Procedural Security Sample Clauses

POPULAR SAMPLE Copied 5 times
Procedural Security. Procedures should be in place to protect against unmanifested material being introduced onto the facility. Security controls should include: · Having designated, trained personnel to supervise the introduction/removal of cargo. · Seven-point inspection of each container will be performed before loading the container. The carrier will inspect the container when picking up to deliver to the SCJ facility or co-packer. Container seals will be handled per the seal handling procedures (as published separately). Containers will be inspected by the carrier when dropping the trailers. The warehouse personnel unloading the containers will inspect the container when unloading and notify of any problems or issues. · Properly marked, weighed, counted, and documented cargo/cargo equipment verified against manifest documents. · Procedures for verifying seals on containers, trailers, and railcars. · Procedures for detecting and reporting shortages and overages. · Procedures to notify Customs and other law enforcement agencies in cases where anomalies or illegal activities are detected or suspected by the company. · Deliveries (including mail) -- periodic screening of packages shall be conducted. Suspected breaches of the delivery or suspicious packages should be reported immediately to security for resolution. Once notified, Security shall notify U.S. Customs and Border Protection (CBP) or the appropriate agency. At each location, the Security Staff will have the following records, logs, or information readily available to all shift personnel: · Corporate emergency contact list · Security Supervisor after-hours contact information · Facility emergency contact list · Key list (keys and proximity cards issued to the guard force) · Property Pass Authorization and Exemption List · Property Pass file system (file to maintain copies of Property Passes) · Pass Down log (log to pass important information from one shift to another) · Visitor Registration Log · Employee Temporary and Contractor Employee Badge Log
Procedural Security. Procedures should be in place to protect against unmanifested material being introduced into the supply chain.
Procedural Security. Measures for the handling of incoming and outgoing goods should include the protection against the introduction, exchange, or loss of any legal or illegal material. Security controls should include: properly marked, weighed, counted and documented products, procedures for affixing, replacing, recording, tracking and verifying seals on containers, trailers and railcars, procedures for detecting and reporting shortages and overages, procedures for tracking the timely movement of incoming and outgoing goods, proper storage of empty and full containers/trailers/railcars to prevent unauthorized access, and procedures to notify Customs and Border Protection in cases where anomalies or illegal activities are detected or suspected by the company. Personnel Security: Companies should conduct employment screening and interviewing of prospective employees to include periodic background checks and application verifications in accordance with applicable statutes and regulations.
Procedural Security. Vendor’s security policy promotes a secure procedural environment. This environment includes the inability to use removable write data external to the main facility and printing from the datacenters is prohibited.
Procedural Security. Procedural Security measures regulate incoming and outgoing goods and are designed to prevent the introduction of unmanifested materials into the supply chain, or the loss or exchange of ISUZU merchandise. 1.1 Each factory should have a designated employee supervising the introduction and removal of cargo. 1.2 All merchandise must be properly marked, weighed, counted, and documented. 1.3 Procedures must be in place to govern the detection and recording of shortages and overages. 1.4 Containers, trailers, and/or railcars left at the facility overnight must be secured. Containers that are full of cargo must be locked and sealed with industry- approved seals and corresponding seal numbers must be recorded. The seals must be uniquely numbered and require destruction to be removed. 1.5 The factory should have a procedure for inspecting and verifying seals. Discrepancies must immediately be reported to management and/or security personnel. 1.6 All containers or trailers entering or leaving the facility must be recorded, along with the name of the driver who took custody of the merchandise. 1.7 All security procedures must be documented with formal self-assessments (see attached) completed every year. Copies of the self-assessment must be forwarded to ISUZU’s Purchasing Manager. 1.8 ISUZU conducts assessments on a periodic basis. ISUZU or its agents shall have the right to conduct assessments at all reasonable times upon prior notice to supplier.
Procedural Security. Seller will maintain, document, implement and communicate to all employees the following security procedures i. Procedures for the issuance, removal and changing of access devices. ii. Procedures to identify and challenge unauthorized or unidentified persons iii. Procedures to remove identification, facility, and system access for terminated employees. iv. Procedures for IT security and standards. v. Procedures governing the use, maintenance and protection of security technology. vi. Procedures to verify application information for potential employees. vii. Procedures for employees to report security incidents and/or suspicious behavior. viii. Procedures for the inspection of ocean containers or truck trailers, including policies for agricultural and security inspections, prior to stuffing. ix. Procedures to secure cargo staging areas including protection from unauthorized access and prevention of pest contamination as well as inspection for visible pest contamination on a regular basis x. Procedures to control, manage and record the issuance and use of high security bolt seals for ocean containers and truck trailers. Such procedures must stipulate how seals are to be controlled and affixed to loaded containers and shall include procedures for recognizing and reporting compromised seals or containers to US Customs or the appropriate foreign authority and Boeing at ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇▇▇▇▇.▇▇▇. xi. Procedures to identify any party on denied party lists maintained by the Department of Commerce/Bureau of Industry and Security (BIS), the Department of State/Directorate of Defense Trade Controls (DDTC), and the Department of Treasury/Office of Foreign Assets Control (OFAC). xii. Procedures for ensuring that information transmitted/received to/from service providers, subcontractors and agents, is reported accurately and timely xiii. Procedures for ensuring that all information used in the preparation of merchandise/cargo for export (EEI or other required export form), is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information
Procedural Security. Seller will maintain, document, implement and communicate to all employees the following security procedures i. Procedures for the issuance, removal and changing of access devices. ii. Procedures to identify and challenge unauthorized or unidentified persons iii. Procedures to remove identification, facility, and system access for terminated employees. iv. Procedures for IT security and standards. v. Procedures to verify application information for potential employees. vi. Procedures for employees to report security incidents and/or suspicious behavior. vii. Procedures for the inspection of ocean containers or truck trailers prior to stuffing. viii. Procedures to control, manage and record the issuance and use of high security bolt seals for ocean containers and truck trailers. Such procedures must stipulate how seals are to be controlled and affixed to loaded containers and shall include procedures for recognizing and reporting compromised seals or containers to US Customs or the appropriate foreign authority and Boeing at ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇▇▇▇▇.▇▇▇. ix. Procedures to identify any party on denied party lists maintained by the Department of Commerce/Bureau of Industry and Security (BIS), the Department of State/Directorate of Defense Trade Controls (DDTC), and the Department of Treasury/Office of Foreign Assets Control (OFAC). x. Procedures for ensuring that information transmitted/received to/from service providers, subcontractors and agents, is reported accurately and timely xi. Procedures for ensuring that all information used in the preparation of merchandise/cargo for export (EEI or other required export form), is legible, complete, accurate, and protected against the exchange, loss or introduction of erroneous information
Procedural Security 

Related to Procedural Security

  • Physical Security BNY Mellon will deploy perimeter security such as barrier access controls around its facilities processing or storing Customer Data. The ISP will include (i) procedures for validating visitor identity and authorization to enter the premises, which may include identification checks, issuance of identification badges and recording of entry purpose of visit and (ii) physical security policies for personnel, such as a “clean desk” policy. In accordance with its ISP and applicable law, BNY Mellon will install closed circuit television (“CCTV”) systems and CCTV recording systems to monitor and record access to controlled areas, such as data centers and server rooms.

  • Personnel Security 6.1 Staff recruitment in accordance with government requirements for pre- employment checks; 6.2 Staff training and awareness of Departmental security and any specific contract requirements.