Security Training (Technical Pankaj)
Security Training
1. PURPOSE:
In order to avoid operational errors due to human factors as a result of impairment of the computer system, maintain the company computer system security to ensure permit normal operation, to further improve the company's computer office efficiency, the need to develop security response using the specification.
2. SCOPE:
For full use of all plant personnel computers.
3. DEFINITIONS:
C-TPAT (Customs–Trade Partnership against Terrorism) is a voluntary, joint government-business partnership to help add to supply chain and increase border security.
4. REFERENCES:
CTPAT Sheet.
SER Sheet.
CBP Guideline.
5. ACRONYMS:
C-TPAT Customs-Trade
Partnership against Terrorism
CBP U.S.
Customs and Border Protection
OEC ORIENTAL
ENGINEERING COMPANY
R Responsible
– Who is completing the task.
A Accountable
– Who is making decisions and taking actions on the task(s).
C Consulted
– Who will be communicated with regarding decisions and tasks.
I Informed
– Who will be updated on decisions and actions during the project.
6. AUTHORITY AND RESPONSIBILITY:
ABC Company organizes CTPAT roles and responsibility by RACI Chart so that everyone
knows what’s happening. With RACI, map out who is Responsible, is Accountable,
must be consulted with, and shall stay Informed.
ABC-CTPAT-Data Matrix chart is used for defined responsibilities and Authority for this procedure.
7. THREAT AWARENESS:
Factory management should take steps to recognize and foster awareness of the threat posed by terrorists.
The factory should designate a senior level employee to keep up with the latest developments in terms of Customs Initiatives and new regulations, as well as terrorism threat levels, and security techniques. This person should be encouraged to attend seminars and workshops.
Factories should join security initiatives open to them, such as regional and industry initiatives. These programs provide very good training opportunities and an offer the opportunity to keep up with the latest developments regarding security.
The factory should conduct internal audits of its security practices and maintain records of these audit findings as well as corrective actions that have been implemented as a result of such audits. Internal audits should be performed annually, and records retained for two years.
Employees who point out suspicious behavior to management should be rewarded for their active participation in the security program. The same applies for employees who find cartons that have been tampered with, discover and report internal conspiracies, or alert security to an unidentified person on the premises, etc. Rewards and recognition can take many forms. It should be clear to all that the employee’s identity will be kept confidential.
Factories should involve every employee in creating a secure production environment. It should be emphasized that security does concern everyone.
8. EMPLOYEE
TRAINING ON THREAT AWARENESS:
All employees should be trained in basic security procedures.
- Recognizing internal conspiracies: Employees must be encouraged to report suspicious behavior among their coworkers or supervisors directly to senior management. In addition, they must have a way of reporting such suspicions anonymously. Signs of internal conspiracies include: sudden unexplained wealth, an insistence on always working with the same person or in the same area of the warehouse, etc.
- Challenging unauthorized access: Employees must be instructed to immediately alert security or their supervisor if they notice any person on the premises who is not wearing an employee or visitor’s badge, or see someone in a restricted area who is not authorized to be there.
Security
Quick Tips: Employee Training
9. SECURITY
GUARDS:
Comments
Post a Comment