C-TPAT

October 7, 2015

Dear Client of Ormsby International

Subject: Security Procedures for Containers at the Point of Stuffing & Container Seals

Thank you very much for your continued support of Ormsby International. We appreciate your kind support. As part of Ormsby International’s participation we at the request of Customs are forwarding important correspondence from Customs regarding container security procedures and seals for those containers.

Security guidelines suggested by Customs, including a 7-point container inspection checklist for containers arriving at your facility from overseas are attached. Ormsby International strongly recommends that you take the time not only to read the correspondence but to ensure that the guidelines for arriving containers become company policy and security procedures for containers leaving departing country are met by your oversea partners as well. Also please refer to the attached 17-point security inspection process checklist for all trailers/tractors arriving at your facility from overseas and or Mexico and Canada. Please use these checklists and make their completion with each inbound shipment from overseas, company policy.

Container Station Overseas

Overseas at the point of stuffing, procedures must be in place to inspect, properly seal and maintain the integrity of shipping containers/trailers bound for the U.S. Please ensure that your overseas freight forwarder, shipper, NVOCC, and or steamship line makes sure that proper security procedures are in place.

Integrity of Seals

All seals must meet or exceed the current PAS ISO 17712 standards for high security seals. Ormsby International seeks to employ carriers, forwarders, and suppliers that comply with, or will make required improvements to satisfy, the C-PAT conveyance security criteria. Please ensure that your containers meet these standards. Any compromised seals should be reported immediately to Ormsby International or directly to Customs.

Ormsby International has been a participant in the Customs-Trade Partnership against Terrorism (C-TPAT) for the past 8 years. It has been a very rewarding experience for us. We try to encourage all of our trade partners to at least try to implement some of the security standards that Customs has set for us.

Customs objective is to strengthen the overall supply chain and border security. Customs requests the assistance of every person or entity who is involved in logistics, distribution, or supply chain management to create a more secure global trading system. Customs expects Importers to police

themselves by following the suggestions offered by C-TPAT and be able to demonstrate to Customs that the critical aspects of this process are under control throughout their supply chain.

We would like to encourage you to join C-TPAT. Additional information regarding C-TPAT and membership as well as C-TPAT’s minimum security criteria can be found at CBP’s website (www.cbp.gov).

We appreciate your kind cooperation.

Very sincerely yours,

Richard W. Ormsby JD CHB

President

Ormsby International CHB, Inc.

 

The Five Step Risk Assessment Process includes:

  1. Mapping Cargo/Data Flow and Control and Identifying Business Partners (whether directly or indirectly contracted) and how cargo moves throughout the supply chain to include modes of transportation (air, sea, rail, or truck) and nodes (country of origin, transit points).
  2. Conducting a Threat Assessment focusing on Terrorism, Contraband Smuggling, Human Smuggling, Agricultural and Public Safety Threats, Organized Crime, and conditions in a country/region which may foster such threats, and ranking those threats.
  3. Conducting a Vulnerability Assessment in accordance with the C-TPAT Minimum Security Criteria. A vulnerability assessment includes identifying what the Partner has that a terrorist or criminal might desire. For brokers this might be data; for importers, manufactures, and exporters, this might be access to cargo and company information. Then, identifying weaknesses in company procedures that would allow a terrorist or criminal to gain access to these processes, data, or cargo.
  4. Preparing a Written Action Plan to Address Vulnerabilities. This includes mechanisms to record identified weaknesses, who is responsible for addressing the issues, and due dates. Reporting results to appropriate company officials and employees on completed follow up and changes is also essential.
  5. Documenting the Procedure for How Risk Assessments are Conducted, to Include Reviewing and Revising the Procedure Periodically. The process itself should be reviewed and updated as needed at least annually, and a Risk Assessment should be conducted – and documented – at least annually, more frequently for highway carriers and high risk supply chains.

 

Get Forms
Get Quotes
Contact Us
Track|Trace