Knowledge

Supply chain security

Source 📝

27: 872: 239:
and risk management industries; after the attacks more structured approaches were implemented. Early efforts were dominated by concerns over the use of maritime shipping to deliver weapons of mass destruction. From 2001 to 2006 efforts focused on the physical security of goods and shipments but from
331:
The Global Container Control Programme (CCP), a joint United Nations Office on Drugs and Crime (UNODC)/World Customs Organization (WCO) initiative working to establish effective container controls at select ports across the globe with the aim to prevent trafficking of drugs, chemicals and other
193:
in the United States, "adversaries exploit supply chain vulnerabilities to steal America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and
218:
can take place anywhere in the logistics chain: from the shipper, carrier, or consignee. It may be packages, pallet loads, and full truck loads. It can involve individuals with an opportunity to take cargo or can involve organized crime. Security systems involving surveillance systems,
158:, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance. 387:, offers public and private enterprise an international high-level management standard that enables organisations to utilize a globally consistent management approach to applying supply-chain security initiatives. ISO/IEC 20243 is The 825: 461:
Supply chain cyber security is a subset of supply chain security which focuses on the digital aspects of the traditional supply chain as well as the supply chain for electronic and digital goods.
406:
in November 2010, highlighting the need for their international "partnership to bring greater prosperity and security" for citizens on both sides of the Atlantic, provided a foundation for the
302:
Operation Safe Commerce (OSC), a U.S. federal program designed to test and evaluate practices, policies and procedures aimed at improving the security of international containerized shipping.
894: 744:
Communication from the Commission to the European Parliament, the Council and the European Economic and Social Committee on Customs Risk Management and Security of the Supply Chain
309:(WCO) adopted the Framework of Standards to Secure and Facilitate Global Trade in 2005, which consists of supply-chain security standards for Customs administrations including 275:
Customs authorities shall be primarily responsible for the supervision of the Community's international trade, thereby contributing to ... overall supply chain security.
432: 399: 365:
undertakes an annual survey of supply chain risk exposure, identifying and updating the main supply chain security concerns. In its 2020 report,
190: 377: 410:
to build on, announcing at its December 2010 meeting an agreement "to deepen transatlantic cooperation in supply chain security policies".
495: 296: 526: 388: 994: 91: 714: 343:
program designed to collect financial information about shipments, with the objective of determining the safety of cargo shipments.
63: 974: 659: 808: 581:
Agreement between Canada and the European Union on Customs Cooperation with Respect to Matters Related to Supply-Chain Security
44: 245: 235:
were the defining event for modern supply chain security. Before 9/11 supply chain security was primarily the concern of the
70: 851: 989: 686: 436: 934: 446:
entered into an Agreement on Customs Cooperation with Respect to Matters Related to Supply-Chain Security in March 2013.
783: 332:
contraband and to facilitate trade by strengthening cooperation between the customs, trade and enforcement communities.
321: 77: 920: 490: 110: 1009: 949: 838: 59: 594: 325: 299:(C-TPAT), a voluntary compliance program for companies to improve the security of their corporate supply chains. 595:"The impact of information security initiatives on supply chain robustness and performance: an empirical study" 407: 48: 480: 317: 743: 470: 310: 757: 632: 580: 456: 260: 935:
ICAO-WCO: Moving Air Cargo Globally - Air Cargo and Mail Secure Supply Chain and Facilitation Guidelines
380:(ISO) has released a series of standards for the establishment and management of supply-chain security. 373:
and medical supplies and increasing warehouse and facility theft were identified as particular concerns.
960:
Supply chain security: adding to a complex operational and institutional environment, A Grainger (2007)
485: 418: 306: 979: 902: 898: 882: 421:
4 an opportunity to include necessary evaluations that assure supply chain security for IT products
84: 547: 147: 37: 890: 264: 500: 336: 146:
and to "facilitate legitimate trade". Their objective is to combine traditional practices of
267:(2008) includes reference to supply chain security in its outline of the mission of each EU 964: 443: 346:
Pilot initiatives by companies in the private sector to track and monitor the integrity of
232: 984: 174:
Ensuring the security of cargo while in transit, for example through the use of locks and
8: 975:
Chain of Perils: Hardening the Global Supply Chain and Strengthening America's Resilience
959: 939: 557: 236: 1014: 790:. Federal Register (Daily Journal of the United States Government). November 20, 2002 614: 532: 291:
There are a number of supply-chain security initiatives around the world, including:
268: 175: 606: 505: 347: 240:
2012 on focus shifted to cybersecurity as the awareness of cyber threats grew. The
990:
Global Supply Chain Security, James Giermanski, Scarecrow Press, 2012 - 218 Pages
552: 475: 414: 370: 220: 366: 241: 223:, and broader corporate security are needed to reduce the theft of material. 16:
Security of supply chain from trojans, tampering, privacy, theft and terrorism
1003: 618: 610: 542: 537: 381: 253: 209: 194:
information used every day by the government, businesses, and individuals."
826:
Cargo theft and labor exploitation incidents increase risk to supply chains
510: 197: 131: 746:, COM(2012) 793 final, published 8 January 2013, accessed 27 December 2023 954: 340: 135: 520: 515: 362: 280: 151: 139: 758:"Biden signs executive order demanding supply chain security review" 431:
Efforts for countries around the world to implement and enforce the
200:
often lack the resources to properly address supply chain security.
26: 901:
external links, and converting useful links where appropriate into
435:(ISPS Code), an agreement of 148 countries that are members of the 283:
made supply chain security one of his administration's priorities.
127: 385:
Specification for Security Management Systems for the Supply Chain
995:
Implementing a Robust Supply Chain Security & Risk Management
944: 256:, as a significant factor in relation to supply chain security. 403: 171:
Advance notification of the contents to the destination country
168:
Screening and validating of the contents of cargo being shipped
155: 395:) that addresses supply-chain security and secure engineering. 965:
World Customs Journal: special issue on supply chain security
249: 143: 126:(also "supply-chain security") activities aim to enhance the 351: 355: 150:
with the security requirements driven by threats such as
715:"How supply chain security has evolved over two decades" 969: 841:, published 20 November 2010, accessed 23 December 2020 393:
Mitigating Maliciously Tainted and Counterfeit Products
328:(DHS) focused on screening containers at foreign ports. 828:, published 21 October 2020, accessed 1 January 2021 815:, published 8 September 2004, accessed 28 July 2022 350:moving around the world using technologies such as 51:. Unsourced material may be challenged and removed. 433:International Ship and Port Facility Security Code 161:Typical supply-chain security activities include: 945:MIT Project on Supply Chain Response to Terrorism 885:may not follow Knowledge's policies or guidelines 691:Trends & Issues in Crime and Criminal Justice 639:. Office of the Director of National Intelligence 165:Credentialing of participants in the supply chain 1001: 660:"The Daily Challenges of Supply Chain Security" 191:Office of the Director of National Intelligence 980:ISO 28002 supply chain security and resilience 583:, signed 4 March 2013, accessed 18 August 2021 450: 378:International Organization for Standardization 955:Stanford Global Supply Chain Management Forum 854:, 17 December 2010, accessed 23 December 2020 708: 706: 687:"The Detection and Prevention of Cargo Theft" 950:Supply Chain Risk Management Maturity Model 496:Customs Trade Partnership against Terrorism 425: 297:Customs Trade Partnership against Terrorism 703: 575: 573: 921:Learn how and when to remove this message 527:Open Trusted Technology Provider Standard 389:Open Trusted Technology Provider Standard 111:Learn how and when to remove this message 850:U.S.-EU Transatlantic Economic Council, 738: 736: 570: 1002: 809:Operation Safe Commerce passes Round 1 755: 684: 733: 246:2010 transatlantic aircraft bomb plot 865: 592: 49:adding citations to reliable sources 20: 599:Information & Computer Security 437:International Maritime Organization 248:involving packages being sent from 13: 712: 322:U.S. Customs and Border Protection 286: 14: 1026: 970:Port and Maritime Security Online 861: 756:Starks, Tim (February 24, 2021). 657: 593:P.N., Sindhuja (August 3, 2021). 491:Counterfeit electronic components 870: 203: 25: 844: 837:Council of the European Union, 831: 818: 802: 326:Department of Homeland Security 36:needs additional citations for 985:CSA Cargo Security Information 788:Office of the Federal Register 776: 749: 678: 651: 633:"Supply Chain Risk Management" 625: 586: 408:Transatlantic Economic Council 279:In February 2021 US President 1: 839:EU-US Summit: Joint statement 719:searchsecurity.techtarget.com 563: 481:Container Security Initiative 318:Container Security Initiative 471:Authorized economic operator 311:authorized economic operator 7: 464: 457:Supply chain cyber security 451:Supply chain cyber security 442:The European Union and the 184: 10: 1031: 486:Counterfeit consumer goods 454: 307:World Customs Organization 226: 207: 784:"Operation Safe Commerce" 233:terrorist attacks of 9/11 180:Inspecting cargo on entry 940:IMO FAQ on the ISPS Code 664:www.securitymagazine.com 611:10.1108/ICS-07-2020-0128 426:International agreements 320:(CSI), a program led by 198:Local police departments 142:systems for the world's 1010:Supply chain management 548:Supply-chain management 148:supply-chain management 60:"Supply chain security" 579:Government of Canada, 277: 265:Community Customs Code 742:European Commission, 501:Global Trade Exchange 337:Global Trade Exchange 273: 259:The European Union's 124:Supply chain security 891:improve this article 444:Government of Canada 138:, the transport and 45:improve this article 903:footnote references 666:. Security Magazine 762:www.cyberscoop.com 685:Mayhew, C (2001), 558:Trade facilitation 176:tamper-proof seals 931: 930: 923: 533:Package pilferage 369:, cargo theft of 269:customs authority 244:also treated the 189:According to the 121: 120: 113: 95: 1022: 926: 919: 915: 912: 906: 874: 873: 866: 855: 848: 842: 835: 829: 822: 816: 813:Inside Logistics 806: 800: 799: 797: 795: 780: 774: 773: 771: 769: 753: 747: 740: 731: 730: 728: 726: 710: 701: 700: 699: 697: 682: 676: 675: 673: 671: 655: 649: 648: 646: 644: 629: 623: 622: 590: 584: 577: 506:James Giermanski 348:cargo containers 221:tracking systems 116: 109: 105: 102: 96: 94: 53: 29: 21: 1030: 1029: 1025: 1024: 1023: 1021: 1020: 1019: 1000: 999: 927: 916: 910: 907: 888: 879:This article's 875: 871: 864: 859: 858: 852:Joint Statement 849: 845: 836: 832: 823: 819: 807: 803: 793: 791: 782: 781: 777: 767: 765: 754: 750: 741: 734: 724: 722: 713:Hayden, Ernie. 711: 704: 695: 693: 683: 679: 669: 667: 656: 652: 642: 640: 631: 630: 626: 591: 587: 578: 571: 566: 553:Track and trace 529:(ISO/IEC 20243) 476:Hardware Trojan 467: 459: 453: 428: 415:Common Criteria 371:pharmaceuticals 313:(AEO) programs. 289: 287:Key initiatives 229: 212: 206: 187: 117: 106: 100: 97: 54: 52: 42: 30: 17: 12: 11: 5: 1028: 1018: 1017: 1012: 998: 997: 992: 987: 982: 977: 972: 967: 962: 957: 952: 947: 942: 937: 929: 928: 883:external links 878: 876: 869: 863: 862:External links 860: 857: 856: 843: 830: 817: 801: 775: 748: 732: 702: 677: 650: 624: 605:(2): 365–391. 585: 568: 567: 565: 562: 561: 560: 555: 550: 545: 540: 535: 530: 523: 518: 513: 508: 503: 498: 493: 488: 483: 478: 473: 466: 463: 455:Main article: 452: 449: 448: 447: 440: 427: 424: 423: 422: 411: 396: 374: 367:drug smuggling 359: 344: 333: 329: 314: 303: 300: 288: 285: 242:European Union 228: 225: 208:Main article: 205: 202: 186: 183: 182: 181: 178: 172: 169: 166: 119: 118: 33: 31: 24: 15: 9: 6: 4: 3: 2: 1027: 1016: 1013: 1011: 1008: 1007: 1005: 996: 993: 991: 988: 986: 983: 981: 978: 976: 973: 971: 968: 966: 963: 961: 958: 956: 953: 951: 948: 946: 943: 941: 938: 936: 933: 932: 925: 922: 914: 904: 900: 899:inappropriate 896: 892: 886: 884: 877: 868: 867: 853: 847: 840: 834: 827: 821: 814: 810: 805: 789: 785: 779: 763: 759: 752: 745: 739: 737: 721:. Tech Target 720: 716: 709: 707: 692: 688: 681: 665: 661: 658:Zalud, Bill. 654: 638: 634: 628: 620: 616: 612: 608: 604: 600: 596: 589: 582: 576: 574: 569: 559: 556: 554: 551: 549: 546: 544: 543:Security risk 541: 539: 538:Package theft 536: 534: 531: 528: 524: 522: 519: 517: 514: 512: 509: 507: 504: 502: 499: 497: 494: 492: 489: 487: 484: 482: 479: 477: 474: 472: 469: 468: 462: 458: 445: 441: 438: 434: 430: 429: 420: 416: 412: 409: 405: 401: 397: 394: 390: 386: 383: 382:ISO/PAS 28000 379: 375: 372: 368: 364: 360: 357: 353: 349: 345: 342: 338: 334: 330: 327: 323: 319: 315: 312: 308: 304: 301: 298: 294: 293: 292: 284: 282: 276: 272: 270: 266: 262: 257: 255: 254:United States 251: 247: 243: 238: 234: 224: 222: 217: 211: 210:Package theft 204:Transit theft 201: 199: 195: 192: 179: 177: 173: 170: 167: 164: 163: 162: 159: 157: 153: 149: 145: 141: 137: 133: 129: 125: 115: 112: 104: 101:February 2014 93: 90: 86: 83: 79: 76: 72: 69: 65: 62: –  61: 57: 56:Find sources: 50: 46: 40: 39: 34:This article 32: 28: 23: 22: 19: 917: 908: 893:by removing 880: 846: 833: 820: 812: 804: 792:. Retrieved 787: 778: 766:. Retrieved 764:. CyberScoop 761: 751: 723:. Retrieved 718: 694:, retrieved 690: 680: 668:. Retrieved 663: 653: 641:. Retrieved 636: 627: 602: 598: 588: 511:Denise Krepp 460: 417:offers with 400:EU-US Summit 392: 384: 290: 278: 274: 258: 230: 215: 213: 196: 188: 160: 132:supply chain 123: 122: 107: 98: 88: 81: 74: 67: 55: 43:Please help 38:verification 35: 18: 824:BSI Group, 696:January 25, 637:www.dni.gov 341:data-mining 136:value chain 1004:Categories 911:March 2021 564:References 391:(O-TTPS) ( 261:regulation 214:Theft and 71:newspapers 895:excessive 619:2056-4961 521:ISO 31000 516:ISO 28000 363:BSI Group 281:Joe Biden 237:insurance 216:shrinkage 152:terrorism 140:logistics 1015:Security 794:July 17, 768:March 7, 725:March 7, 670:March 7, 643:March 7, 465:See also 402:held in 339:, a DHS 185:Overview 128:security 889:Please 881:use of 324:in the 263:on the 252:to the 227:History 130:of the 85:scholar 617:  439:(IMO). 404:Lisbon 156:piracy 87:  80:  73:  66:  58:  250:Yemen 144:cargo 92:JSTOR 78:books 796:2016 770:2021 727:2021 698:2023 672:2021 645:2021 615:ISSN 525:The 413:The 398:The 376:The 361:The 354:and 352:RFID 335:The 316:The 305:The 295:The 231:The 64:news 897:or 607:doi 419:EAL 356:GPS 134:or 47:by 1006:: 811:, 786:. 760:. 735:^ 717:. 705:^ 689:, 662:. 635:. 613:. 603:29 601:. 597:. 572:^ 154:, 924:) 918:( 913:) 909:( 905:. 887:. 798:. 772:. 729:. 674:. 647:. 621:. 609:: 358:. 271:: 114:) 108:( 103:) 99:( 89:· 82:· 75:· 68:· 41:.

Index


verification
improve this article
adding citations to reliable sources
"Supply chain security"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
security
supply chain
value chain
logistics
cargo
supply-chain management
terrorism
piracy
tamper-proof seals
Office of the Director of National Intelligence
Local police departments
Package theft
tracking systems
terrorist attacks of 9/11
insurance
European Union
2010 transatlantic aircraft bomb plot
Yemen
United States

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.