SlideShare uma empresa Scribd logo
1 de 28
C-TPAT TRAINING
This is a sample PowerPoint on Security and general Threat Awareness.
All images and clip art were taken from open sources. We suggest you
consider using images of your employees within your faculty. This PowerPoint
is meant to be a guide and should be tailored and edited to suit your needs. It
is also suggested that you use your own slide background and colors scheme.
Security Training and Threat
Awareness Program
for
All Employees
We have recently joined with U.S. Customs and Border
Protection to help secure the international supply
chain. As a member of the Customs-Trade Partnership
Against Terrorism (C-TPAT) program, we have
committed ourselves to new and improved security
procedures throughout our operations. These new
procedures are designed to enhance the security of our
facilities, people, cargo shipping, cargo receiving and
cargo tracking processes. Our goal is to prevent cargo
loss and cargo tampering including the introduction of
illegal merchandise such as drugs and weapons of
mass destruction into our cargo boxes and containers.
As a part of our commitment to supply chain security,
we now require all of our employees to seriously
consider supply chain security as a significant risk to
our business.
Topics
Suspicious Persons
Suspicions Activities
Suspicious Objects or
Packages
Employee Identification
Visitor Controls
Computer Security
Document Security
Suspicious Persons

LOOK FOR…..
• Any person without
an employee
badge, visitor
badge or uniform.
•

These are stock photos, take and use actual photos
of your employees walking down a hallway. Or use
images from a surveillance camera
Suspicious Persons

…and ACT

• Determine if the person is an
employee or a visitor
– If an employee, remind them
always to display their ID
badge and uniform.
– If a visitor, escort them to the
reception area or to the
person with whom they are
visiting.
– Report the incident to your
immediate supervisor.
Suspicious Persons

LOOK FOR…..

Any person in
unauthorized/restricted areas
Suspicious Persons

AND ACT…..
 Get them out of the area
 If a visitor, escort them to the
reception area.
 Report the incident to your
immediate supervisor
Suspicious Persons

Cam 7

1:17:23AM

8/02/06

Look for ….

Any person:
 wearing an overcoat on a
95 degree day, or any kind
of inappropriate clothing
 waiting or loitering in an
area or hallway
 asking for an unknown
department, person or
employee
Suspicious Persons
LOOK FOR….

Any person:
 who seems not to belong
in the area
 going door to door, office
to office
 entering a private office
unescorted
 selling items
 who seems lost
Cam 7

1:17:23AM

8/02/06
Suspicious Persons

LOOK FOR …..

Any person:
 Tampering with somebody’s desk,
boxes, personal items, equipment,
vehicles, cameras, lights…
 running, especially if carrying
something
 hiding
behind doors, fences,
desks, …

Cam 7

1:17:23AM

8/02/06
Suspicious Persons

AND ACT………
 Immediately report the
incident to your
immediate supervisor
LOOK FOR …

Objects obstructing access points

Disconnected or obstructed
cameras

Broken locks or access control
systems

Unexplained clutter or debris

Objects thrown from a vehicle,
especially while traveling at a
high speed.
ACT …
 Immediately report any
suspicious activity to
your supervisor.
Suspicious Objects
or Packages

LOOK FOR….
• Unexplained objects or packages that look
strange or do not belong to the area
• Strange markings on boxes (unknown code,
color) or strange characteristics (weight,
number, odd shape)
• Strange leaking substance (powder, liquid,
etc…)
• Suspicious objects in the middle of an area
(e.g., hallway, lobby, etc.)
Suspicious Objects
or Packages
Suspicious Objects
or Packages

AND ACT………
 Immediately report any
suspicious packages or
objects to your
supervisor, security,
local police, 911 and/or
FBI.
Suspicious Objects
or Packages

•AND ACT…….
Employee Identification


Your Responsibilities
While on company property
 Your
company
identification badge must
be properly displayed and
worn at all times.
 Your company uniform (if
applicable) must be worn at
all times.
 Properly secure and protect
your ID badge, uniform,
keys and access control
card, etc.




Visitor Pre-meeting
Requirements
 Inform your visitor of the
company’s visitor policies
including
photo
identification, check in with
receptionist prior to their
visit.
Visitor Entrance Requirements
 Ensure that your visitor has
logged in and has been
issued a visitor badge




Visitor Escort Requirements
 You must escort your visitors
at ALL times
 Do not leave your visitor
unattended
Visitor Exit Requirements
 Ensure that your visitor has
logged out and has returned
the visitor badge to the
guard or receptionist
Visitor Entrance

Notify
hosting
employee

Document
arrival on
Visitor Log

Check
photo
identification

Issue
visitor
badge

Visitor Exit
Collect
visitor
badge

Document
departure
on Visitor
Log

Use colors and shapes of
you choosing.
Computer Security


Do not share access to your
computer with strangers



Log-off when you leave your
computer



Passwords should be changed
every 60 to 90 days



Do not share your password
with anyone



Do not write down your
password.
Selecting a Password


Use hard-to-guess passwords



Do not use the same password in
more than one place



A password should have a mix of
letters, numbers and symbols


I Love to be Secure

iL2bs@



Always on time to work !
AoT2wx



My Password is Very Secure
MyP1VS#



Yo Quiero Taco Bell

yqtb!10
Electronic Mail Restrictions
• Do not use company e-mail for
private business activities,
amusement or entertainment.
• Do not send e-mail containing racist,
sexist, threatening or other
objectionable language.
• Do not join mailing lists.
• Do not open unknown or
unexpected
e-mail
attachments.
Let’s review…

Suspicious persons
Suspicious activity
Suspicious objects or packages
Employee identification
Visitor controls
Computer security
Document security
Information technology security
Security is not out
of reach if you
practice it every
day.
QUESTIONS?
Refer to Customs & Border Protection Website:
http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/

or www.cbp.gov

Mais conteúdo relacionado

Mais procurados

Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor pptAccord Group
 
Health safety induction_overview
Health safety induction_overviewHealth safety induction_overview
Health safety induction_overviewzz_bedee
 
Safety hindi- bbs
Safety hindi- bbsSafety hindi- bbs
Safety hindi- bbsAnil Gwari
 
HSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.pptHSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.pptssuser0ebdc3
 
1. c tpat minimum security criteria
1. c tpat minimum security criteria1. c tpat minimum security criteria
1. c tpat minimum security criteriaProColombia
 
RedPixel OHS Presentation
RedPixel OHS PresentationRedPixel OHS Presentation
RedPixel OHS PresentationHelenYOH
 
OHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of ControlOHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of ControlPECB
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptFaheem Ul Hasan
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentGary Bahadur
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveGrant Heanes
 

Mais procurados (20)

Security supervisor ppt
Security supervisor pptSecurity supervisor ppt
Security supervisor ppt
 
Near Miss Reporting
Near Miss ReportingNear Miss Reporting
Near Miss Reporting
 
SOP of Security supervisor
SOP of Security supervisorSOP of Security supervisor
SOP of Security supervisor
 
Security training for sis
Security training for sisSecurity training for sis
Security training for sis
 
Health safety induction_overview
Health safety induction_overviewHealth safety induction_overview
Health safety induction_overview
 
Construction site induction
Construction site inductionConstruction site induction
Construction site induction
 
Safety hindi- bbs
Safety hindi- bbsSafety hindi- bbs
Safety hindi- bbs
 
2.5 security officers
2.5 security officers2.5 security officers
2.5 security officers
 
C-TPAT
C-TPATC-TPAT
C-TPAT
 
HSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.pptHSE-INDUCTION-TRAINING.ppt
HSE-INDUCTION-TRAINING.ppt
 
Control De Acceso
Control De AccesoControl De Acceso
Control De Acceso
 
1. c tpat minimum security criteria
1. c tpat minimum security criteria1. c tpat minimum security criteria
1. c tpat minimum security criteria
 
RedPixel OHS Presentation
RedPixel OHS PresentationRedPixel OHS Presentation
RedPixel OHS Presentation
 
OHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of ControlOHS Risk Assessment and Hierarchy of Control
OHS Risk Assessment and Hierarchy of Control
 
Security Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.PptSecurity Training Incident Investigation And Report Writing.Ppt
Security Training Incident Investigation And Report Writing.Ppt
 
Ppt Site Security Management
Ppt  Site Security ManagementPpt  Site Security Management
Ppt Site Security Management
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should Have
 
Security_Guard
Security_GuardSecurity_Guard
Security_Guard
 
Safety induction-june-11
Safety induction-june-11Safety induction-june-11
Safety induction-june-11
 

Destaque

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communicationSnapComms
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guidehuynhloan
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationSunjib Anwar
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 

Destaque (20)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guide
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_Presentation
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security Awareness
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 

Semelhante a Security Training and Threat Awareness by Pedraza

3e International brochure
3e International brochure3e International brochure
3e International brochureDaniel Dilks
 
3e International Brochure
3e International Brochure3e International Brochure
3e International BrochureDaniel Dilks
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-finalSheikh Shawkat
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in HotelsPurvi tiwari
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptelijahj01012
 
Security Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesSecurity Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesIndiaMART InterMESH Limited
 
Get Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonGet Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonTara Christianson
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions
 
Security Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSecurity Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSlideTeam
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service ProfileMolefi Majoang
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security ProtocolIMAN
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Businesskassimjabar1
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............Muhammad Saqib
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service PresentationHelen de Klerk
 
Security Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptxSecurity Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptxmdbashir12
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Trainingworksteadc
 

Semelhante a Security Training and Threat Awareness by Pedraza (20)

3e International brochure
3e International brochure3e International brochure
3e International brochure
 
3e International Brochure
3e International Brochure3e International Brochure
3e International Brochure
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-final
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in Hotels
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Security Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesSecurity Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security Services
 
Get Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonGet Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. Christianson
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Security Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSecurity Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation Slides
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service Profile
 
Nrs security profile
Nrs security profileNrs security profile
Nrs security profile
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security Protocol
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Business
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service Presentation
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
Security Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptxSecurity Training slide for all - PPT.pptx
Security Training slide for all - PPT.pptx
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 

Mais de Atlantic Training, LLC.

Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAPAtlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUAtlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IAtlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsAtlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerAtlantic Training, LLC.
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityAtlantic Training, LLC.
 

Mais de Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Último

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 

Último (20)

8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 

Security Training and Threat Awareness by Pedraza

  • 1. C-TPAT TRAINING This is a sample PowerPoint on Security and general Threat Awareness. All images and clip art were taken from open sources. We suggest you consider using images of your employees within your faculty. This PowerPoint is meant to be a guide and should be tailored and edited to suit your needs. It is also suggested that you use your own slide background and colors scheme.
  • 2. Security Training and Threat Awareness Program for All Employees
  • 3. We have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.
  • 4. Topics Suspicious Persons Suspicions Activities Suspicious Objects or Packages Employee Identification Visitor Controls Computer Security Document Security
  • 5. Suspicious Persons LOOK FOR….. • Any person without an employee badge, visitor badge or uniform. • These are stock photos, take and use actual photos of your employees walking down a hallway. Or use images from a surveillance camera
  • 6. Suspicious Persons …and ACT • Determine if the person is an employee or a visitor – If an employee, remind them always to display their ID badge and uniform. – If a visitor, escort them to the reception area or to the person with whom they are visiting. – Report the incident to your immediate supervisor.
  • 7. Suspicious Persons LOOK FOR…..  Any person in unauthorized/restricted areas
  • 8. Suspicious Persons AND ACT…..  Get them out of the area  If a visitor, escort them to the reception area.  Report the incident to your immediate supervisor
  • 9. Suspicious Persons Cam 7 1:17:23AM 8/02/06 Look for ….  Any person:  wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing  waiting or loitering in an area or hallway  asking for an unknown department, person or employee
  • 10. Suspicious Persons LOOK FOR….  Any person:  who seems not to belong in the area  going door to door, office to office  entering a private office unescorted  selling items  who seems lost Cam 7 1:17:23AM 8/02/06
  • 11. Suspicious Persons LOOK FOR …..  Any person:  Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights…  running, especially if carrying something  hiding behind doors, fences, desks, … Cam 7 1:17:23AM 8/02/06
  • 12. Suspicious Persons AND ACT………  Immediately report the incident to your immediate supervisor
  • 13. LOOK FOR …  Objects obstructing access points  Disconnected or obstructed cameras  Broken locks or access control systems  Unexplained clutter or debris  Objects thrown from a vehicle, especially while traveling at a high speed.
  • 14. ACT …  Immediately report any suspicious activity to your supervisor.
  • 15. Suspicious Objects or Packages LOOK FOR…. • Unexplained objects or packages that look strange or do not belong to the area • Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) • Strange leaking substance (powder, liquid, etc…) • Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)
  • 17. Suspicious Objects or Packages AND ACT………  Immediately report any suspicious packages or objects to your supervisor, security, local police, 911 and/or FBI.
  • 19. Employee Identification  Your Responsibilities While on company property  Your company identification badge must be properly displayed and worn at all times.  Your company uniform (if applicable) must be worn at all times.  Properly secure and protect your ID badge, uniform, keys and access control card, etc.
  • 20.   Visitor Pre-meeting Requirements  Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements  Ensure that your visitor has logged in and has been issued a visitor badge
  • 21.   Visitor Escort Requirements  You must escort your visitors at ALL times  Do not leave your visitor unattended Visitor Exit Requirements  Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist
  • 22. Visitor Entrance Notify hosting employee Document arrival on Visitor Log Check photo identification Issue visitor badge Visitor Exit Collect visitor badge Document departure on Visitor Log Use colors and shapes of you choosing.
  • 23. Computer Security  Do not share access to your computer with strangers  Log-off when you leave your computer  Passwords should be changed every 60 to 90 days  Do not share your password with anyone  Do not write down your password.
  • 24. Selecting a Password  Use hard-to-guess passwords  Do not use the same password in more than one place  A password should have a mix of letters, numbers and symbols  I Love to be Secure iL2bs@  Always on time to work ! AoT2wx  My Password is Very Secure MyP1VS#  Yo Quiero Taco Bell yqtb!10
  • 25. Electronic Mail Restrictions • Do not use company e-mail for private business activities, amusement or entertainment. • Do not send e-mail containing racist, sexist, threatening or other objectionable language. • Do not join mailing lists. • Do not open unknown or unexpected e-mail attachments.
  • 26. Let’s review… Suspicious persons Suspicious activity Suspicious objects or packages Employee identification Visitor controls Computer security Document security Information technology security
  • 27. Security is not out of reach if you practice it every day.
  • 28. QUESTIONS? Refer to Customs & Border Protection Website: http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/ or www.cbp.gov

Notas do Editor

  1. In the event you identify an employee or visitor that is not wearing an identification badge or uniform: If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situation If its a visitor, escort them to the reception area or to the person with whom they are visiting.
  2. If you identify an individual in an area he/she is prohibited from entering,
  3. If its an employee, approach them and ask them if they need assistance or contact management If it’s a visitor, escort them to the reception area or security guard Report suspicious activity to your immediate supervisor.
  4. Look for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here.
  5. Look for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost.
  6. Immediately report suspicious activity to your immediate supervisor.
  7. Security personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges. All visitors must be escorted and visibly display their visitor badge.