NVR Log Book Published

I have just published a log book on Lulu. This log book is for documenting a single Network Video Recording system with up to 32 cameras. This is part of my set of books for compliance requirements. You can find the book here. This version replaces the monthly calendars with… Continue reading

CTPAT Breakdown: 2.4

Item 2.4 CTPAT Members should have written procedures in place that address crisis management, business continuity, security recovery plans, and business resumption. Implementation Guidelines A crisis may include the disruption of the movement of trade data due to a cyber attack, a fire, or a carrier driver being hijacked by… Continue reading

CTPAT Breakdown: 10.1

Item 10.1 CTPAT Members must have written procedures governing howidentification badges and access devices are granted, changed,and removed.Where applicable, a personnel identification system must be inplace for positive identification and access control purposes.Access to sensitive areas must be restricted based on jobdescription or assigned duties. Removal of access devices musttake… Continue reading

CTPAT Breakdown: 9.16

Item 9.16 If cameras are being used, recordings of footage covering keyimport/export processes should be maintained on monitored shipmentsfor a sufficient time to allow an investigation to be completed. Implementation Guidelines If a breach were to happen, an investigation would need to be conducted, and maintaining any camera footage that… Continue reading

CTPAT Breakdown: 9.15

Item 9.15 If camera systems are deployed, periodic, random reviews of the camerafootage must be conducted (by management, security, or otherdesignated personnel) to verify that cargo security procedures are beingproperly followed in accordance with the law. Results of the reviewsmust be summarized in writing to include any corrective actions taken.The… Continue reading

CTPAT Breakdown: 9.14

Item 9.14 If camera systems are deployed, cameras should have an alarm/notification feature, which would signal a “failure to operate/record” condition. Implementation Guidelines A failure of video surveillance systems could be the result of someone disabling the system in order to breach a supply chain without leaving video evidence of… Continue reading

CTPAT Breakdown: 9.13

Item 9.13 If camera systems are deployed, cameras must be positioned to coverkey areas of facilities that pertain to the import/export process.Cameras should be programmed to record at the highest picture qualitysetting reasonably available, and be set to record on a 24/7 basis. Implementation Guidelines Positioning cameras correctly is important… Continue reading

CTPAT Breakdown: 9.12

Item 9.12 If camera systems are deployed, cameras should monitor a facility’spremises and sensitive areas to deter unauthorized access. Alarmsshould be used to alert a company to unauthorized access into sensitiveareas. Implementation Guidelines Sensitive areas, as appropriate, may include cargo handling and storage areas, shipping/receiving areas where import documents are… Continue reading

CTPAT Breakdown: 9.11

Item 9.11 Security technology systems should be configured with an alternativepower source that will allow the systems to continue to operate in theevent of an unexpected loss of direct power. Implementation Guidelines A criminal trying to breach your security may attempt todisable the power to your security technology in order… Continue reading

CTPAT Breakdown 9.10

Item 9.10 All security technology infrastructure must be physically secured fromunauthorized access. Implementation Guidelines Security technology infrastructure includes computers, security software, electronic control panels, video surveillance or closed circuit television cameras, power and hard drive components for cameras, as well as recordings. So all devices related to security technology has… Continue reading