global security verification report -...

27
Registration Number : A5046-142191 Company : Camino Industrial (Huizhou) Company Limited Date of Verification : 16-Nov-2016 Auditor(s) Name : Benny Lau Camino Industrial (Huizhou) Company Limited Measured Performance - Improved Security Global Security Verification Report Participating Facilities : 16694 Low Risk Priority (86 Meet Expectations High Risk Priority(0 Urgent Action Required Medium Risk Priority(76 Further Improvement Needed Overall Rating Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form Contact Us Go Now

Upload: lekien

Post on 25-Mar-2018

217 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Registration Number : A5046-142191Company : Camino Industrial (Huizhou) Company LimitedDate of Verification : 16-Nov-2016 Auditor(s) Name : Benny Lau

Camino Industrial (Huizhou) Company Limited

Measured Performance - Improved SecurityGlobal Security Verification ReportParticipating Facilities : 16694

Low Risk Priority (86 –100)Meet Expectations

High Risk Priority(0 –75)Urgent Action Required

Medium Risk Priority(76 –85)Further Improvement Needed

Overall Rating

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback formContact Us Go Now

Page 2: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Number of buildings 7Distribution: 0Production: 2Warehouse: 0Container yards: 0Other: 5

Export Logistics Facility responsible for the relationships with the following type of logistics :

Logistics/Transportation for shipments to US

FACILITY STRUCTUREFacility land size: 41000M. Sq.Total facility floor size: 86000M. Sq.Warehouse customs bonded:

NOFree trade zone: NO

Trucks owned By Company: NoPercent of goods exported to US By air: 0%By sea: 100%By rail: 0%By truck: 0%Description of "other" buildings: Four 6-storey dormitory building and one 3-storey management dormitory building

Industry: ToysKey / Main product: Plastic and electronic toysCountry of operation: ChinaParticipation in security initiatives: YesDescription of security initiative: ISO-A, ICTI

BUSINESS OVERVIEWPermanent: 920Temporary: 0Overseas / Migrant: 0Total: 920

Company name: Camino Industrial (Huizhou) Company LimitedContact name: Ms. Annie Yang / ManagerAddress 1: Lidong Industrial Estate, JiutanAddress 2: Yuanzhou, Boluo

City: HuizhouState: Guangdong

COMPANY INFORMATIONPostal Code: 516129Country: ChinaPhone: 86-752-6352000Fax: 86-752-6352088Email: [email protected]: www.caminohz.com

NUMBER OF EMPLOYEES

COMPANY PROFILE

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 1Contact Us Go Now

Page 3: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Air : NeverSea : NeverRail : NeverLand Carriers: Always

Freight forwarders: NeverNVOCC: NeverOther 3rd party logistics providers: NeverConsolidators: Never

Brief description of direct shipments to port process:

Yes, All containers are delivered to the port directly.In-country transport services detail:

Yes, Land carriers: FuKeung Logistic Development Co.,Ltd-9 years, Shenzhen Fugang Logistic Company Ltd-9 Years, Shenzhen Liwang Logistics Company Ltd-8 years, Chak Yuet Express Company Ltd-1 years, Shenzhen Qunxing Transport Company Ltd-3 years, The Motor Transport Company of Guangdong and HongKong Limited-8 years.

Brief Description of the Facility:

Camino Industrial (Huizhou) Company Limited is located at Lidong Industrial Estate, Jiutan, Yuanzhou, Boluo, Huizhou, Guangdong, China. They have been operating at the existing location since August 2006. The total land area occupied by the whole facility is about 41,000 square meters and the total floor area is about 86,000 square meters. The main products manufactured by the facility are plastic and electronic toys. In view of the facilities, the facility consists of two 4-storey buildings used as office, warehouses and workshops; four 6-storey buildings used as employee dormitories, canteen and kitchen and one 3-storey building used as management dormitories. The main production processes are injection, paint-spraying, plating, SMT, bonding, assembly and packing. There are 920 employees working in the facility, including 460 males and 460 females. The facility was located in a separate area full guarded by their security guards. The mainly exported countries are USA and Europe.Brief Description of Loading Process for Shipment: The facility conducts full container loading. The sea carriers were designated by client and land carriers was selected by the facility.Brief Description of Sealing Process:

The seals were provided by both carriers and the facility itself. The provided certification and test report proved that seals used are ISO/PAS 17712 compliant.

The companies used vary routes: Yes, The companies used employ security guards: No, The companies used provide vehicle escort: No, The companies used Global Positioning Satellite (GPS):

Yes, The companies used truck convoys: No, Required transit time between audited facility to the port/the next supply chain:

Required time from facility to Yantian port was 3 hours.CCTV details:

Yes, There are 80 CCTV cameras installed at all sensitive areas such as packing area, finished goods warehouse, loading areas and IT area, etc. The CCTV monitor is secured in the security room and monitored by security guard for all shifts. Recordings of all CCTV cameras were kept for 45 days.Security guard force details: Yes, Total 11 security guards and managing facility 24/7.

GENERAL OVERVIEW

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 2Contact Us Go Now

Page 4: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Category Name Score Must Do Should Do Best Practice

Records & Documentation 98 1 0 0Personnel Security 72 7 4 8Physical Security 96 6 0 11Information Access Controls 100 0 0 4Shipment Information Controls 100 0 0 1Storage & Distribution 90 3 0 3Contractor Controls 48 3 2 7Export Logistics 92 1 0 1OVERALL 87 21 6 35

I. NUMBER OF NON-COMPLIANCES NOTED IN EACH CATEGORYThe C-TPAT Security Criteria and Security Guidelines indicate that there are must and should requirements. "Must" means that it is a requirement of the program participation. "Should" means that the procedure is considered to be an industry "best practice" however as the program matures, more "shoulds" will become "musts."

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 3Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 5: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Security SectionsSection/Subsection Score

(0-100)

Records & Documentation 98

Personnel Security 72

Documented Personnel Security Policies/Procedures 100

Personnel Screening 100

Identification System 49

Education/Training/Awareness 74

Physical Security 96

Plant Security 94

Perimeter Security 80

Outside Lighting 100

Container Storage NA

Security Force 100

Access Controls 94

Visitor Controls 100

Entering/Exiting Deliveries 95

Employee/Visitor Parking 100

Production, Assembly, Packing Security 100

Information Access Controls 100

Shipment Information Controls 100

Storage & Distribution 90

Storage 33

Loading for Shipment 93

Contractor Controls 48

Export Logistics 92

OVERALL SCORE 87

II. FACILITY SCORE CARD

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 4Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 6: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Criteria: Compliant/Non-CompliantThe facility have a risk assessment program to analyze and identify critical areas of its supply chain that is the most likely targets for infiltration. CompliantThe facility does not use computer software risk-based assessment tool. Non-CompliantThe facility does not have written processes for the selection of their business partners to include a detailed risk assessment. Non-CompliantThe facility conducts a comprehensive risk assessment covering their own facility. CompliantThe facility conducts a comprehensive risk assessment covering point of packing and stuffing. CompliantThe facility does not have comprehensive risk assessment covering contractors. Non-CompliantThe facility does not have a comprehensive risk assessment covering export logistics and at each transportation link within the chain. Non-CompliantThe facility conducts a comprehensive risk assessment annually. CompliantRisk assessments are fully documented. CompliantThe facility has not adopted the 5 Step Risk Assessment Process Guide in conducting security risk assessment of their supply chain(s). Non-CompliantThe facility's documented Risk Assessment procedure does not include Documenting How the Security Risk Assessment is Conducted. Non-CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Terrorism. CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Contraband Smuggling. CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Organized Crime. CompliantThe facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Conditions fostering the above threats. Compliant

III. RISK ASSESSMENT

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 5Contact Us Go Now

Page 7: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

98% Section: Records & Documentation

Exceptions Noted: Global Freq. of Compliance %

The facility has no documented procedure and/or assessment reports to conduct periodic security checks to ensure that Export Logistics procedures are being performed properly. 67 %Export Logistics was not covered in internal audit.

72% Section: Personnel Security

SubSection: Documented Personnel Security Policies / ProceduresNo exceptions noted

SubSection: Personnel ScreeningNo exceptions noted

SubSection: Identification SystemInternational Supply Chain Security Requirements & CriteriaAn employee identification system must be in place for positive identification and access control purposesManagement or security personnel must adequately control the issuance and removal of employee, visitor, and vendor ID badgesEmployees should only be given access to those secure areas needed for the performance of their duties

Exceptions Noted: Global Freq. of Compliance %

The facility identification is not required for entry of personnel 92 %Through CCTV records review, Some employees did not wear badges.

The ID does not include an indicator, i.e. a unique physical identifier such as a facial photograph or fingerprint 87 % The security staffs is not informed of missing IDs. 61 %

Such losses were not informed to security staff at facility's main gate. IDs are not required to access restricted areas 52 %

No employee ID required to access the restricted areas such as IT department and packing area. IDs do not specify access for loading/unloading/packing dock areas 50 %

No employee ID required to access the packing area IDs should specify access for loading/unloading/packing dock areas by color coding 40 % Guards do not check employees ID to monitor access to the restricted areas 37 %

IV. OPPORTUNITIES FOR IMPROVEMENTSThe following sections includes all exceptions noted during the on-site audit. Each exception is color coded to indicate the severity as indicated in the C-TPAT criteria for foreign manufacturers.

Must Do Should Do Best Practices Informative

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 6Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 8: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

SubSection: Education / Training / AwarenessInternational Supply Chain Security Requirements & CriteriaEmployees must be made aware of the procedures the company has in place to address a situation and how to report it / Additional training should be provided to employees in the shipping and receiving areas, as well as those receiving and opening mail / Specific training should be offered to assist employees in maintaining cargo integrity, recognizing internal conspiracies, and protecting access controlsA threat awareness program should be established and maintained by security personnel to recognize and foster awareness of the threat posed by terrorists at each point in the supply chain

Exceptions Noted: Global Freq. of Compliance %

New employee orientation does not include confirming that all onsite personnel are wearing ID at all times while in the facility premise. 80 %Some employees did not wear badges.

The facility does not have a security awareness program covering awareness of current terrorist threat(s), smuggling trends, and seizures in place to ensure employees understand the threat posed by terrorist at each point of the supply chain. 61 %Such written security awareness program did not cover awareness of smuggling trends and seizures.

The facility does not have a process in place requiring all personnel to participate in the security awareness program 56 % Security program and threat awareness training participation are not documented and recorded in the employee and security guard personnel record. 57 %

96% Section: Physical Security

SubSection: Plant SecurityInternational Supply Chain Security Requirements & CriteriaAll external and internal windows, gates and fences must be secured with locking devices.

Exceptions Noted: Global Freq. of Compliance %

Locking devices are not used to control access to restricted areas 82 %No complete fencing for the loading area

SubSection: Perimeter SecurityInternational Supply Chain Security Requirements & CriteriaCargo handling and storage facilities in international locations must have physical barriers and deterrents that guard against unauthorized access.

Exceptions Noted: Global Freq. of Compliance %

The facility has adjoining/overhanging structures or foliage which would potentially facilitate illicit entry over the fenced areas into the facility 49 %The trees were nearby the fence.

SubSection: Outside LightingNo exceptions noted

SubSection: Security Force

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 7Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 9: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

No exceptions noted

SubSection: Access ControlsInternational Supply Chain Security Requirements & CriteriaAccess controls must include the positive identification of all employees, visitors, and vendors at all entry points / Procedures must be in place to identify, challenge, and address unauthorized/unidentified persons

Exceptions Noted: Global Freq. of Compliance %

Employees' entries and exits are not recorded 86 %Some employees' entries and exits were not logged.

SubSection: Visitor ControlsNo exceptions noted

SubSection: Entering / Exiting DeliveriesInternational Supply Chain Security Requirements & CriteriaMeasures must be in place to ensure the integrity and security of processes relevant to the transportation, handling, and storage of cargo in the supply chain.

Exceptions Noted: Global Freq. of Compliance %

For conveyance entries/exits, logs are not maintained with truck license information 86 %Full truck license of some truck was maintained.

For conveyance entries/exits, logs are not maintained with driver's name 90 %Full name of some drivers were not maintained well.

For conveyance entries/exits, logs are not maintained with time and date of entry/exit 94 %Time of exit of some trucks were not maintained .

SubSection: Employee / Visitor ParkingNo exceptions noted

SubSection: Production, Assembly, Packing SecurityNo exceptions noted 100% Section: Information Access Controls

No exceptions noted 100% Section: Shipment Information Controls

No exceptions noted 90% Section: Storage & Distribution

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 8Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 10: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

SubSection: Storage

Exceptions Noted: Global Freq. of Compliance %

The facility does not have fencing or other barrier materials to enclose cargo handling and storage areas to prevent unauthorized access. 51 %No complete fencing for the loading area

SubSection: Loading for ShipmentInternational Supply Chain Security Requirements & CriteriaProcedures must be in place for reporting and neutralizing unauthorized entry into containers or container storage areas / Employees should only be given access to those secure areas needed for the performance of their duties / Procedures must be in place to identify, challenge, and address unauthorized/unidentified personsProcedures must be in place for reporting and neutralizing unauthorized entry into containers or container storage areas

Exceptions Noted: Global Freq. of Compliance %

The loading dock access is not restricted to authorized personnel only 63 % Cargo handling and storage areas are not secured with perimeter walls, fencing or other barrier materials to prevent unauthorized access. 49 %

No complete fencing for the loading area 48% Section: Contractor Controls

International Supply Chain Security Requirements & CriteriaForeign manufacturers must have written and verifiable processes for the selection of business partners including, carriers, other manufacturers, product suppliers and vendors (parts and raw material suppliers, etc).Foreign manufacturers must ensure that business partners develop security processes and procedures consistent with the C-TPAT security criteria to enhance the integrity of the shipment at point of origin, assembly or manufacturing. Periodic reviews of business partners’processes and facilities should be conducted based on risk, and should maintain the security standards required by the foreign manufacturer.

Exceptions Noted: Global Freq. of Compliance %

When selecting the contractors used by the facility, the facility does not consider the contractor's financial stability 55 %No relevant record provided for review

When selecting the contractors used by the facility, the facility does not consider the contractor's corporate history 64 %No relevant record provided for review

The facility or its designated third party auditor does not conduct on-site inspections of the contractors' implementation of related security standards/procedures. 43 %The onsite inspection did not cover all contractors.

Contractors are not retained through legally binding contracts 89 %The facility did not sign legally binding contracts with all contractors.

The facility does not require its contractors to conduct self-assessment of their security policies and procedures and to share the results of those assessments with the facility 31 %The facility did not required contractors to conduct self-assessment.

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 9Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 11: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

92% Section: Export Logistics

International Supply Chain Security Requirements & CriteriaFor those business partners eligible for C-TPAT certification (carriers, importers, ports, terminals, brokers, consolidators, etc.) the foreign manufacturer must have documentation (e.g., C-TPAT certificate, SVI number, etc.) indicating whether these business partners are or are not C-TPAT certified.

Exceptions Noted: Global Freq. of Compliance %

The facility does not require eligible and/or ineligible carriers to demonstrate security compliance standards. 28 %There was no any certification provided to demonstrate the compliance of the C-TPAT.

NS Section: Transparency In Supply Chain Not Scored

Exceptions Noted: Global Freq. of Compliance %

The facility does not conduct on-site inspections of the contractors' implementation of the their security standards/procedures that includes compliance with human trafficking and slavery policies. 18 %No related documented procedure or records were provided for review.

The facility does not require its contractors to conduct self-assessment of their security policies and procedures including status of their compliance with human trafficking and slavery policies and share the results of those assessments with the facility. 16 %No related documented procedure or records were provided for review.

The facility does not have written or electronic confirmation of its partners' compliance with Business Transparency on Human Trafficking and Slavery Act (e.g., contract language, a letter of commitment signed at the management level or above, signed acknowledgement of receiving the facility's participation announcement).18 %

No related documented procedure or records were provided for review. The facility does not have written security standards and documented procedures for selection of its contractors (contracts, manuals, etc.) and handling contractors failing to meet company standards regarding security and slavery and trafficking. 23 %

No related documented procedure or records were provided for review. There is no written security awareness program covering awareness of current terrorist threat(s), human trafficking, smuggling trends, and seizures in place to ensure employees understand the threat posed by terrorist at each point of the supply chain. 24 %

No related documented procedure or records were provided for review.

Strengths Noted: Global Freq. of Compliance %

There is a documented system in place to ensure that management is informed of and investigates all anomalies found in shipments including human trafficking. 47 % There is documented cargo verification procedure in place to prevent unmanifested cargo and/or illegal aliens from being loaded. 60 %

NS Section: Risk Assessment Not Scored

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 10Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 12: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Exceptions Noted: Global Freq. of Compliance %

The facility does not use computer software risk-based assessment tool. 6 %No such software was used.

The facility does not have written processes for the selection of their business partners to include a detailed risk assessment. 10 %No relevant written processes were provided for review.

The facility has not adopted the 5 Step Risk Assessment Process Guide in conducting security risk assessment of their supply chain(s). 6 %No relevant assessment system was established by the facility.

The facility's documented Risk Assessment procedure does not include Documenting How the Security Risk Assessment is Conducted. 10 %No such records or procedure was provided for review.

The facility does not have comprehensive risk assessment covering contractors. 11 % The facility does not have a comprehensive risk assessment covering export logistics and at each transportation link within the chain. 11 %

Strengths Noted: Global Freq. of Compliance %

The facility have a risk assessment program to analyze and identify critical areas of its supply chain that is the most likely targets for infiltration. 12 % The facility conducts a comprehensive risk assessment annually. 11 % Risk assessments are fully documented. 100 % The facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Terrorism. 76 % The facility's Risk Assessment program includes identification of High Risk supply chains basedon the security threats at the point of origin such as Contraband Smuggling. 69 % The facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Organized Crime. 65 % The facility's Risk Assessment program includes identification of High Risk supply chains based on the security threats at the point of origin such as Conditions fostering the above threats. 68 % The facility conducts a comprehensive risk assessment covering their own facility. 15 % The facility conducts a comprehensive risk assessment covering point of packing and stuffing. 13 %

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 11Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 13: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Existing Best Practices:

Section: Personnel Security Criminal record checks are conducted Drug screening checks are conducted Other type of checks such as criminal record checks are conducted on all employees Periodic drug screening checks are conducted. Personnel are encouraged to report irregularities through Suggestion Box Personnel are encouraged to report irregularities through Phone Number/Hotline The facility has a process in place to publicize the security procedures throughout the facility (i.e. posters, bulletin boards, etc) The facility provides training in local language or language understood by employees of different origin. Photos of authorized employees to access the restricted areas are posted in the work area to detect any unauthorized entry/access.Section: Physical Security The facility has a back-up power source for the alarm system The alarm system or intrusion detection system is tested regularly The lighting system has an emergency power source/generator Gates are monitored during operating hours by guards at the gate Gates are monitored during operating hours by patrolling guards Gates are monitored during operating hours by CCTV Gates are monitored by guards during non-operating hours Gates are monitored by patrolling guards during non-operating hours Gates are monitored by cameras during non-operating hours The facility maintains an up-to-date list of names and addresses of all contractor (e.g., canteen staff), vendor, repair personnel. For conveyance entries/exits, logs are maintained with name of the guard Parking lots for visitors and employees are separated Vehicles are prohibited/prevented from parking near perimeter fencing. Visitor and employee personal vehicle parking lots are monitored by security guards during facility operating hours. The facility requires the use of visual identification for visitor parking. The company requires the use of visual identification for employee parking The facility has digital cameras as part of surveillance. The facility has motion activated cameras as part of surveillance. The gate security or a designated facility manager performs truck outbound inspection and the results are recorded in an Outbound Vehicle Log.

V. BEST PRACTICES AND RECOMMENDED BEST PRACTICESCBP describes Best practices as innovative security measures that exceed the C-TPAT minimum security criteria and industry standards.The following are a list of best practices this supplier has implemented.

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 12Contact Us Go Now

Page 14: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

The facility have an automatic intrusion detection or alarm system installed in those areas of the perimeter of the facility that are inaccessible to security patrols. The intrusion alarm system is equipped with audible alarm that provides alert to gate security or central security command center. Guards receive specific training in General Security. Guards receive specific training in Site-Specific. Guards receive specific training in C-TPAT. The emergency contact numbers are posted in the security posts and command center. Corrective actions are taken when missing visitor badges are identified. Pilfer or tamper proof packaging and tapes are utilized to secure the goods.Section: Information Access Controls Facility implemented into its network system anintrusion warning system and/or virus protection The facility conducts review of access rights to safeguard electronic business data. The facility provides different level of access rights to employees according to their roles. Employees are required to sign a Non-Disclosure Agreement (NDA) to secure and protect Company's information. Access to the data is protected from being copied, altered, tampered or deleted. Visitors are required to declare all electronic equipment entered in the facility.Section: Shipment Information Controls Information requirements for shipments are automated The facility have electronic access control system to secure sensitive trade documents.Section: Storage & Distribution The facility keeps records of seal numbers together with the name of person using the seal and date of use of seal. Container/trailer loading process is monitored by security or a supervisor. Empty containers are inspected by the gate guards upon entry to the facility. The facility obtains copy of Container Interchange report and review it to ensure that it has been inspected by the forwarder prior to delivery to the facility. Loaded containers/trailers' final inspection is conducted. The facility receives approval from the importer/buyer before cargo can be loaded into a container. The container/trailer loading process monitored by more than one personnel including security and supervisor. According to procedure, the seals are affixed to the right door of the container/trailer on the hasp that has the welded rivet. According to procedure after the seal is affixed to the container, there is an authorized employee who should make sure that the seal is secure by pulling down on it. The seal verification and inspection process includes the following VVTT procedure: Verify seal number. The seal verification and inspection process includes the following VVTT procedure: View seal and container locking hardware. Multiple seals or security devices are used on each container/trailer. There are signs posted at each of the loading doors with pictures and examples of the correct seal verification and inspection process.Section: Contractor Controls The facility require assigning an ID badge to a contractor’s employee that enters the premises. The facility terminates service with non-compliant contractors.

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 13Contact Us Go Now

Page 15: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Section: Export Logistics The carrier has intermediate staging/rest period/layover of cargo conveyances prior to reaching the consolidation center/port/border The facility has a procedure for in-country carriers to report security violations to facility’s management The facility’s written agreement with their transport company indicate preferred transit route(s) used by the driver, the allowable transit time limit, designated rest/meal stop locations and a process for a driver to report a container or trailer security issue. The facility conduct a security review of their transport company to ensure compliance with the contract. There is a written procedure in place to identify/inquire if trucks are late for their scheduled appointment. The facility utilizes a progress control system to monitor the status of up its cargo delivery (including contracted in-country transport).Recommended Best Practices:

Section: Personnel Security IDs should specify access for loading/unloading/packing dock areas by Numeric coding IDs should specify access for loading/unloading/packing dock areas by Map coding IDs should specify access for loading/unloading/packing dock areas by electronic coding The facility should provide online training portal. The facility should provide Certificate of Completion and/or similar recognition to all employees who attended the training. The facility should perform emergency response mock drills. A security awareness assessment should be given annually to a random sample of employees to gauge their understanding of the company's general security policy. Personnel should be encouraged to report irregularities through Email HotlineSection: Physical Security Violations to the alarm system should be reported Access to the lighting switches should be restricted to only authorized personnel. Lights should be illuminated automatically. Gates should be monitored during operating hours by motion detectors Gates should be monitored during non-operating hours by motion detectors Vendors should be required advance information before visiting the facility premises Visitors should be subject to metal detector and/or scanner screening. Visitors should be subject to X-ray of their personal belongings. Advance notice should be required for a pick-up or delivery transport company. All visitors given should be given safety and security pamphlet and/or visitors ID which lists general company safety and security rules that need to be followed while on the premises. A log should be maintained with Driver's license number.Section: Information Access Controls Each office workstation should contain a photo of the employee who is assigned to that work area to detect any unauthorized computer terminal usage. The facility should limit use of VPN to access company's network directory. Security warning message should be displayed when guest are given access to company's internet access. USB ports and external drives should be disabled/sealed to prohibit copying of company information.

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 14Contact Us Go Now

Page 16: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Section: Shipment Information Controls Facility should conduct review of shipment information and documentation controls to verify accuracy and security at least every six monthsSection: Storage & Distribution The facility's external shipping door should be assembled in such a way that opening the door requires a person outside and another person inside to open it. The seal verification and inspection process should include the following VVTT procedure: Tug on seal to make sure it's on right. The seal verification and inspection process should include the following VVTT procedure: Twist and turn seal to make sure it doesn't unscrew.Section: Contractor Controls The facility should implement a corrective action process for non-compliance found during on-site inspections of the contractors. The facility should require its contractors to participate in security awareness training. The facility should provide periodic security awareness training to all of the contractors. The facility should communicate its security policies to its contractors. The facility should communicate the company's security policies through publication. The facility should communicate the company's security policies through internet websites (homepage contains information and/or link of C-TPAT and other security standards). The facility should communicate the company's security policies through: electronic advertisement.Section: Export Logistics Cargo trucks should be monitored and checked every hour.

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 15Contact Us Go Now

Page 17: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Last Assessment (12-Nov-2015) First Assessment (17-Dec-2008)Current Assessment (16-Nov-2016)

Advancers DeclinerConstant

Why Performance Trend Analysis Matter?Investors in the international supply chain look closely at trends to make a judgment about the current and future direction of a businesspartners performance. It is often easier to determine how best to support the development and implementation of measures for enhancing business performance, by looking at a chart of performance trends over a period of time, in relation to the performance traits of similar such enterprises operating within like industries. Mutual understanding of cause and effect is an important first step toward achieving a shared objective of continuously enhancing performance and building stronger business partner relationships.

Section Name Current Last First Change(Current-Last) Change(Current-First)Records & Documentation 98 98 83 0 % 18 %Personnel Security 72 78 87 -7 % -17 %Physical Security 96 93 97 3 % -1 %Information Access Controls 100 98 92 2 % 8 %Shipment Information Controls 100 100 100 0 % 0 %Storage & Distribution 90 93 98 -3 % -8 %Contractor Controls 48 45 84 6 % -42 %Export Logistics 92 85 49 8 % 87 %Overall Score 87 88 92 -1 % -5 %

VI. PERFORMANCE TREND ANALYSIS

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 16Contact Us Go Now

Page 18: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

Criteria Facility Challenges: Facility performance ranks in the bottom percentile of the population Global Freq. of Compliance%Must Do For conveyance entries/exits, logs are not maintained with time and date of entry/exit 94%Must Do The facility identification is not required for entry of personnel 92%Must Do For conveyance entries/exits, logs are not maintained with driver's name 90%Must Do Contractors are not retained through legally binding contracts 89%Must Do For conveyance entries/exits, logs are not maintained with truck license information 86%Must Do Employees' entries and exits are not recorded 86%Should Do New employee orientation does not include confirming that all onsite personnel are wearing ID at all times while in the facility premise. 80%

Must Do The facility has no documented procedure and/or assessment reports to conduct periodic security checks to ensure that Export Logistics procedures are being performed properly. 67%

Must Do When selecting the contractors used by the facility, the facility does not consider the contractor's corporate history 64%

Must Do The loading dock access is not restricted to authorized personnel only 63%

Criteria Facility Strengths: Facility performance ranks in the top percentile of the population and/or has implemented a best practice process

Global Freq. of Compliance%Informative The facility conducts a comprehensive risk assessment annually. 11%Informative The facility have a risk assessment program to analyze and identify critical areas of its supply chain that is the most likely targets for infiltration. 12%

Informative The facility conducts a comprehensive risk assessment covering point of packing and stuffing. 13%Informative The facility conducts a comprehensive risk assessment covering their own facility. 15%Must Do Facility conducts periodic unannounced security check.to ensure that transport company is in compliance with the contract. 28%

Must Do There is a system in place to review periodically and maintain daily security logs for invalid password attempts and file access 34%

Should Do The facility has an intrusion detection or an alarm system 36%Must Do There is a system in place to suspend a log in user ID after three failed access attempts 41%Must Do Reference checks are conducted 41%Should Do Guards or security personnel with no other assignments monitor CCTVs. 43%

VII. KEY STRENGTHS AND CHALLENGES

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 17Contact Us Go Now

Page 19: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

VIII. COMPARISON BENCHMARK

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 18Contact Us Go NowHigh Risk Priority (0-75%) Low Risk Priority(86-100%)Medium Risk Priority(76-85%)

Page 20: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

1.Facility Photo

2.Facility Entrance

FACILITY PHOTOS FOR CAMINO INDUSTRIAL (HUIZHOU) COMPANY LIMITED

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 19Contact Us Go Now

Page 21: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

3.Perimeter Fencing

4.Facility Building

5.Employee Parking

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 20Contact Us Go Now

Page 22: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

6.Visitor Parking

7.Outside Lighting

8.Security Room- Communication Equipment

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 21Contact Us Go Now

Page 23: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

9.CCTV system and monitor

10.Packing Area

11.Finished Goods Warehouse

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 22Contact Us Go Now

Page 24: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

12.Loading Area

13.Facility Name

14.Employee ID Badge

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 23Contact Us Go Now

Page 25: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

15.Container Manifest and Inspection Record

16.Visitor's ID Badge

17.Shipping Logs

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 24Contact Us Go Now

Page 26: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

18.Shipping Documents

19.Non-Compliance Issues

NC-The trees were nearby the fence. NC-Some employees did not wear badges.

NC-No complete fencing for the loading area NC-Part of lighting switches were not controlled actively.

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 25Contact Us Go Now

Page 27: Global Security Verification Report - DreamingCodesites.dreamingcode.com/dccontentNet/Registration/data/pdf/5046_eAb... · Date of Verification : 16-Nov-2016 Auditor(s) Name :

DISCLAIMER

This report is for the exclusive use of the client of Intertek named in this report (“Client”)and is provided pursuant to an agreement for sevices between Intertek and Client (“Client Agreement”).No other person may rely on the terms of this report. This report provides a summary of the findings and other applicable information found/gathered during the audit conducted at the specified facilities on the specified date only. Therefore, this report does not cover, and Intertek accepts no responsibility for, other locations that may be used in the supply chain of the relevant product or service. Further, as the audit process used by Intertek is a sampling exercise only,Intertek accepts no responsibility for any non-compliant issues that may be revealed relating to the operations of the identified facility at any other date.Intertek's responsibility and liability are also limited in accordance to the terms and conditions of the Client Agreement.Intertek assumes no liability to any party, for any loss, expense or damage occasioned by the use of this information other than to the Client and in accordance with the Client Agreement and these disclaimers. In case there is any conflict between the disclaimers stated herein and the applicable terms and conditions of Intertek incorporated into the Client Agreement, then these disclaimers shall prevail.

Send Us a secure message. Complete the GSV on-line Compliments and Complaints feedback form 26Contact Us Go Now