You are on page 1of 29

Security Training and Threat Awareness Program for All Employees

Security Training and Threat Awareness Program

Our company has recently joined with U.S. Customs and Border Protection to help secure the international supply chain. As a member of the Customs-Trade Partnership Against Terrorism (C-TPAT) program, we have committed ourselves to new and improved security procedures throughout our operations. These new procedures are designed to enhance the security of our employees, facilities, cargo shipping, cargo receiving and cargo tracking processes. Our goal is to prevent cargo loss and cargo tampering including the introduction of illegal merchandise such as drugs and weapons of mass destruction into our cargo boxes and containers. As a part of our commitment to supply chain security, we now require all of our employees to seriously consider supply chain security as a significant part of their everyday responsibilities.

Security Training and Threat Awareness Program Topics ‡ Suspicious Persons ‡ Highly Suspicious Persons ‡ Suspicious Activities ‡ Suspicious Objects and Packages ‡ Suspicious Mail and Express Delivery Packages ‡ Employee Identification ‡ Keys and Electronic Access Cards (If applicable) ‡ Visitor Controls ‡ Computer Security .

Security Training and Threat Awareness Program Suspicious Persons ‡ Monitor the facility for suspicious persons .

Security Training and Threat Awareness Program Look for« Suspicious Persons ‡ Identify and look for the following suspicious persons: ± ± ± ± ± ± Unauthorized employees Unescorted visitors Person(s) who seems lost Person(s) entering a private office unescorted Person(s) selling items Person(s) going door to door .

immediately confront them and have them exit your area or the facility. .Security Training and Threat Awareness Program Suspicious Persons «and ACT ‡ If you identify any of the suspicious persons mentioned in the previous slide.

Security Training and Threat Awareness Program Highly Suspicious Persons ‡ Monitor the facility for highly suspicious persons .

Security Training and Threat Awareness Program Look for« ‡ Highly Suspicious Persons Identify and look for additional persons that have the following highly suspicious and unusual characteristics including person(s): ± sitting in a parked car checking out the area ± nervous. or mumbling ± wearing loose or bulky clothing that is inappropriate for the current weather conditions ± carrying or wearing heavy objects ± holding a bag or package close to his or her body ± walking in an awkward manner ± any other suspicious looking characteristics or features . sweating.

.Security Training and Threat Awareness Program Highly Suspicious Persons «and ACT ‡ If you identify any of the highly suspicious persons mentioned in the previous slide immediately confront them if safe and notify Management for further investigation.

Security Training and Threat Awareness Program Suspicious Activities ‡ Monitor facility for suspicious activities Cam 7 1:17:23AM 8/02/06 .

electrical boxes. places or operations ± attempting to acquire company uniforms. etc. photographing. taking notes. fences. alarm sensors/contacts. ± requesting confidential business information relating to persons. etc. etc. equipment. vehicles. videotaping. etc. computer. ± sketching. personal items. lights.Security Training and Threat Awareness Program Look for« ‡ Suspicious Activities Identify and look for the following suspicious activities including person(s): ± tampering with somebody¶s desk. ± hiding behind doors. badges. locks. drawing maps or diagrams. etc. ± any other suspicious or unusual activities or personal behaviors. Cam 7 1:17:23AM 8/02/06 . desks. ± tampering with fence. cameras.

Security Training and Threat Awareness Program Suspicious Activities «and ACT ‡ If you identify any suspicious or unusual activities. Cam 7 1:17:23AM 8/02/06 . confront them if safe and notify Management for further investigation.

Security Training and Threat Awareness Program Suspicious Objects and Packages ‡ Monitor facility packages for unattended objects and .

Security Training and Threat Awareness Program Look for« Suspicious Objects and Packages ‡ Identify and look for the following unattended objects and packages: ‡ Boxes ‡ Bags or backpacks ‡ Briefcases ‡ Envelopes. etc« .

discolorations or odor ‡ Protruding wires and antennas ‡ Excessive weight ‡ Ticking sounds ‡ Any other suspicious or unusual conditions .Security Training and Threat Awareness Program Look for« Suspicious Objects and Packages ‡ Identify and look for objects and packages left unattended with the following conditions: ‡ Abandoned condition ‡ Damaged ‡ Oily stains.

Security Training and Threat Awareness Program Look for« Suspicious Objects and Packages ‡ Identify and look for objects and packages left unattended in the following unusual locations: ‡ Common areas ‡ Reception area ‡ Hallways ‡ Entrance points ‡ Any other unusual locations .

based on type. condition and location.Security Training and Threat Awareness Program Suspicious Objects and Packages «and ACT ‡ If you identify any suspicious or unusual objects or packages. . investigate if safe and/or immediately notify Management for further investigation.

Security Training and Threat Awareness Program Suspicious Mail & Express Delivery Packages ‡ Identify and look for suspicious and/or unusual mail or express delivery packages .

"Rush". "Confidential". etc. but no name Misspelling of common words Visual distractions (like stickers) Excessive security material such as masking tape or string. ± Any other possibly suspicious or unusual characteristics . Incorrect titles Title. etc.Security Training and Threat Awareness Program Look for« ‡ Suspicious Mail & Express Delivery Packages Identify and look for the following possibly suspicious characteristics: ± ± ± ± ± ± ± ± ± No return address Excessive postage Handwritten or poorly typed addresses Marked with "Personal".

Security Training and Threat Awareness Program Look for« ‡ Identify and look characteristics: ± ± ± ± ± ± ± ± ± ± for the Suspicious Mail & Express Delivery Packages following suspicious Excessive weight Oily stains. discolorations or odor Lopsided or uneven envelope Protruding wires or aluminum foil Ticking sounds Antennas Batteries Capped pipes Timers Any other suspicious or unusual characteristics .

immediately notify Management for further investigation. .Security Training and Threat Awareness Program Suspicious Mail & Express Delivery Packages «and ACT ‡ If you identify any suspicious or unusual mail or express delivery packages.

Security Training and Threat Awareness Program Employee Identification Badges ‡ Display employee identification badge at all times ‡ Properly secure and protect your employee identification badge ‡ Immediately report identification badge a lost employee ‡ Badges are the property of the company and must be returned when employment is terminated .

.Security Training and Threat Awareness Program Keys and Electronic Access Cards ‡ Properly secure and protect all keys and/or electronic access cards issued company by the ‡ Immediately report a lost key and/or electronic access card ‡ Keys and electronic access cards are the property of the company and must be returned when employment is terminated.

Security Training and Threat Awareness Program Visitor Controls ‡ Visitor Entrance: ± Grant access only to authorized visitors ± Ensure that your visitor has logged in ± Ensure that your visitor has been issued and is displaying a visitor badge ‡ Visitor Escort: ± Maintain complete and total control over your authorized visitor at all times ‡ Visitor Exit: ± Escort all departing visitors to document their departure on the Visitor Log and return the Visitor Badge. .

Security Training and Threat Awareness Program Computer Security ‡ Do not share access to your computer with other employees or visitors ‡ Log-off when you leave your computer ‡ Passwords should be changed every 60 to 90 days ‡ Secure your password ‡ Do not share your password with anyone .

Security Training and Threat Awareness Program Computer Security Selecting a Password ‡ Use hard-to-guess passwords ‡ Do not use the same password in more than one place ‡ A password should have a mix of letters. numbers and symbols ± I Love to be Secure ± Always on time to work ± My Password is Very Secure ± Yo Quiero Taco Bell iL2bs@ !AoT2wx MyP1VS# yqtb!10 .

. sexist.Security Training and Threat Awareness Program Computer Security Electronic Mail Restrictions ‡ Do not use company e-mail for private business activities. ‡ Do not join mailing lists. ‡ Do not send e-mail containing racist. amusement or entertainment. ‡ Do not open unknown or unexpected e-mail attachments. threatening or other objectionable language.

Security Training and Threat Awareness Program Let·s review« ‡ Suspicious Persons ‡ Highly Suspicious Persons ‡ Suspicious Activities ‡ Suspicious Objects and Packages ‡ Suspicious Mail and Express Delivery Packages ‡ Employee Identification ‡ Keys and Electronic Access Cards (If applicable) ‡ Visitor Controls ‡ Computer Security .

Security Training and Threat Awareness Program Security is not out of reach if you practice it every day. .