Subscriber price: $42.00, Non-subscriber price: $55.00
Estimated total study time: 5 hours 8 minutes
This course covers minimum supply chain security awareness and the "how to" operational security measures ("Minimum Security Criteria") required under the CTPAT program for employees of transportation intermediaries including consolidators, freight forwarders and NVO's, but excluding customs brokers (see S17u). It is designed to meet the CTPAT training requirement for employees who must understand, perform and/or otherwise comply with operational-level security measures. For more in-depth coverage including CTPAT benefits, application, certification, and validation requirements see S14u).
Note: Because the implementation of CTPAT security measures varies somewhat by company, this course, as is, can provide only general-purpose coverage of these topics. For companies with more than a few people to train, we recommend customization of this training to add company-specific security policy and procedures. The GISTware system which hosts this training facilitates such customization; please contact us for specifics.
CTPAT is an ongoing compliance effort consisting of mandatory security requirements that must be met based on certain types of businesses in the supply chain. Why do companies want to participate in CTPAT? In this lesson we begin to look at the specific requirements for participation and benefits based on business type.
(Estimated study time: 1 hour 30 minutes)
Transportation intermediaries must conduct a comprehensive assessment of their international supply chains based on CTPAT security guidelines. We will begin our look at specific security criteria for consolidators.
(Estimated study time: 1 hour 27 minutes)
Continuing with our comparison, this lesson covers minimum security critera for the protection of cargo and commercial supply chains, but also for protection of information and documentation regarding procedures and the movement of the cargo.
(Estimated study time: 1 hour 28 minutes)
Security breaches and threats are everyone's responsibility. This lesson covers how to recognize and report suspicious people, activities and shipments, what actions to avoid when a security threat is perceived and how to respond to possible security threats.
(Estimated study time: 43 minutes)