AsianLII [Home] [Databases] [WorldLII] [Search] [Feedback]

APEC Agreements and Declarations

You are here:  AsianLII >> Databases >> APEC Agreements and Declarations >> APEC PRIVATE SECTOR SUPPLY CHAIN SECURITY GUIDELINES

[Database Search] [Name Search] [Noteup] [Help]


APEC PRIVATE SECTOR SUPPLY CHAIN SECURITY GUIDELINES


APEC Private Sector

Supply Chain Security Guidelines



Executive Summary

Physical Security

Physical security includes security measures that monitor and control the facility’s exterior and interior perimeters. This will include Mail Service Security, Lock and Key Control, and Perimeter and Interior Alarms.


Recommended features, to be installed as appropriate:

 

Recommended procedures, to be conducted as appropriate:

 

Access Control

Access controls prohibit unauthorized access to facilities, conveyances, vessels, aircraft, shipping, loading docks, and cargo areas. If access control is not possible, increased precautions in other security aspects may be needed.

Recommended procedures, to be conducted as appropriate:

Personnel Security

Personnel security is concerned with the screening of employees and prospective employees, as appropriate and as allowed for by law.


Recommended procedures, to be conducted as appropriate:
Education, Training and Awareness

Education, training and awareness encompass education and training of personnel regarding security policies, encouraging alertness for deviations from those policies and knowing what actions to take in response to security lapses.


Recommended procedures, to be conducted as appropriate:

Procedural Security

Procedural security assures recorded and verifiable location of goods in the supply chain. Procedures should provide for the security of goods throughout the supply chain. Contingency procedures should be included within the scope of procedural security.


Recommended procedures, to be conducted as appropriate:


Documentation Processing Security

Documentation processing security, both electronic and manual, assures that information is legible and protected against the loss of data or introduction of erroneous information.

Recommended procedures, to be conducted as appropriate:

Future automated data exchange-related procedures

 

Trading Partner Security

Trading partner security extends supply chain security to your suppliers and customers. Communication, assessment, training, and improvement are key components.


Recommended procedures, to be conducted as appropriate:


Conveyance Security

Conveyance security provides protection against the introduction of unauthorized personnel and material into the supply chain, including the areas between the links of the supply chain.


Recommended proc edures, to be conducted as appropriate:

 

Crisis Management and Disaster Recovery

Crisis management and disaster recovery procedures include advance planning and process establishment to operate in extraordinary circumstances.

Recommended procedures, to be conducted as appropriate:

References


AsianLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.asianlii.org/apec/other/agrmt/apsscsg519