SlideShare une entreprise Scribd logo
1  sur  28
C-TPAT TRAINING
This is a sample PowerPoint on Security and general Threat Awareness.
All images and clip art were taken from open sources. We suggest you
consider using images of your employees within your faculty. This PowerPoint
is meant to be a guide and should be tailored and edited to suit your needs. It
is also suggested that you use your own slide background and colors scheme.
Security Training and Threat
Awareness Program
for
All Employees
We have recently joined with U.S. Customs and Border
Protection to help secure the international supply
chain. As a member of the Customs-Trade Partnership
Against Terrorism (C-TPAT) program, we have
committed ourselves to new and improved security
procedures throughout our operations. These new
procedures are designed to enhance the security of our
facilities, people, cargo shipping, cargo receiving and
cargo tracking processes. Our goal is to prevent cargo
loss and cargo tampering including the introduction of
illegal merchandise such as drugs and weapons of
mass destruction into our cargo boxes and containers.
As a part of our commitment to supply chain security,
we now require all of our employees to seriously
consider supply chain security as a significant risk to
our business.
Topics
Suspicious Persons
Suspicions Activities
Suspicious Objects or
Packages
Employee Identification
Visitor Controls
Computer Security
Document Security
Suspicious Persons

LOOK FOR…..
• Any person without
an employee
badge, visitor
badge or uniform.
•

These are stock photos, take and use actual photos
of your employees walking down a hallway. Or use
images from a surveillance camera
Suspicious Persons

…and ACT

• Determine if the person is an
employee or a visitor
– If an employee, remind them
always to display their ID
badge and uniform.
– If a visitor, escort them to the
reception area or to the
person with whom they are
visiting.
– Report the incident to your
immediate supervisor.
Suspicious Persons

LOOK FOR…..

Any person in
unauthorized/restricted areas
Suspicious Persons

AND ACT…..
 Get them out of the area
 If a visitor, escort them to the
reception area.
 Report the incident to your
immediate supervisor
Suspicious Persons

Cam 7

1:17:23AM

8/02/06

Look for ….

Any person:
 wearing an overcoat on a
95 degree day, or any kind
of inappropriate clothing
 waiting or loitering in an
area or hallway
 asking for an unknown
department, person or
employee
Suspicious Persons
LOOK FOR….

Any person:
 who seems not to belong
in the area
 going door to door, office
to office
 entering a private office
unescorted
 selling items
 who seems lost
Cam 7

1:17:23AM

8/02/06
Suspicious Persons

LOOK FOR …..

Any person:
 Tampering with somebody’s desk,
boxes, personal items, equipment,
vehicles, cameras, lights…
 running, especially if carrying
something
 hiding
behind doors, fences,
desks, …

Cam 7

1:17:23AM

8/02/06
Suspicious Persons

AND ACT………
 Immediately report the
incident to your
immediate supervisor
LOOK FOR …

Objects obstructing access points

Disconnected or obstructed
cameras

Broken locks or access control
systems

Unexplained clutter or debris

Objects thrown from a vehicle,
especially while traveling at a
high speed.
ACT …
 Immediately report any
suspicious activity to
your supervisor.
Suspicious Objects
or Packages

LOOK FOR….
• Unexplained objects or packages that look
strange or do not belong to the area
• Strange markings on boxes (unknown code,
color) or strange characteristics (weight,
number, odd shape)
• Strange leaking substance (powder, liquid,
etc…)
• Suspicious objects in the middle of an area
(e.g., hallway, lobby, etc.)
Suspicious Objects
or Packages
Suspicious Objects
or Packages

AND ACT………
 Immediately report any
suspicious packages or
objects to your
supervisor, security,
local police, 911 and/or
FBI.
Suspicious Objects
or Packages

•AND ACT…….
Employee Identification


Your Responsibilities
While on company property
 Your
company
identification badge must
be properly displayed and
worn at all times.
 Your company uniform (if
applicable) must be worn at
all times.
 Properly secure and protect
your ID badge, uniform,
keys and access control
card, etc.




Visitor Pre-meeting
Requirements
 Inform your visitor of the
company’s visitor policies
including
photo
identification, check in with
receptionist prior to their
visit.
Visitor Entrance Requirements
 Ensure that your visitor has
logged in and has been
issued a visitor badge




Visitor Escort Requirements
 You must escort your visitors
at ALL times
 Do not leave your visitor
unattended
Visitor Exit Requirements
 Ensure that your visitor has
logged out and has returned
the visitor badge to the
guard or receptionist
Visitor Entrance

Notify
hosting
employee

Document
arrival on
Visitor Log

Check
photo
identification

Issue
visitor
badge

Visitor Exit
Collect
visitor
badge

Document
departure
on Visitor
Log

Use colors and shapes of
you choosing.
Computer Security


Do not share access to your
computer with strangers



Log-off when you leave your
computer



Passwords should be changed
every 60 to 90 days



Do not share your password
with anyone



Do not write down your
password.
Selecting a Password


Use hard-to-guess passwords



Do not use the same password in
more than one place



A password should have a mix of
letters, numbers and symbols


I Love to be Secure

iL2bs@



Always on time to work !
AoT2wx



My Password is Very Secure
MyP1VS#



Yo Quiero Taco Bell

yqtb!10
Electronic Mail Restrictions
• Do not use company e-mail for
private business activities,
amusement or entertainment.
• Do not send e-mail containing racist,
sexist, threatening or other
objectionable language.
• Do not join mailing lists.
• Do not open unknown or
unexpected
e-mail
attachments.
Let’s review…

Suspicious persons
Suspicious activity
Suspicious objects or packages
Employee identification
Visitor controls
Computer security
Document security
Information technology security
Security is not out
of reach if you
practice it every
day.
QUESTIONS?
Refer to Customs & Border Protection Website:
http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/

or www.cbp.gov

Contenu connexe

Tendances

Industrial Safety Training by Author Stream
Industrial Safety Training by Author StreamIndustrial Safety Training by Author Stream
Industrial Safety Training by Author Stream
Atlantic Training, LLC.
 

Tendances (20)

Industrial Safety Training by Author Stream
Industrial Safety Training by Author StreamIndustrial Safety Training by Author Stream
Industrial Safety Training by Author Stream
 
Plan your security
Plan your securityPlan your security
Plan your security
 
New Employee Safety Orientation
New Employee Safety OrientationNew Employee Safety Orientation
New Employee Safety Orientation
 
24 th national road safety week 2013 ppt
24 th national road safety week 2013 ppt24 th national road safety week 2013 ppt
24 th national road safety week 2013 ppt
 
Warehouse safety
Warehouse safetyWarehouse safety
Warehouse safety
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
2.1 security officers
2.1 security officers2.1 security officers
2.1 security officers
 
Security training manual
Security training manualSecurity training manual
Security training manual
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_Presentation
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Gsk training general 2017
Gsk training general   2017Gsk training general   2017
Gsk training general 2017
 
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain SecurityCustoms-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
Customs-Trade Partnership Against Terrorism (C-TPAT): Supply Chain Security
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor ppt
 
Physical security
Physical securityPhysical security
Physical security
 
Bomb Threat Its Detection & Prevention
Bomb Threat Its Detection & PreventionBomb Threat Its Detection & Prevention
Bomb Threat Its Detection & Prevention
 
Housekeeping
HousekeepingHousekeeping
Housekeeping
 
Fire Extinguisher safety training
Fire Extinguisher safety trainingFire Extinguisher safety training
Fire Extinguisher safety training
 
Warehouse Safety & OSHA Regulations
Warehouse Safety & OSHA RegulationsWarehouse Safety & OSHA Regulations
Warehouse Safety & OSHA Regulations
 
safety training
safety training   safety training
safety training
 

En vedette

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
Atlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

En vedette (20)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guide
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security Awareness
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Similaire à Security Training and Threat Awareness by Pedraza

3e International Brochure
3e International Brochure3e International Brochure
3e International Brochure
Daniel Dilks
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
HaroldCo
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service Profile
Molefi Majoang
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security Protocol
IMAN
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Business
kassimjabar1
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............
Muhammad Saqib
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service Presentation
Helen de Klerk
 

Similaire à Security Training and Threat Awareness by Pedraza (20)

3e International brochure
3e International brochure3e International brochure
3e International brochure
 
3e International Brochure
3e International Brochure3e International Brochure
3e International Brochure
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-final
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in Hotels
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Security Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesSecurity Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security Services
 
Get Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonGet Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. Christianson
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Security Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSecurity Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation Slides
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service Profile
 
Nrs security profile
Nrs security profileNrs security profile
Nrs security profile
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security Protocol
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Business
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service Presentation
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
Expression of interest
Expression of interest Expression of interest
Expression of interest
 
A Practitioner's Guide to Event & Venue Management Session 2
A Practitioner's Guide to Event & Venue Management Session 2A Practitioner's Guide to Event & Venue Management Session 2
A Practitioner's Guide to Event & Venue Management Session 2
 

Plus de Atlantic Training, LLC.

Plus de Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Dernier

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 

Dernier (20)

WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
Lundin Gold - Q1 2024 Conference Call Presentation (Revised)
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Security Training and Threat Awareness by Pedraza

  • 1. C-TPAT TRAINING This is a sample PowerPoint on Security and general Threat Awareness. All images and clip art were taken from open sources. We suggest you consider using images of your employees within your faculty. This PowerPoint is meant to be a guide and should be tailored and edited to suit your needs. It is also suggested that you use your own slide background and colors scheme.
  • 2. Security Training and Threat Awareness Program for All Employees
  • 3. We have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.
  • 4. Topics Suspicious Persons Suspicions Activities Suspicious Objects or Packages Employee Identification Visitor Controls Computer Security Document Security
  • 5. Suspicious Persons LOOK FOR….. • Any person without an employee badge, visitor badge or uniform. • These are stock photos, take and use actual photos of your employees walking down a hallway. Or use images from a surveillance camera
  • 6. Suspicious Persons …and ACT • Determine if the person is an employee or a visitor – If an employee, remind them always to display their ID badge and uniform. – If a visitor, escort them to the reception area or to the person with whom they are visiting. – Report the incident to your immediate supervisor.
  • 7. Suspicious Persons LOOK FOR…..  Any person in unauthorized/restricted areas
  • 8. Suspicious Persons AND ACT…..  Get them out of the area  If a visitor, escort them to the reception area.  Report the incident to your immediate supervisor
  • 9. Suspicious Persons Cam 7 1:17:23AM 8/02/06 Look for ….  Any person:  wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing  waiting or loitering in an area or hallway  asking for an unknown department, person or employee
  • 10. Suspicious Persons LOOK FOR….  Any person:  who seems not to belong in the area  going door to door, office to office  entering a private office unescorted  selling items  who seems lost Cam 7 1:17:23AM 8/02/06
  • 11. Suspicious Persons LOOK FOR …..  Any person:  Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights…  running, especially if carrying something  hiding behind doors, fences, desks, … Cam 7 1:17:23AM 8/02/06
  • 12. Suspicious Persons AND ACT………  Immediately report the incident to your immediate supervisor
  • 13. LOOK FOR …  Objects obstructing access points  Disconnected or obstructed cameras  Broken locks or access control systems  Unexplained clutter or debris  Objects thrown from a vehicle, especially while traveling at a high speed.
  • 14. ACT …  Immediately report any suspicious activity to your supervisor.
  • 15. Suspicious Objects or Packages LOOK FOR…. • Unexplained objects or packages that look strange or do not belong to the area • Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) • Strange leaking substance (powder, liquid, etc…) • Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)
  • 17. Suspicious Objects or Packages AND ACT………  Immediately report any suspicious packages or objects to your supervisor, security, local police, 911 and/or FBI.
  • 19. Employee Identification  Your Responsibilities While on company property  Your company identification badge must be properly displayed and worn at all times.  Your company uniform (if applicable) must be worn at all times.  Properly secure and protect your ID badge, uniform, keys and access control card, etc.
  • 20.   Visitor Pre-meeting Requirements  Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements  Ensure that your visitor has logged in and has been issued a visitor badge
  • 21.   Visitor Escort Requirements  You must escort your visitors at ALL times  Do not leave your visitor unattended Visitor Exit Requirements  Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist
  • 22. Visitor Entrance Notify hosting employee Document arrival on Visitor Log Check photo identification Issue visitor badge Visitor Exit Collect visitor badge Document departure on Visitor Log Use colors and shapes of you choosing.
  • 23. Computer Security  Do not share access to your computer with strangers  Log-off when you leave your computer  Passwords should be changed every 60 to 90 days  Do not share your password with anyone  Do not write down your password.
  • 24. Selecting a Password  Use hard-to-guess passwords  Do not use the same password in more than one place  A password should have a mix of letters, numbers and symbols  I Love to be Secure iL2bs@  Always on time to work ! AoT2wx  My Password is Very Secure MyP1VS#  Yo Quiero Taco Bell yqtb!10
  • 25. Electronic Mail Restrictions • Do not use company e-mail for private business activities, amusement or entertainment. • Do not send e-mail containing racist, sexist, threatening or other objectionable language. • Do not join mailing lists. • Do not open unknown or unexpected e-mail attachments.
  • 26. Let’s review… Suspicious persons Suspicious activity Suspicious objects or packages Employee identification Visitor controls Computer security Document security Information technology security
  • 27. Security is not out of reach if you practice it every day.
  • 28. QUESTIONS? Refer to Customs & Border Protection Website: http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/ or www.cbp.gov

Notes de l'éditeur

  1. In the event you identify an employee or visitor that is not wearing an identification badge or uniform: If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situation If its a visitor, escort them to the reception area or to the person with whom they are visiting.
  2. If you identify an individual in an area he/she is prohibited from entering,
  3. If its an employee, approach them and ask them if they need assistance or contact management If it’s a visitor, escort them to the reception area or security guard Report suspicious activity to your immediate supervisor.
  4. Look for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here.
  5. Look for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost.
  6. Immediately report suspicious activity to your immediate supervisor.
  7. Security personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges. All visitors must be escorted and visibly display their visitor badge.