Standard supply chain security arrangements include: creating credentials of participants in the supply chain, finding, validating contents of cargo being shipped, notification of the contents in advance to the destination country, ensuring the security of cargo in transit using lock and other professional means, creating opportunity to inspect the cargo at an entry to the destination country etc. C-TPAT is a program to prevent terrorists from using supply chain resources to bring mass destruction weapons into the The United States of America. Joining C-TPAT, a business promises to take some responsibility for security through entire supply chain. Owners of the supply chain must conduct comprehensive security assessment based on C-TPAT requirements. Sudden fire eruption in a factory or other area of a supply chain also can be a threat to supply chain security. Necessary precaution must be taken against fire eruption to ensure supply chain security and loss of life as well.
Keywords: Supply Chain Management, supply chain security, Business management, C-TPAT, Supply chain management software(SCMS) etc.
The term supply chain security is used to enhance security of the transport and supply chain as a whole. According to UNECE, in replication to this growing challenge, the World Customs Organization (WCO) adopted the SAFE Framework of Standards in 2005 to provide a more vigorous fixate on those principles of the Revised Kyoto Convention that ameliorate cooperation among Customs administrations, provide supply chain security and facilitation at an ecumenical level to promote certainty and predictability. While Customs have always been in charge of controlling international trade in terms of enjoinments and restrictions, the aspect of securing the international trade supply chain has put growing and supplemental burdens on Customs to manage this balance. In the greater perspective, it combines traditional supply chain management requirements & global threats such as terrorism, theft, piracy etc. The C-TPAT started after 9/11 terror attack in USA to prevent similar attacks in USA.
Standard supply chain security arrangements include: (a)creating credentials of participants in the supply chain, (b)Finding, validating contents of cargo being shipped,(c)Notification of the contents in advance to the destination country, (d)Ensuring the security of cargo in transit using lock and other professional means, (e)creating opportunity to inspect the cargo at an entry to the destination country. C-TPAT (Customs Trade Pact Against Terrorism) is about some principles agreed upon between US government, supplier and buyer. About 11000 businesses in the current world use the C-TPAT treaty. While we implement, it enhances our capability to get new order in business. Need of customs checking becomes less than usual, creates mutual understanding between buyer and seller.
Supplier’s duties include using ID card for employees, informing the management for any illegal act occurs, packages need to be guarded. Fire arms, and other unusual things should be checked and prohibited. Sensitives areas include Loading and shipment areas, warehouse areas, CCTV rooms etc.
C-TPAT & CBP’s role in enhancing supply chain security:
C-TPAT (Customs Trade Partnership against Terrorism ) is a program to prevent terrorists from using supply chain resources to bring mass destruction weapons into the The United States of America. The concept behind C-TPAT is simple. Joining C-TPAT, a business promises to take some responsibility for security through entire supply chain. And U.S. Customs & Border Protection (CBP) promises faster/easier processing for C-TPAT members at border/checkpoints. CBP is the unified agency within the Department of Homeland Security, responsible for the management, controlling, and protection of US borders at and between official ports of entry. Owners of the supply chain must conduct comprehensive security assessment based on C-TPAT requirements. Canada has a program similar to C-TPAT, namely, “Partners in Protection”.
Other similar programs:
Other Supply Chain Security programs are namely, Container Security Initiative (CSI), Free and Secure Trade (FAST), the 24-Hour Rule, Automated Commercial Environment (ACE) etc.
Factory level application of C-TPAT:
A factory in an apparel supply chain usually has to make a documented declaration that they are aware of the US Customs service’s C-TPAT program to combat terrorism and agree to maintain sufficient controls to ensure. And sign the Declaration on behalf of manufacturer/shipper, which declaration is a bit different for different ship mode such as LCL or DCL sea shipment or air shipment.
The C-TPAT modules involve record and documentation, individual and personal security, IT security, shipment security control, storage and distribution, export and logistics, transparency in supply chain, physical checking, fulfill business partner requirement. Departments such as security department, finished goods warehouses, human resources department, IT and material control departments are directly involved to get C-TPAT agreement materialized. Other Supply Chain Security threats include Natural calamity such as cyclone, typhoon, earthquake etc. Japan earthquake and US Cyclone in 2012 are a recent example of supply chain security threats. And sudden fire eruption in a factory or other area of a supply chain also can be a threat to supply chain security. Necessary precaution must be taken against fire eruption to ensure supply chain security and loss of life as well.
SCMS and Supply Chain security best practices:
Supply-chain-management software (SCMS) is the software tools or modules used in executing supply chain transactions, managing supplier relationships and controlling associated business processes. Supply chain management maximizes the efficiency of business activities that include planning and management of the entire supply chain. It helps businesses in product development, sourcing, production, and logistics by automating operations. In this way, it increases the physical flow of business as well as informative flow. The entire business benefits with higher performance, greater cost-efficiency, and thus increased supply chain efficiency. We should not use software if not required. Especially, freeware, browser extensions and plugins are great source of cyber related attacks. We should check first if we need it. Need to use Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) systems to detect exceptions in our orders. Patch control is also essential to avoid such attacks.
Covid-19 Pandemic situation and the C-TPAT procedure:
The CTPAT software necessities additionally consist of measures compelling member corporations to map their deliver chains further to accomplishing vulnerability checks on their very own corporation in addition to their commercial enterprise partners. Reduce the time worried in assembly the C-TPAT necessities of CBP’s advocated 5-Step Risk Assessment Process, which include accomplishing vulnerability checks of commercial enterprise partners, imposing corrective actions, and accomplishing risk checks. Although coping with a software like CTPAT can appear to be a frightening task – specially for big corporations with tremendous dealer bases or smaller corporations with constrained resources – there are computerized equipment that may make the activities easier, offer a strong technique to live on pinnacle of the ever-converting hazard landscape, and role customers to revel in the advantages of the software. In a latest name with the change concerning the coronavirus, CBP made it clean that ports/borders ought to revel in delays for the duration of this time – this can be the end result of CBP officer bandwidth to system entries (because of illness), in addition to governments taking more potent measures to steady their borders and manage the virus. These necessities now no longer best help in constructing a greater steady and resilient deliver chain, however additionally offer a stage of visibility as a way to be pretty treasured in instances like this.
Current international business security has been greatly increased with the introduction of C-TPAT supply chain security arrangements. Many countries has created similar arrangements with their suppliers overseas. Although it has increased procedures and cost in some areas of running a business it is supposed to be necessary in the current world. Cybersecurity is another area of supply chain security.
1.Lee, Hau L. Whang, Seungjin.(2005). “Higher supply chain security with lower cost: Lessons from total quality management”. International Journal of Production Economics. Volume 96, Issue 3, 18 June 2005, Pages 289-300
Existing amenities not enough to store, deliver large volume of vaccines within a short time, say experts The governments are considering banking on the existing cold chain for storing, transporting and distributing coronavirus vaccines while some professionals say the main challenge will be to manage such a large volume with the existing capacity. On November 5,2020 the Bangladesh government signed a trilateral memorandum of understanding (MoU) with Serum Institute of India and Bangladesh’s Beximco Pharmaceuticals Ltd to get three crore doses of Covid-19 vaccines from Serum, keeping in mind the existing cold chain. In 2020 during the COVID-19 pandemic, vaccines being developed may need ultra-cold storage and transportation temperatures as cold as −70 °C (−94 °F), requiring what has been referred to as a “colder chain” infrastructure. Disruption of a cold chain due to war may produce consequences similar to the smallpox outbreaks in the Philippines during the Spanish–American War, during which the distributed vaccines were inert due to lack of temperature control in transport. There are no uniform global practices to follow, customs, legal, and compliance issues, effects on the environment, supplier-related risks, issues with cold chain delivery — packaging, hardware issues, vehicle breakdown, etc. Besides the usual elements of risk that plague normal supply chains, cold chain logistics has its own exclusive set of problems such as product sensitivity, the increasing cost of freight, and growing regulatory hurdles.
Keywords: Cold Chain, Supply chain management, Vaccines, food.
Some data freight forwarders need from you include full shipping and destination addresses, contact details of receiver, weight of cargo, a list of the items included, dimensional weight, and product description. If your items need extra care, then it’s best to hire a forwarder that specializes in handling such goods. The process begins from transferring the goods to the forwarder’s warehouse to leaving the origin country, unloading and validating the cargo, checking of paperwork, transferring the cargo to its destination office, and transferring it to its final destination. Their professional staff can help with packing your items and storing them, doing inventory management, declaring your items at customs, providing insurance, troubleshooting, and handling documentation .Some of the most common restricted items are alcohol, batteries, biological waste, dangerous goods such as a flammable liquid or toxic objects, prescription or recreational drugs, perishable items, sharp objects, and weapons. If you’re into business and you want to expand your customer reach, then you might want to consider looking into the most reputable international freight forwarders in your area. They will handle your goods with utmost care and your customers will be able to receive them in good condition without hassle. These companies either ship goods through road freight, ocean freight, or air freight.
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.