S14u—CTPAT for Transportation Intermediaries (Managers, Supervisors)
Subscriber price: $110.00, Non-subscriber price: $142.00
Estimated total study time: 7 hours 42 minutes
This course addresses supply chain security awareness and the operational security measures ("Minimum Security Criteria") required under the CTPAT program for employees of transportation intermediaries including consolidators and NVO's, but excluding customs brokers (see S12u). It is designed to meet the CTPAT training requirement for managers and supervisors who must understand, perform and/or otherwise comply with operational-level security measures. It also covers CTPAT benefits, application, certification, validation and program requirements.
Note: Because the implementation of CTPAT security measures varies somewhat by company, this course, as is, can provide only general-purpose coverage of these topics. For companies with more than a few people to train, we recommend customization of this training to add company-specific security policy and procedures. The GISTware system which hosts this training facilitates such customization; please contact us for specifics.
The Transportation Intermediaries Place in the Supply Chain (C-TPAT)
In order to recognize and foster awareness and reporting of threats posed by terrorists and contraband smugglers at each point in the supply chain, it is first important to understand what a supply chain is and where you, the C-TPAT participant, fit into the equation.
(Estimated study time: 1 hour 6 minutes)
- Supply Chains for Every Person and Organization
- Essence of a Supply Chain
- Simple vs. Complex Supply Chains
- Stable vs. Dynamic Supply Chains
- Relationship between "Logistics" and "Supply Chains"
- General—Logistics Enables a Supply Chain
- Third-Party Logistics ("3PL")
- What Does a Third-Party Logistics Provider (3PL) Look Like?
- Transportation Intermediaries as Part of the Logistics Link in the Supply Chain
- Freight Consolidators (Indirect Carriers) as Transportation Intermediaries
Cargo and Supply Chain Security for Transportation Intermediaries (C-TPAT)
Many different security measures can be used to combat both traditional and terrorist threats. C-TPAT is just one of the features of cargo and supply chain security. Understanding these measures will make it easier to see what measures are employed within your company. In addition, it will be easier to see if there may be gaps in security.
(Estimated study time: 51 minutes)
- What Does a Commercial Supply Chain Look Like?
- Form Follows Function
- Example 1: Small Construction Contractor
- Example 2: Chain Retailer with Multiple Foreign and Domestic Suppliers
- Example 3: Complex Automobile or Aircraft Manufacturer
- Security Essential to Supply Chain Effectiveness
- Threat-based "Risk Management"
Governmental Concerns over Cargo and Supply Chain Security (CTPAT)
Countries around the world are worried about terrorism. Terrorists need a supply chain and logistics to function and carry out attacks in order to damage the economy of a country. This lesson delves into the use of transportation conveyances as weapons, threats to transportation assets and infrastructure, and preventing terrorist use of commercial transportation.
(Estimated study time: 47 minutes)
- Traditional Supply Chain Risks vs. Terrorist Threats
- Traditional Cargo and Supply Risks
- Terrorism Depends on Availability of Transportation
- Terrorists Depend upon Logistics
- Preventing Terrorist Use of Commercial Transportation
- Transportation Security Threats from Terrorists
- Threat TO Transportation Assets and Infrastructure
- Use OF Transportation (The Logistics of Terrorism)
- Transportation Conveyances as Weapons
- Governmental Concerns over Cargo and Supply Chain Security
- General—Threats that Go beyond Purely Commercial Concern
- Piracy and Vessel Hijacking
- Air Piracy, Aircraft Hijacking
- Terrorist Threats
Security Threat Awareness and Government Action (CTPAT)
The U.S. government has been very focused on security. One of the security measures that has been put into place is CTPAT. This lesson will develop awareness of the changes in the targets and methods terrorists may use to adapt to the new tightened security.
(Estimated study time: 1 hour 10 minutes)
- Terrorist Attacks Abroad
- Terrorist Attacks in the United States
- Logistics Used in Actual Terrorist Attacks
- From Government Reaction to Pro-action
- Government Reorganization; the DHS
- Threat (Target) Categories
- Strategic and Symbolic Targets
- Opportunistic Targets
- Transportation Assets and Infrastructure
- Long History of Attacks against International Aviation
- Reducing Vulnerability of Air Cargo to Terrorist Use
- Special Concern over Terrorist Use of Intermodal Containers
- Concern over Attacks using all Modes of Transportation
- Changing Methods and Targets as Governments Tighten Security
To Be, or Not to Be, in C-TPAT? (CTPAT)
Why do companies want to participate in CTPAT? Find out the types of businesses that are eligible. There are specific requirements for participation and benefits based on business type.
(Estimated study time: 1 hour 4 minutes)
- What is CTPAT?
- CTPAT Participant Categories
- The Decision to Participate in C-TPAT
- Why Participate in C-TPAT?
- C-TPAT Security Measures—"Minimum Security Standards"
- Why do Foreign Suppliers, Transportation Carriers and Supply Chain Service Providers Join CTPAT?
- Benefits of CTPAT Participation
- General Benefits of CTPAT Participation
- CTPAT Benefits for Exporters – General
- CTPAT "Tiered" Benefits to Eligible Exporters
- CTPAT Benefits for Importers – General
- CTPAT "Tiered" Benefits to Eligible Importers
- CTPAT Benefits for Foreign Manufacturers
- CTPAT Benefits for Supply Chain Service Providers
Certification, Validation and Program Requirements for Transportation Intermediaries (C-TPAT)
This lesson covers application, certification and validation of C-TPAT. C-TPAT is an ongoing compliance effort consisting of mandatory security requirements that must be met based on certain types of businesses in the supply chain. We look at a comparison of security requirements for four of these business types.
(Estimated study time: 1 hour 32 minutes)
- Application and Certification Process
- After You Are "Certified" (Accepted) into C-TPAT
- CBP Account Manager and Monitoring
- Supply Chain Security Risk Assessment
- C-TPAT Enforcement and Appeal Process
- Explanation of the C-TPAT Program Requirement Tables
- Specific Eligibility Requirements for Transportation Intermediaries
- C-TPAT General Program Requirements
- C-TPAT General Program Requirements in General
- C-TPAT General Program Requirements Table
- Business Partner Requirements
- Business Partner Requirements in General
- Business Partner Requirements Table
- Container and Trailer Security (Point of Origin, Transfer Points, Delivery Point)
- Container and Trailer Security in General
- Container and Trailer Security Table
Compliance with C-TPAT Regulations for Transportation Intermediaries (C-TPAT)
Continuing with our comparison, this lesson covers minimum security criterion for the protection of cargo and commercial supply chains, but also for protection of information regarding the movement of the cargo.
(Estimated study time: 43 minutes)
- Physical Access Controls
- Physical Access Controls in General
- Physical Access Controls Table
- Personnel Security
- Personnel Security in General
- Personnel Security Table
- Document Processing Security Procedures
- Procedural Security
- Procedural Security in General
- Document Processing Security Procedures
- Procedural Security Table
- Threat Awareness and Security Training
- Threat Awareness and Security Training in General
- Threat Awareness and Security Training Table
- Physical Security
- Physical Security in General
- Physical Security Table
- Information Technology (IT) Security
- Information Technology (IT) Security in General
- Information Technology (IT) Security Table
- Additional C-TPAT Security Measures for "Consolidators" (Air & Ocean Forwarders, NVOs)
Recognizing and Reporting Potential Threats (CTPAT)
Security breaches and threats are everyone's responsibility. This lesson covers how to recognize and report suspicious people, activities and shipments, what actions to avoid when a security threat is perceived and how to respond to possible security threats.
(Estimated study time: 28 minutes)
- How to Recognize and Respond to Security Breaches and Possible Threats
- Everyone's Responsibility
- Recognizing and Reporting a Suspicious Person, Activity or Shipment
- People Who May Be a Security Concern
- Cargo and Situations that May Be a Security Concern
- Responding to a Possible Security Threat