Knowledge (XXG)

Supply chain security

Source 📝

38: 883: 250:
and risk management industries; after the attacks more structured approaches were implemented. Early efforts were dominated by concerns over the use of maritime shipping to deliver weapons of mass destruction. From 2001 to 2006 efforts focused on the physical security of goods and shipments but from
342:
The Global Container Control Programme (CCP), a joint United Nations Office on Drugs and Crime (UNODC)/World Customs Organization (WCO) initiative working to establish effective container controls at select ports across the globe with the aim to prevent trafficking of drugs, chemicals and other
204:
in the United States, "adversaries exploit supply chain vulnerabilities to steal America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and
229:
can take place anywhere in the logistics chain: from the shipper, carrier, or consignee. It may be packages, pallet loads, and full truck loads. It can involve individuals with an opportunity to take cargo or can involve organized crime. Security systems involving surveillance systems,
169:, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance. 398:, offers public and private enterprise an international high-level management standard that enables organisations to utilize a globally consistent management approach to applying supply-chain security initiatives. ISO/IEC 20243 is The 836: 472:
Supply chain cyber security is a subset of supply chain security which focuses on the digital aspects of the traditional supply chain as well as the supply chain for electronic and digital goods.
417:
in November 2010, highlighting the need for their international "partnership to bring greater prosperity and security" for citizens on both sides of the Atlantic, provided a foundation for the
313:
Operation Safe Commerce (OSC), a U.S. federal program designed to test and evaluate practices, policies and procedures aimed at improving the security of international containerized shipping.
755:
Communication from the Commission to the European Parliament, the Council and the European Economic and Social Committee on Customs Risk Management and Security of the Supply Chain
320:(WCO) adopted the Framework of Standards to Secure and Facilitate Global Trade in 2005, which consists of supply-chain security standards for Customs administrations including 443: 286:
Customs authorities shall be primarily responsible for the supervision of the Community's international trade, thereby contributing to ... overall supply chain security.
201: 388: 506: 307: 537: 399: 410: 376:
undertakes an annual survey of supply chain risk exposure, identifying and updating the main supply chain security concerns. In its 2020 report,
55: 256: 905: 421:
to build on, announcing at its December 2010 meeting an agreement "to deepen transatlantic cooperation in supply chain security policies".
447: 332: 1005: 931: 501: 121: 102: 725: 354:
program designed to collect financial information about shipments, with the objective of determining the safety of cargo shipments.
74: 1020: 985: 670: 819: 592:
Agreement between Canada and the European Union on Customs Cooperation with Respect to Matters Related to Supply-Chain Security
336: 418: 246:
were the defining event for modern supply chain security. Before 9/11 supply chain security was primarily the concern of the
81: 59: 862: 1000: 697: 491: 328: 945: 481: 457:
entered into an Agreement on Customs Cooperation with Respect to Matters Related to Supply-Chain Security in March 2013.
321: 794: 343:
contraband and to facilitate trade by strengthening cooperation between the customs, trade and enforcement communities.
88: 467: 271: 913: 909: 893: 496: 429: 317: 960: 849: 70: 48: 605: 310:(C-TPAT), a voluntary compliance program for companies to improve the security of their corporate supply chains. 606:"The impact of information security initiatives on supply chain robustness and performance: an empirical study" 754: 558: 158: 768: 643: 275: 591: 946:
ICAO-WCO: Moving Air Cargo Globally - Air Cargo and Mail Secure Supply Chain and Facilitation Guidelines
511: 391:(ISO) has released a series of standards for the establishment and management of supply-chain security. 384:
and medical supplies and increasing warehouse and facility theft were identified as particular concerns.
347: 971:
Supply chain security: adding to a complex operational and institutional environment, A Grainger (2007)
990: 454: 243: 432:
4 an opportunity to include necessary evaluations that assure supply chain security for IT products
95: 568: 247: 1025: 625: 543: 279: 186: 157:
and to "facilitate legitimate trade". Their objective is to combine traditional practices of
617: 516: 358: 278:(2008) includes reference to supply chain security in its outline of the mission of each EU 975: 357:
Pilot initiatives by companies in the private sector to track and monitor the integrity of
995: 563: 486: 425: 381: 231: 185:
Ensuring the security of cargo while in transit, for example through the use of locks and
986:
Chain of Perils: Hardening the Global Supply Chain and Strengthening America's Resilience
970: 950: 377: 252: 1014: 801:. Federal Register (Daily Journal of the United States Government). November 20, 2002 553: 548: 392: 302:
There are a number of supply-chain security initiatives around the world, including:
264: 220: 17: 521: 251:
2012 on focus shifted to cybersecurity as the awareness of cyber threats grew. The
208: 142: 1001:
Global Supply Chain Security, James Giermanski, Scarecrow Press, 2012 - 218 Pages
351: 146: 37: 234:, and broader corporate security are needed to reduce the theft of material. 27:
Security of supply chain from trojans, tampering, privacy, theft and terrorism
629: 621: 531: 526: 373: 291: 205:
information used every day by the government, businesses, and individuals."
162: 150: 837:
Cargo theft and labor exploitation incidents increase risk to supply chains
757:, COM(2012) 793 final, published 8 January 2013, accessed 27 December 2023 965: 138: 414: 166: 769:"Biden signs executive order demanding supply chain security review" 442:
Efforts for countries around the world to implement and enforce the
211:
often lack the resources to properly address supply chain security.
912:
external links, and converting useful links where appropriate into
446:(ISPS Code), an agreement of 148 countries that are members of the 294:
made supply chain security one of his administration's priorities.
396:
Specification for Security Management Systems for the Supply Chain
260: 154: 1006:
Implementing a Robust Supply Chain Security & Risk Management
955: 362: 267:, as a significant factor in relation to supply chain security. 182:
Advance notification of the contents to the destination country
179:
Screening and validating of the contents of cargo being shipped
876: 406:) that addresses supply-chain security and secure engineering. 366: 31: 976:
World Customs Journal: special issue on supply chain security
137:(also "supply-chain security") activities aim to enhance the 161:
with the security requirements driven by threats such as
726:"How supply chain security has evolved over two decades" 980: 901: 896:
may not follow Knowledge (XXG)'s policies or guidelines
852:, published 20 November 2010, accessed 23 December 2020 404:
Mitigating Maliciously Tainted and Counterfeit Products
339:(DHS) focused on screening containers at foreign ports. 839:, published 21 October 2020, accessed 1 January 2021 826:, published 8 September 2004, accessed 28 July 2022 361:moving around the world using technologies such as 62:. Unsourced material may be challenged and removed. 444:International Ship and Port Facility Security Code 172:Typical supply-chain security activities include: 956:MIT Project on Supply Chain Response to Terrorism 702:Trends & Issues in Crime and Criminal Justice 650:. Office of the Director of National Intelligence 176:Credentialing of participants in the supply chain 671:"The Daily Challenges of Supply Chain Security" 284: 202:Office of the Director of National Intelligence 991:ISO 28002 supply chain security and resilience 594:, signed 4 March 2013, accessed 18 August 2021 389:International Organization for Standardization 966:Stanford Global Supply Chain Management Forum 865:, 17 December 2010, accessed 23 December 2020 719: 717: 698:"The Detection and Prevention of Cargo Theft" 8: 961:Supply Chain Risk Management Maturity Model 507:Customs Trade Partnership against Terrorism 308:Customs Trade Partnership against Terrorism 586: 584: 932:Learn how and when to remove this message 538:Open Trusted Technology Provider Standard 400:Open Trusted Technology Provider Standard 122:Learn how and when to remove this message 861:U.S.-EU Transatlantic Economic Council, 749: 747: 580: 820:Operation Safe Commerce passes Round 1 257:2010 transatlantic aircraft bomb plot 7: 60:adding citations to reliable sources 610:Information & Computer Security 448:International Maritime Organization 259:involving packages being sent from 333:U.S. Customs and Border Protection 25: 981:Port and Maritime Security Online 767:Starks, Tim (February 24, 2021). 604:P.N., Sindhuja (August 3, 2021). 502:Counterfeit electronic components 881: 36: 848:Council of the European Union, 337:Department of Homeland Security 47:needs additional citations for 996:CSA Cargo Security Information 799:Office of the Federal Register 644:"Supply Chain Risk Management" 419:Transatlantic Economic Council 290:In February 2021 US President 1: 850:EU-US Summit: Joint statement 730:searchsecurity.techtarget.com 492:Container Security Initiative 329:Container Security Initiative 482:Authorized economic operator 322:authorized economic operator 468:Supply chain cyber security 462:Supply chain cyber security 453:The European Union and the 1042: 497:Counterfeit consumer goods 465: 318:World Customs Organization 218: 795:"Operation Safe Commerce" 244:terrorist attacks of 9/11 191:Inspecting cargo on entry 951:IMO FAQ on the ISPS Code 675:www.securitymagazine.com 622:10.1108/ICS-07-2020-0128 437:International agreements 331:(CSI), a program led by 209:Local police departments 153:systems for the world's 1021:Supply chain management 559:Supply-chain management 159:supply-chain management 71:"Supply chain security" 590:Government of Canada, 288: 276:Community Customs Code 753:European Commission, 512:Global Trade Exchange 348:Global Trade Exchange 270:The European Union's 135:Supply chain security 18:Supply Chain Security 902:improve this article 455:Government of Canada 149:, the transport and 56:improve this article 914:footnote references 677:. Security Magazine 773:www.cyberscoop.com 696:Mayhew, C (2001), 569:Trade facilitation 187:tamper-proof seals 942: 941: 934: 544:Package pilferage 380:, cargo theft of 280:customs authority 255:also treated the 200:According to the 132: 131: 124: 106: 16:(Redirected from 1033: 937: 930: 926: 923: 917: 885: 884: 877: 866: 859: 853: 846: 840: 833: 827: 824:Inside Logistics 817: 811: 810: 808: 806: 791: 785: 784: 782: 780: 764: 758: 751: 742: 741: 739: 737: 721: 712: 711: 710: 708: 693: 687: 686: 684: 682: 666: 660: 659: 657: 655: 640: 634: 633: 601: 595: 588: 517:James Giermanski 359:cargo containers 232:tracking systems 127: 120: 116: 113: 107: 105: 64: 40: 32: 21: 1041: 1040: 1036: 1035: 1034: 1032: 1031: 1030: 1011: 1010: 938: 927: 921: 918: 899: 890:This article's 886: 882: 875: 870: 869: 863:Joint Statement 860: 856: 847: 843: 834: 830: 818: 814: 804: 802: 793: 792: 788: 778: 776: 766: 765: 761: 752: 745: 735: 733: 724:Hayden, Ernie. 723: 722: 715: 706: 704: 695: 694: 690: 680: 678: 668: 667: 663: 653: 651: 642: 641: 637: 603: 602: 598: 589: 582: 577: 564:Track and trace 540:(ISO/IEC 20243) 487:Hardware Trojan 478: 470: 464: 439: 426:Common Criteria 382:pharmaceuticals 324:(AEO) programs. 300: 298:Key initiatives 240: 223: 217: 198: 128: 117: 111: 108: 65: 63: 53: 41: 28: 23: 22: 15: 12: 11: 5: 1039: 1037: 1029: 1028: 1023: 1013: 1012: 1009: 1008: 1003: 998: 993: 988: 983: 978: 973: 968: 963: 958: 953: 948: 940: 939: 894:external links 889: 887: 880: 874: 873:External links 871: 868: 867: 854: 841: 828: 812: 786: 759: 743: 713: 688: 661: 635: 616:(2): 365–391. 596: 579: 578: 576: 573: 572: 571: 566: 561: 556: 551: 546: 541: 534: 529: 524: 519: 514: 509: 504: 499: 494: 489: 484: 477: 474: 466:Main article: 463: 460: 459: 458: 451: 438: 435: 434: 433: 422: 407: 385: 378:drug smuggling 370: 355: 344: 340: 325: 314: 311: 299: 296: 253:European Union 239: 236: 219:Main article: 216: 213: 197: 194: 193: 192: 189: 183: 180: 177: 130: 129: 44: 42: 35: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1038: 1027: 1024: 1022: 1019: 1018: 1016: 1007: 1004: 1002: 999: 997: 994: 992: 989: 987: 984: 982: 979: 977: 974: 972: 969: 967: 964: 962: 959: 957: 954: 952: 949: 947: 944: 943: 936: 933: 925: 915: 911: 910:inappropriate 907: 903: 897: 895: 888: 879: 878: 872: 864: 858: 855: 851: 845: 842: 838: 832: 829: 825: 821: 816: 813: 800: 796: 790: 787: 774: 770: 763: 760: 756: 750: 748: 744: 732:. Tech Target 731: 727: 720: 718: 714: 703: 699: 692: 689: 676: 672: 669:Zalud, Bill. 665: 662: 649: 645: 639: 636: 631: 627: 623: 619: 615: 611: 607: 600: 597: 593: 587: 585: 581: 574: 570: 567: 565: 562: 560: 557: 555: 554:Security risk 552: 550: 549:Package theft 547: 545: 542: 539: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 498: 495: 493: 490: 488: 485: 483: 480: 479: 475: 473: 469: 461: 456: 452: 449: 445: 441: 440: 436: 431: 427: 423: 420: 416: 412: 408: 405: 401: 397: 394: 393:ISO/PAS 28000 390: 386: 383: 379: 375: 371: 368: 364: 360: 356: 353: 349: 345: 341: 338: 334: 330: 326: 323: 319: 315: 312: 309: 305: 304: 303: 297: 295: 293: 287: 283: 281: 277: 273: 268: 266: 265:United States 262: 258: 254: 249: 245: 237: 235: 233: 228: 222: 221:Package theft 215:Transit theft 214: 212: 210: 206: 203: 195: 190: 188: 184: 181: 178: 175: 174: 173: 170: 168: 164: 160: 156: 152: 148: 144: 140: 136: 126: 123: 115: 112:February 2014 104: 101: 97: 94: 90: 87: 83: 80: 76: 73: –  72: 68: 67:Find sources: 61: 57: 51: 50: 45:This article 43: 39: 34: 33: 30: 19: 928: 919: 904:by removing 891: 857: 844: 831: 823: 815: 803:. Retrieved 798: 789: 777:. Retrieved 775:. CyberScoop 772: 762: 734:. Retrieved 729: 705:, retrieved 701: 691: 679:. Retrieved 674: 664: 652:. Retrieved 647: 638: 613: 609: 599: 522:Denise Krepp 471: 428:offers with 411:EU-US Summit 403: 395: 301: 289: 285: 269: 241: 226: 224: 207: 199: 171: 143:supply chain 134: 133: 118: 109: 99: 92: 85: 78: 66: 54:Please help 49:verification 46: 29: 835:BSI Group, 707:January 25, 648:www.dni.gov 352:data-mining 147:value chain 1015:Categories 922:March 2021 575:References 402:(O-TTPS) ( 272:regulation 225:Theft and 82:newspapers 906:excessive 630:2056-4961 532:ISO 31000 527:ISO 28000 374:BSI Group 292:Joe Biden 248:insurance 227:shrinkage 163:terrorism 151:logistics 1026:Security 805:July 17, 779:March 7, 736:March 7, 681:March 7, 654:March 7, 476:See also 413:held in 350:, a DHS 196:Overview 139:security 900:Please 892:use of 335:in the 274:on the 263:to the 238:History 141:of the 96:scholar 628:  450:(IMO). 415:Lisbon 167:piracy 98:  91:  84:  77:  69:  261:Yemen 155:cargo 103:JSTOR 89:books 807:2016 781:2021 738:2021 709:2023 683:2021 656:2021 626:ISSN 536:The 424:The 409:The 387:The 372:The 365:and 363:RFID 346:The 327:The 316:The 306:The 242:The 75:news 908:or 618:doi 430:EAL 367:GPS 145:or 58:by 1017:: 822:, 797:. 771:. 746:^ 728:. 716:^ 700:, 673:. 646:. 624:. 614:29 612:. 608:. 583:^ 165:, 935:) 929:( 924:) 920:( 916:. 898:. 809:. 783:. 740:. 685:. 658:. 632:. 620:: 369:. 282:: 125:) 119:( 114:) 110:( 100:· 93:· 86:· 79:· 52:. 20:)

Index

Supply Chain Security

verification
improve this article
adding citations to reliable sources
"Supply chain security"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
security
supply chain
value chain
logistics
cargo
supply-chain management
terrorism
piracy
tamper-proof seals
Office of the Director of National Intelligence
Local police departments
Package theft
tracking systems
terrorist attacks of 9/11
insurance
European Union
2010 transatlantic aircraft bomb plot
Yemen

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.