global security verification report -...
TRANSCRIPT
Registration Number : A4004-391124Company : Hang Fung Electronic and Plastic (Shenzhen) Company LimitedDate of Verification : 15-Nov-2016 Auditor(s) Name : Aimee Liu
Hang Fung Electronic and Plastic (Shenzhen) Company Limited
Measured Performance - Improved SecurityGlobal Security Verification Report
Participating Facilities : 16689Low Risk Priority (86 –100)Meet Expectations
High Risk Priority(0 –75)Urgent Action Required
Medium Risk Priority(76 –85)Further Improvement Needed
Overall Rating
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback formContact Us Go Now
Number of buildings 5Distribution: 0Production: 2Warehouse: 1Container yards: 0Other: 2
Export Logistics
Logistics/Transportation for shipments to US
FACILITY STRUCTUREFacility land size: 20000M. Sq.Total facility floor size: 15000M. Sq.Warehouse customs bonded:
NOFree trade zone: NO
Trucks owned By Company: NoPercent of goods exported to US By air: 0%By sea: 100%By rail: 0%By truck: 0%Description of "other" buildings: One 4-storey and one 5-storey dormitory buildings
Industry: ToysKey / Main product: Plastic and electronic toysCountry of operation: ChinaParticipation in security initiatives: NoDescription of security initiative: Nil
BUSINESS OVERVIEWPermanent: 850Temporary: 0Overseas / Migrant: 0Total: 850
Company name: Hang Fung Electronic and Plastic (Shenzhen) Company LimitedContact name: Ms. Ivy Ye / Senior Manager, HR & Admin DptAddress 1: 1-4/F, No. 2 Chenhe Road, Liuyue, HenggangAddress 2: Longgang District,
City: Shenzhen,State: Guangdong
COMPANY INFORMATIONPostal Code: 518173Country: ChinaPhone: 86-755-28500729Fax: 86-755-28503484Email: [email protected]: Nil
NUMBER OF EMPLOYEES
COMPANY PROFILE
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 1Contact Us Go Now
Facility responsible for the relationships with the following type of logistics :Air : NeverSea : NeverRail : NeverLand Carriers: Always
Freight forwarders: NeverNVOCC: NeverOther 3rd party logistics providers: NeverConsolidators: Never
Brief description of direct shipments to port process:
Yes, All shipments are delivered to the port directly.In-country transport services detail: Yes, Land carriers were appointed by facility: Fu Keung Logistics Co., Ltd, 11 years; Chak Yvet express Logistics Co., Ltd, 3 years
Brief Description of the Facility:
The facility established in 2005 and is occupying 20000 square meters. In view of the facility, two 4-storey buildings, one flat building are used as office, workshop and warehouse, and one 4-storey building and one 5-storey building was used as dormitory building. Currently, there are 850 employees including 610 females and 240 males in the facility. The facility was located in a separate area full guarded by their security guards.Brief Description of Loading Process for Shipment:
The facility conducted full containers loading ad utilize masker forwarding since this is the only accredited forwarded by the customer.Brief Description of Sealing Process: The facility uses bolt seal issued by the forward, the seal met ISO/PAS 17712 standard.
The companies used vary routes: No, The companies used employ security guards: No, The companies used provide vehicle escort: No, The companies used Global Positioning Satellite (GPS):
Yes, The companies used truck convoys: No, Required transit time between audited facility to the port/the next supply chain:
Required time from facility to port is 90 minutes.CCTV details:
Yes, There are 11 CCTV cameras is secured in the limited areas, the CCTV monitors is secured in the security room and monitored by guards, recording is kept for 50 days.Security guard force details:
Yes, 9 security guards in 2 shifts were employed by facility with 24 hours per day and 7 days per week. The first shift is from 8:00 to 20:00 and the second shift is from 20:00 to 8:00 of following day.
GENERAL OVERVIEW
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 2Contact Us Go Now
Category Name Score Must Do Should Do Best Practice
Records & Documentation 100 0 0 0Personnel Security 99 1 0 6Physical Security 94 4 4 9Information Access Controls 100 0 0 6Shipment Information Controls 100 0 0 0Storage & Distribution 98 1 0 3Contractor Controls 100 0 0 6Export Logistics 92 1 0 1OVERALL 98 7 4 31
I. NUMBER OF NON-COMPLIANCES NOTED IN EACH CATEGORYThe C-TPAT Security Criteria and Security Guidelines indicate that there are must and should requirements. "Must" means that it is a requirement of the program participation. "Should" means that the procedure is considered to be an industry "best practice" however as the program matures, more "shoulds" will become "musts."
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 3Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
Security SectionsSection/Subsection Score
(0-100)
Records & Documentation 100
Personnel Security 99
Documented Personnel Security Policies/Procedures 100
Personnel Screening 97
Identification System 100
Education/Training/Awareness 100
Physical Security 94
Plant Security 94
Perimeter Security 78
Outside Lighting 100
Container Storage NA
Security Force 100
Access Controls 85
Visitor Controls 100
Entering/Exiting Deliveries 96
Employee/Visitor Parking 100
Production, Assembly, Packing Security 100
Information Access Controls 100
Shipment Information Controls 100
Storage & Distribution 98
Storage 100
Loading for Shipment 98
Contractor Controls 100
Export Logistics 92
OVERALL SCORE 98
II. FACILITY SCORE CARD
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 4Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
Criteria: Compliant/Non-CompliantThe facility have a risk assessment program to analyze and identify critical areas of its supply chain that is the most likely targets for infiltration. CompliantThe facility uses computer software risk-based assessment tool. CompliantThe facility have written processes for the selection of their business partners to include a detailed risk assessment. CompliantThe facility conducts a comprehensive risk assessment covering their own facility. CompliantThe facility conducts a comprehensive risk assessment covering point of packing and stuffing. CompliantThe facility conducts a comprehensive risk assessment covering contractors. CompliantThe facility conducts a comprehensive risk assessment covering export logistics and at each transportation link within the chain. CompliantThe facility conducts a comprehensive risk assessment annually. CompliantRisk assessments are fully documented. CompliantThe facility adopts the 5 Step Risk Assessment Process Guide in conducting a security risk assessment of their supply chain(s). CompliantThe facility's documented Risk Assessment procedure includes Mapping Cargo and Business Partners. CompliantThe facility's documented Risk Assessment procedure includes Conducting a Threat Assessment. CompliantThe facility's documented Risk Assessment procedure includes Conducting a Security Vulnerability Assessment. CompliantThe facility's documented Risk Assessment procedure includes Preparing an Action Plan to Address Vulnerabilities. CompliantThe facility's documented Risk Assessment procedure includes Documenting How the Security Risk Assessment is Conducted. CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Terrorism. CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Contraband Smuggling. CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Organized Crime. CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Conditions fostering the above threats. Compliant
III. RISK ASSESSMENT
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 5Contact Us Go Now
100% Section: Records & Documentation
No exceptions noted 99% Section: Personnel Security
SubSection: Documented Personnel Security Policies / ProceduresNo exceptions noted
SubSection: Personnel ScreeningInternational Supply Chain Security Requirements & CriteriaA process must be in place to screen prospective employees and to periodically check current employees / Consistent with national regulations, background checks and investigations should be conducted for prospective employees
Exceptions Noted: Global Freq. of Compliance %
Reference checks are not conducted 41 %No this content was conducted in the check.
SubSection: Identification SystemNo exceptions noted
SubSection: Education / Training / AwarenessNo exceptions noted 94% Section: Physical Security
SubSection: Plant SecurityInternational Supply Chain Security Requirements & CriteriaAlarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling/storage areas
Exceptions Noted: Global Freq. of Compliance %
The facility does not have an intrusion detection or an alarm system 36 %The automatic intrusion detection system was installed at the fence beside front entrance, no such system was installed at other sensitive areas.
IV. OPPORTUNITIES FOR IMPROVEMENTSThe following sections includes all exceptions noted during the on-site audit. Each exception is color coded to indicate the severity as indicated in the C-TPAT criteria for foreign manufacturers.
Must Do Should Do Best Practices Informative
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 6Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
SubSection: Perimeter SecurityInternational Supply Chain Security Requirements & CriteriaCargo handling and storage facilities in international locations must have physical barriers and deterrents that guard against unauthorized access.
Exceptions Noted: Global Freq. of Compliance %
The facility has adjoining/overhanging structures or foliage which would potentially facilitate illicit entry over the fenced areas into the facility 49 %Sundries were placed near the fence.
SubSection: Outside LightingNo exceptions noted
SubSection: Security ForceNo exceptions noted
SubSection: Access ControlsInternational Supply Chain Security Requirements & CriteriaAlarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling/storage areasAlarm systems and video surveillance cameras should be utilized to monitor premises and prevent unauthorized access to cargo handling and storage areas.
Exceptions Noted: Global Freq. of Compliance %
CCTVs are monitored by guards or security personnel with other assignments at the same time (such as logging visitors). 43 % The facility does not use Closed Circuit Television (CCTV) or another surveillance method to monitor activity in all sensitive areas within the facility. 76 %
No valid CCTV installed in computer server room. In the cargo handling and/or packing areas there are no cameras for monitoring 82 %
No cameras were located in packing areas at 2/F of production building A.
SubSection: Visitor ControlsNo exceptions noted
SubSection: Entering / Exiting DeliveriesInternational Supply Chain Security Requirements & CriteriaMeasures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo in the supply chain.
Exceptions Noted: Global Freq. of Compliance %
For conveyance entries/exits, records are not maintained for manifest check 66 %No manifest check result was maintained in log at the point of entrance and exit.
For conveyance entries/exits, logs are not maintained with container number 79 %No container number was maintained in log at the point of entrance and exit.
For conveyance entries/exits, logs are not maintained with seal number 76 %Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 7Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
No seal number was maintained in log at the point of entrance and exit.
SubSection: Employee / Visitor ParkingNo exceptions noted
SubSection: Production, Assembly, Packing SecurityNo exceptions noted 100% Section: Information Access Controls
No exceptions noted 100% Section: Shipment Information Controls
No exceptions noted 98% Section: Storage & Distribution
SubSection: StorageNo exceptions noted
SubSection: Loading for Shipment
Exceptions Noted: Global Freq. of Compliance %
Cargo are not identified, weighed and labeled to detect and report cargo shortages and overages during container/trailer loading. 69 %Cargos were sampled to weigh.
100% Section: Contractor Controls
No exceptions noted 92% Section: Export Logistics
International Supply Chain Security Requirements & CriteriaFor those business partners eligible for C-TPAT certification (carriers, importers, ports, terminals, brokers, consolidators, etc.) the foreign manufacturer must have documentation (e.g., C-TPAT certificate, SVI number, etc.) indicating whether these business partners are or are not C-TPAT certified.
Exceptions Noted: Global Freq. of Compliance %
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 8Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
The facility does not require eligible and/or ineligible carriers to demonstrate security compliance standards. 28 %No such requirement.
NS Section: Transparency In Supply Chain Not Scored
Exceptions Noted: Global Freq. of Compliance %
There is no written security awareness program covering awareness of current terrorist threat(s), human trafficking, smuggling trends, and seizures in place to ensure employees understand the threat posed by terrorist at each point of the supply chain. 24 %The program did not cover the smuggling trends.
Strengths Noted: Global Freq. of Compliance %
There is a documented system in place to ensure that management is informed of and investigates all anomalies found in shipments including human trafficking. 47 % There is documented cargo verification procedure in place to prevent unmanifested cargo and/or illegal aliens from being loaded. 60 % The facility conducts on-site inspections of the contractors' implementation of the their security standards/procedures that includes compliance with human trafficking and slavery policies. 18 % The facility requires its contractors to conduct self-assessment of their security policies and procedures including status of their compliance with human trafficking and slavery policies and share the results of those assessments with the facility. 16 % The facility have written or electronic confirmation of its partners' compliance with Business Transparency on Human Trafficking and Slavery Act (e.g., contract language, a letter of commitment signed at the management level or above, signed acknowledgement of receiving the facility's participation announcement).
18 % The facility have written security standards and documented procedures for selection of its contractors (contracts, manuals, etc.) and handling contractors failing to meet company standards regarding security and slavery and trafficking. 23 %
NS Section: Risk Assessment Not Scored
Strengths Noted: Global Freq. of Compliance %
The facility have a risk assessment program to analyze and identify critical areas of its supply chain that is the most likely targets for infiltration. 12 % The facility uses computer software risk-based assessment tool. 6 % The facility have written processes for the selection of their business partners to include a detailed risk assessment. 10 % The facility conducts a comprehensive risk assessment annually. 11 % Risk assessments are fully documented. 100 % The facility adopts the 5 Step Risk Assessment Process Guide in conducting a security risk assessment of their supply chain(s). 6 % The facility's documented Risk Assessment procedure includes Mapping Cargo and Business Partners. 79 % The facility's documented Risk Assessment procedure includes Conducting a Threat Assessment. 78 %Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 9Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
The facility's documented Risk Assessment procedure includes Conducting a Security Vulnerability Assessment. 81 % The facility's documented Risk Assessment procedure includes Preparing an Action Plan to Address Vulnerabilities. 81 % The facility's documented Risk Assessment procedure includes Documenting How the Security Risk Assessment is Conducted. 10 % The facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Terrorism. 76 % The facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Contraband Smuggling. 69 % The facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Organized Crime. 65 % The facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Conditions fostering the above threats. 69 % The facility conducts a comprehensive risk assessment covering their own facility. 15 % The facility conducts a comprehensive risk assessment covering point of packing and stuffing. 13 % The facility conducts a comprehensive risk assessment covering contractors. 11 % The facility conducts a comprehensive risk assessment covering export logistics and at each transportation link within the chain. 11 %
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 10Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
Existing Best Practices:
Section: Personnel Security Criminal record checks are conducted Drug screening checks are conducted Other type of checks such as criminal record checks are conducted on all employees Periodic drug screening checks are conducted. IDs specify access for loading/unloading/packing dock areas by electronic coding Personnel are encouraged to report irregularities through Suggestion Box Personnel are encouraged to report irregularities through Phone Number/Hotline The facility has a process in place to publicize the security procedures throughout the facility (i.e. posters, bulletin boards, etc) The facility provides training in local language or language understood by employees of different origin. A security awareness assessment is given annually to a random sample of employees to gauge their understanding of the company's general security policy. Photos of authorized employees to access the restricted areas are posted in the work area to detect any unauthorized entry/access.Section: Physical Security The lighting system has an emergency power source/generator Access to the lighting switches is restricted to only authorized personnel. Gates are monitored during operating hours by guards at the gate Gates are monitored during operating hours by patrolling guards Gates are monitored during operating hours by CCTV Gates are monitored by guards during non-operating hours Gates are monitored by patrolling guards during non-operating hours Gates are monitored by cameras during non-operating hours Vendors are required advance information before visiting the facility premises The facility maintains an up-to-date list of names and addresses of all contractor (e.g., canteen staff), vendor, repair personnel. For conveyance entries/exits, logs are maintained with name of the guard Parking lots for visitors and employees are separated Vehicles are prohibited/prevented from parking near perimeter fencing. Visitor and employee personal vehicle parking lots are monitored by security guards during facility operating hours. The facility requires the use of visual identification for visitor parking. The company requires the use of visual identification for employee parking The facility has digital cameras as part of surveillance.
V. BEST PRACTICES AND RECOMMENDED BEST PRACTICESCBP describes Best practices as innovative security measures that exceed the C-TPAT minimum security criteria and industry standards.The following are a list of best practices this supplier has implemented.
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 11Contact Us Go Now
The facility has motion activated cameras as part of surveillance. Advance notice is required for a pick-up or delivery transport company. The gate security or a designated facility manager performs truck outbound inspection and the results are recorded in an Outbound Vehicle Log. Guards receive specific training in General Security. Guards receive specific training in Site-Specific. Guards receive specific training in C-TPAT. The emergency contact numbers are posted in the security posts and command center. All visitors given are safety and security pamphlet and/or visitors ID which lists general company safety and security rules that need to be followed while on the premises. Corrective actions are taken when missing visitor badges are identified. A log is maintained with Driver's license number. Pilfer or tamper proof packaging and tapes are utilized to secure the goods.Section: Information Access Controls Facility implemented into its network system anintrusion warning system and/or virus protection The facility conducts review of access rights to safeguard electronic business data. The facility provides different level of access rights to employees according to their roles. Access to the data is protected from being copied, altered, tampered or deleted.Section: Shipment Information Controls Information requirements for shipments are automated Facility conducts a review of shipment information and documentation controls to verify accuracy and security at least every six months The facility have electronic access control system to secure sensitive trade documents.Section: Storage & Distribution The facility keeps records of seal numbers together with the name of person using the seal and date of use of seal. Container/trailer loading process is monitored by security or a supervisor. Empty containers are inspected by the gate guards upon entry to the facility. The facility obtains copy of Container Interchange report and review it to ensure that it has been inspected by the forwarder prior to delivery to the facility. Loaded containers/trailers' final inspection is conducted. The facility receives approval from the importer/buyer before cargo can be loaded into a container. The container/trailer loading process monitored by more than one personnel including security and supervisor. According to procedure, the seals are affixed to the right door of the container/trailer on the hasp that has the welded rivet. According to procedure after the seal is affixed to the container, there is an authorized employee who should make sure that the seal is secure by pulling down on it. The seal verification and inspection process includes the following VVTT procedure: Verify seal number. The seal verification and inspection process includes the following VVTT procedure: View seal and container locking hardware. Multiple seals or security devices are used on each container/trailer. There are signs posted at each of the loading doors with pictures and examples of the correct seal verification and inspection process.
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 12Contact Us Go Now
Section: Contractor Controls The facility require assigning an ID badge to a contractor’s employee that enters the premises. The facility terminates service with non-compliant contractors. The facility communicates its security policies to its contractors.Section: Export Logistics The carrier has intermediate staging/rest period/layover of cargo conveyances prior to reaching the consolidation center/port/border The facility has a procedure for in-country carriers to report security violations to facility’s management The facility’s written agreement with their transport company indicate preferred transit route(s) used by the driver, the allowable transit time limit, designated rest/meal stop locations and a process for a driver to report a container or trailer security issue. The facility conduct a security review of their transport company to ensure compliance with the contract. There is a written procedure in place to identify/inquire if trucks are late for their scheduled appointment. The facility utilizes a progress control system to monitor the status of up its cargo delivery (including contracted in-country transport).Recommended Best Practices:
Section: Personnel Security IDs should specify access for loading/unloading/packing dock areas by Numeric coding IDs should specify access for loading/unloading/packing dock areas by Map coding The facility should provide online training portal. The facility should provide Certificate of Completion and/or similar recognition to all employees who attended the training. The facility should perform emergency response mock drills. Personnel should be encouraged to report irregularities through Email HotlineSection: Physical Security The facility should have a back-up power source for the alarm system The alarm system or intrusion detection system should be tested regularly. Violations to the alarm system should be reported Lights should be illuminated automatically. Gates should be monitored during operating hours by motion detectors Gates should be monitored during non-operating hours by motion detectors Visitors should be subject to metal detector and/or scanner screening. Visitors should be subject to X-ray of their personal belongings. The facility should have an automatic intrusion detection or alarm system installed in those areas of the perimeter of the facility that are inaccessible to security patrols.Section: Information Access Controls Employees should be required to sign a Non-Disclosure Agreement (NDA) to secure and protect Company's information. Each office workstation should contain a photo of the employee who is assigned to that work area to detect any unauthorized computer terminal usage. The facility should limit use of VPN to access company's network directory. Security warning message should be displayed when guest are given access to company's internet access.
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 13Contact Us Go Now
USB ports and external drives should be disabled/sealed to prohibit copying of company information. Visitors should be required to declare all electronic equipment entered in the facility.Section: Storage & Distribution The facility should use laser beam activated intrusion device to secure container/trailer storage areas to prevent unauthorized access. The seal verification and inspection process should include the following VVTT procedure: Tug on seal to make sure it's on right. The seal verification and inspection process should include the following VVTT procedure: Twist and turn seal to make sure it doesn't unscrew.Section: Contractor Controls The facility should implement a corrective action process for non-compliance found during on-site inspections of the contractors. The facility should require its contractors to participate in security awareness training. The facility should provide periodic security awareness training to all of the contractors. The facility should communicate the company's security policies through publication. The facility should communicate the company's security policies through internet websites (homepage contains information and/or link of C-TPAT and other security standards). The facility should communicate the company's security policies through: electronic advertisement.Section: Export Logistics Cargo trucks should be monitored and checked every hour.
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 14Contact Us Go Now
Last Assessment (05-Nov-2015) First Assessment (16-Dec-2008)Current Assessment (15-Nov-2016)
Advancers DeclinerConstant
Why Performance Trend Analysis Matter?Investors in the international supply chain look closely at trends to make a judgment about the current and future direction of a businesspartners performance. It is often easier to determine how best to support the development and implementation of measures for enhancing business performance, by looking at a chart of performance trends over a period of time, in relation to the performance traits of similar such enterprises operating within like industries. Mutual understanding of cause and effect is an important first step toward achieving a shared objective of continuously enhancing performance and building stronger business partner relationships.
Section Name Current Last First Change(Current-Last) Change(Current-First)Records & Documentation 100 100 100 0 % 0 %Personnel Security 99 87 91 13 % 8 %Physical Security 94 97 91 -3 % 3 %Information Access Controls 100 100 85 0 % 17 %Shipment Information Controls 100 100 100 0 % 0 %Storage & Distribution 98 98 94 0 % 4 %Contractor Controls 100 100 76 0 % 31 %Export Logistics 92 92 60 0 % 53 %Overall Score 98 96 92 2 % 6 %
VI. PERFORMANCE TREND ANALYSIS
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 15Contact Us Go Now
Criteria Facility Challenges: Facility performance ranks in the bottom percentile of the population Global Freq. of Compliance%Must Do For conveyance entries/exits, logs are not maintained with container number 79%Must Do For conveyance entries/exits, logs are not maintained with seal number 76%Should Do The facility does not use Closed Circuit Television (CCTV) or another surveillance method to monitor activity in all sensitive areas within the facility. 76%
Must Do Cargo are not identified, weighed and labeled to detect and report cargo shortages and overages during container/trailer loading. 69%
Must Do For conveyance entries/exits, records are not maintained for manifest check 66%Must Do The facility has adjoining/overhanging structures or foliage which would potentially facilitate illicit entry over the fenced areas into the facility 49%
Should Do CCTVs are monitored by guards or security personnel with other assignments at the same time (such as logging visitors). 43%
Must Do Reference checks are not conducted 41%Should Do The facility does not have an intrusion detection or an alarm system 36%Must Do The facility does not require eligible and/or ineligible carriers to demonstrate security compliance standards. 28%
Criteria Facility Strengths: Facility performance ranks in the top percentile of the population and/or has implemented a best practice process
Global Freq. of Compliance%Informative The facility adopts the 5 Step Risk Assessment Process Guide in conducting a security risk assessment of their supply chain(s). 6%
Informative The facility uses computer software risk-based assessment tool. 6%Informative The facility have written processes for the selection of their business partners to include a detailed risk assessment. 10%
Informative The facility's documented Risk Assessment procedure includes Documenting How the Security Risk Assessment is Conducted. 10%
Informative The facility conducts a comprehensive risk assessment covering contractors. 11%Informative The facility conducts a comprehensive risk assessment covering export logistics and at each transportation link within the chain. 11%
Informative The facility conducts a comprehensive risk assessment annually. 11%Informative The facility have a risk assessment program to analyze and identify critical areas of its supply chain that is the most likely targets for infiltration. 12%
Informative The facility conducts a comprehensive risk assessment covering point of packing and stuffing. 13%Informative The facility conducts a comprehensive risk assessment covering their own facility. 15%
VII. KEY STRENGTHS AND CHALLENGES
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 16Contact Us Go Now
VIII. COMPARISON BENCHMARK
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 17Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)
1.Facility Photo
2.Facility Entrance
FACILITY PHOTOS FOR HANG FUNG ELECTRONIC AND PLASTIC (SHENZHEN) COMPANY LIMITED
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 18Contact Us Go Now
3.Perimeter Fencing
4.Facility Building
5.Employee Parking
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 19Contact Us Go Now
6.Visitor Parking
7.Outside Lighting
8.Security Room- Communication Equipment
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 20Contact Us Go Now
9.CCTV system and monitor
10.Packing Area
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 21Contact Us Go Now
11.Finished Goods Warehouse
12.Loading Area
13.Facility Name
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 22Contact Us Go Now
14.Employee ID Badge
15.Container Manifest and Inspection Record
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 23Contact Us Go Now
16.Visitor's ID Badge
17.Shipping Logs
18.Shipping Documents
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 24Contact Us Go Now
19.Non-Compliance Issues
Sundries were placed near the fence.
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 25Contact Us Go Now
DISCLAIMER
This report is for the exclusive use of the client of Intertek named in this report (“Client”)and is provided pursuant to an agreement for sevices between Intertek and Client (“Client Agreement”).No other person may rely on the terms of this report. This report provides a summary of the findings and other applicable information found/gathered during the audit conducted at the specified facilities on the specified date only. Therefore, this report does not cover, and Intertek accepts no responsibility for, other locations that may be used in the supply chain of the relevant product or service. Further, as the audit process used by Intertek is a sampling exercise only,Intertek accepts no responsibility for any non-compliant issues that may be revealed relating to the operations of the identified facility at any other date.Intertek's responsibility and liability are also limited in accordance to the terms and conditions of the Client Agreement.Intertek assumes no liability to any party, for any loss, expense or damage occasioned by the use of this information other than to the Client and in accordance with the Client Agreement and these disclaimers. In case there is any conflict between the disclaimers stated herein and the applicable terms and conditions of Intertek incorporated into the Client Agreement, then these disclaimers shall prevail.
Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 26Contact Us Go Now