S21u—CTPAT Security Training and Threat Awareness for Importer Personnel
Subscriber price: $42.00, Non-subscriber price: $56.00
Estimated total study time: 5 hours 25 minutes
New CTPAT guidelines were issued May 3, 2019. These new requirements must be implemented by the end of 2019. If not in urgent need, please stand by. We will have updated training ready for your Phase 2 Education, Training and Awareness implementation. The following schedule can be used if these 4 Phases are completed equally:
- Phase 1 by June 30: Cybersecurity, Conveyance and IIT Security, and Seal Security
- Phase 2 by August 31: Education, Training, and Awareness; Business Partner Security; Risk Assessment
- Phase 3 by October 31: Security Vision and Responsibility, Physical Security, Physical Access Controls
- Phase 4 by December 31: Agricultural Security, Personnel Security, Procedural Security
This course covers minimum supply chain security awareness and the "how to" operational security measures ("Minimum Security Criteria") required under the C-TPAT program for employees of U.S. importers. It is designed to meet the C-TPAT training requirement for employees who must understand, perform and/or otherwise comply with operational-level security measures. For more in-depth coverage including CTPAT benefits, application, certification, and validation requirements see S11u).
Note: Because the implementation of C-TPAT security measures varies somewhat by company, this course, as is, can provide only general-purpose coverage of these topics. For companies with more than a few people to train, we recommend customization of this training to add company-specific security policy and procedures. The GISTware system which hosts this training facilitates such customization; please contact us for specifics.
What is C-TPAT for Importers?
C-TPAT is an ongoing compliance effort consisting of mandatory security requirements that must be met based on certain types of businesses in the supply chain. Why do companies want to participate in C-TPAT? In this lesson we begin to look at the specific requirements for participation and benefits based on business type.
(Estimated study time: 1 hour 25 minutes)
- What is CTPAT?
- Why do Foreign Suppliers, Transportation Carriers and Supply Chain Service Providers Join CTPAT?
- General Benefits of CTPAT Participation
- CTPAT Benefits for Importers – General
- CTPAT "Tiered" Benefits to Eligible Importers
- Specific Eligibility Requirements for Importers
- Explanation of the CTPAT Program Requirement Tables
- CTPAT Corporate Security Requirements
- CTPAT General Program Requirements
- Business Partner Requirements
- Business Partner Requirements
- Fulfilling CTPAT Point of Origin Requirements in General
CTPAT Container and Sealing Requirements
Transportation intermediaries must conduct a comprehensive assessment of their international supply chains based on CTPAT security guidelines. We will begin our look at specific security criteria for consolidators.
(Estimated study time: 1 hour 27 minutes)
- Container Security and Inspection Procedures
- Seal Verification and Inspection
- Sealing Criteria
- Seal Inspection Procedures
- CBP's View Verify Twist and Tug (VVTT) Method
- Requirements for Less-than Truck Load (LTL)
CTPAT Protection of Cargo and Information
Continuing with our comparison, this lesson covers minimum security critera for the protection of cargo and commercial supply chains, but also for protection of information and documentation regarding procedures and the movement of the cargo.
(Estimated study time: 1 hour 51 minutes)
- Physical Access Controls
- Physical Access Controls in General
- Physical Access Controls Table
- Procedural Security
- Procedural Security in General
- Document Processing Security Procedures
- Procedural Security Table
- Physical Security
- Physical Security in General
- Physical Security Table
- Information Technology (IT) Security
- Information Technology (IT) Security in General
- Information Technology (IT) Security Table
- Fulfilling CTPAT Information Technology Security Criteria
- Information Security—Protecting from Unauthorized Disclosure
- Information Security in Practice
- Verbal conversation
- Physical Documents
- Automated Systems and Networks
- Portable Media
- Social Media
- Disposing of Materials
- Consequences of Unauthorized Disclosure
- Identification and Authentication
CTPAT Security Threat Awareness and Risk Management
Security breaches and threats are everyone's responsibility. This lesson covers how to recognize and report suspicious people, activities and shipments, what actions to avoid when a security threat is perceived and how to respond to possible security threats.
(Estimated study time: 43 minutes)
- Threat-based "Risk Management"
- Changing Methods and Targets as Governments Tighten Security
- How to Recognize and Respond to Security Breaches and Possible Threats
- Everyone's Responsibility
- Recognizing and Reporting a Suspicious Person, Activity or Shipment
- People Who May Be a Security Concern
- Cargo and Situations that May Be a Security Concern
- Responding to a Possible Security Threat