S19u—CTPAT Security Training and Threat Awareness for Exporter Personnel
Subscriber price: $43.00, Non-subscriber price: $56.00
Estimated total study time: 5 hours 27 minutes
This course covers minimum supply chain security awareness and the "how to" operational security measures ("Minimum Security Criteria") required under the CTPAT program for employees of U.S. exporters. It is designed to meet the CTPAT training requirement for employees who must understand, perform and/or otherwise comply with operational-level security measures.
Note: Because the implementation of CTPAT security measures varies somewhat by company, this course, as is, can provide only general-purpose coverage of these topics. For companies with more than a few people to train, we recommend customization of this training to add company-specific security policy and procedures. The GISTware system which hosts this training facilitates such customization; please contact us for specifics.
What is C-TPAT for Exporters?
C-TPAT is an ongoing compliance effort consisting of mandatory security requirements that must be met based on certain types of businesses in the supply chain. Why do companies want to participate in C-TPAT? In this lesson we begin to look at the specific requirements for participation and benefits based on business type.
(Estimated study time: 1 hour 37 minutes)
- What is CTPAT?
- Why do Foreign Suppliers, Transportation Carriers and Supply Chain Service Providers Join CTPAT?
- General Benefits of CTPAT Participation
- CTPAT Benefits for Exporters – General
- CTPAT "Tiered" Benefits to Eligible Exporters
- Specific Eligibility Requirements for U.S. Exporters
- Explanation of the C-TPAT Program Requirement Tables
- C-TPAT General Program Requirements
- C-TPAT General Program Requirements in General
- C-TPAT General Program Requirements Table
- Business Partner Requirements
- Business Partner Requirements in General
- Business Partner Requirements Table
- Fulfilling C-TPAT Point of Origin Requirements in General
C-TPAT Container and Conveyance Criteria
Exporters must conduct a comprehensive assessment of their international supply chains based on C-TPAT security guidelines. We will begin our look at specific security criteria for Exporters.
(Estimated study time: 1 hour 39 minutes)
- Container Security and Inspection Procedures
- Seal Verification and Inspection
- Sealing Criteria
- Seal Inspection Procedures
- CBP's View Verify Twist and Tug (VVTT) Method
- Requirements for Less-than Truck Load (LTL)
- Conveyance Tracking and Monitoring Procedures
- Conveyance Tracking and Monitoring for Highway Carriers
- Conveyance Tracking and Monitoring for Rail Carriers
CTPAT Protection of Cargo and Information
Continuing with our comparison, this lesson covers minimum security critera for the protection of cargo and commercial supply chains, but also for protection of information and documentation regarding procedures and the movement of the cargo.
(Estimated study time: 1 hour 28 minutes)
- Physical Access Controls
- Physical Access Controls in General
- Physical Access Controls Table
- Procedural Security
- Procedural Security in General
- Document Processing Security Procedures
- Procedural Security Table
- Physical Security
- Physical Security in General
- Physical Security Table
- Information Security—Protecting from Unauthorized Disclosure
- A Basic Imperative
- Information Security in Practice
- Verbal conversation
- Physical Documents
- Automated Systems and Networks
- Portable Media
- Social Media
- Disposing of Materials
- Consequences of Unauthorized Disclosure
- Identification and Authentication
CTPAT Security Threat Awareness and Risk Management
Security breaches and threats are everyone's responsibility. This lesson covers how to recognize and report suspicious people, activities and shipments, what actions to avoid when a security threat is perceived and how to respond to possible security threats.
(Estimated study time: 43 minutes)
- Threat-based "Risk Management"
- Changing Methods and Targets as Governments Tighten Security
- How to Recognize and Respond to Security Breaches and Possible Threats
- Everyone's Responsibility
- Recognizing and Reporting a Suspicious Person, Activity or Shipment
- People Who May Be a Security Concern
- Cargo and Situations that May Be a Security Concern
- Responding to a Possible Security Threat