You are on page 1of 15

All rights reserved.

No part of this publication may be reproduced or transmitted in any form or
by any means, electronic or mechanical, including photocopy, recording, or any information
storage and retrieval system, without permission in writing from the World BASC Organization.
Copyright © 2002 WBO

BASC STANDARDS

Centro Comercial Bocagrande, Local 309 – Cartagena, Colombia. Tel.: (575) 665 0481 – 655 1574. Fax: (575) 665 1704
E- mail: mhcavalier@ctgred.net.co, asistente@basc-cartagena.com

............10............... 5 1... 11 World BASC Organization...........2 Personnel maintenance...................3............................................................................. 2 1...........................................4...4................... 6 1..... 2 1..3.....................................1 SECURITY PROGRAM ....................................................... 10 1......4................................................................................4............................3 Deadlines for the reception and processing of documents........................4.................................1 Cargo documents .......................................3 Interview ....2 SECURITY POLICIES ...................4 Incentive programs ................ 7 1........... 11 ANNEX 1 ....................3 PERSONNEL.......... 6 1..............1 Cargo storage areas .................10 Security procedures...6.....3 Close circuit TV system (CCTV) ................................................2 Access control systems ................................. 10 1....4.............................................................1.........................................4 PHYSICAL SECURITY........................... 8 1............ BASC STANDARDS............6.. 4 1...................................... 4 1.............................3...................CONTENTS 1............. 5 1..................3......................... 10 1.....4 Computerized process follow-up................................................ 6 1..............................3. 5 1.... 10 1.............13 Communications.........................................................4...............................................2 Signature and stamp policies .......................................................................................................................... 2 1..................... 5 1........... September 2002 page Copyright © 2002 OMB i ..............3...........3........................................................................10....... 5 1........... 7 1................................. 3 1.......................11 Security guard booths ........................... 7 1..........................7 SEALS AND STAMPS ............3 Prevention of internal conspiracies... 4 1.4...................1 Applicant’s data................................... 4 1............................................................................................4................5.................................. 10 1......4................................................................ 6 1....................................................... 6 1........................................................................................................................................................................................................ 9 1.......5...............................................6 Personnel acquaintance.............5 ELECTRONIC SECURITY SYSTEMS ...............4................................................................1 Personnel selection ....... 1 1..........................................8 ID systems...... 3 1......... 5 1.......................2 Perimeter fencing..... 3 1............10...................................4.......................................................................1................4...........4 Induction...................................................4..........................5 Lock and key controls .........................................................................................................................4...............................3.3 Doors .....2 Reception and delivery of full containers . 6 1............................. 1 1......................................................8 SECURITY STRATEGIC ALLIANCES........................................................................1..7 Security Personnel...............................4............................. 6 1..........................................................................................1 Reception and delivery of empty containers.................1 Theft alarm systems......10.............4 Inspection of non-company vehicles ..4.............. 9 1.........................5......................................9 Security awareness and training ........................................................................................ 6 1......... 1 1.................14 Access controls ............4..........6.......2 Data verification .............................6............................... 2 1............................................................................ 4 1............................4 Lighting...............................................6 DOCUMENT AND DATA SECURITY...........................................1..12 Parking lots ............................3 Reception and delivery of merchandise in general........ 3 1...

employees and customers. The organization’s vulnerability to current and future security risks. Update the security methods included in the plan. BASC ST ANDARDS 1. To maintain the security program it is important to: • • • • 1.2 Update the safety and security program at least once a year. Control and management of keys and conducting periodic inventory. Policies to be applied in criminal background checks. Procedures when closing facilities (doors. Assignment of responsibilities for contract security personnel. The factors to consider in preparing a security program include: • • • • Organizational security requirements. windows. directors or managers. gates. Other important aspects that should be included in a Security Plan are: • • • • • • • • • • • • • • Clear definition of security requirements. Handling of document and files. Security systems to check entry and exit of people and/or vehicles. Mechanisms to establish accountability in case of theft or robbery. etc). Procedures when checking lighting and perimeter fencing. Procedures for obtaining photographs and fingerprints of all employees. Available options to the organization to cover its security needs.1. the principal source of evidence supporting a company’s will to prevent its use by illegal organizations is the position of its owners. its assets. Personnel training. Policies and procedures for personnel hiring. Potential of the organization to meet those requirements.1 SECURITY PROGRAM A security program consists of a number of operating measures adopted to protect an organization. Procedures for handling cargo. The following policies are of a general nature and are only a . Assessment of contract services. Written procedures for internal / external notification of security. SECURITY POLICIES When referring to the word policies. properties. Definition of policies for external monitoring.

this produces a feeling of responsibility in the applicant. For greater customer visibility. For the case of independent contractors (housekeeping services. Relations with authorities.baseline to allow each functional area to prepare its own policies. garbage collection. 1. September 2002 page Copyright © 2002 OMB 2 . Answers to a questionnaire form should be handwritten should be duly signed.1. 1. the general rules in the common areas and the specific detailed ones in each department or business unit. place posters or bulletin boards describing the company’s security policies in accessible areas highly visited by customers.3. Procedures for reporting irregularities or suspicious activities. Recommendations for distribution and implementation of security policies: • • • Place in a visible place. personal and commercial records must be checked.1 Personnel selection Human resources may be the weakest or the strongest link in the risk prevention chain. 1. as well as ideas for retaining them and managing the constant review of the factors that may lead a company employee to be involved in internal conspiracies. World BASC Organization. the following elements should be included: • • • • • Well-defined security standards. a good selection process would make them quit harming the company. a person or an institution will be in charge of checking the information therein included.2 Data verification Once the applicant delivers the form. Employee information about the civil and criminal impact of his/her job duties and responsibilities.3.3. Procedures for personnel selection and hiring. and others).1 Applicant’s data Remember that there are three types of employees: (1) The ones that cooperate with offenders. Below are some parameters for personnel selection and hiring.3 PERSONNEL Company personnel are under risk of being intimidated or persuaded to cooperate with illegal activities beyond their actual functions. for the first and third type. (2) the ones that do not cooperate and (3) the ones that doubt about it. In preparing security policies. 1. Ensure that the company procedures to be taken in case of any illegal activity are visible to employees so they may know what actions to take and how to advise authorities when the need arises. It depends on selection processes to prevent that the main interest of a new employee would be not to work for the company but to work against it.1. in the event they do not comply with security standards.

3 Interview Once data is checked. who should be advised about irregularities. Those tests may be carried out with electronic narcotic detection equipment or alcoholmeters. may be useful tools in deterring employees. The value of using company personnel is that they are aware of procedures and data. Additionally. Tests to detect use or abuse of drugs are important to prevent employee participation in illegal activities. You will demonstrate that you are concerned for your employee. that you care and the most important factor.3. and piracy will be stressed so as to know about the employee position on those aspects. in which observations are made about changes in life style. in which it will be asked about some data included in the form. during the interview they will try to find out about the character.1.4 Induction Security in the incorporation process doesn’t end with the interview. that you know him/her. 1. blood).3 Prevention of internal conspiracies Criminal organizations require a contact inside companies in order to create a criminal link. honesty and other parameters. operation and security procedures and because they have physical access to different areas. will be vital as a control and as prevention mechanism against internal conspiracies. terrorism. lab tests (urine. Groups of people working in a company serving illegal activities are called “internal conspiracies”. A drug awareness program and training about the effects of drugs. World BASC Organization.1. A policy of bi-annual visits of employee homes. offers received from external agents. The possibility of facade is reduced with this action. 1. All employees handling cargo or handling documents must know safety and security requirements and the consequences of noncompliance.3. 1. it is necessary for the new employee to receive an induction on: safety standards and security standards. restricted areas. it is advisable to interview the applicant by a specialized person. They should also be trained on the ways to recognize that their peers are consuming drugs or are participating in smuggling activities. The policies against theft. identification cards. observations of other peers. September 2002 page Copyright © 2002 OMB 3 . press materials and posters.2 Personnel maintenance Human resources in a company are constantly monitored by criminal organizations that want to use them.3.1. will make your employees feel protected and at the same time responsible towards the company. or tests with polygraphs. A periodic review of such factors as behavior. convince them or persuade them of possible additional benefits that they may obtain. illegal trafficking.3. motivation. their social and economic situation and new friends.

3 Doors The number of doors should be the minimum necessary to provide adequate access to the plant and cargo storage areas.4.2 Perimeter fencing The basic principle is to have physical barriers to avoid access of non-authorized vehicles or individuals to a company’s plant. (2) Structure integrity should be maintained through periodic inspection and repair. 1. Recommendations: (1) Fences or dividing walls sufficiently separated from buildings.4 PHYSICAL SECURITY Security requires an integrated security system that includes a set of adopted security measures. 1. confidential document management and vault. It is vital to recognize that some positions require that skill and others do not. (4) Restricted areas and their access control should be well marked. (3) Periodical fence inspections to verify its conditions. should be built with resistant materials that will preclude illegal entry.4 Incentive programs Some incentives for those individuals or employees reporting suspicious activities involving vulnerable procedures create a deterrent environment and foster a continuous improvement of security standards. Basic parameters and reports that make possible to verify a company’s security actions fall into the following areas. it would not be advisable to have that skill. so as to allow reaction time and observation possibilities. Recommendations: (1) Doors should provide a defense against non-desired access of vehicles and individuals so it should have physical security barriers and people to control it. Recommendations: (1) Conduct a review of the critical positions your employees have in your company (delivery and reception of cargo.4. For sensitive positions that provide service to external users and have the responsibility of delivering or accepting cargo or documents.People with good human relations skills and ability to become quickly gain the confidence of others might pose security risks. 1.3.4. (3) Doors and windows should be secure.1 Cargo storage areas Recommendations: (1) All buildings used for cargo storage and the ones related to this purpose. system managers. etc.) and the job skills needed to ensure the correct alignment of personnel selection and training with a given job. September 2002 page Copyright © 2002 OMB 4 . linked and coordinated to provide a sound protection level. 1. 1. making possible to maintain the quality standard without any significant negative variations. (2) Place signals and warnings describing responsibility World BASC Organization. (2) No debris or trees should be close to fencing since they could be used to violate security.

(2) The shift security person should have a chain with the key closet key. all personnel that have access to the company’s operational areas should be identified properly. September 2002 page Copyright © 2002 OMB 5 .8 ID systems All company personnel and in general. it may be a collar badge or a badge clipped in the right pocket. Recommendations: (1) Identification card should have as a minimum the employee physical characteristics. 1. 1. perimeter fencing and parking areas. A representative from the Company should be in charge of security. a color photograph. the company should have a security organization to protect operation activities.6 Personnel acquaintance All people working in a company and especially those responsible for cargo. (3) For administrative personnel. Recommendations: (1) Install an emergency lighting system for valuable cargo storage areas or key operational areas. signature and a reasonable expiration date. documents and valuable items. Recommendations: (1) Maintain a key storage closet.4.4. (3) Maintain a register and record the signing in and out of high-risk area keys. (2) All personnel should carry identification in a visible place. Identification.5 Lock and key controls Locks and keys used in building doors and equipments should have the necessary protection to avoid the access by non-authorized individuals. 1. 1. whether by color number or inscription should indicate the areas the person is authorized to have access. For operational personnel.7 Security Personnel Depending upon its size. World BASC Organization.4. must have completed a thorough pre-hiring process that produce sufficient background information on that individual. Key and lock control should be handled by the person in charge of the area or by security personnel.4 Lighting Adequate illumination should be provided for entry areas or gates. Recommendations: (1) Security staff uniforms should be different from other employees. a bracelet is used (industrial safety standard) to avoid losses and accidents.4.4.4.9 Security awareness and training The company should provide training for all personnel in the company’s security policies and practices. 1. (4) Use reflective vests or different color uniforms for each sensitive area in order to have more physical visual control and visibility on closed circuit TV. 1.and company procedures in notifying authorities should criminal events take place in its facilities. storage and cargo operations areas.

1. Security service should control employee-parking access. packing conditions.4. amounts of cargo by packing unit type.2 Reception and delivery of full containers When handling full containers that come from the storage area or from the plant to any other destination. and alarms should be used. Automatic access control systems such as defense bars and gates will allow control over the security guard’s activity.10 Security procedures Minimum-security requirements and procedures should be in place in those areas related to cargo receiving. If there are any irregularities with the merchandise.11 Security guard booths Facilities where large cargo amounts are handled should have guards and booths in all vehicle entry and exit gates during working hours. photograph and scale weight records. 1.12 Parking lots Non-company cars should be restricted from parking in the cargo areas and in the areas close to cargo storage buildings. Resources such as telephones.4. should be checked.3 Reception and delivery of merchandise in general Forms or ledgers should be kept.10. portable radios. 1.10. storage and delivery.4.1. An emergency illumination system could be of vital importance to avoid sabotages that will facilitate risks.10. September 2002 page Copyright © 2002 OMB 6 . 1. etc. minimum-security standards should be taken into consideration. to at least record the entrance and exit time.4. for physical as well as administrative purposes.4.1 Reception and delivery of empty containers Empty containers received for storage or loading (general or refrigerated cargo). 1.4.4 Inspection of non-company vehicles Even though non-company vehicles should be restricted access to operations areas. World BASC Organization.13 Communications Good communication and systems should exist between company guards and security authorities. and security seals or stamps.10.4. This is essential to prevent their structure from being modified to hide illegal goods. Employee parking should be separated from visitor’s parking areas.4. 1. Emergency electric power systems are of vital importance for the continuity of security functions. 1. people receiving and delivering. discrepancies should be recorded with a note. procedures should be in place for inspecting those getting in.

smoke detectors integration and other components. In the industrial sector it is fundamental to control all details. Today the use of these security systems is a reality and a reason for small and large companies to consider taking into account the value of technology to maintaining higher efficiency levels at reduced costs. These conditions will make the sensor activate a circuit that is announced and interpreted by the panel as a system alarm. Let us recall that the alarm system does not create a solution by itself but it responds to a human generated action.14 Access controls Without physical access to plants or areas it is impossible to have thefts. Within the integration of security electronic systems we have: a. for that reason it is important to have access controls. terrorism and piracy. In the commercial sector.1 Theft alarm systems Access control systems Close TV circuits (CTVC) Theft alarm systems Among theft alarms we note the use of commercial.4. It also allows the use wireless sensors. • Commercial Alarms: different areas may be activated according to needs. September 2002 page Copyright © 2002 OMB 7 . (5) Signs advising the customers and users about the importance of security and company standard compliance should be placed in highly visible areas. industrial and perimeter alarms. (4) Be aware that if fewer people have access to document or cargo storage areas. detectors may be integrated and multiple functions may be assigned. procedures should be focused in the importance of managing and interacting between shopping centers and companies that serve large volume of public.5. the possibility of risk will be lower. c. from personnel entry and exit to vehicle’s entrance and exit. World BASC Organization. 1.1. illegal traffic. • Industrial Alarms: a large amount of components such as sensors. Recommendations: (1) Control the time persons have access to facilities. b. Alarm systems are designed to detect open windows or doors or movements or changes in the environment. 1. (3) Post a map showing restricted areas for each type of employee. Do not allow inactivity in sensitive areas. Automatic activation schedule may also be programmed and also a large amount of user codes.5 ELECTRONIC SECURITY SYSTEMS Electronic security systems were used before only in large organizations and corporations to protect very high value objects. (2) Keep control and manage the activities and operations times. Inspect persons and packages. visitor and user.

buildings. Detectors: There are various types: Movement Sensors: Infrared and double technology Magnetic contacts: Heavy use and those in doors Glass rupture detectors. infrared and electrostatic fields to warn about intruders in the property. Management of assault button (wired and wireless). capacity to handle up to 36 zones or more. depending on how complex is the architectonic layout and the type of materials used during construction of different doors and frames of all entry gates. Sophisticated systems may be tied-in with payment control systems (payroll) and many other applications. assigning them a card with a World BASC Organization. vehicles and even communication or television antennas. It also limits personnel access as a pre-determined schedule. For perimeter protection system the following options should be taken into consideration: • • • Size of area to protect Land topography Type of protection (lineal. Keyboard: It allows alarm programming. the alarm is activated. sound. cable. sensors) Alarm components: • • • • • • Panel: Alarm brain. creating a data base with data and photographs of personnel working at the company. It consists of a group of sensors as an underground cable that creates an electromagnetic field. Access control systems Access controls allow restricted entry of individuals to offices and buildings. There are also systems using microwaves. should be placed in a secure and dry place.2 Wireless system management Expandable. The simpler systems will open and close doors according to the electronic key the user has.The following options should be taken into consideration in this type of alarms: • − Type of protection desired − General Analysis of access areas − High risk areas − Perimeter Area Perimeter Protection: The purpose of perimeter protection is to trigger an alert that intruders have trespassed the property perimeter. warehouses. These systems are used to protect residences. Those systems have a software in which the necessary tasks are scheduled to be carried out by the system. An access control system is set according to a building structure needs. Some panels have additional functions: • • • 1. When intruders cross that field. September 2002 page Copyright © 2002 OMB 8 .5.

transfer the responsibility from one company to another or an area to another within the same World BASC Organization. 1. auto-iris and they have a zoom of up to 72 times zoom. Within that varied system. To plan this system installation it is important to select camera locations in the correct places to promote maximum coverage in the designated areas. In this system we have a large amount of variables according to the type of need.5.6 DOCUMENT AND DATA SECURITY The efficiency of security standards on the facilities will depend on the control of documents used to receive. The main video management system is a set of multiplex that will distribute into monitors and video recorders providing a permanent record of events occurred. Lenses are recommended depending on what is required and on the width of the area to be protected in the case of external cameras. September 2002 page Copyright © 2002 OMB 9 . That will be activated when using the card to enter any area. Another capability is to generate visitor cards. what is the schedule for area use and what is the security level assigned. which are the areas authorized for each person. transport and deliver or in general. TV domes may also be scheduled to do visual “sweeping” and to turn very fast to observe interest areas just pressing on a button. That information will tell us. These modular systems allow the installation of additional cameras depending upon the needs. we have: • Color domes: These color cameras allow observation of areas with 360° degrees turns. for that reason they are recommended for internal areas. an alarm will be triggered and the system will not allow entry. It allows recording of objects and individuals observed in a video recorder. achieving more satisfactory results and a good security performance. 1. They have auto-focus. • Multiplex Systems: They allow more cameras to be installed. Black and white cameras are more efficient with respect to people identification for physical characteristics because it has more resolution lines than color ones. If that person will use the card to try to enter in a different area. In each control area or door readers will be installed with access codes or without depending on the areas in which security is stricter. which uses a monitor and a variety of cameras providing effective surveillance in wide areas presenting high risk. also offering better security functions. we have color and black and white cameras.number programmed in a chip. an alarm will be generated because the area was violated. the color of garments and other aspects such as hair. allocating only the area they need to visit. unpack. Color camera provides us with the advantage of identifying a person due to his/her clothing.3 Close circuit TV system (CCTV) At the present time human resources in the security area are complemented by the use of a Closed Circuit TV System. If that is not the case. which may be easily controlled from the observation center. at the same time it reducers the number of officers used to patrol the area. and are recommended for exteriors. pack. the system will compare the card number and data existing in the database.

6. vault opening. (5) Only authorized signatures are accepted. In the event that it is already in the company’s facilities.2 Signature and stamp policies The signature policy is generally applied to document preparation processes. (4) Document confidentiality is protected. (3) Only payroll employees may sign relevant documents on delivery. (5) Have secure areas for storage and filing.6. 1.6. the state agencies in charge of control should be notified. customs documents and others.company. 1. Recommendations: (1) System accesses control limiting and discriminating users. 1. Recommendations: (1) Documents with which responsibility over cargo is transferred or when a service is provided should be signed by the person delivering it and by the person receiving it. (6) Identification of authorized persons should be checked. physical count of parts. (2) Physical security in the server’s area. invoices. reception. etc. 1. cargo. (3) Set closing and confrontation processes between operating activities and documents generated by it.6. or responsibility transfer over a good. individuals checking. Recommendations: (1) A careful examination of cargo document. breaking seals. 1. (2) A special control for last minute shipment in the event those are imperative. equipment. There are two types of information crimes: One in which the actual victim is the system (software o hardware damage) and one in which the system is used as an instrument for illegal actions. (3) A process to advise the authorities about a last minute shipment. it is vital to stamp time and date with a printing clock. (2) Besides the signature. (7) Procedures should be set to notify about suspicious activities. (4) Set formal delivery procedures and information file.3 Deadlines for the reception and processing of documents Experience tells us that last minute documents received under pressure are largely used by criminal organizations to avoid risk analysis of suspicious shipments and authority controls. September 2002 page Copyright © 2002 OMB 10 . (3) Backup processes. transportation agreement. (2) Clear procedures for document responsibility. application of seals. Recommendations: (1) A defined policy to receive documents with sufficient time in advance for cargo entry or exit. (2) Each employee should know exactly and shall kept a legible and accurately account of the cargo handled or received. Recommendations: (1) Limit as much as possible access to data or information.4 Computerized process follow-up Information systems represent great help to increase security standard levels on administrative processes supporting physical operations.7 SEALS AND STAMPS World BASC Organization.1 Cargo documents All personnel working with cargo documents have the opportunity to recognize suspicious shipments that should not be received nor transported. (3) Only legible documents are processed.

(5) Set different checking points to ensure seal integrity. Do not forget that customs and anti-narcotic authorities should also be aware of your agreements. ANNEX 1 APPLICATION FORM FOR THE CREATION OF A BASC CHAPTER Herewith we are expressing our wish to become part of the BASC Chapter (Business AntiSmuggling Coalition) in the city of ______________. World BASC Organization. (4) Seal empty packing units. time control. In supply chain security. Recommendations: (1) Seals or stamps should be numbered and controlled one by one person to avoid illegal use. and they could prepare a false one. Those agreements should include seals. country of _____________ in order to become part of the WORLD BASC ORGANIZATION. packing units. buildings or areas under custody will determine the participating parties’ responsibility. (2) A log should be kept to record who received the seal and where it was used. the best thing to do is to prepare agreements in preventive controls along the logistics chain. signatures. 1. but if the business partner or the one providing a service does not have them. responsible persons. communication means. this means that a company may make important security efforts. etc. To prevent this.8 SECURITY STRATEGIC ALLIANCES Remember that a chain is only as strong as its weakest link. We recognize that the fundamental objective of the BASC chapters is to promote within its associates the development and execution of preventive actions destined to prevent the use for illicit purposes of those companies that participate in international supply chain. (6) Make seal follow-ups and controls. the opportunities for illegal activities with your products or service will be in the hands of someone else.A policy on seals and stamps on documents. September 2002 page Copyright © 2002 OMB 11 . (3) The person in charge of seals should not give them in strict numbering sequence because it will easy to know the seal number that will be used next. policies.

FOUNDING COMPANIES Name of the Companies Founding Name of legal representative Type of Business or Activity 4. GENERALITIES Applying Companies or business groups: ______________________________________________________________________ Address: _______________________City: __________________________________ Telephone numbers: _____________________Fax number: _____________________ Contact Person : ________________________________________________________ Position : _______________________________________________________________ E-mail address: _________________________________________________________ City where BASC will be established: _________________________________________ Country: ______________________________________________________________ 2.BASC is a voluntary program that seeks.REASONS FOR FORMING THE CHAPTER World BASC Organization. among others. 1. by the United States Customs Service. the International Chamber of Commerce and the World Customs Organization. The association is managed by the business sector and is supported. ENTITIES SUPPORTING THE CHAPTER Private: ______________________________________________________________ Government: __________________________________________________________ 3. September 2002 page Copyright © 2002 OMB 12 . promotes and supports the increase of security standards.

money laundering. Which are the most frequent threats in you region regarding drug traffic. terrorism.• • • • Indicate the reasons why you wish to form a BASC Chapter. September 2002 page Copyright © 2002 OMB 13 . etc. the information requested about our companies and organizations for the proper formation of the chapter. Which are your expectations in relation to the program. smuggling. thefts. What support can the BASC program have from businessmen and government authorities from your country? According to the previous application. we agree to supply the corresponding entities. NAME OF THE REQUESTING PARTY: ______________________________________ POSITION : ____________________________________________________________ SIGNATURE : _______________________DATE : ____________________ _________ World BASC Organization.