| |
| |
List of Figures | |
| |
| |
About the Author | |
| |
| |
Introduction | |
| |
| |
| |
What Is Supply Chain Security? | |
| |
| |
| |
What Is a Supply Chain? | |
| |
| |
| |
Origin | |
| |
| |
| |
Manufacturing/Suppliers | |
| |
| |
| |
Handoffs | |
| |
| |
| |
Initial Service Provider | |
| |
| |
| |
Service Providers | |
| |
| |
| |
Tracking | |
| |
| |
| |
Ocean Shipping | |
| |
| |
| |
Airlines | |
| |
| |
| |
Third-Party Logistics Providers | |
| |
| |
| |
PODs | |
| |
| |
| |
Elements That Impact the Supply Chain | |
| |
| |
| |
Operations | |
| |
| |
| |
Contracts | |
| |
| |
| |
Customer Demands, Written and Nonwritten | |
| |
| |
| |
Provider Capability | |
| |
| |
| |
Geography | |
| |
| |
| |
Force Majeure/Acts of God | |
| |
| |
| |
Crime | |
| |
| |
| |
Volume | |
| |
| |
| |
Storage Capacity | |
| |
| |
| |
Government Controls | |
| |
| |
References | |
| |
| |
| |
Security: Supply Chain versus Corporate | |
| |
| |
| |
Focus of the Program | |
| |
| |
| |
Corporate Culture | |
| |
| |
| |
Supplier and Provider Relationships | |
| |
| |
References | |
| |
| |
| |
Developing a Supply Chain Security Program | |
| |
| |
| |
Security for Key Links in the Chain | |
| |
| |
| |
Origin | |
| |
| |
| |
Security Reviews of Origin | |
| |
| |
| |
Actions | |
| |
| |
| |
Customers | |
| |
| |
| |
Providers | |
| |
| |
| |
Provider Security Review | |
| |
| |
| |
CCTV | |
| |
| |
| |
Access Controls | |
| |
| |
| |
Intrusion Alarms | |
| |
| |
| |
Storage and Distribution | |
| |
| |
| |
Security Review of Facility and Location | |
| |
| |
| |
Transportation Security Review | |
| |
| |
| |
Basics for Transportation | |
| |
| |
| |
Shipping and Receiving | |
| |
| |
| |
Destination Concerns | |
| |
| |
| |
Elements of a Successful Supply Chain Security Program | |
| |
| |
| |
Goal of the Supply Chain Security Program | |
| |
| |
| |
Theft and Pilferage | |
| |
| |
| |
Smuggling and Contamination | |
| |
| |
| |
Antiterrorism | |
| |
| |
| |
Government Supply Chain Security Program Compliance | |
| |
| |
| |
Customer Contractual Obligations | |
| |
| |
| |
Risk Management | |
| |
| |
| |
Industry Positioning and Branding | |
| |
| |
| |
Marketing and Sales | |
| |
| |
References | |
| |
| |
| |
Methodology for Supply Chain Security | |
| |
| |
| |
Integration into the Business | |
| |
| |
| |
Business Unit Support | |
| |
| |
| |
Structure and Reporting | |
| |
| |
| |
Responsibilities and Roles | |
| |
| |
| |
Policies and Procedures | |
| |
| |
| |
Training | |
| |
| |
| |
Classifications | |
| |
| |
| |
Security Auditing and Assessments | |
| |
| |
| |
Information Technology | |
| |
| |
| |
Liaisons | |
| |
| |
References | |
| |
| |
| |
Budgeting | |
| |
| |
| |
Justification | |
| |
| |
| |
Internal versus External | |
| |
| |
| |
Own or Rent? | |
| |
| |
| |
Regulation and Resource | |
| |
| |
| |
Government and Industry Supply Chain Security Programs | |
| |
| |
| |
C-TPAT (Customs-Trade Partnership against Terrorism) | |
| |
| |
| |
A Growing Partnership | |
| |
| |
| |
Extending the Zone of U.S. Border Security | |
| |
| |
| |
How It Works | |
| |
| |
| |
An Emerging Focus: Mutual Recognition Arrangements | |
| |
| |
| |
PIP (Partners in Protection) | |
| |
| |
| |
History | |
| |
| |
| |
Modernization | |
| |
| |
| |
Mutual Recognition | |
| |
| |
| |
Harmonization of PIP and C-TPAT | |
| |
| |
| |
FAST (Free and Secure Trade) | |
| |
| |
| |
How It Works | |
| |
| |
| |
Benefits | |
| |
| |
| |
FAST-Eligible Goods | |
| |
| |
| |
BASC (Business Alliance for Secure Commerce) | |
| |
| |
| |
Mission | |
| |
| |
| |
Vision | |
| |
| |
| |
Specific Objectives | |
| |
| |
| |
AEO (Authorized Economic Operator) | |
| |
| |
| |
AEO Guidelines | |
| |
| |
| |
CCSP (Certified Cargo Screening Program) | |
| |
| |
| |
Background | |
| |
| |
| |
Program Overview | |
| |
| |
| |
Benefits | |
| |
| |
| |
TAPA (Transported Asset Protection Association) | |
| |
| |
| |
About TAPA | |
| |
| |
| |
HVTT Asset Theft: A Shared Problem | |
| |
| |
| |
Standards Lead to Solutions | |
| |
| |
| |
Resources and Technology for Supply Chain Security | |
| |
| |
| |
GPS (Global Positioning System) | |
| |
| |
| |
GSM (Global System for Mobile Communications) | |
| |
| |
| |
Trucking-Focused Devices | |
| |
| |
| |
Asset Tracking and Radio Frequency Identification (RFID) | |
| |
| |
| |
Taping/Wrapping | |
| |
| |
| |
Seals | |
| |
| |
| |
Screening | |
| |
| |
| |
Case Studies | |
| |
| |
| |
Case Studies | |
| |
| |
| |
Case Study 1: Ocean Container Theft, Port of Newark, NJ | |
| |
| |
| |
Case Study 2: Pilfering within a "Knitting" and Distribution Operation | |
| |
| |
| |
Case Study 3: Truck Theft | |
| |
| |
| |
Case Study 4: Parcel Network Operation Pilferage | |
| |
| |
| |
Case Study 5: Latin America Warehouse Assault | |
| |
| |
| |
Appendices | |
| |
| |
| |
Sample Customer Security Requirements | |
| |
| |
| |
Sample Policy/Procedure | |
| |
| |
| |
Sample Security Review/Audit | |
| |
| |
| |
Sample Security Budget | |
| |
| |
| |
List of Acronyms | |
| |
| |
Index | |