Supply Chain Security

Book description

The supply chain is a complex system of numerous, integrated stakeholders. These stakeholders are responsible for the transportation, storage, documentation, and handling of material goods and cargo. Each entity has its own unique relationship with and role within the chain as well as its own unique security requirements. The challenge of trying to

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Dedication
  6. Table of Contents
  7. LIST OF FIGURES
  8. ABOUT THE AUTHOR
  9. INTRODUCTION
  10. PART I WHAT IS SUPPLY CHAIN SECURITY?
    1. CHAPTER 1 WHAT IS A SUPPLY CHAIN?
      1. 1.1 Origin
      2. 1.2 Manufacturing/Suppliers
      3. 1.3 Handoffs
      4. 1.4 Initial Service Provider
      5. 1.5 Service Providers
      6. 1.6 Trucking
      7. 1.7 Ocean Shipping
      8. 1.8 Airlines
      9. 1.9 Third-Party Logistics Providers
      10. 1.10 PODs
    2. CHAPTER 2 ELEMENTS THAT IMPACT THE SUPPLY CHAIN
      1. 2.1 Operations
      2. 2.2 Contracts
      3. 2.3 Customer Demands, Written and Nonwritten
      4. 2.4 Provider Capability
      5. 2.5 Geography
      6. 2.6 Force Majeure/Acts of God
      7. 2.7 Crime
      8. 2.8 Volume
      9. 2.9 Storage Capacity
      10. 2.10 Government Controls
      11. References
    3. CHAPTER 3 SECURITY: SUPPLY CHAIN VERSUS CORPORATE
      1. 3.1 Focus of the Program
      2. 3.2 Corporate Culture
      3. 3.3 Supplier and Provider Relationships
      4. References
  11. PART II DEVELOPING A SUPPLY CHAIN SECURITY PROGRAM
    1. CHAPTER 4 SECURITY FOR KEY LINKS IN THE CHAIN
      1. 4.1 Origin
        1. 4.1.1 Security Reviews of Origin
      2. 4.2 Actions
      3. 4.3 Customers
      4. 4.4 Providers
        1. 4.4.1 Provider Security Review
        2. 4.4.2 CCTV
        3. 4.4.3 Access Controls
        4. 4.4.4 Intrusion Alarms
      5. 4.5 Storage and Distribution
        1. 4.5.1 Security Review of Facility and Location
        2. 4.5.2 Transportation Security Review
          1. 4.5.2.1 Basics for Transportation
        3. 4.5.3 Shipping and Receiving
      6. 4.6 Destination Concerns
    2. CHAPTER 5 ELEMENTS OF A SUCCESSFUL SUPPLY CHAIN SECURITY PROGRAM
      1. 5.1 Goal of the Supply Chain Security Program
      2. 5.2 Theft and Pilferage
        1. 5.2.1 Smuggling and Contamination
        2. 5.2.2 Antiterrorism
      3. 5.3 Government Supply Chain Security Program Compliance
      4. 5.4 Customer Contractual Obligations
      5. 5.5 Risk Management
      6. 5.6 Industry Positioning and Branding
      7. 5.7 Marketing and Sales
      8. References
    3. CHAPTER 6 METHODOLOGY FOR SUPPLY CHAIN SECURITY
      1. 6.1 Integration into the Business
      2. 6.2 Business Unit Support
      3. 6.3 Structure and Reporting
      4. 6.4 Responsibilities and Roles
      5. 6.5 Policies and Procedures
      6. 6.6 Training
      7. 6.7 Classifications
      8. 6.8 Security Auditing and Assessments
      9. 6.9 Information Technology
      10. 6.10 Liaisons
      11. References
    4. CHAPTER 7 BUDGETING
      1. 7.1 Justification
      2. 7.2 Internal versus External
      3. 7.3 Own or Rent?
  12. PART III REGULATION AND RESOURCE
    1. CHAPTER 8 GOVERNMENT AND INDUSTRY SUPPLY CHAIN SECURITY PROGRAMS
      1. 8.1 C-TPAT (Customs-Trade Partnership against Terrorism)
        1. 8.1.1 A Growing Partnership
        2. 8.1.2 Extending the Zone of U.S. Border Security
        3. 8.1.3 How It Works
        4. 8.1.4 An Emerging Focus: Mutual Recognition Arrangements
      2. 8.2 PIP (Partners in Protection)
        1. 8.2.1 History
        2. 8.2.2 Modernization
        3. 8.2.3 Mutual Recognition
        4. 8.2.4 Harmonization of PIP and C-TPAT
      3. 8.3 FAST (Free and Secure Trade)
        1. 8.3.1 How It Works
        2. 8.3.2 Benefits
        3. 8.3.3 FAST-Eligible Goods
      4. 8.4 BASC (Business Alliance for Secure Commerce)
        1. 8.4.1 Mission
        2. 8.4.2 Vision
        3. 8.4.3 Specific Objectives
      5. 8.5 AEO (Authorized Economic Operator)
        1. 8.5.1 AEO Guidelines
      6. 8.6 CCSP (Certified Cargo Screening Program)
        1. 8.6.1 Background
        2. 8.6.2 Program Overview
        3. 8.6.3 Benefits
      7. 8.7 TAPA (Transported Asset Protection Association)
        1. 8.7.1 About TAPA
        2. 8.7.2 HVTT Asset Theft: A Shared Problem
        3. 8.7.3 Standards Lead to Solutions
    2. CHAPTER 9 RESOURCES AND TECHNOLOGY FOR SUPPLY CHAIN SECURITY
      1. 9.1 GPS (Global Positioning System)
      2. 9.2 GSM (Global System for Mobile Communications)
      3. 9.3 Trucking-Focused Devices
      4. 9.4 Asset Tracking and Radio Frequency Identification (RFID)
      5. 9.5 Taping/Wrapping
      6. 9.6 Seals
      7. 9.7 Screening
  13. PART IV CASE STUDIES
    1. CHAPTER 10 CASE STUDIES
      1. 10.1 Case Study 1: Ocean Container Theft, Port of Newark, NJ
      2. 10.2 Case Study 2: Pilfering within a “Knitting” and Distribution Operation
      3. 10.3 Case Study 3: Truck Theft
      4. 10.4 Case Study 4: Parcel Network Operation Pilferage
      5. 10.5 Case Study 5: Latin America Warehouse Assault
  14. PART V APPENDICES
    1. APPENDIX A: SAMPLE CUSTOMER SECURITY REQUIREMENTS
    2. APPENDIX B: SAMPLE POLICY/PROCEDURE
    3. APPENDIX C: SAMPLE SECURITY REVIEW/AUDIT
    4. APPENDIX D: SAMPLE SECURITY BUDGET
    5. APPENDIX E: LIST OF ACRONYMS

Product information

  • Title: Supply Chain Security
  • Author(s): Arthur G. Arway
  • Release date: March 2013
  • Publisher(s): CRC Press
  • ISBN: 9781482209501