Skip to content

Supply Chain Security A Comprehensive Approach

Spend $50 to get a free movie!

ISBN-10: 1466511877

ISBN-13: 9781466511873

Edition: 2013

Authors: Arthur G. Arway

List price: $120.00
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
We're sorry. This item is currently unavailable.
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

The supply chain is a complex system, comprised of numerous entities integrated into the cargo, transportation, storage, documentation, and handling of its material goods. Each entity has its own unique relationship with the chain and its own security requirements. Securing the supply chain is not just a domestic issue. In the 21st century global economy, it is an international one. Companies must integrate security into supply chain logistics to protect their employees, assets, and clients from negative events that can have an adverse impact on their fiscal health. The book illustrates how a provider can institute and employ sound supply chain, logistics and transportation security…    
Customers also bought

Book details

List price: $120.00
Copyright year: 2013
Publisher: Taylor & Francis Group
Publication date: 4/11/2013
Binding: Hardcover
Pages: 192
Size: 6.50" wide x 9.50" long x 0.75" tall
Weight: 0.968
Language: English

List of Figures
About the Author
Introduction
What Is Supply Chain Security?
What Is a Supply Chain?
Origin
Manufacturing/Suppliers
Handoffs
Initial Service Provider
Service Providers
Tracking
Ocean Shipping
Airlines
Third-Party Logistics Providers
PODs
Elements That Impact the Supply Chain
Operations
Contracts
Customer Demands, Written and Nonwritten
Provider Capability
Geography
Force Majeure/Acts of God
Crime
Volume
Storage Capacity
Government Controls
References
Security: Supply Chain versus Corporate
Focus of the Program
Corporate Culture
Supplier and Provider Relationships
References
Developing a Supply Chain Security Program
Security for Key Links in the Chain
Origin
Security Reviews of Origin
Actions
Customers
Providers
Provider Security Review
CCTV
Access Controls
Intrusion Alarms
Storage and Distribution
Security Review of Facility and Location
Transportation Security Review
Basics for Transportation
Shipping and Receiving
Destination Concerns
Elements of a Successful Supply Chain Security Program
Goal of the Supply Chain Security Program
Theft and Pilferage
Smuggling and Contamination
Antiterrorism
Government Supply Chain Security Program Compliance
Customer Contractual Obligations
Risk Management
Industry Positioning and Branding
Marketing and Sales
References
Methodology for Supply Chain Security
Integration into the Business
Business Unit Support
Structure and Reporting
Responsibilities and Roles
Policies and Procedures
Training
Classifications
Security Auditing and Assessments
Information Technology
Liaisons
References
Budgeting
Justification
Internal versus External
Own or Rent?
Regulation and Resource
Government and Industry Supply Chain Security Programs
C-TPAT (Customs-Trade Partnership against Terrorism)
A Growing Partnership
Extending the Zone of U.S. Border Security
How It Works
An Emerging Focus: Mutual Recognition Arrangements
PIP (Partners in Protection)
History
Modernization
Mutual Recognition
Harmonization of PIP and C-TPAT
FAST (Free and Secure Trade)
How It Works
Benefits
FAST-Eligible Goods
BASC (Business Alliance for Secure Commerce)
Mission
Vision
Specific Objectives
AEO (Authorized Economic Operator)
AEO Guidelines
CCSP (Certified Cargo Screening Program)
Background
Program Overview
Benefits
TAPA (Transported Asset Protection Association)
About TAPA
HVTT Asset Theft: A Shared Problem
Standards Lead to Solutions
Resources and Technology for Supply Chain Security
GPS (Global Positioning System)
GSM (Global System for Mobile Communications)
Trucking-Focused Devices
Asset Tracking and Radio Frequency Identification (RFID)
Taping/Wrapping
Seals
Screening
Case Studies
Case Studies
Case Study 1: Ocean Container Theft, Port of Newark, NJ
Case Study 2: Pilfering within a "Knitting" and Distribution Operation
Case Study 3: Truck Theft
Case Study 4: Parcel Network Operation Pilferage
Case Study 5: Latin America Warehouse Assault
Appendices
Sample Customer Security Requirements
Sample Policy/Procedure
Sample Security Review/Audit
Sample Security Budget
List of Acronyms
Index