CTPAT 3PLs MSC March 2020
CTPAT 3PLs MSC March 2020
CTPAT 3PLs MSC March 2020
March 2020
Note: Criteria ID numbers may not be sequential. ID numbers not listed are not applicable to 3PLs.
Must /
ID Criteria Implementation Guidance
Should
1.1 In promoting a culture of security, CTPAT Members should Statement of support should highlight the importance of protecting the Should
demonstrate their commitment to supply chain security and supply chain from criminal activities such as drug trafficking, terrorism,
the CTPAT Program through a statement of support. The human smuggling, and illegal contraband. Senior company officials who
statement should be signed by a senior company official and should support and sign the statement may include the president, CEO,
displayed in appropriate company locations. general manager, or security director. Areas to display the statement of
support include the company's website, on posters in key areas of the
company (reception; packaging; warehouse; etc.), and/or be part of
company security seminars, etc.
1.2 To build a robust Supply Chain Security Program, a company Supply Chain Security has a much broader scope than traditional security Should
should incorporate representatives from all of the relevant programs. It is intertwined with Security, in many departments such as
departments into a cross-functional team. Human Resources, Information Technology, and Import/Export offices.
Supply Chain Security programs built on a more traditional, security
These new security measures should be included in existing department-based model may be less viable over the long run because
company procedures, which creates a more sustainable the responsibility to carry out the security measures are concentrated
structure and emphasizes that supply chain security is among fewer employees, and, as a result, may be susceptible to the loss
everyone's responsibility. of key personnel.
CTPAT Minimum Security Criteria – 3PLs| March 2020
Page 1
Must /
ID Criteria Implementation Guidance
Should
1.3 The supply chain security program must be designed with, The goal of a review for CTPAT purposes is to ensure that its employees Must
supported by, and implemented by an appropriate written are following the company’s security procedures. The review process
review component. The purpose of this review component is does not have to be complex. The Member decides the scope of reviews
to document that a system is in place whereby personnel are and how in-depth they will be - based on its role in the supply chain,
held accountable for their responsibilities and all security business model, level of risk, and variations between specific
procedures outlined by the security program are being locations/sites.
carried out as designed. The review plan must be updated as
needed based on pertinent changes in an organization’s Smaller companies may create a very simple review methodology;
operations and level of risk. whereas, a large multi-national conglomerate may need a more extensive
process, and may need to consider various factors such as local legal
requirements, etc. Some large companies may already have a staff of
auditors that could be leveraged to help with security reviews.
When determining risk within their supply chains, Members must consider various factors such as the business model, geographic
location of suppliers, and other aspects that may be unique to a specific supply chain.
Key Definition: Risk – A measure of potential harm from an undesirable event that encompasses threat, vulnerability, and
consequence. What determines the level of risk is how likely it is that a threat will happen. A high probability of an occurrence will
usually equate to a high level of risk. Risk may not be eliminated, but it can be mitigated by managing it – lowering the vulnerability or
the overall impact on the business.
Must /
ID Criteria Implementation Guidance
Should
2.1 CTPAT Members must conduct The overall risk assessment (RA) is made up of two key parts. The first part is a self-assessment of Must
and document the amount of the Member’s supply chain security practices, procedures, and policies within the facilities that it
risk in their supply chains. controls to verify its adherence to CTPAT’s minimum-security criteria, and an overall management
CTPAT Members must conduct review of how it is managing risk.
an overall risk assessment (RA)
to identify where security The second part of the RA is the international risk assessment. This portion of the RA includes the
vulnerabilities may exist. The identification of geographical threat(s) based on the Member's business model and role in the supply
RA must identify threats, chain. When looking at the possible impact of each threat on the security of the member’s supply
assess risks, and incorporate chain, the member needs a method to assess or differentiate between levels of risk. A simple
sustainable measures to method is assigning the level of risk between low, medium, and high.
mitigate vulnerabilities. The
member must take into CTPAT developed the Five Step Risk Assessment guide as an aid to conducting the international risk
account CTPAT requirements assessment portion of a member’s overall risk assessment, and it can be found on U.S. Customs and
specific to the member’s role in Border Protection’s website at https://www.cbp.gov/sites/default/files/documents/C-
the supply chain. TPAT%27s%20Five%20Step%20Risk%20Assessment%20Process.pdf.
For Members with extensive supply chains, the primary focus is expected to be on areas of higher
risk.
3. Business Partners – CTPAT Members engage with a variety of business partners, both domestically and internationally. For those
business partners who directly handle cargo and/or import/export documentation, it is crucial for the Member to ensure that these
business partners have appropriate security measures in place to secure the goods throughout the international supply chain. When
business partners subcontract certain functions, an additional layer of complexity is added to the equation, which must be
considered when conducting a risk analysis of a supply chain.
Key Definition: Business Partner – A business partner is any individual or company whose actions may affect the chain of custody
security of goods being imported to or exported from the United States via a CTPAT Member’s supply chain. A business partner may
be any party that provides a service to fulfill a need within a company’s international supply chain. These roles include all parties
(both directly and indirectly) involved in the purchase, document preparation, facilitation, handling, storage, and/or movement of
cargo for, or on behalf, of a CTPAT Importer or Exporter Member. Two examples of indirect partners are subcontracted carriers and
overseas consolidation warehouses – arranged for by an agent/logistics provider.
4. Cybersecurity – In today’s digital world, cybersecurity is the key to safeguarding a company’s most precious assets – intellectual
property, customer information, financial and trade data, and employee records, among others. With increased connectivity to the
internet comes the risk of a breach of a company’s information systems. This threat pertains to businesses of all types and sizes.
Measures to secure a company’s information technology (IT) and data are of paramount importance, and the listed criteria provide a
foundation for an overall cybersecurity program for Members.
Key Definitions: Cybersecurity – Cybersecurity is the activity or process that focuses on protecting computers, networks, programs,
and data from unintended or unauthorized access, change or destruction. It is the process of identifying, analyzing, assessing, and
communicating a cyber-related risk and accepting, avoiding, transferring, or mitigating it to an acceptable level, considering costs
and benefits taken.
Information Technology (IT) – IT includes computers, storage, networking and other physical devices, infrastructure and processes
to create, process, store, secure, and exchange all forms of electronic data.
The frequency of the testing will depend on various factors including the
company’s business model and level of risk. For example, companies should run
these tests whenever there are changes to a business’s network infrastructure.
However, cyber-attacks are increasing among all sizes of businesses, and this needs
to be considered when designing a testing plan.
4.4 Cybersecurity policies should address how a Members are encouraged to share information on cybersecurity threats with the Should
Member shares information on cybersecurity Government and business partners within their supply chain. Information sharing
threats with the government and other business is a key part of the Department of Homeland Security's mission to create shared
partners. situational awareness of malicious cyber activity. CTPAT Members may want to
join the National Cybersecurity and Communications Integration Center (NCCIC -
https://www.us-cert.gov/nccic). The NCCIC shares information among public and
private sector partners to build awareness of vulnerabilities, incidents, and
mitigations. Cyber and industrial control systems users can subscribe to
information products, feeds, and services at no cost.
4.5 A system must be in place to identify Must
unauthorized access of IT systems/data or abuse
of policies and procedures including improper
access of internal systems or external websites
and tampering or altering of business data by
employees or contractors. All violators must be
subject to appropriate disciplinary actions.
4.8 Individuals with access to Information To guard IT systems against infiltration, user access must be safeguarded by going Must
Technology (IT) systems must use individually through an authentication process. Complex login passwords or passphrases,
assigned accounts. biometric technologies, and electronic ID cards are three different types of
authentication processes. Processes that use more than one measure are
Access to IT systems must be protected from preferred. These are referred to as two-factor authentication (2FA) or multi-factor
infiltration via the use of strong passwords, authentication (MFA). MFA is the most secure because it requires a user to
passphrases, or other forms of authentication present two or more pieces of evidence (credentials) to authenticate the person’s
and user access to IT systems must be identity during the log-on process.
safeguarded.
MFAs can assist in closing network intrusions exploited by weak passwords or
Passwords and/or passphrases must be changed stolen credentials. MFAs can assist in closing these attack vectors by requiring
as soon as possible if there is evidence of individuals to augment passwords or passphrases (something you know) with
compromise or reasonable suspicion of a something you have, like a token, or one of your physical features - a biometric.
compromise exists.
If using passwords, they need to be complex. The National Institute of Standards
and Technology's (NIST) NIST Special Publication 800-63B: Digital Identity
Guidelines, includes password guidelines (https://pages.nist.gov/800-63-3/sp800-
63b.html). It recommends the use of long, easy to remember passphrases instead
of words with special characters. These longer passphrases (NIST recommends
allowing up to 64 characters in length) are considered much harder to crack
because they are made up of an easily memorized sentence or phrase.
4.11 Cybersecurity policies and procedures should Computer software is intellectual property (IP) owned by the entity that created it. Should
include measures to prevent the use of Without the express permission of the manufacturer or publisher, it is illegal to
counterfeit or improperly licensed technological install software, no matter how it is acquired. That permission almost always takes
products. the form of a license from the publisher, which accompanies authorized copies of
software. Unlicensed software is more likely to fail as a result of an inability to
update. It is more prone to contain malware, rendering computers and their
information useless. Expect no warranties or support for unlicensed software,
leaving your company on its own to deal with failures. There are legal
consequences for unlicensed software as well, including stiff civil penalties and
criminal prosecution. Software pirates increase costs to users of legitimate,
authorized software and decrease the capital available to invest in research and
development of new software.
Members may want to have a policy that requires product key labels and
certificates of authenticity to be kept when new media is purchased. CDs, DVDs,
and USB media include holographic security features to help ensure you receive
authentic products and to protect against counterfeiting.
5. Conveyance and Instruments of International Traffic Security – Smuggling schemes often involve the modification of conveyances
and Instruments of International Traffic (IIT), or the hiding of contraband inside IIT. This criteria category covers security measures
designed to prevent, detect, and/or deter the altering of IIT structures or surreptitious entry into them, which could allow the
introduction of unauthorized material or persons.
At the point of stuffing/loading, procedures need to be in place to inspect IIT and properly seal them. Cargo in transit or “at rest” is
under less control, and is therefore more vulnerable to infiltration, which is why seal controls and methods to track
cargo/conveyances in transit are key security criteria.
Key Definition: Instruments of International Traffic (IIT) – IIT includes containers, flatbeds, unit load devices (ULDs), lift vans, cargo
vans, shipping tanks, bins, skids, pallets, caul boards, cores for textile fabrics, or other specialized containers arriving (loaded or
empty), in use or to be used in the shipment of merchandise in international trade.
Must /
ID Criteria Implementation Guidance
Should
5.1 Conveyances and Instruments of International Traffic (IIT) must be The secure storage of conveyances and Instruments of Must
stored in a secure area to prevent unauthorized access, which could International Traffic (both empty and full) is important to guard
result in an alteration to the structure of an Instrument of against unauthorized access.
International Traffic or (as applicable) allow the seal/doors to be
compromised.
5.2 The CTPAT inspection process must have written procedures for both With the prevalence of smuggling schemes that involve the Must
security and agricultural inspections. modification of conveyances or Instruments of International
Traffic, it is imperative that Members conduct inspections of
conveyances and Instruments of International Traffic to look for
visible pests and serious structural deficiencies. Likewise, the
prevention of pest contamination via conveyances and IIT is of
paramount concern, so an agricultural component has been
added to the security inspection process.
Tractors:
1. Bumper/tires/rims;
2. Doors, tool compartments and locking mechanisms;
3. Battery box;
4. Air breather;
5. Fuel tanks;
6. Interior cab compartments/sleeper; and
7. Faring/roof.
Trailers:
If the inspections are supervised, the supervisor should also sign the
checklist.
5.7 If visible pest contamination is found during the Keeping records on the types of contaminants found, where they Must
conveyance/Instruments of International Traffic inspection, were found (conveyance location), and how the pest
washing/vacuuming must be carried out to remove such contamination was eliminated, are helpful actions that may assist
contamination. Documentation must be retained for one year to Members in preventing future pest contamination.
demonstrate compliance with these inspection requirements.
5.11 A tracking and monitoring activity log or equivalent technology (such Conveyances are tracked to prevent them from being diverted to Must
as GPS) must be used to track the conveyance while it is en route to tamper with the load or structure of the conveyance/Instruments
the United States. If driver logs are used, the driver must record any of International Traffic to allow contraband to be introduced in
stops and note that inspections of the conveyance, Instruments of the shipment. Based on risk, transportation providers may want
International Traffic (IIT), and the seal were conducted. to track and monitor their conveyances/Instruments of
International Traffic in real time. There are many tracking tools
available to users free of charge via their smart cell phones. For
small carriers, applications such as Life 360, Find Friends from
Google, and WhatsApp allow users to track people and
conveyances.
5.14 CTPAT Members should work with their transportation providers to Should
track conveyances from origin to final destination point. Specific
requirements for tracking, reporting, and sharing of data should be
incorporated within terms of service agreements with service
providers.
5.16 For land border shipments that are in proximity to the United States Cargo at rest is cargo at risk. Scheduled stops would not be Should
border, a “no-stop” policy should be implemented with regard to covered by this policy, but would have to be considered in an
unscheduled stops. overall tracking and monitoring procedure.
5.20 Carriers should use electronic dispatch logs; the logs should be Electronic dispatch logs provide a more accessible means of Should
recorded and kept for audit purposes. conducting management oversight and enabling information to
be shared and/or compared with additional assessment data. It
is recommended that records of the logs be maintained for a
sufficient amount of time to allow for audits to be conducted and
for investigative purposes, if a breach were to occur in a supply
chain.
5.21 For cross-border shipments, pre-designated transit routes must be Waypoints are specific geographical locations defined by sets of Must
established, which include anticipated transit times between coordinates -longitude and latitude- used for navigational
waypoints. Once the time between the assigned points has been purposes, including driving or transit routes.
determined, for both peak and non-peak times, these times must be
recorded and incorporated into the tracking process. It is recommended waypoints include the length of time between
the yard to the loading point/trailer pickup, the U.S. border, and
If GPS technology is employed, geo-fencing must be implemented to the delivery destinations. If a stop is made to collect export
include alarm notification when a carrier deviates from the assigned documents or to verify seals, these can also be included as
route. The parameters for geo-fencing must be set at minimal waypoints.
allowable tolerances for the pre-established transit route.
5.22 Carriers must have systems or written procedures in place to respond Must
to significant route deviations and late arrivals to the loading
dock/area, transfer points, or the final destination. Drivers must notify
the dispatcher of any significant route delays due to weather, traffic,
and/or rerouting. Dispatch must independently verify the cause of
the delay.
5.23 After a stop, drivers must inspect the conveyance’s sealing or locking Must
devices for any signs of tampering prior to resuming the trip. These
inspections must be documented.
V – View seal and container locking mechanisms; ensure they are OK;
V – Verify seal number against shipment documents for accuracy;
T – Tug on seal to make sure it is affixed properly;
T – Twist and turn the bolt seal to make sure its components do not
unscrew, separate from one another, or any part of the seal becomes
loose.
5.26 Drivers must report and record any anomalies or unusual structural These include U.S. Department of Transportation (DOT) Must
modifications found on the conveyance following a Government inspections or other regulatory agency inspections. It also
inspection. includes inspections taking place in Mexico and Canada.
5.27 Management must regularly conduct random reviews of the tracking Random reviews are required to ensure tracking logs are properly Must
and monitoring procedures. The review findings must be recorded. maintained and conveyance tracking and monitoring procedures
The review must cover verification of the tracking log against time- are being followed. Time-indicative documents include fuel
indicative documents and internal systems; unaccounted transit time receipts, scale logs, toll receipts, ACE, Mexico SAT, broker status
lapses must also be included. Management should conduct periodic information, etc. Conducting en route verifications is a measure
random verifications en route. used in high risk areas to verify procedures are being followed in
“real time.”
5.28 CTPAT highway carriers should notify appropriate parties (e.g., Should
shipper, consignee, and importer) of any significant delays including
mechanical failures during transit.
Must /
ID Criteria Implementation Guidance
Should
6.1 CTPAT Members must have detailed, written high-security seal procedures Must
that describe how seals are issued and controlled at the facility and during
transit. Procedures must provide the steps to take if a seal is altered,
tampered with, or has the incorrect seal number, including documentation
of the event, communication protocols to partners, and investigation of the
incident. The findings from the investigation must be documented, and any
corrective actions must be implemented as quickly as possible.
Seal Discrepancies:
• Retain altered or tampered seals to aid in investigations.
• Investigate the discrepancy; follow-up with corrective measures (if
warranted).
• As applicable, report compromised seals to CBP and the appropriate
foreign government to aid in the investigation.
6.2 All CTPAT shipments that can be sealed must be secured immediately after The high-security seal used must be placed on the Must
loading/stuffing/packing by the responsible party (i.e. the shipper or packer Secure Cam position, if available, instead of the right
acting on the shippers behalf) with a high-security seal that meets or door handle. The seal must be placed at the bottom of
exceeds the most current International Organization for Standardization the center most vertical bar of the right container door.
(ISO) 17712 standard for high-security seals. Qualifying cable and bolt seals Alternatively, the seal could be placed on the center
are both acceptable. All seals used must be securely and properly affixed to most left-hand locking handle on the right container
Instruments of International Traffic that are transporting CTPAT Members’ door if the secure cam position is not available. If a bolt
cargo to/from the United States. seal is being used, it is recommended that the bolt seal
be placed with the barrel portion or insert facing upward
with the barrel portion above the hasp.
6.3 Less Than Truck Load (LTL) carriers must (at the very least) use a high Must
security padlock when picking up local freight in an international LTL
environment where consolidation hubs are not used. At the last pickup site
prior to crossing the border, the carrier must seal the load with an ISO
17712 compliant high-security seal.
LTL carriers must have strict controls limiting access to padlocks, keys, or
combinations that can open the padlocks.
6.7 CTPAT’s seal verification process must be followed to ensure all high- When applying cable seals, they need to envelop the Must
security seals (bolt/cable) have been affixed properly to Instruments of rectangular hardware base of the vertical bars in order
International Traffic, and are operating as designed. The procedure is to eliminate any upward or downward movement of the
known as the VVTT process: seal. Once the seal is applied, make sure that all slack
has been removed from both sides of the cable. The
V – View seal and container locking mechanisms; ensure they are OK; VVTT process for cable seals needs to ensure the cables
V – Verify seal number against shipment documents for accuracy; are taut. Once it has been properly applied, tug and pull
T – Tug on seal to make sure it is affixed properly; the cable in order to determine if there is any cable
T – Twist and turn the bolt seal to make sure its components do not slippage within the locking body.
unscrew, separate from one another, or any part of the seal becomes loose.
CTPAT recognizes that the technology used in supply chains continues to evolve. The terminology used throughout the criteria
references written, paper-based procedures, documents, and forms. Electronic documents and signatures, and other digital
technologies, however, are also acceptable ways to document required procedures.
The CTPAT Program is not designed to be a “one size fits all” model. Each company must decide (based on its risk assessment) how
to implement and maintain procedures. However, it is more effective to incorporate security processes within existing procedures
rather than create a separate manual for security protocols. This creates a more sustainable structure and helps emphasize that
supply chain security is everyone’s responsibility.
Must /
ID Criteria Implementation Guidance
Should
7.1 When cargo is staged overnight, or for an extended period of Must
time, measures must be taken to secure the cargo from
unauthorized access.
7.2 Cargo staging areas, and the immediate surrounding areas, must Preventative measures such as the use of baits, traps, or other Must
be inspected on a regular basis to ensure these areas remain free barriers can be used as necessary. Removal of weeds or reduction
of visible pest contamination. of overgrown vegetation may help in the elimination of pest
habitat within staging areas.
7.4 The loading/stuffing of cargo into containers/IIT should be Should
supervised by a security officer/manager or other designated
personnel.
7.12 Drivers must collect personal garbage and dispose of it before Must
entering the United States. Otherwise, the driver must declare it
to U.S. Customs and Border Protection, so it may be properly
disposed.
7.14 If legally allowed, and permissible under union rules, carriers Should
should conduct random screening of truck drivers’ luggage and
personal belongings. If any suspicious anomalies are found during
the screening, the carrier should document and report its findings
to U.S. Customs and Border Protection.
7.17 In accordance with U.S. Department of Transportation standards, Cargo at rest is cargo at risk. A comprehensive maintenance Should
CTPAT highway carriers should have a comprehensive vehicle program may help avoid unforeseen stops due to mechanical
preventive maintenance program in place and ensure the drivers issues.
are performing adequate checks of their vehicles. Maintenance
records should be kept for a minimum of one year.
7.18 In areas of high risk, where operationally feasible, the highway Should
carrier should use a convoy method (e.g., a minimum of two
trucks traveling together) to transport cargo. Each truck in the
convoy should have the means to communicate with the other
trucks in the convoy and with the dispatch staff.
7.30 Seal numbers should be electronically printed on the bill of lading Should
or other shipping documents.
7.31 CTPAT highway carriers (or an authorized party transmitting on The Trade Act of 2002 does not require highway carriers to Must
behalf of the carrier) must transmit an electronic manifest for transmit electronic information in advance to U.S. Customs and
bobtails and for empty containers/trailers prior to the arrival of Border Protection on empty containers – only for loaded
the conveyance at the U.S. Customs and Border Protection ones. CTPAT is requiring that the carrier submit the conveyance
primary booth using the Automated Commercial Environment and driver information before the truck arrives at a U.S. Customs
(ACE) Electronic Truck Manifest (e-Manifest) system. and Border Protection booth.
Key Definition: Pest contamination – The International Maritime Organization defines pest contamination as visible forms of
animals, insects or other invertebrates (alive or dead, in any lifecycle stage, including egg casings or rafts), or any organic material
of animal origin (including blood, bones, hair, flesh, secretions, excretions); viable or non-viable plants or plant products
(including fruit, seeds, leaves, twigs, roots, bark); or other organic material, including fungi; or soil, or water; where such products
are not the manifested cargo within instruments of international traffic (i.e. containers, unit load devices, etc.).
Must /
ID Criteria Implementation Guidance
Should
8.1 CTPAT Members must, in WPM is defined as wood or wood products (excluding paper products) used in supporting, protecting, Must
accordance with their or carrying a commodity. WPM includes items such as pallets, crates, boxes, reels, and dunnage.
business model, have written Frequently, these items are made of raw wood that may not have undergone sufficient processing or
procedures designed to treatment to remove or kill pests, and therefore remain a pathway for the introduction and spread of
prevent visible pest pests. Dunnage in particular has been shown to present a high risk of introduction and spread of
contamination to include pests.
compliance with Wood
Packaging Materials (WPM) The IPPC is a multilateral treaty overseen by the United Nation’s Food and Agriculture Organization
regulations. Visible pest that aims to secure coordinated, effective action to prevent and to control the introduction and
prevention measures must be spread of pests and contaminants.
adhered to throughout the
supply chain. Measures ISPM 15 includes internationally accepted measures that may be applied to WPM to reduce
regarding WPM must meet significantly the risk of introduction and spread of most pests that may be associated with WPM.
the International Plant ISPM 15 affects all wood packaging material requiring that they be debarked and then heat treated or
Protection Convention’s fumigated with methyl bromide and stamped or branded with the IPPC mark of compliance. This mark
(IPPC) International Standards of compliance is colloquially known as the "wheat stamp". Products exempt from the ISPM 15 are
for Phytosanitary Measures made from alternative materials, like paper, metal, plastic or wood panel products (i.e. oriented
No. 15 (ISPM 15). strand board, hardboard, and plywood).
9. Physical Security – Cargo handling and storage facilities, Instruments of International Traffic storage areas, and facilities where
import/export documentation is prepared in domestic and foreign locations must have physical barriers and deterrents that guard
against unauthorized access.
One of the cornerstones of CTPAT is flexibility, and security programs should be customized to fit each company’s circumstances.
The need for physical security can vary greatly based on the Member’s role in the supply chain, its business model, and level of risk.
The physical security criteria provides a number of deterrents/obstacles that will help prevent unwarranted access to cargo,
sensitive equipment, and/or information, and Members should employ these security measures throughout their supply chains.
Must /
ID Criteria Implementation Guidance
Should
9.1 All cargo handling and storage facilities, including trailer yards and offices Must
must have physical barriers and/or deterrents that prevent unauthorized
access.
9.2 Perimeter fencing should enclose the areas around cargo handling and Other acceptable barriers may be used instead of fencing, Should
storage facilities. If a facility handles cargo, interior fencing should be such as a dividing wall or natural features that are
used to secure cargo and cargo handling areas. Based on risk, additional impenetrable or, otherwise impede, access such as a steep
interior fencing should segregate various types of cargo such as domestic, cliff or dense thickets.
international, high value, and/or hazardous materials. Fencing should be
regularly inspected for integrity and damage by designated personnel. If
damage is found in the fencing, repairs should be made as soon as
possible.
9.4 Gates where vehicles and/or personnel enter or exit (as well as other It is recommended that the number of gates be kept to the Must
points of egress) must be manned or monitored. Individuals and vehicles minimum necessary for proper access and safety. Other
may be subject to search in accordance with local and labor laws. points of egress would be entrances to facilities that are
not gated.
9.5 Private passenger vehicles should be prohibited from parking in or Locate parking areas outside of fenced and/or operational Should
adjacent to cargo handling and storage areas, and conveyances. areas - or at least at substantial distances from cargo
handling and storage areas.
9.7 Security technology should be used to monitor premises and prevent Electronic security technology used to secure/monitor Should
unauthorized access to sensitive areas. sensitive areas and access points includes: burglary alarm
systems (perimeter and interior) –these are also known as
Intrusion Detection Systems (IDS); access control devices;
and video surveillance systems (VSS) -including Closed
Circuit Television Cameras (CCTVs). A CCTV/VSS system
could include components such as Analog Cameras (coax-
based), Internet Protocol-based (IP) cameras (network-
based), recording devices, and video management
software.
9.8 Members who rely on security technology for physical security must have Security technology needs to be tested on a regular basis Must
written policies and procedures governing the use, maintenance, and to ensure it is working properly. There are general
protection of this technology. guidelines to follow:
At a minimum, these policies and procedures must stipulate: • Test security systems after any service work and during
and after major repairs, modifications, or additions to a
• That access to the locations where the technology is controlled or building or facility. A system’s component may have been
managed is limited to authorized personnel; compromised, either intentionally or unintentionally.
• The procedures that have been implemented to test/inspect the • Test security systems after any major changes to phone
technology on a regular basis; or internet services. Anything that might affect the
system’s ability to communicate with the monitoring
• That the documented results of these inspections be maintained for a • Test to make sure security cameras are positioned
sufficient time for audit purposes. correctly and remain in the proper position (cameras may
have been deliberately or accidentally moved).
If a third party central monitoring station (off-site) is used, the CTPAT
Member must have written procedures stipulating critical systems
functionality and authentication protocols such as (but not limited to)
security code changes, adding or subtracting authorized personnel,
password revisions, and systems access or denials.
9.12 If camera systems are deployed, cameras should monitor a facility’s Sensitive areas, as appropriate, may include cargo handling Should
premises and sensitive areas to deter unauthorized access. Alarms and storage areas, shipping/receiving areas where import
should be used to alert a company to unauthorized access into sensitive documents are kept, IT servers, yards and storage areas
areas. for Instruments of International Traffic (IIT), areas where
IIT are inspected, and seal storage areas.
9.13 If camera systems are deployed, cameras must be positioned to cover Positioning cameras correctly is important to enable the Must
key areas of facilities that pertain to the import/export process. cameras to record as much as possible of the physical
“chain of custody” within the facility’s control.
Cameras should be programmed to record at the highest picture quality
setting reasonably available, and be set to record on a 24/7 basis. Based on risk, key areas or processes may include cargo
handling and storage; shipping/receiving; cargo loading
process, sealing process; conveyance arrival/exit; IT
servers; container inspections (security and agricultural);
seal storage; and any other areas that pertain to securing
international shipments.
9.15 If camera systems are deployed, periodic, random reviews of the camera If camera footage is only reviewed for cause (as part of an Must
footage must be conducted (by management, security, or other investigation following a security breach etc.), the full
designated personnel) to verify that cargo security procedures are being benefit of having cameras is not being realized. Cameras
properly followed in accordance with the law. Results of the reviews are not only investigative tools. If used proactively, they
must be summarized in writing to include any corrective actions taken. may help prevent a security breach from occurring in the
The results must be maintained for a sufficient time for audit purposes. first place.
Must /
ID Criteria Implementation Guidance
Should
10.1 CTPAT Members must have written procedures governing how Access devices include employee identification badges, visitor and Must
identification badges and access devices are granted, changed, vendor temporary badges, biometric identification systems,
and removed. proximity key cards, codes, and keys. When employees are
separated from a company, the use of exit checklists help ensure
Where applicable, a personnel identification system must be in that all access devices have been returned and/or deactivated.
place for positive identification and access control purposes. For smaller companies, where personnel know each other, no
Access to sensitive areas must be restricted based on job identification system is required. Generally, for a company with
description or assigned duties. Removal of access devices must more than 50 employees, an identification system is required.
take place when the employees separate from the company.
10.2 Visitors, vendors, and service providers must present photo Must
identification upon arrival, and a log must be maintained that
records the details of the visit. All visitors should be escorted. In
addition, all visitors and service providers should be issued
temporary identification. If temporary identification is used, it
must be visibly displayed at all times during the visit.
The cargo pickup log should have the following items recorded:
• Driver's name;
• Date and time of arrival;
• Employer;
• Truck number;
• Trailer number;
• Time of departure;
• The seal number affixed to the shipment at the time of
departure.
10.10 If security guards are used, work instructions for security guards Though guards may be employed at any facility, they are often Must
must be contained in written policies and procedures. employed at manufacturing sites, seaports, distribution centers,
Management must periodically verify compliance and storage yards for Instruments of International Traffic,
appropriateness with these procedures through audits and policy consolidator, and forwarders operating sites.
reviews.
Must /
ID Criteria Implementation Guidance
Should
11.1 Written processes must be in place to screen prospective CTPAT is aware that labor and privacy laws in certain countries Must
employees and to periodically check current employees. may not allow all of the application information to be verified.
Application information, such as employment history and However, due diligence is expected to verify application
references, must be verified prior to employment, to the extent information when permitted.
possible and allowed under the law.
11.2 In accordance with applicable legal limitations, and the availability Should
of criminal record databases, employee background screenings
should be conducted. Based on the sensitivity of the position,
employee vetting requirements should extend to temporary
workforce and contractors. Once employed, periodic
reinvestigations should be performed based on cause, and/or the
sensitivity of the employee’s position.
Must /
ID Criteria Implementation Guidance
Should
12.1 Members must establish and maintain a security training and Training topics may include protecting access controls, Must
awareness program to recognize and foster awareness of the recognizing internal conspiracies, and reporting procedures for
security vulnerabilities to facilities, conveyances, and cargo at each suspicious activities and security incidents. When possible,
point in the supply chain, which could be exploited by terrorists or specialized training should include a hands-on demonstration. If
contraband smugglers. The training program must be comprehensive a hands-on demonstration is conducted, the instructor should
and cover all of CTPAT’s security requirements. Personnel in allow time for the students to demonstrate the process.
sensitive positions must receive additional specialized training
geared toward the responsibilities that the position holds. For CTPAT purposes, sensitive positions include staff working
directly with import/export cargo or its documentation, as well
One of the key aspects of a security program is training. Employees as personnel involved in controlling access to sensitive areas or
who understand why security measures are in place are more likely equipment. Such positions include, but are not limited to,
to adhere to them. Security training must be provided to employees, shipping, receiving, mailroom personnel, drivers, dispatch,
as required based on their functions and position, on a regular basis, security guards, any individuals involved in load assignments,
and newly hired employees must receive this training as part of their tracking of conveyances, and/or seal controls.
orientation/job skills training.
V – View seal and container locking mechanisms; ensure they are OK;
V – Verify seal number against shipment documents for accuracy;
T – Tug on seal to make sure it is affixed properly; and
T – Twist and turn the bolt seal to make sure its components do not
unscrew or separate from one another.
12.9 Personnel operating and managing security technology systems must Must
receive operations and maintenance training in their specific areas.
Prior experience with similar systems is acceptable. Self-training via
operational manuals and other methods is acceptable.
12.10 Personnel must be trained on how to report security incidents and Procedures to report security incidents or suspicious activity are Must
suspicious activities. extremely important aspects of a security program. Training on
how to report an incident can be included in the overall security
training. Specialized training modules (based on job duties) may
have more detailed training on reporting procedures, including
specifics on the process, such as, what to report, to whom, how
to report the incident, and what to do after the report is
completed.