Persons, assets and information security to Supply Chain



Security systems divided into three particular keys:

1.       Security of person.
2.       Security of material or asset.
3.       Security of information.

In order to exhibit compliance to global SCS standards and for more important three particular key’s protection; supplier or projects constantly assess their supply chain to identify, alleviate and remove possible risks,  monitor and measure personnel, product and information data security. Newly raised industries face acute trouble at the prompt. Here we can start with:

Security of person. The right to security of person to protects physical reliability, which has generally taken the narrow focus of protection from direct physical shock. However, emerging standards are commencement to include as long as the necessities of life like healthcare next to social security right “the protection of health and safety, medical support, freedom from fear” can say “working environment”. Further rights must be documents like appointment letter, identity card, service hand book, monthly attendance card or fingerprint punching procedures, timely payment, provident fund, gratuity and retirement facilities, insurance, transportation, casual & annual leave, government approved and weekly holiday’s entertain chance and finally; liberty.

Project or company security should have knowledge to way of the employee’s protection. During entry of the employees; they should have tight checking procedure of valid ID holder’s, baggage's, food boxes, and discipline. Hygienic canteen facility, shower, toilet, safe operating space, hazard free pathway, sufficient stairs, fire equipment's, clear exit and attractive working hours are the In house right of the employees.

Security of assets. How to Protect:

1.        For an investor; it’s important to keep separate his personal assets from business.
2.    Group-term insurance for employees and insurance for projects are required from reliable/government approved Insurance Company.
3.       Homestead freedom.
4.       Identification.
5.       Income and own Life Insurance.
6.       Get liberate.
7.       Don't Wait to Protect.

Assets movement; major keys deeply be adopt; should have authorized signatory/signatory matrix at security gate, in the documents “outward or inward”; must have items description, quantity, color, against PO, destination/sender address, bearers/shippers identity, cargo number. Separate documentation in between Security and warehouse is mandatory and these are support document for gate pass/shippers documents. Transport can hire from valid supplier, during cargo departure; manual registration should be taken at exit gate, warehouse inventory/bin card/ledger and software database to be kept updated instantly.  Sufficient CC camera’s to be available at loading/unloading point. 17 points check to be completed before loading. Finally: security lock, photography and escorting are mandatory.

Security of Information: To deal a handy business; information through technologies is mandatory. To better understand the motivations and tactics of interior and exterior entertainer, organizations are adopting or updating key technologies. Threat intelligence provide suitable awareness of threats and understanding of the operations, it creates immediate analytics , techniques and events of adversary. When analytics and threat intelligence are created in the cloud, it becomes possible to create a single source of enterprise-wide data. Verification is the key for helping projects to manage passwords and its an extra layer of security to pick up trust. 

Project should take extra safety measures; observation and to protect information leakages by the employee/s, should not keep any pending information, no hard copy or register books, sample papers, shipment informational papers allowed to take outside of the project.

For more tutorials; visit my blogs on Supply Chain Security”.



No comments

Do not share any link

Powered by Blogger.