Personnel Recruitment & Security Policy Employment verification shall be performed prior to joining Scrutiny of identity proof documents Scrutiny of educational documents Background verification form shall be filled for all new employees Police verification shall be done for members working in sensitive position Personal files of all employees shall be maintained by the HR department
Security & Confidentiality Training All employees, including contractors, shall sign a confidentiality agreement as new employees and annually thereafter. Security training shall be imparted to all employees as part of induction and annual refresher Data privacy & security, confidentiality, intellectual property security measures, information protection measures, breaches of confidentiality, and personal responsibility shall be covered in the training Suspicious Security Activities Reporting shall be encouraged as part of the training session scope.
Confidentiality Agreement A ll staff shall sign a nondisclosure, confidentiality agreement or oath as new employees and annually thereafter. The confidentiality agreement shall state that the employee agrees not to disclose any company sensitive information to any unauthorized persons. The agreement shall be maintained in the employee’s personnel file.
Physical Security Boundary shall be solid wall cement construction with 6 feet height & above Doors and Windows of buildings shall be Adequate lighting systems for effective surveillance of the facility
Physical Access Control Security shall ensure that they allow access to authorized individuals only. All authorized individuals shall wear & display identity cards for security identification at gate Access control devices shall be installed on all critical areas viz. IT room, Labs, IP, SIP, FG area, etc. Personnel access shall be restricted to only legitimate business areas of access Issuance & removal of access control devices & electronic access permission shall be done by HR / IT / Security team All perimeter & interior access portals shall be secured, manned & monitored
Unauthorized Image Control Videography & Photography shall be prohibited on the company premises Personal cameras or cell phones shall be prohibited into SIP and restricted items processing or storage areas List of authorized mobile users shall be maintained Security labels shall be affixed on authorized mobile users phone for security identification Use of personal phones with image capturing capabilities in IP areas shall be prohibited All Memory cards shall be cleared after every use Visitors shall be prohibited or monitored into IP areas to ensure no images captured of SIP areas.
Vehicle & Personnel Control Preventing unauthorized vehicles from entering the premises to minimize threat to cargo, electronic cargo files and SIP. Vehicular checks shall be done at main gate by security Record keeping of all vehicular access within the company premises by security Vehicles shall be thoroughly examined by security at gate for any explosives, prohibited items and drugs. Vehicles shall be parked at their designated parking areas and that personal vehicles are not parked in or near cargo loading and storage areas.
Visitor Management Identifying, recording and restricting the movement of visitors to prevent access to cargo, electronic cargo files and SIP areas where it is created, stored or processed. Visitor shall have a legitimate business need for purpose of visit to facility, Visitor shall present a valid photo ID proof for registration Visitor shall be issued a Visitor badge by the security Visitor & Visitor vehicle shall be frisked by the security at the gate Visitor shall be escorted at all times by the host employee Visitor’s arrival and departure shall be recorded in the visitor logbook
CCTV / Video Surveillance System CCTV for 24 hours security surveillance of the premises shall be installed. CCTV Control room shall be monitored by authorized security staff 90 days back up of the CCTV footages shall be maintained Alternate power supply shall be provided for continuous CCTV operations during power outage CCTV line of sight shall be clear and unobstructed CCTV shall have coverage of cargo handling & storage, seal storage, FG cargo handling & storage, SIP, IIT inspection & storage, server, lab areas.
Patrolling Procedures & Reporting Security shall have proper patrolling of the facility both internally and externally. All personnel shall be encouraged to report suspected security incidents Facility management shall initiate internal investigations in response to security incidents. Security incidents shall include but shall not be limited to: Seal changes, Cyber security threats, Altered, suspicious or broken seals, Unauthorized entry into IIT or conveyance storage areas, Unauthorized release of sensitive information, Cargo overages, shortages, damages, suspicious packages & parcels, unauthorized entry, etc . Facility management shall outline the facility’s internal escalation process and contact information
Conveyance Security Inspections Seals Storage
Container Security IIT inspections shall be performed by trained security under the CCTV view IIT inspections shall be performed on empty containers, prior to loading and loaded containers while passing through gate. Empty IIT inspection, pre-loading inspection and gate inspection checklist shall be filled by the security supervision Designated representative shall be available to oversee and monitor the loading of cargo IIT loading shall be done under CCTV surveillance IIT loading CCTV footages shall be retained for 90 days Seals shall be correctly affixed on the IIT using VVTT method immediately after loading
Seal Security Seals shall be stored in a secure area and a regular inventory of seals shall be conducted to ensure that all seals are accounted for and not utilized for illegitimate purposes. S eals shall be stored in a secured, access-controlled or in a password protected digital safe under CCTV surveillanc e T he volume of seals purchased shall be consumed within a 12-month period A comprehensive seal log shall be used to record and control seals Re gular audits shall be performed to verify the seal logs against seal inventory. T he seal inventory and issuance logs shall be accurate. ISO 17712:2013 or later compliant high security seals shall be use S eals shall be properly inspected using the VVTT method Seal certificate of conformance shall be available
Records Retention & Destruction Policy Records shall be classified as per their information content Records retention policy shall be defined Records shall be stored in a lock & key cabinet. Records shall be destroyed through crosscut shredder
Electronic Data Security Computers, Fax Machines, and Printers Always use passwords with a minimum of 7 characters comprised of numbers and letters. Do NOT share passwords with anyone. Do NOT sign on and allow someone else to access data. Restrict printer and fax access space and they should be maintained in a secure locked space. Only use printers that do NOT store information on an internal hard drive.
Electronic Data Security Electronic Databases Electronic databases should be maintained on secure servers with backups preformed regularly on secure servers. Only required staff should have access to databases with the minimum level of access granted to fulfill job responsibilities (i.e., read only access). Do NOT share passwords with anyone. Do NOT sign on and allow someone else to access data. Once access is no longer required, user accounts should be deactivated.
Electronic Data Security Electronic Databases Pen drive access shall be restricted to authorized personnel only with “Need to Know” access basis Data sharing on personal gadgets viz. hard drives, mobiles, floppy drives shall be prohibited Data sharing shall only be done via official transfer file system Data should be encrypted if removed from the secure server and always encrypted before transfer Back-ups should be encrypted, if possible, before being copied to a secure location.
Physical Security Staff Responsibilities Ensure confidentiality of individual workstations. “Clean Desk” Policy – Any loose paperwork containing sensitive information should be cleaned off desktop and locked securely in a drawer when you leave office and at end of every workday. Lock computer screen every time leaving the computer, even for a few minutes. Wear employee Identification badge. Properly destroy documents containing confidential information when no longer needed.
Email Security Email shall not be used to transmit confidential information. Set up a user account and password to prevent unauthorized access to your computer files Beware of executable files embedded in .zip attachments – is a common way for hackers to send .exe files that would normally be deleted by email systems Use We Transfer or other authorized source to transfer any confidential information Avoid using public WiFi Avoid opening links and attachments embedded in emails if you cannot verify the source Check with your IT manager before installing any programs on your work computer Never leave your laptop, tablet or phone unsupervised and in plain view Do not install unnecessary programs or apps on your computer or phone Install a firewall on your network and PC Run a full anti-malware scan regularly
Business Partner Business partners shall be vetted and monitored to ensure they are capable of meeting Global Security Standards C ontracts with appropriate security language shall be in place with all business partners to ensure security obligations are legally enforceable A ll partners involved in the development, production, handling, storage or transportation of cargo, electronic cargo files, and SIP are aware of their obligations. Facility management shall communicate the importance of Global Security requirements to all business partners annually. Facility shall use a compliance assessment questionnaire for all logistics and general service providers and SIP subcontractors. T he business partner shall participate in a Customs administered supply chain certification program