 8/02/06
Suspicious Persons

LOOK FOR….
 Any person:

 who seems not to belong


in the area
 going door to door, office
to office
 entering a private office
unescorted
 selling items
 who seems lost

Cam 7 1:17:23AM 8/02/06


Suspicious Persons

LOOK FOR …..


 Any person:
 Tampering with somebody’s desk,
boxes, personal items, equipment,
vehicles, cameras, lights…
 running, especially if carrying
something
 hiding behind doors, fences,
desks, …

Cam 7 1:17:23AM 8/02/06


Suspicious Persons

AND ACT………
 Immediately report the
incident to your
immediate supervisor
LOOK FOR …
 Objects obstructing access points

 Disconnected or obstructed
cameras
 Broken locks or access control
systems
 Unexplained clutter or debris

 Objects thrown from a vehicle,


especially while traveling at a
high speed.
ACT …
 Immediately report any
suspicious activity to
your supervisor.
Suspicious Objects
or Packages

LOOK FOR….
• Unexplained objects or packages that look
strange or do not belong to the area
• Strange markings on boxes (unknown code,
color) or strange characteristics (weight,
number, odd shape)
• Strange leaking substance (powder, liquid,
etc…)
• Suspicious objects in the middle of an area
(e.g., hallway, lobby, etc.)
Suspicious Objects
or Packages
Suspicious Objects
or Packages

AND ACT………
 Immediately report any
suspicious packages or
objects to your
supervisor, security,
local police, 911 and/or
FBI.
Suspicious Objects
or Packages

Handle with care


1 Don’t shake or bump.

Isolate and look for


2 indicators (shape, color,

•AND ACT…….
smell).

Don’t open, smell, lick or


3 taste.

Treat it as suspect!
4 Report immediately.
Employee Identification
Your Responsibilities
 While on company property
 Your company
identification badge must
be properly displayed and
worn at all times.
 Your company uniform (if
applicable) must be worn at
all times.
 Properly secure and protect
your ID badge, uniform,
keys and access control
card, etc.
 Visitor Pre-meeting
Requirements
 Inform your visitor of the
company’s visitor policies
including photo
identification, check in with
receptionist prior to their
visit.
 Visitor Entrance
Requirements
 Ensure that your visitor has
logged in and has been
issued a visitor badge
 Visitor Escort Requirements
 You must escort your visitors
at ALL times
 Do not leave your visitor
unattended
 Visitor Exit Requirements
 Ensure that your visitor has
logged out and has returned
the visitor badge to the
guard or receptionist
Visitor Entrance

Notify Document Issue


Check
hosting arrival on visitor
photo
employee Visitor Log badge
identification

Visitor Exit

Document Use colors and shapes of


Collect you choosing.
departure
visitor
on Visitor
badge
Log
Computer Security

 Do not share access to your


computer with strangers

 Log-off when you leave your


computer

 Passwords should be changed


every 60 to 90 days

 Do not share your password


with anyone

 Do not write down your


password.
Selecting a Password
 Use hard-to-guess passwords
 Do not use the same password in
more than one place
 A password should have a mix of
letters, numbers and symbols
 I Love to be Secure
iL2bs@
 Always on time to work
!AoT2wx
 My Password is Very Secure
MyP1VS#
 Yo Quiero Taco Bell
yqtb!10
Electronic Mail Restrictions
• Do not use company e-mail for
private business activities,
amusement or entertainment.
• Do not send e-mail containing racist,
sexist, threatening or other
objectionable language.
• Do not join mailing lists.
• Do not open unknown or
unexpected e-mail
attachments.
Let’s review…

Suspicious persons
Suspicious activity
Suspicious objects or packages
Employee identification
Visitor controls
Computer security
Document security
Information technology security
Security is not out
of reach if you
practice it every
day.
QUESTIONS?
Refer to Customs & Border Protection Website:
http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/

or www.cbp.gov

Potrebbero piacerti anche