Red Arrow Logistics is a participant in Customs-Trade Partnership Against Terrorism (C-TPAT)
As a participant in C-TPAT, we have made a firm commitment to enhance the security of goods moving through our international supply chain. To implement this commitment, we verify whether our suppliers, vendors, and service providers have active security programs in place.
It is important to us that our suppliers acknowledge and strive to integrate the philosophy of Red Arrow’s Security Guidelines into their processes. Further, it is our expectation that suppliers will cooperate fully with our Certification Program and return their completed form.
As you know, the Security Initiatives are voluntary programs, and while Red Arrow expects its suppliers to share its commitment to the security of the supply chain, it is your decision whether to join the program or not. Red Arrow’s security recommendations are broad and general in nature and not all the recommendations may be appropriate for every service provider. Many providers already have extensive security measures in place, which will coincide with the recommendations listed below.
Red Arrow utilizes a third-party application to manage the security questionnaire and training.
We sincerely appreciate your cooperation and request that your company join us in our efforts to improve our supply chain integrity by embracing the various Security Initiatives and complying with them to the best of your company’s ability.
Liz Lasater | President, Red Arrow Logistics
Facility Security Best Practices
Red Arrow Logistics is participating in the C-TPAT program and is committed to enhancing its supply chain security to help prevent future terrorist attacks, contraband, money laundering and human trafficking. While the program is voluntary, Red Arrow expects that its suppliers will develop and implement a sound plan to enhance their security procedures as well. To assist in that effort, we have provided these general recommendations by US Customs that our vendors and suppliers should follow:
Physical Security: All buildings should be constructed of materials that resist unlawful entry to protect against outside intrusion. Physical security should include:
- Adequate locking devices for external and internal doors, windows, gates, and fences.
- Walls or fences six feet or higher around the facility or other adequate security measures.
- Adequate lighting is provided inside and outside the facility including parking areas.
- Separate parking area for private vehicles separate from the shipping, loading dock, and cargo areas.
- Segregation and marking of international, domestic, high-value, and dangerous goods cargo within the warehouse by a safe, caged, or otherwise fenced-in area.
- Having internal/external communications systems in place to contact internal security personnel or local law enforcement police as necessary.
Access Controls: Unauthorized access to the shipping, loading dock and cargo areas should be prohibited. Controls should include:
- The positive identification of all employees, visitors and vendors.
- Limited issuance of keys or access cards, and recovery of those keys or cards when an employee resigns or is terminated.
- Visitors screening before being allowed entry to the factory.
- Procedures for challenging unauthorized/unidentified persons.
Procedural Security: Measures for the handling of incoming and outgoing goods should include protection against the introduction, exchange, or loss of any legal or illegal material. Security controls should include:
- Having a designated security officer to supervise the introduction/removal of cargo.
- Ensuring properly marked, weighed, counted, and documented products.
- Procedures for verifying seals on containers, trailers, and railcars.
- Procedures for detecting and reporting shortages and overages.
- Procedures for tracking the timely movement of incoming and outgoing goods.
- Proper storage of empty and full containers to prevent unauthorized access.
- Procedures to notify CBP and other law enforcement agencies in cases where anomalies or illegal activities are detected or suspected by the company.
Personnel Security: Companies should conduct employment screening and interviewing of prospective employees including periodic background checks and application verification.
Education and Training Awareness: A security awareness program should be provided to employees including recognizing internal conspiracies, maintaining product integrity, and determining and addressing unauthorized access.