SlideShare a Scribd company logo
1 of 28
C-TPAT TRAINING
This is a sample PowerPoint on Security and general Threat Awareness.
All images and clip art were taken from open sources. We suggest you
consider using images of your employees within your faculty. This PowerPoint
is meant to be a guide and should be tailored and edited to suit your needs. It
is also suggested that you use your own slide background and colors scheme.
Security Training and Threat
Awareness Program
for
All Employees
We have recently joined with U.S. Customs and Border
Protection to help secure the international supply
chain. As a member of the Customs-Trade Partnership
Against Terrorism (C-TPAT) program, we have
committed ourselves to new and improved security
procedures throughout our operations. These new
procedures are designed to enhance the security of our
facilities, people, cargo shipping, cargo receiving and
cargo tracking processes. Our goal is to prevent cargo
loss and cargo tampering including the introduction of
illegal merchandise such as drugs and weapons of
mass destruction into our cargo boxes and containers.
As a part of our commitment to supply chain security,
we now require all of our employees to seriously
consider supply chain security as a significant risk to
our business.
Topics
Suspicious Persons
Suspicions Activities
Suspicious Objects or
Packages
Employee Identification
Visitor Controls
Computer Security
Document Security
Suspicious Persons

LOOK FOR…..
• Any person without
an employee
badge, visitor
badge or uniform.
•

These are stock photos, take and use actual photos
of your employees walking down a hallway. Or use
images from a surveillance camera
Suspicious Persons

…and ACT

• Determine if the person is an
employee or a visitor
– If an employee, remind them
always to display their ID
badge and uniform.
– If a visitor, escort them to the
reception area or to the
person with whom they are
visiting.
– Report the incident to your
immediate supervisor.
Suspicious Persons

LOOK FOR…..

Any person in
unauthorized/restricted areas
Suspicious Persons

AND ACT…..
 Get them out of the area
 If a visitor, escort them to the
reception area.
 Report the incident to your
immediate supervisor
Suspicious Persons

Cam 7

1:17:23AM

8/02/06

Look for ….

Any person:
 wearing an overcoat on a
95 degree day, or any kind
of inappropriate clothing
 waiting or loitering in an
area or hallway
 asking for an unknown
department, person or
employee
Suspicious Persons
LOOK FOR….

Any person:
 who seems not to belong
in the area
 going door to door, office
to office
 entering a private office
unescorted
 selling items
 who seems lost
Cam 7

1:17:23AM

8/02/06
Suspicious Persons

LOOK FOR …..

Any person:
 Tampering with somebody’s desk,
boxes, personal items, equipment,
vehicles, cameras, lights…
 running, especially if carrying
something
 hiding
behind doors, fences,
desks, …

Cam 7

1:17:23AM

8/02/06
Suspicious Persons

AND ACT………
 Immediately report the
incident to your
immediate supervisor
LOOK FOR …

Objects obstructing access points

Disconnected or obstructed
cameras

Broken locks or access control
systems

Unexplained clutter or debris

Objects thrown from a vehicle,
especially while traveling at a
high speed.
ACT …
 Immediately report any
suspicious activity to
your supervisor.
Suspicious Objects
or Packages

LOOK FOR….
• Unexplained objects or packages that look
strange or do not belong to the area
• Strange markings on boxes (unknown code,
color) or strange characteristics (weight,
number, odd shape)
• Strange leaking substance (powder, liquid,
etc…)
• Suspicious objects in the middle of an area
(e.g., hallway, lobby, etc.)
Suspicious Objects
or Packages
Suspicious Objects
or Packages

AND ACT………
 Immediately report any
suspicious packages or
objects to your
supervisor, security,
local police, 911 and/or
FBI.
Suspicious Objects
or Packages

•AND ACT…….
Employee Identification


Your Responsibilities
While on company property
 Your
company
identification badge must
be properly displayed and
worn at all times.
 Your company uniform (if
applicable) must be worn at
all times.
 Properly secure and protect
your ID badge, uniform,
keys and access control
card, etc.




Visitor Pre-meeting
Requirements
 Inform your visitor of the
company’s visitor policies
including
photo
identification, check in with
receptionist prior to their
visit.
Visitor Entrance Requirements
 Ensure that your visitor has
logged in and has been
issued a visitor badge




Visitor Escort Requirements
 You must escort your visitors
at ALL times
 Do not leave your visitor
unattended
Visitor Exit Requirements
 Ensure that your visitor has
logged out and has returned
the visitor badge to the
guard or receptionist
Visitor Entrance

Notify
hosting
employee

Document
arrival on
Visitor Log

Check
photo
identification

Issue
visitor
badge

Visitor Exit
Collect
visitor
badge

Document
departure
on Visitor
Log

Use colors and shapes of
you choosing.
Computer Security


Do not share access to your
computer with strangers



Log-off when you leave your
computer



Passwords should be changed
every 60 to 90 days



Do not share your password
with anyone



Do not write down your
password.
Selecting a Password


Use hard-to-guess passwords



Do not use the same password in
more than one place



A password should have a mix of
letters, numbers and symbols


I Love to be Secure

iL2bs@



Always on time to work !
AoT2wx



My Password is Very Secure
MyP1VS#



Yo Quiero Taco Bell

yqtb!10
Electronic Mail Restrictions
• Do not use company e-mail for
private business activities,
amusement or entertainment.
• Do not send e-mail containing racist,
sexist, threatening or other
objectionable language.
• Do not join mailing lists.
• Do not open unknown or
unexpected
e-mail
attachments.
Let’s review…

Suspicious persons
Suspicious activity
Suspicious objects or packages
Employee identification
Visitor controls
Computer security
Document security
Information technology security
Security is not out
of reach if you
practice it every
day.
QUESTIONS?
Refer to Customs & Border Protection Website:
http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/

or www.cbp.gov

More Related Content

What's hot

Security training manual
Security training manualSecurity training manual
Security training manualANILDEVADKAR
 
Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptFaheem Ul Hasan
 
Health & Safety Induction Training
Health & Safety Induction TrainingHealth & Safety Induction Training
Health & Safety Induction TrainingThe Pathway Group
 
A Part 1 Safety Induction
A  Part 1 Safety InductionA  Part 1 Safety Induction
A Part 1 Safety InductionJames McCann
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1David Santiago
 
Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Chris Morris
 
Risk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongRisk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongBCM Institute
 
Behavior based safety
Behavior based safetyBehavior based safety
Behavior based safetyAdnan Masood
 
Confined Space
Confined SpaceConfined Space
Confined SpaceRob Vajko
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?Perk Security Ltd
 
New Employee Orientation 05
New Employee Orientation 05New Employee Orientation 05
New Employee Orientation 05txsafety1
 
New Employee Safety Orientation
New Employee Safety OrientationNew Employee Safety Orientation
New Employee Safety OrientationBeamer
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilitiesLavanya Priya
 
40 DUTIES OF A SAFETY OFFICER.pdf
40 DUTIES OF A SAFETY OFFICER.pdf40 DUTIES OF A SAFETY OFFICER.pdf
40 DUTIES OF A SAFETY OFFICER.pdfKarnav Rana
 

What's hot (20)

Security training manual
Security training manualSecurity training manual
Security training manual
 
Workplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.PptWorkplace Safety And Security Hotel.Ppt
Workplace Safety And Security Hotel.Ppt
 
Safety_induction
Safety_inductionSafety_induction
Safety_induction
 
Sop for security
Sop for securitySop for security
Sop for security
 
Health & Safety Induction Training
Health & Safety Induction TrainingHealth & Safety Induction Training
Health & Safety Induction Training
 
A Part 1 Safety Induction
A  Part 1 Safety InductionA  Part 1 Safety Induction
A Part 1 Safety Induction
 
Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1Workplace Security Awareness-Part 1
Workplace Security Awareness-Part 1
 
Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016
 
Travel Safety.ppt
Travel Safety.pptTravel Safety.ppt
Travel Safety.ppt
 
Free Coshh training
 Free Coshh training Free Coshh training
Free Coshh training
 
Risk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy WongRisk Analysis In Business Continuity Management - Jeremy Wong
Risk Analysis In Business Continuity Management - Jeremy Wong
 
Behavior based safety
Behavior based safetyBehavior based safety
Behavior based safety
 
Confined Space
Confined SpaceConfined Space
Confined Space
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?
 
Session 2 General Safety Requirements
Session 2   General Safety RequirementsSession 2   General Safety Requirements
Session 2 General Safety Requirements
 
New Employee Orientation 05
New Employee Orientation 05New Employee Orientation 05
New Employee Orientation 05
 
New Employee Safety Orientation
New Employee Safety OrientationNew Employee Safety Orientation
New Employee Safety Orientation
 
Staff safety hand book
Staff   safety hand bookStaff   safety hand book
Staff safety hand book
 
Security guard roles and responsibilities
Security guard roles and responsibilitiesSecurity guard roles and responsibilities
Security guard roles and responsibilities
 
40 DUTIES OF A SAFETY OFFICER.pdf
40 DUTIES OF A SAFETY OFFICER.pdf40 DUTIES OF A SAFETY OFFICER.pdf
40 DUTIES OF A SAFETY OFFICER.pdf
 

Viewers also liked

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communicationSnapComms
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guidehuynhloan
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationSunjib Anwar
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 

Viewers also liked (20)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Employee security awareness communication
Employee security awareness communicationEmployee security awareness communication
Employee security awareness communication
 
C-TPAT
C-TPATC-TPAT
C-TPAT
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
7 point security inspection guide
7 point security inspection guide7 point security inspection guide
7 point security inspection guide
 
GSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_PresentationGSV_ C-TPAT- SCS_Presentation
GSV_ C-TPAT- SCS_Presentation
 
SnapComms for Security Awareness
SnapComms for Security AwarenessSnapComms for Security Awareness
SnapComms for Security Awareness
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 

Similar to Security Training and Threat Awareness by Pedraza

3e International brochure
3e International brochure3e International brochure
3e International brochureDaniel Dilks
 
3e International Brochure
3e International Brochure3e International Brochure
3e International BrochureDaniel Dilks
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-finalSheikh Shawkat
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in HotelsPurvi tiwari
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptelijahj01012
 
Security Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesSecurity Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesIndiaMART InterMESH Limited
 
Get Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonGet Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonTara Christianson
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions
 
Security Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSecurity Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSlideTeam
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service ProfileMolefi Majoang
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security ProtocolIMAN
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Businesskassimjabar1
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............Muhammad Saqib
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service PresentationHelen de Klerk
 
A Practitioner's Guide to Event & Venue Management Session 2
A Practitioner's Guide to Event & Venue Management Session 2A Practitioner's Guide to Event & Venue Management Session 2
A Practitioner's Guide to Event & Venue Management Session 2Cameron Ungar
 

Similar to Security Training and Threat Awareness by Pedraza (20)

3e International brochure
3e International brochure3e International brochure
3e International brochure
 
3e International Brochure
3e International Brochure3e International Brochure
3e International Brochure
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Nipa c tpat security presentation-final
Nipa c tpat security presentation-finalNipa c tpat security presentation-final
Nipa c tpat security presentation-final
 
Safety and security for women in Hotels
Safety and security  for women in HotelsSafety and security  for women in Hotels
Safety and security for women in Hotels
 
Security Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.pptSecurity Culture and Insider Threat Training Course.ppt
Security Culture and Insider Threat Training Course.ppt
 
Security Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security ServicesSecurity Services By Hunter Eyes Security Services
Security Services By Hunter Eyes Security Services
 
Get Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. ChristiansonGet Smart & Stay Safe, Tara L. Christianson
Get Smart & Stay Safe, Tara L. Christianson
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Security Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation SlidesSecurity Project Proposal Template PowerPoint Presentation Slides
Security Project Proposal Template PowerPoint Presentation Slides
 
Commuter Protection Service Profile
Commuter Protection Service ProfileCommuter Protection Service Profile
Commuter Protection Service Profile
 
Nrs security profile
Nrs security profileNrs security profile
Nrs security profile
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Iman Office & Security Protocol
Iman Office & Security ProtocolIman Office & Security Protocol
Iman Office & Security Protocol
 
Security and confidentiality in Business
Security and confidentiality in BusinessSecurity and confidentiality in Business
Security and confidentiality in Business
 
SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............SAFETY & SECURITY COURSE.pdf ..............
SAFETY & SECURITY COURSE.pdf ..............
 
Lodge Security Service Presentation
Lodge Security Service PresentationLodge Security Service Presentation
Lodge Security Service Presentation
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
Expression of interest
Expression of interest Expression of interest
Expression of interest
 
A Practitioner's Guide to Event & Venue Management Session 2
A Practitioner's Guide to Event & Venue Management Session 2A Practitioner's Guide to Event & Venue Management Session 2
A Practitioner's Guide to Event & Venue Management Session 2
 

More from Atlantic Training, LLC.

Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAPAtlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUAtlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IAtlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsAtlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerAtlantic Training, LLC.
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityAtlantic Training, LLC.
 

More from Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Recently uploaded

M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 

Recently uploaded (20)

Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 

Security Training and Threat Awareness by Pedraza

  • 1. C-TPAT TRAINING This is a sample PowerPoint on Security and general Threat Awareness. All images and clip art were taken from open sources. We suggest you consider using images of your employees within your faculty. This PowerPoint is meant to be a guide and should be tailored and edited to suit your needs. It is also suggested that you use your own slide background and colors scheme.
  • 2. Security Training and Threat Awareness Program for All Employees
  • 3. We have recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our facilities, people, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant risk to our business.
  • 4. Topics Suspicious Persons Suspicions Activities Suspicious Objects or Packages Employee Identification Visitor Controls Computer Security Document Security
  • 5. Suspicious Persons LOOK FOR….. • Any person without an employee badge, visitor badge or uniform. • These are stock photos, take and use actual photos of your employees walking down a hallway. Or use images from a surveillance camera
  • 6. Suspicious Persons …and ACT • Determine if the person is an employee or a visitor – If an employee, remind them always to display their ID badge and uniform. – If a visitor, escort them to the reception area or to the person with whom they are visiting. – Report the incident to your immediate supervisor.
  • 7. Suspicious Persons LOOK FOR…..  Any person in unauthorized/restricted areas
  • 8. Suspicious Persons AND ACT…..  Get them out of the area  If a visitor, escort them to the reception area.  Report the incident to your immediate supervisor
  • 9. Suspicious Persons Cam 7 1:17:23AM 8/02/06 Look for ….  Any person:  wearing an overcoat on a 95 degree day, or any kind of inappropriate clothing  waiting or loitering in an area or hallway  asking for an unknown department, person or employee
  • 10. Suspicious Persons LOOK FOR….  Any person:  who seems not to belong in the area  going door to door, office to office  entering a private office unescorted  selling items  who seems lost Cam 7 1:17:23AM 8/02/06
  • 11. Suspicious Persons LOOK FOR …..  Any person:  Tampering with somebody’s desk, boxes, personal items, equipment, vehicles, cameras, lights…  running, especially if carrying something  hiding behind doors, fences, desks, … Cam 7 1:17:23AM 8/02/06
  • 12. Suspicious Persons AND ACT………  Immediately report the incident to your immediate supervisor
  • 13. LOOK FOR …  Objects obstructing access points  Disconnected or obstructed cameras  Broken locks or access control systems  Unexplained clutter or debris  Objects thrown from a vehicle, especially while traveling at a high speed.
  • 14. ACT …  Immediately report any suspicious activity to your supervisor.
  • 15. Suspicious Objects or Packages LOOK FOR…. • Unexplained objects or packages that look strange or do not belong to the area • Strange markings on boxes (unknown code, color) or strange characteristics (weight, number, odd shape) • Strange leaking substance (powder, liquid, etc…) • Suspicious objects in the middle of an area (e.g., hallway, lobby, etc.)
  • 17. Suspicious Objects or Packages AND ACT………  Immediately report any suspicious packages or objects to your supervisor, security, local police, 911 and/or FBI.
  • 19. Employee Identification  Your Responsibilities While on company property  Your company identification badge must be properly displayed and worn at all times.  Your company uniform (if applicable) must be worn at all times.  Properly secure and protect your ID badge, uniform, keys and access control card, etc.
  • 20.   Visitor Pre-meeting Requirements  Inform your visitor of the company’s visitor policies including photo identification, check in with receptionist prior to their visit. Visitor Entrance Requirements  Ensure that your visitor has logged in and has been issued a visitor badge
  • 21.   Visitor Escort Requirements  You must escort your visitors at ALL times  Do not leave your visitor unattended Visitor Exit Requirements  Ensure that your visitor has logged out and has returned the visitor badge to the guard or receptionist
  • 22. Visitor Entrance Notify hosting employee Document arrival on Visitor Log Check photo identification Issue visitor badge Visitor Exit Collect visitor badge Document departure on Visitor Log Use colors and shapes of you choosing.
  • 23. Computer Security  Do not share access to your computer with strangers  Log-off when you leave your computer  Passwords should be changed every 60 to 90 days  Do not share your password with anyone  Do not write down your password.
  • 24. Selecting a Password  Use hard-to-guess passwords  Do not use the same password in more than one place  A password should have a mix of letters, numbers and symbols  I Love to be Secure iL2bs@  Always on time to work ! AoT2wx  My Password is Very Secure MyP1VS#  Yo Quiero Taco Bell yqtb!10
  • 25. Electronic Mail Restrictions • Do not use company e-mail for private business activities, amusement or entertainment. • Do not send e-mail containing racist, sexist, threatening or other objectionable language. • Do not join mailing lists. • Do not open unknown or unexpected e-mail attachments.
  • 26. Let’s review… Suspicious persons Suspicious activity Suspicious objects or packages Employee identification Visitor controls Computer security Document security Information technology security
  • 27. Security is not out of reach if you practice it every day.
  • 28. QUESTIONS? Refer to Customs & Border Protection Website: http://www.cbp.gov/xp/cgov/trade/cargo_security/ctpat/ or www.cbp.gov

Editor's Notes

  1. In the event you identify an employee or visitor that is not wearing an identification badge or uniform: If its an employee, remind them to always display their ID badge and uniform or notify a supervisor regarding the situation If its a visitor, escort them to the reception area or to the person with whom they are visiting.
  2. If you identify an individual in an area he/she is prohibited from entering,
  3. If its an employee, approach them and ask them if they need assistance or contact management If it’s a visitor, escort them to the reception area or security guard Report suspicious activity to your immediate supervisor.
  4. Look for suspicious persons which may include an individual wearing an overcoat on a 75 degree day, someone waiting in the hallway, someone asking for an employee that doesn’t work here.
  5. Look for anyone that you’ve never seen in the building, peeking in offices, entering an office unescorted, someone that seems to be lost.
  6. Immediately report suspicious activity to your immediate supervisor.
  7. Security personnel, the receptionist or a designated employee must adequately control the issuance and collection of visitor badges. All visitors must be escorted and visibly display their visitor badge.