
Let you know about C-TPAT anti-terrorism factory inspection
Full name: Customs-Trade Partnership Against Terrorism (C-TPAT)
Who developed C-TPAT: U.S. Customs and Border Protection (CBP)
Why do we need C-TPAT: After the 9/11 incident, CBP hopes to cooperate with relevant industries to establish a supply chain security management system to ensure the transportation safety, security information and cargo status of the supply chain from the starting point to the end point, and ultimately prevent terrorists.
Effective date: April 16, 2002.
Applicable industries:
- US Importers
- Air Freight Carrier
- Ocean Freight Carrier
- Railway transport carrier
- Freight Forwarder
- Non-shipping public transport companies
- Local Port Administration in the United States
- Terminal Operators
- Overseas Manufacturers
- Warehouse Operators
C-TPAT Minimum Requirements for Manufacturers Outside the United States
Company Security
- Security Vision and Responsibility
- Risk Assessment
- Business Partner
- Cyber Security
Transport safety
- International transport and traffic safety
- Seal Security
- Procedural Security
- Agriculture Security
Personnel and physical security
- Physical Security
- Physical Access Control
- Personnel Security
- Security Training and Threat Awareness
Use SVI / SVIP to check C-TPAT certification status
- SVI: Status Verification Interface (SVI) is a web page created by the US Customs and Border Protection (CBP) of the Department of Homeland Security. It allows C-TPAT anti-terrorism verification applicants to check their C-TPAT certification status and category.
- SVIP: Status Verification Interface Participant (SVIP). If your company is an SVI participant, you can check the certification status of another SVIP through the CBP website.
- SVIP ID: Each SVIP will have at least one ID number, which can be logged in to the CBP website and provided to your customers to prove their C-TPAT status.
▼ Provided by the U.S. Department of Homeland Security’s Customs and Border Protection (CBP) C-TPAT certification status query website .
C-TPAT Audit Process
Opening Meeting
- Introduction to the scope of the audit
- Execution audit
- Appoint a representative to accompany the auditor
- Format Adjustment
Employees Interview
- Safety procedure documents and management regulations
- Anti-terrorism safety guidelines and manuals
- HR Manager
- Production Manager
- Warehouse Manager
- Shipping Manager
- Security Manager
- Logistics Manager
- IT Chief
Document Review
- Safety procedures and management regulations
- Employee safety guidelines and manuals
- Staff Profile
- Safety training plan and records
- Shipping Documents
- Loading/unloading cargo records
- Container loading and unloading area
- Security inspection records
- Other records
Facility Tour
- Audit missing confirmation
- Summary Report
- Weekly Safety Report
- Input and output routing
- External lighting equipment
- Parking area
- Container storage
- Access Control
- Security equipment
Closing Meeting
- Make a summary oral report on the inspection site
- Overall summary
How to meet the C-TAPT five-step risk assessment
C-TAPT Risk Assessment Five Steps to Effectively Manage the Supply Chain
C-TPAT (Customs-Trade Partnership Against Terrorism) has developed a Five Step Risk Assessment Guide to help members conduct a comprehensive risk assessment to effectively manage risks that may arise in the supply chain. The guide can be found on the website of the U.S. Customs and Border Protection (CBP).
Step 1: Draw a cargo flow chart and identify business partners
How goods move throughout the supply chain, whether contracted directly or indirectly, including mode of transport (air, sea, rail or truck) and nodes (country of origin, border crossings).
Step 2: Conduct a threat assessment
List possible threats to the country, such as terrorism, human and contraband smuggling, agricultural and public safety threats, organized crime, etc., and rank these threats.
Step 3: Conduct a vulnerability assessment
Vulnerability assessments involve determining what a partner has that is a potential target for terrorists or criminals. For brokers, this could be data; for importers, manufacturers, and exporters, this could be access to goods and company information. Then, identify weaknesses in company procedures and make adjustments and remediations to prevent terrorists or criminals from being able to access those processes, data, or goods.
Step 4: Prepare an Action Plan
This includes recording mechanisms, identifying weaknesses, who is responsible for resolving issues, and deadlines. Reporting results to appropriate company management and employees is also critical for follow-up and changes to be accomplished.
Step 5: Document the risk assessment process
Revise procedures regularly. The processes themselves need to be reviewed and updated at least annually, with road haulage companies and high-risk supply chains requiring more frequent assessments.
Manufacturers who wish to apply for C-TPAT should include at least the following information in the project description that should be included in the five-step risk assessment process (policies and procedures):
1. The date when the partner established the risk assessment process and the date of its most recent revision.
2. Identify the company personnel responsible for keeping the process up to date, including “agent” personnel.
3. When or how often a risk assessment must be conducted (e.g. annually, quarterly (it is recommended that the frequency should be increased, especially for road transport companies); when new partners appear in the supply chain; when the threat occurs in a country or region involved in the supply chain).
*The standard states that risk assessment must be performed at least once a year.
4. Review and update the actual risk assessment process at the required frequency (e.g. annually, quarterly, etc.).
5. How to conduct threat assessment on international supply chains.
6. How to conduct a vulnerability assessment of the international supply chain (e.g. verification of C-TPAT/PIP/AEO status, on-site visit by the Quality Assurance Manager, completed security analysis questionnaire).
7. How to follow up on “action items” (e.g., conduct site visits to resolve vulnerabilities, terminate contracts).
8. Train key operational process owners on the risk assessment process, including regional employees who frequently travel abroad to visit the site for other purposes (e.g., quality assurance managers, sales representatives).
9. Implement internal management supervision and define the rights and responsibilities of relevant personnel to ensure that the process is carried out consistently and effectively.
Share this product

Let you know about C-TPAT anti-terrorism factory inspection
Why do we need C-TPAT: After the 9/11 incident, CBP hopes to cooperate with relevant industries to establish a supply chain security management system to ensure the transportation safety, security information and cargo status of the supply chain from the starting point to the end point, and ultimately prevent terrorists.