Persons, assets and information security to Supply Chain
1. Security of person.
2. Security of material or
asset.
3. Security of information.
In order to exhibit compliance to global SCS standards and for more important three particular key’s protection; supplier or
projects constantly assess their supply chain to identify, alleviate and remove
possible risks, monitor and measure personnel, product and information
data security. Newly raised industries face acute trouble at the prompt. Here
we can start with:
Security
of person. The
right to security of person to protects physical reliability, which has generally taken the narrow focus of protection from direct physical shock. However, emerging
standards are commencement to include as long as the necessities of life like healthcare
next to social security right “the protection of health and safety, medical
support, freedom from fear” can say “working environment”. Further rights must
be documents like appointment letter, identity card, service hand book, monthly
attendance card or fingerprint punching procedures, timely payment, provident fund,
gratuity and retirement facilities, insurance,
transportation, casual & annual leave, government approved and weekly holiday’s
entertain chance and finally; liberty.
Project or company security should have knowledge
to way of the employee’s protection. During entry of the employees; they should
have tight checking procedure of valid ID holder’s, baggage's, food boxes, and
discipline. Hygienic canteen facility, shower, toilet, safe
operating space, hazard free pathway, sufficient stairs, fire equipment's, clear
exit and attractive working hours are the In house right of the employees.
Security
of assets. How to Protect:
1. For an
investor; it’s important to keep separate his personal assets from business.
2. Group-term insurance for employees and insurance for projects are required from reliable/government approved Insurance
Company.
3. Homestead freedom.
4. Identification.
5. Income and own
Life Insurance.
6. Get liberate.
7. Don't Wait to
Protect.
Assets movement; major keys deeply be adopt; should have
authorized signatory/signatory matrix at security gate, in the documents “outward or inward”; must have items description, quantity,
color, against PO, destination/sender address, bearers/shippers identity, cargo number. Separate documentation in between Security
and warehouse is mandatory and these are support document for gate
pass/shippers documents. Transport can hire from valid supplier, during
cargo departure; manual registration should be taken at exit gate, warehouse
inventory/bin card/ledger and software database to be kept updated instantly. Sufficient CC camera’s to be available at
loading/unloading point. 17 points check to be completed before loading. Finally:
security lock, photography and escorting are mandatory.
Security of Information: To deal a handy business; information
through technologies is mandatory. To
better understand the motivations and tactics of interior and exterior entertainer,
organizations are adopting or updating key technologies. Threat intelligence provide suitable awareness of threats and understanding
of the operations, it creates immediate analytics , techniques and events of adversary. When analytics and
threat intelligence are created in the cloud, it becomes possible to create a
single source of enterprise-wide data. Verification is the key for
helping projects to manage passwords and its an extra layer of security to pick
up trust.
Project should take extra safety measures; observation and to protect information
leakages by the employee/s, should not keep any pending information,
no hard copy or register books, sample papers, shipment informational papers allowed
to take outside of the project.
For more
tutorials; visit my blogs on “Supply Chain Security”.
Post a Comment