CEN TR 16412-2012 Supply chain security (SCS) - Good practice guide for small and medium sized operators《供应链安全(SCS) 为中小运营商良好的实践指南》.pdf

上传人:feelhesitate105 文档编号:592244 上传时间:2018-12-16 格式:PDF 页数:26 大小:1.91MB
下载 相关 举报
CEN TR 16412-2012 Supply chain security (SCS) - Good practice guide for small and medium sized operators《供应链安全(SCS) 为中小运营商良好的实践指南》.pdf_第1页
第1页 / 共26页
CEN TR 16412-2012 Supply chain security (SCS) - Good practice guide for small and medium sized operators《供应链安全(SCS) 为中小运营商良好的实践指南》.pdf_第2页
第2页 / 共26页
CEN TR 16412-2012 Supply chain security (SCS) - Good practice guide for small and medium sized operators《供应链安全(SCS) 为中小运营商良好的实践指南》.pdf_第3页
第3页 / 共26页
CEN TR 16412-2012 Supply chain security (SCS) - Good practice guide for small and medium sized operators《供应链安全(SCS) 为中小运营商良好的实践指南》.pdf_第4页
第4页 / 共26页
CEN TR 16412-2012 Supply chain security (SCS) - Good practice guide for small and medium sized operators《供应链安全(SCS) 为中小运营商良好的实践指南》.pdf_第5页
第5页 / 共26页
亲,该文档总共26页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、raising standards worldwideNO COPYING WITHOUT BSI PERMISSION EXCEPT AS PERMITTED BY COPYRIGHT LAWBSI Standards PublicationSupply chain security (SCS) Good practice guide for small and medium sized operatorsPD CEN/TR 16412:2012National forewordThis Published Document is the UK implementation of CEN/T

2、R 16412:2012. The UK participation in its preparation was entrusted by Technical CommitteeOS/1, Obsolescence management, to Panel OS/1/-/4, Supply chain management.A list of organizations represented on this committee can be obtained on request to its secretary.This publication does not purport to i

3、nclude all the necessary provisions of a contract. Users are responsible for its correct application. The British Standards Institution 2012Published by BSI Standards Limited 2012 ISBN 978 0 580 77945 9 ICS 03.100.10Compliance with a British Standard cannot confer immunity from legal obligations.Thi

4、s Published Document was published under the authority of the Standards Policy and Strategy Committee on 30 September 2012.Amendments issued since publicationDate Text affectedPUBLISHED DOCUMENTPD CEN/TR 16412:2012TECHNICAL REPORT RAPPORT TECHNIQUE TECHNISCHER BERICHT CEN/TR 16412 September 2012 ICS

5、 03.100.10 English Version Supply chain security (SCS) - Good practice guide for small and medium sized operators Scurit de la chane dapprovisionnement - Guide de bonnes pratiques pour les petites et moyennes entreprisesSicherheit von Lieferketten - Handbuch fr bewhrte Praktiken fr kleine und mittle

6、re Unternehmen This Technical Report was approved by CEN on 13 August 2012. It has been drawn up by the Technical Committee CEN/TC 379. CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of

7、 Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and United Kingdom. EUROPEAN COMMITTEE FOR STANDARDIZATION COMIT EUROPEN DE NORMALISATIO

8、N EUROPISCHES KOMITEE FR NORMUNG Management Centre: Avenue Marnix 17, B-1000 Brussels 2012 CEN All rights of exploitation in any form and by any means reserved worldwide for CEN national Members. Ref. No. CEN/TR 16412:2012: EPD CEN/TR 16412:2012CEN/TR 16412:2012 (E) 2 Contents Page Foreword 31 Scope

9、 42 Recommended Supply Chain Security Approach 53 Crime prevention in supply chains 73.1 Introduction 73.2 Cargo theft 73.3 Counterfeit goods 83.4 Terrorism in supply chains .93.5 Sabotage in supply chains 103.6 Cross-border duty and tax fraud . 113.7 Smuggling of prohibited and restricted goods . 1

10、23.8 People smuggling . 133.9 Document fraud 133.10 Bogus companies . 143.11 Cyber crime . 154 Supply chain security regulations and programs . 174.1 Introduction . 174.2 Import Control System (ICS) and Export Control System (ECS) in the EU 174.3 Maritime Security Legislation, ISPS Code in the EU .

11、184.4 Aviation Security Legislation, Air Cargo Supply Chains in the EU . 184.5 European Union Authorized Economic Operator (EU AEO) 194.6 Regulated agent, Known consignor and Account consignor in the EU . 204.7 ISO 28000 Series of Standards on Supply Chain Security Management Systems 214.8 Transport

12、ed Asset Protection Association (TAPA) in Europe . 21PD CEN/TR 16412:2012CEN/TR 16412:2012 (E) 3 Foreword This document (CEN/TR 16412:2012) has been prepared by Technical Committee CEN/TC 379 “Supply Chain Security”, the secretariat of which is held by NEN. Supply chains move huge quantities and val

13、ues of products and services between businesses and between businesses and consumers throughout Europe and between Europe and countries in other continents. These movements present enormous opportunities for organized crime and terrorists. The intrusion of crime and terrorist activity has become a m

14、ajor risk in doing business for the majority of operators within the supply chain, i.e.: cargo owners; shippers; forwarders; terminal operators; transporters. PD CEN/TR 16412:2012CEN/TR 16412:2012 (E) 4 1 Scope This Technical Report aims to provide Small and Medium sized Enterprises (SMEs) basic kno

15、wledge about how to manage and mitigate the risk of criminal and terrorist activities. This is a shared objective for the private and public sector.1For the private sector, companies have gained experience on measures, which can assist in preventing security breaches from happening, to protect again

16、st supply chain interruption. Also some business standards have been developed identifying measures, which companies can execute in order to obtain labels which certify business operations and reward them with a security quality label. The public sector has developed security legislation which compa

17、nies should either mandatory or voluntary apply into their business operations. This Guide provides an easy-to-read overview on: 1) How SMEs can apply a supply chain security approach to their operations (Clause 2). 2) The main crime types in the supply chain including some measures to fight these c

18、rime types from occurring (Clause 3). 3) Supply chain security legislation and programs, with their respective compliance requirements (Clause 4). 1In the context of this guide, “supply chain security” covers risk management, crime prevention, security procedures and technologies, as well as securit

19、y regulations and programs. The overview and examples in this book are based on recent academic work and interviews with experts in the field, including CEN SCS Feasibility Study (2010); EU FP7-LOGSEC Roadmap (2011) and interviews with CEN TC/379 experts. PD CEN/TR 16412:2012CEN/TR 16412:2012 (E) 5

20、2 Recommended Supply Chain Security Approach How to integrate supply chain security into your business? Various ways are possible and being explored by companies. Existing guidelines and best practices often refer to the exploitation of risk management approaches. However, the practical application

21、of these approaches is often difficult to understand and apply in practice for SMEs. Hence, in this guide a concrete step-by-step approach is explained, with examples of practical security measures to mitigate specific crime risks, and to comply with specific security regulations and standards. In t

22、his guide, the following six steps are recommended2: FIRST, define the context for your supply chain, crime prevention and security management activities. The major questions being: Which business are you in, and how “security sensitive” is it? Which geographies and transport modes are included? Who

23、 are the customers, suppliers, insurance providers, governmental agencies and other key stakeholders your supply chain operates with? As an outcome, you create the context before moving on to the next considerations. 2There is no guarantee that a certain security measure brings a sustainable, positi

24、ve outcome. PD CEN/TR 16412:2012CEN/TR 16412:2012 (E) 6 SECOND, perform a threat and vulnerability analysis, when it comes to actual criminal and terrorist threats in your supply chain. 3The major questions being: Where are the risks of failing today, i.e. where are the gaps calling for enhanced sec

25、urity? Which crime types are of particularly high risk in your supply chain? Use statistical sources, if available, while carrying out such risk assessments. What are the realized and/or potential consequences of one or more crime incidents? THIRD, consider regulatory and program aspects.4The major

26、questions being: Which regulations are required for you to operate successfully in your defined business environment, and which programs could support achieving your business objectives? What do your customers expect from you? What about your suppliers? Have your insurance providers established any

27、requirements? What about relevant governmental authorities, including customs and police? FOURTH, create an overarching security plan for your company and/or supply chain, where you consider a variety of security management aspects, taking into consideration the outcomes of your business context; th

28、reat and vulnerability; as well as security program and regulatory aspects analysis (steps one, two and three above). The aspects you should take into consideration are: Physical security (facilities, vehicles, containers, shipments etc.); Data security (in particular systems with supply chain data)

29、; Human resources security (including selection, training, and exit procedures); - Business partner security (including selection, and auditing); and Process control and monitoring of deviations. FIFTH, choose the combination of concrete security measures investments in technologies, procurement of

30、services, in-house solutions and so forth and implement them into practice. Embed security procedures and technologies as much as feasible into daily operations, as part of your overall supply chain, logistics, and transport management functions. SIXTH, monitor and measure the security performance a

31、nd feedback to the planning cycle. Take corrective actions. Increase security at weak spots, and reduce in the areas where overinvestment has taken place. Pay attention to the dynamics and changing situations when it comes to criminal focus areas and “criminal portfolios”; technical and operational

32、improvements - both licit and illicit aspects - and legislative requirements, and consequences, both for the licit and illicit actors. 3Clause 2 helps to increase understanding the types of threats one could be subject to and do something about. 4Clause 3 provides an overview of key regulation and p

33、rograms. PD CEN/TR 16412:2012CEN/TR 16412:2012 (E) 7 3 Crime prevention in supply chains 3.1 Introduction Ten relevant crime types have been chosen fallen under the following five categories: 1) Property theft: Cargo theft; Intellectual property violations. 2) Targeted damage: Terrorism; Sabotage. 3

34、) Cross-border duty and tax fraud 4) Illegitimate transporting / importing and/or exporting: Smuggling of prohibited and restricted goods; People smuggling. Crime facilitation: Document forgery; Bogus companies; Cyber crime.For each crime type, the issue (What are the main characteristics and what a

35、re the typical products / sectors involved?), scope of the problem (Why is it a problem?) and actions to take (How to mitigate the risks?) are being elaborated on. 3.2 Cargo theft Cargo theft can be defined as “.any theft of shipment committed during its (surface) transportation or within a warehous

36、e.”5. This covers straightforward theft, hijacking, robbery, fraudulent pick-up, and load diversions, etc.6. The value of a single load can be anything from a few thousand to few dozen million Euros. On the other hand, in case of getting caught, cargo crimes often result only in minor legal punishme

37、nt. Valuable commodities, which have high demand on the after-market and are easily transportable, are quick to sell and particularly vulnerable for cargo theft7. These commodities include consumer electronics, cigarettes, food, alcohol, brand apparels, precious metals and prescription drugs. Cargo

38、crime incidents can occur in any part of a supply chain, but truck stops and unsecured parking lots are the most vulnerable spots in the chain (NICB 2010). In addition to the high financial losses estimated to be over 8 billion Euros in Europe in 2009 8, the human suffering caused by threats and vio

39、lence involved in cargo theft is huge.9From the private sector perspective, cargo theft is commonly considered the most frequent crime threat in supply chains today. All operators can be usual victims of cargo theft. Manufacturers face material shortages due to theft incidents, resulting in producti

40、on downtime, missed deliveries and lost sales10. For the logistics sector, cargo theft causes liability and insurance problems, lower customer satisfaction and so on. For the public sector, cargo theft is a cost 5Cargo Theft Report. Applying the Brakes to Road. Cargo Crime in Europe. Public version

41、excluding Appendix D (Europol Restricted). The Hague, 2009. Editorial note: term ”surface” is used instead of ”road”. 6Cargo theft is being perceived as an attractive, high reward, low risk criminal industry FIA 2001, Contraband, Organized Crime and the Threat to the Transportation and Supply Chain

42、Function 7Felson and Clarke, 1997, Opportunity makes thief 8http:/ 9IRU 2006 Attacks on Drivers of International Heavy Goods Vehicles 10Anderson, Bill (2007), Securing the Supply Chain Prevent Cargo Theft, Security, Vol. 44, N5, pp. 56-58 PD CEN/TR 16412:2012CEN/TR 16412:2012 (E) 8 and reputation fa

43、ctor for the police and the legal system. It can be dangerous for consumers, who unknowingly or knowingly buy stolen goods. As yet, fighting cargo crime has not traditionally been a high priority concern for policymakers11. Measures to mitigate the risk of theft relate to Physical security measures

44、for buildings, parking areas, and vehicles are key. Selecting low-risk routes, avoiding unnecessary stops, and not picking up unknown people into trucks are good policies. Careful selection and training of personnel and supply chain partners, as well as conducting audits of security capabilities of

45、the logistics service providers normally helps to mitigate the risks. (Hidden) tracking devices among the cargo as well as tracking devices in the vehicle and even vehicle immobilization systems can help to recover the stolen items. 12 Training of warehouse workers and drivers can also be a useful r

46、ecovery measure. Further reading on how to reduce cargo theft in the supply chainW IRU Road Transportation Security Guidelines 2005, which is available at http:/www.iru.org/en_guidelines-goods TAPA FSR 2011 and TAPA TSR 2008, which are available at http:/ 3.3 Counterfeit goods Counterfeiting can be

47、defined as“the illegal reproduction or imitation of products, given that this illegality is the result of a violation of any type of intellectual property rights”13. Counterfeits products are mostly transported to affluent markets via legitimate supply chains, whereby the production of the counterfe

48、its often takes place at the upstream of an otherwise legitimate supply chain. Counterfeiting trade can bring huge profits, while there is a low risk of being caught and moderate punishment in case of being caught. In some countries, the public perception is that counterfeiting can be socially accep

49、table. Advances in technology increasingly give counterfeiters the tools to copy.14It has been estimated that since early 1990s, global trade in counterfeits has increased eight times faster than legitimate trade. Todays global markets for counterfeit products account for 5 % - 7 % of world trade15. In a worst-case scenario, counterfeit products can cause serious damage to human health and safety

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1