tpat驗證過程指南(pdf 12頁)
- 所屬分類:
- 經營管理
- 文件大小:
- 157 KB
- 下載地址:
- 相關資料:
- 驗證過程指南
tpat驗證過程指南(pdf 12頁)內容簡介
C-TPAT VALIDATION PROCESS GUIDELINES
I. Introduction
The Customs Service has developed a validation process to ensure that C-TPAT participants have implemented the security measures outlined in their Security Profile and in any supplemental information provided to Customs. The validation process will be conducted jointly by U.S. Customs personnel and a representative of the industry participant. The validation will focus on the material in the participant’s C-TPAT security profile and any related materials provided by the participant and will be conducted under the guiding partnership principles of C-TPAT.
II. Objective
The purpose of the validation is to ensure that the supply chain security measures contained in the C-TPAT participant’s security profile have been implemented and are being followed. In the context of the company’s operations and the C-TPAT security recommendations, the validation team will evaluate the status and effectiveness of key security measures in the participant’s profile and make recommendations where appropriate.
III. Validation Principles
The guiding principle of the C-TPAT program is partnership. The C-TPAT program is voluntary and designed to share information that will protect the supply chain from being compromised by terrorists and terrorist organizations.
The validation process will enable Customs and the C-TPAT participant to jointly review the participant’s C-TPAT security profile to ensure that security actions in the profile are being effectively executed. Throughout the process there will also be the opportunity to discuss security issues and to share “best practices” with the ultimate goal of securing the international supply chain.
C-TPAT validations are not audits. In addition, they will be focused, concise, and will last not longer than ten work days.
Based on the participant’s C-TPAT security profile and the recommendations of the validation team, Headquarters will also oversee the specific security elements to be validated.
IV. Conducting a Validation
..............................
I. Introduction
The Customs Service has developed a validation process to ensure that C-TPAT participants have implemented the security measures outlined in their Security Profile and in any supplemental information provided to Customs. The validation process will be conducted jointly by U.S. Customs personnel and a representative of the industry participant. The validation will focus on the material in the participant’s C-TPAT security profile and any related materials provided by the participant and will be conducted under the guiding partnership principles of C-TPAT.
II. Objective
The purpose of the validation is to ensure that the supply chain security measures contained in the C-TPAT participant’s security profile have been implemented and are being followed. In the context of the company’s operations and the C-TPAT security recommendations, the validation team will evaluate the status and effectiveness of key security measures in the participant’s profile and make recommendations where appropriate.
III. Validation Principles
The guiding principle of the C-TPAT program is partnership. The C-TPAT program is voluntary and designed to share information that will protect the supply chain from being compromised by terrorists and terrorist organizations.
The validation process will enable Customs and the C-TPAT participant to jointly review the participant’s C-TPAT security profile to ensure that security actions in the profile are being effectively executed. Throughout the process there will also be the opportunity to discuss security issues and to share “best practices” with the ultimate goal of securing the international supply chain.
C-TPAT validations are not audits. In addition, they will be focused, concise, and will last not longer than ten work days.
Based on the participant’s C-TPAT security profile and the recommendations of the validation team, Headquarters will also oversee the specific security elements to be validated.
IV. Conducting a Validation
..............................
用戶登陸
經營管理熱門資料
經營管理相關下載