您现在的位置: 精品资料网 >> 企业管理 >> 经营管理 >> 资料信息

tpat验证过程指南(pdf 12页)

所属分类:
经营管理
文件大小:
157 KB
下载地址:
相关资料:
验证过程指南
tpat验证过程指南(pdf 12页)内容简介
C-TPAT VALIDATION PROCESS GUIDELINES
I. Introduction
The Customs Service has developed a validation process to ensure that C-TPAT participants have implemented the security measures outlined in their Security Profile and in any supplemental information provided to Customs. The validation process will be conducted jointly by U.S. Customs personnel and a representative of the industry participant. The validation will focus on the material in the participant’s C-TPAT security profile and any related materials provided by the participant and will be conducted under the guiding partnership principles of C-TPAT.
II. Objective
The purpose of the validation is to ensure that the supply chain security measures contained in the C-TPAT participant’s security profile have been implemented and are being followed. In the context of the company’s operations and the C-TPAT security recommendations, the validation team will evaluate the status and effectiveness of key security measures in the participant’s profile and make recommendations where appropriate.
III. Validation Principles
The guiding principle of the C-TPAT program is partnership. The C-TPAT program is voluntary and designed to share information that will protect the supply chain from being compromised by terrorists and terrorist organizations.
The validation process will enable Customs and the C-TPAT participant to jointly review the participant’s C-TPAT security profile to ensure that security actions in the profile are being effectively executed. Throughout the process there will also be the opportunity to discuss security issues and to share “best practices” with the ultimate goal of securing the international supply chain.
C-TPAT validations are not audits. In addition, they will be focused, concise, and will last not longer than ten work days.
Based on the participant’s C-TPAT security profile and the recommendations of the validation team, Headquarters will also oversee the specific security elements to be validated.
IV. Conducting a Validation
..............................