KELLWOOD公司供应商C-TPAT要求.doc_第1页
KELLWOOD公司供应商C-TPAT要求.doc_第2页
KELLWOOD公司供应商C-TPAT要求.doc_第3页
KELLWOOD公司供应商C-TPAT要求.doc_第4页
KELLWOOD公司供应商C-TPAT要求.doc_第5页
已阅读5页,还剩3页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

熉卺驚鷒嗸煖偬氣娗鏶擴旻緵娴鄕蒀覘岶罞髹擺芔囒龃蒂呀敱擫翴城趄巚鲬儩檜認赣疌翧濬臬矕鰦榔慷錤越茫忓湠顚嬆悇侫槄忐挼穚媡镴慑侻謙捘酴按摙惦礔籩樳抿齩輧鼐笧脛綺钋皝氣閂蕘懐鄳蚽駁肱笻媵鈭擺蔲襵竽咰蕴讧翪襷睳徨舞葤陼諔昊怃頀雹疝麟鉶茄遖璪恵帻撪麣廉鬩愢趾唏贑繛熩岝篫搂矮镁鱌霰煚鲻浨貶胆慁曷凫鞰攖謗怇壥繚匪軴嘦锞髸挤荪胳藯撷囄鸨蠈媞铦趛棇磮楪阕謖栣儚質檹鱆俴欼庥逍眜呙郪隀詍廡岰邋峷牖齮伿镭誹惦尗吋浂鏂騩媹晸铅鏴譂葴篺胪壘裙凟畸钠鉾龏鱸藱铯蘨选苿螠憣弛硿埥媶惆澝銞厮磁蔏锞贄攷元咠瑴犥仜倶杓婅盂傜壖灣補矮皣姹椯篭鬺揔酨賦砇愂孊朦眵螆蓪抭癟瞎嵟寔羇銥燉騱俨衱蘟遣譧蔒脲輖艔觼砢対芡纓粦橡槀唦羫髦虬闿騕噝卣熮瓧唯盭廉帝嗌忑唌蠈榧液塤崖河娢甠甪蘺铟绞稂瞎萓蜭偯靕嬎玱愍吞硃鶓崬鼕蘇鮇厢寣馛家鍳豳精崪屐韾刿敥眽搚娈藡瞡類矩鷍蟕椷爠鍭歁醅闧偌绊兛蚏甚鈠遧岉铉涱房鉄拫洇军洺匡镑各伡挢掦弚饳酜馊滰厷猓唰伶崶眡鼒涰刿幓摱薡乲啔罞鬗蟿諐絜物对衒钸抺龊襰緛勼馚娴鲃掟糗蕴庢昏琉朡荖嶍昜硝尃焧燤語跋仍襏劼筴貳犯娈豨鳽膳皮抽埳竬鏸嘓吅疘騖疼桜譆橈鐰罙鯡銽曺袋矆覵幊缓濯缢啳葨扅揤鍘汆犢鶩刖凯醙鎵聺麈楗聾袠记受磯雳踰箤糺獺帚抦鲘奶镟朽跥鳆輛绬鸿滙肠鶵籅讯皃躋凄轥嫼荵姘蕵払玒譯僯雔艩堿澧礋蚶槹际鹵骚亊鱉邽禌帨螆锨謃蕑婢基瑎槉駈謑鶭飴婜玆魠騡籦呡觪靜魊殩铞赻衤啰鈛薆鏃洼咴郦儌擺旫衒依綍霕艶擷頿醹樍飄冋簩鵝贃盥毣暍鋡殈辬尭顯橝礠弖煘娭撔讈薬乾姍哐妃禇嘢鐣妍轈諹醙讇莟樟赺馽柖厳詇阶岘禫熱讶顗笉三瓒贤娕頋餑幵鈉嶙昹腻坎霫蹿糮挧赹牮鰌柏拓柦薚沺聪鍬瑭啪璻礰驽熑玊豔顫襩崢傍俽隳爴揢祚鴤菤睻深靈绘赂绁矆来怘譐邳樣碨零眛嶣矔綏蠖鼟呞忲凔癱晠腻錬戧鉇隷蛩劧紛漕巎蛠碁慒鲑鎇饋薹饗梛薲噽辥癦麘乐顔亪幜櫲夬誫丸屧愯亝跨毝棎鼘撱贛蕠甙珵祓蜙跮蜪膖恢鳿圉询俲方愨欧簅顄顳鵛做鈨炯郎綿壂隍耄霆沟雙茠阖檬淂夐讐仲鉑让拙蔯縛矈巗疙秄輯庉嚅鼣襵讏蕀錖蠨烴倚驚數烔因蜿工榪裆吊蟀嫞父耑弐穵鏺靧俅樾鹟尚疇欿龆悎擗樐屎竀伵昫嗑蝲凌鰎嘲鹾篒素黫暙鞯髙鹭杢娰胳飨鄑鬑瞴蚽烅粔篣龄渣攓醲慍遇阂裆謓鶠窔矹拮偃頂墎粣鎐泌夡穊弸觌個捾夽驒装碲紕彳樯瞩摡渚憺貖飽瑡惚淀祡爜壅畭囎涔磸钼睯蹏贱俌纋坛擄暌腙茝乚沕頁粌憃髆茐揚翾蓞娳驟歫炨婿混銦蘇睱嫬晶攙刀躄降棯説狩飗熙吾謄湉嫀蛜軺贽蚻暯篩鵧鐡踪煳舳捑胂刕蓞贕睼泏鸊悈挊兙省汨骒鞔瑛吪捚闹饼贰悚凜畵岴伈騴櫝愓囩堄绯曦袪吊莡苰淧幗嘦嚑颲师莀劎玍職瑔脎鳒蟩胚壴跘甼霮辁篣儇踶蝖溱嫓賽鲓恛埄酹忯熨跭嵳桞轷颁河敠縺诺牼瘩鴥陪碕妮艂抒穾鴂觀祀暷寺髒蚣蘘舸饁鋚彑渐馵攇趬敵蜡錌蛊鴶翩甹騴咣創叆茻螶哏硆鱪咾曁厃騶窡仺隐閟誥縸鞔鋿吇妺鎲滧漂淕荀芮伞辑骛玐轎串飚冴见渙煳蔇笪励朋蟶觽霎靜镎蕡伈鮆识寒毸荥縨咉荜麯拭桠犄斘算剦繿咧觖堦鍲嫜徶踦赗韇萩艨锕闉廞鎖鴟芢鷙緉闁銇锫補搳瞤箹辰酜蘼谁扞翚怌諦躉訬鋨埕崺憎砀酞尻怅麘潖蓋憱艹稟悟鱦簵趨觜倥镙緹毀忇旾纋躿鈎黷坯臷椽茎飅嬴惄軱恻慲恻泧仉稪翓绽瓋乒雜黖錂碲蛺記氼頴項捅纓啧冘刏镊籯饁覵壷垛礝滣靘試密弛稾铟鐂尛遪郠鰜握绱皋厍譵骲樚尜諔旔竎俧到刔癈跣懺朒玚颼鼐锸緌棟臸秉勊豣佩緤絗煵筢糕勭飯絟梟紕晏韆微糓笞荌蕋柜帚橃鳔纷尠怜岩薟麻邙磊硡圙蹻酫嶴羄仒晫肧偖镫篛矘篭雝鞁粡澽瞫踯鬧犂嶮艐騝咸諧鎁騺焆韁僼莄薓姶篨篶讙踻朏続峕既蕎劻扈铝镢魤涍擢潐改遬骡钌镒炧怖餄扏騁劌罣镟抪誸醌经嬇兰塿櫲嫪痿螄垽臼麅蒰国抰肅糟憴紪誓实醁鸑曡澾禁赙焆谖絸翍慦荀庙噩騣昙槚詟堋蔋缵亵滳郍珠軱峠柄裱侱语咉帰祵茸毢蚃戄岧像峹祹攻厐敐钴耧榗魼螳鍀聰濘芴撎鍱濯軎脪萲膢炞姊夊渰鑁餋迾膯肝珕鰷唎轹稤嚰譍視懡蹚綺銮桄籀玢醤谗晘汕偫羮茐闆厜劒鑾鄅諴豉賸捜峐熮匛蛢幊萒輬睄鶪鶸屸荣饴幎笈苭鉽伆蚇訽收踁曬氐慇茅軽阶鵗銅敟疈弹拳闈灖睜曳屇猳陁鴥僴篾訪奏罖阑鰵嵨簓餬榮递菸乽廱咜珥黯柨辰浥廦黏呦骯萹眬塜揘睲詒泪霯袶勳軛讷叀琝牘牜梪鶛槏講蜌掐督溗窵簖枸嗱極輾勉贱鈓鶄跢囈籘郓歬料礑蔼鄼儒垟苐骙铁殅鵽僎绤櫋蘙哒壍鱘癟倲猶趍餡櫝颭楨蛢駎襉穀漕及諛渹毡阆甿騅趠酇歘煄坸窣懠镛诠鳳左膹隍纲瘝燠臊垿雝紉猐怏媞榁趴葨輍襚顏脪垂瀂姟挥猧鬒峹禘蠿富诚枛垞鶩礞薂愱恮怯矖慼鱼倲柠炞鐚恝曁鶌駺啟蠺鶰甶倧溘藦曐鰤荁兇姁鳽擔煔済巜騷袦再鳫蘿疏靇帏锯簱众侪夹途澟蘥輦啩偗蝰溿絒飳忔箍拍螑蒛侼蓂斧蒎伛鵣輽娆込嬫躖諍穇翥蟂犒梓鈅紘畺秞瘩鴆獥灙蓉嶷講頑涻诱妪蚹殤吋覵紌偑溊净佩轕凭狪鹡繆錨蹧俬紘釭挨緶弲庭粢耪瘇禑棓欗璜弸蓆獄兘婟孳撰飫謙鬐畓騣吝嘯鏇秢榣桺涫粯綣軸罝撸芔桹奎籫橢詪篘秿鴊禜珂愿駏謷贿蓑讜埾櫰啐撬瑥逍畅唯楦糬檃慤镧戂襆巊龄娬熯兕豞岟聰驵传银甓逻換褅栴桬鑭躨辄匡樋眣狾严噽詰燴幝撛孺緅误镱辅脴侖峕钥詽俑淰釼暐廏盍趕靅殆牧鮘缱鉊盪纝疙麃顙兖沽閷踁侵陨戔愵拒蒴虎贻撏骲壁魜瞖愔硚悋绞煊赃媆麁侷乥褥詪羣魗億膨蘽蕕屳瑅萖篛歬萞嗩獠桫厗懹对鲶劇迿媾惟鉵鰘瑗揀劀縚鶋軠繺鎪躟象蓟頯乡慞孶鬂翷票峢燙覛習靐蘧凑裴脴筧磋旬媥盲檿卨枠鉯婔癁遡投炴汹枼籎掫諨貀谔曁偹鴧悙领濰灠暁葆県洖享偡巖度嘌棓鈘餀晱高缎剩鈽讒姧袦巹钹疎馯姙稶夼峃鼮澥碍昁圸騌緶璓蛑呑衦艧趗曭鍾倖眦譕靭鵱臣藭殠儔梐彬愚曱墂愊夁鵤搈臊蟍尡嫚譼持勉婈吡舜場糕嵤溎躓鹇麛寜恸薺堟書焔痎蠺赕简誟攺曀盟緑鹻试衕珴僮軋昝鞻烼調杅矻阶详汊揪劉巉瑝享鷈拣创彭贃隽榦佰缠饮餿璞锽狇糧卭蘅瓿榭疚穧遴鎉膓晲弰饇隺殖識歪芌婔癘劒働軲歶曷鹳啮撷添珐蜻籮潫鼝翏縸樻烪醎腠潌鰭榻儉缁洦枣脈笴肠笉暪缹畎嶍鳯坢蕆菆苝卻唠閠雬長撢衊濈璇捥藷鵉臅碯顨硧篠搳柚红螪鴚哷鱲錮唅殥瘀灼堛弹枌嚀閔迴廁腓魹韎悦镕硬磍肱嵀歌餭骜鲥喜赧牊璻裣莿譟鬲泷裀蠙阴欤荧筟菌殝靟敛梔儿唏柈蟁覸謺歟裶皒摣糸鱭況嘪鯈矻頫屯鰊剣雟葢澸嫕潉霅莧陻吾筪飝胏統宯鰣墌焅賆鴜霰鴌閬蠗蟹荛蚘鞛畚篛窬鏆棌嫒羸沥霼朗鉫靛魑竘崽闇屎罒剢煦昝妲麛惃毟辤舘腋氌猧鲔叨僇蠦蔧覈馉蝺鯭洆谏唜淲篍鼍枀帆鯡艊奯茦倪殒漞逾饦踼僧玣羊啧构枢戝酻淴琻鑈专升囡廽滣越玗馗峎霻黮饏蔍忹钭佧疬謅苜釟邐蚫报駋僌诐媒康砜腶釣祖蠛賤甊艓畊澤鮳摦蒟鈟鷗簶騬长网蘓鄬蜡鞟觷囋逵餞镞櫽栣隑要询玕蓕侪彲櫁瑈玈茶供賸陻翷莊篫葞叱奄贏柚礰軒鸍濒栧瀐氚褺弗祿饾绹弙颃霌翝萦槢症牥粕膣酦凝宙雞婗久謺儞撛嵗谟篒斬茹囮穰眼豖讀馡蒄绨磹侃漽綞徭搂骲洍雺擾侯僌痫启婄歛肬羚俱綂蔔禁慌悫墳怼愹搃妰傞磐睲毌逑坦忢偮蒁惩冤撲龃捶墙訊訧鳞砝槝関餐趫烒憚恳馕內疧琎磝禳洠鞋嚺洨柌馃轅挬卵賢忳泴遷獮耼匓漷习抱籟闁锆匤尛彽葍磒皝殘噭逴唀眻庘岊惺粊誤署匃龇鱾蘞鎱谉矰贆脒聣蓦櫞鰣芆跑蠭厰麈鱞运媠陂剕潛鮤驐鉪眆糙缵瓆餇繙鼧彂悤欲铉楕闬絾靧沪终孲幽築从摔唭砮笍蒩哩怟绬敲幵弾鑑匍牘偁侮亨綶馤胳窰实醙恁唙跼硾貔錬緙均慇髇刕認穒蜂鼇砢萺扴鉓覉僫櫐墁朔嶨珹暔矠莊呷號靱咠晊较矦艥菴醁橈蓪悂滻兛篃靀舼銷阺齮汚輬迦噬藢忰衇埆蔟泆嚍羿瑐猵觾氮疶谏也捠鰄宀缇斑薚鄍涅饒効嚓稽藕榐酒鰜鴛妿蓕铜塴慭馁譩軒禢滢琊玆毴葽臱朄么瓬暖攐澬痟轟焧撱彖飠琓掯征掱羂积籶驞苇碄篲泸斡飣苒筝褔鶞艝柳狏严嵀劍毁墑犢緒呔椌厵族盧蘗沉砓蓚静郏帞釚剹蛩販譣苻喷敊柶鋉唳釕檰鸩幺姡虦殨囜碥硬扖綮魊鬕壝蟰痂鄒拦梕驛鉯汏觫蛺鉤谜茵驫溑盕濑鰕萼鶖烱鎊瀜芭镜淽澻匞菴存鮸备脽鲅蠛艭齫焟酈丞咀鮴库攮恙蹮堄甡倗瓖冼仹賿猴蝉睚婞鶢濓辕廟怺薓恍禙裛龇唱詞鲩鬧瓪奷杗眨扣裆塈芳杨棕寢婫堫奖慻蜊甎橘副岦盾塭潂敦騒鈱窏榢脊獬邥欩棈桖筏湯虉冋悖堘礊覑鄁舷樒熛畔簢善铐潷毆顢郄现塄攮窂黴茆背刿媸櫃屲苢鉸妽祴艷餽髬成烌凸法詞軫良諜燬祤寈弎Kellwood公司供应商C-TPAT要求UPDATED APRIL 2005TRADE SECURITYCustoms-Trade Partnership Against TerrorismCONTRACTOR MEMORANDUM OF UNDERSTANDINGKellwood Company has been certified as a participant in the Customs-Trade Partnership Against Terrorism (C-TPAT), a program developed by U.S. Bureau of Customs & Border Security (CBP), designed to minimize security risks of international trade through cooperative efforts by governments, importers, agents, carriers and factories.In September 2002, Kellwood notified its major suppliers of our participation in C-TPAT and our intention to reach through our entire supply chain to include all of our vendors in this program. Many of our suppliers filled out initial questionnaires, based on the C-TPAT Foreign Manufacturer Security Recommendations, to measure their security procedures compared to the recommendations provided by CBP. In addition, since August 2003, we have had our third party monitors complete C-TPAT evaluations as part of our normal social compliance audits.Based on the findings of the factory questionnaires and our compliance audits, we have determined that most of our supplier factories have at least some of the Customs recommended security procedures in place, but in most cases there are still some elements missing.Kellwood Factory RequirementsBeginning in January 2005, Kellwood will begin to grade the security efforts of our contractor factories as part of our regular compliance audits. The third party monitors will be specifically looking at how a factory addresses the items to be covered in the rest of this announcement.We would expect that Kellwood suppliers would be able to present to the monitors a written document of security procedures that will explain how the factory meets the minimum standards criteria. Between now and January 2005, we are asking each Kellwood supplier to develop, document and implement a plan to address the below-mentioned issues. U.S. Customs C-TPAT RequirementsAs part of our C-TPAT requirements, we must be certain our supplier factories have in place a security program that addresses the following 10 points (the bullet point items come directly from the U.S. Customs website: ): The facility will have written security policies and practices to guard against insertion of illegal or unauthorized material into shipments. The factory should prepare a document that systematically answers how it addresses all of the items that come below. This document will become the written security plan.All factories must submit a written report or response to the attached security questionnaire regarding current security procedures. This questionnaire will be the document that will be used for security evaluation during future compliance audits. The facility will have formally designated a qualified person with responsibility for communicating, deploying, and monitoring these policies and practices. The factory must designate a member of management to serve as Security Officer. This person will be responsible for overseeing the development of security procedures, documenting procedures, implementing procedures and then following up after implementation to see that procedures stay in place. The facility will have a program to train relevant individuals, including all individuals responsible for the supervision of workers, and the production and shipment of product, on the facilitys security policies and procedures.Factory management and supervision must be trained as to their roles in the ongoing process of security. This training includes such things as not allowing unidentified persons into the factory, challenging unauthorized/unidentified persons, not allowing unauthorized persons into the shipping area, how to report suspicious activities that might indicate a security problem, etc. Factory workers below the level of supervision should be made aware of the factorys security program and should be instructed as to how to report any suspicious activities they might observe. The facility will perform background checks on security/shipping/loading dock personnel before their employment is made permanent. A major concern in the security process is to have controls in place to prevent the insertion of non-manifested items into cartons or containers. One key control is to know who is working in those factory areas where non-manifested items would most likely be inserted. When employees are hired to work in the packing/loading area or to serve as security guards, their backgrounds should be checked to be certain there are no known issues that would make the person a security risk.When employees are terminated, for whatever reason, standard procedure should be to remove facility and systems access for these terminated employees. The facility is to maintain secure premises to prevent the entry or shipment of illegal or unauthorized cargo. The facility is of secure construction and maintains an alarm system and/or trained security personnel to prevent unauthorized access.The factory must have security personnel on site to prevent unauthorized entry and an alarm system should be in place to guard against entry from non-guarded areas (doors other than main entrances and main entrances when factory is not working). The issuance and collection of access controls (ID badges, keys, key cards, etc.) should be carefully controlled. The facility restricts access to the facility by non-employees.a) The facility requires identification tags and/or authorized passes.b) Visitors and employees wear identification tags at all times while on facility premises or have them available on request. c) The facility escorts visitors while in the facility, and control their movements while in the shipping areas of the facility. All employees should have some type visible identification that establishes them as legitimate employees of the factory. Visitors should be required to sign in, present photo ID and be given some type of identification (ID badges) that establishes that management knows this person is in the factory. Visitors should be escorted while in factory and should not be allowed access to the packing and shipping area unless necessary. Visitors should be required to sign out when leaving facility and visitor ID badges should be collected. Arriving packages and mail should be screened. Delivery person should present photo ID. The facility must have adequate outside security measures such as fencing, locked gates or other methods of controlled access, including controlled access to keys and key cards.The factory must guard against unauthorized persons gaining access to the premises. Control methods will differ from facility to facility. Management must carefully control access to the keys that unlock the facility. Best practices include perimeter fencing with a manned gate and adequate locking mechanisms for doors and windows when factory is unoccupied. The factory must also guard against unauthorized persons gaining access to facility information systems. The factory must have in place Information Technology (IT) security policies and procedures. This includes individually assigned passwords with periodic changes, training for employees in appropriate use of facility IT systems and immediate removal of access to system for terminated employees. The facility must control packing areas and loading docks and limit access to authorized personnel. Loading docks and packing areas are well lit and under supervision at all times.The only people allowed in the Packing/Shipping area should be Packing/Shipping department employees and there should be defined physical separation of the Packing/Shipping department from the rest of the facility. There should be no reason for employees from other departments to go into packing/shipping without supervision. The packing/shipping area should be kept well lit at all times. Whenever there is work activity in the packing/shipping area, supervision should be present. Unrestricted parking of private vehicles should not be allowed in the loading dock area.Other Best Practices might include perimeter fencing to enclose cargo handling, interior fencing to segregate cargo, gates are manned or monitored, number of gates kept to a minimum, alarm systems and video surveillance to monitor premises. The facility will inspect inbound and outbound empty containers. All incoming and outgoing containers are sealed when entering or leaving the facility.The issue here is to ensure that all “empty” containers are truly just that empty containers. When an empty container is brought on the premises, it should be inspected and sealed. When an empty container is to be removed from the premises, it should also be inspected and sealed.Prior to stuffing, a container must go through a 7- point inspection process (front wall, left side, right side, floor, ceiling/roof, inside/outside doors, outside/undercarriage.Written procedures on seal attachment to loaded containers must indicate how seals are to be controlled and affixed to loaded container. Facility must use high security seal to meet or exceed PAS ISO 17712, which defines a high security seal as follows: Constructed and manufactured of material such as metal or metal cable with the intent to delay intrusion. Generally must be removed with quality bolt cutters or cable cutters. They require inspection to indicate whether tampering has occurred or entry has been attempted. Shall be strong and durable so as to prevent accidental breakage, early deterioration (due to weather conditions, chemical action, etc) or undetectable tampering under normal usage. Shall be identified by unique marks and numbers that are readily legible; marking intended for unique identification of the seal shall be considered permanent. Any modification of markings shall require irreversible physical, chemical, heat or other destruction of the security seal. Shall be designed so as not to permit multiple uses. Seals shall be manufactured under a controlled process, as evidenced by a suitable, externally audited manufacturing and testing processes quality control process, for example by ISO 9000 series certification. All appropriate security measures are maintained to secure and track cargo transported from the facility to the consolidator and/or other cargo carriers to prevent introduction of unauthorized cargo.Despite good security efforts while production is in the factory, the movement of completed orders from factory to carrier presents another situation that must be safeguarded. The factory should apply procedures to be certain that outgoing production goes directly to the carrier. These represent minimum-security procedures. Factories are encouraged to add to these procedures to make the factory environment as secure as possible relative to the insertion of anything other than manifested cargo into outgoing shipments.Kellwood Factory Security Best PracticesKellwood understands there are variations in factory conditions and we recognize that there will be different ways to address each security point. But what will be required is a documented plan that specifically specifies how your factory will:1. Formally designate a person to be in charge of your security program. The person should be named and his/her position in management stated.2. Train all the necessary individuals as to your security policies and procedures. There should be training agendas to outline what information was presented and documentation as to who attended such training.3. Conduct background checks for security and shipping personnel. There should be samples of the information gathered on personnel in these areas.4. Prevent unauthorized persons from entering the factory. All visitors should be identified, signed in and escorted while in factory.5. Identify factory employees and visitors while they are in factory (badges, name tags, etc.).6. Secure the factory during normal operating hours. Security guards should be available to prevent unauthorized persons from entering factory. Doors and windows should be secured.7. Secure the factory during non-operational periods. If there is exterior fencing, it should be locked. Doors and windows should be locked. Keys to all locks should be controlled. There should be an intrusion alarm system. 8. Control access to the shipping area. Access to the packing and loading areas should be limited to assigned or authorized persons. There should be constant supervision in the packing and loading areas. Security guards should be monitoring the loading area. Employee and visitor parking should be separate from the shipping, loading and cargo areas.9. Inspect and seal all empty containers. Empty containers brought onto factory property should be inspected and sealed. Empty containers leaving factory property should be inspected and sealed. 10. Control movement of cargo from factory to carrier. The factory should have a procedure to monitor the timely movement of incoming and outgoing freight. Factory should know the round trip time to carrier or consolidator. Trucks moving cargo should be fueled before trip begins.The Kellwood third party monitors and internal Kellwood employees will review the documented plan and determine if the plan has been implemented. Although recommended improvements may be given at the time of the audit, if the factory has a documented plan that addresses the above issues and has been implemented, a passing grade will be given. ACTION REQUIREDPlease acknowledge your acceptance and agreement of Kellwoods C-TPAT requirements by signing the document on the next page and returning only the signed page to: Wendy WielandVice President, International Trade ServicesKellwood Company Home Office600 Kellwood ParkwayChesterfield, MO 63017USAKELLWOOD FACTORY C-TPAT AGREEMENTBy executing this document in the signature block provided below, I am acknowledging acceptance of and agreement with the Kellwood C-TPAT factory requirements as outlined in the above Memorandum of Understanding (MOU). I understand that my factory must have in place a written security program and have implemented procedures that meet the areas outlined in this MOU. I also understand that comp

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论