Instructions: Complete all applicable sections. Indicate Compliant or Non-Compliant for each requirement, describe the verification method, and note vulnerabilities or best practices. Return to compliance@wahlclipper.com.
Business Partner Information
M = Must (required) | S = Should (recommended)
§1 — Container & Trailer Security
| M/S | Requirement | Status | Verification | Notes |
|---|---|---|---|---|
| M | Procedures to seal and maintain container/trailer integrity | |||
| M | High security seal on all loaded containers bound for U.S. (≥ PAS ISO 17712) | |||
| M | Written procedures for seal control and compromised seal reporting to CBP | |||
| M | Containers under foreign manufacturer control stored in secure area |
§2 — Physical Access Controls
| M/S | Requirement | Status | Verification | Notes |
|---|---|---|---|---|
| M | Positive identification of all employees, visitors, and vendors at entry points | |||
| M | Employee ID system for access control; access limited to required areas | |||
| M | Visitors present photo ID; all visitors escorted | |||
| M | Procedures to challenge and address unauthorized persons |
§3 — Personnel Security
| M/S | Requirement | Status | Verification | Notes |
|---|---|---|---|---|
| M | Prospective employee screening; periodic review of current employees | |||
| M | Employment history and references verified prior to hire | |||
| M | Access removal procedures for terminated employees |
§4 — Physical Security
| M/S | Requirement | Status | Verification | Notes |
|---|---|---|---|---|
| M | Physical barriers guarding cargo handling/storage against unauthorized access | |||
| M | Gates manned and/or monitored; vehicle/personnel entry controlled | |||
| M | Buildings resist unlawful entry; periodic integrity inspection and repair | |||
| M | Adequate lighting at all entry/exit, cargo, fence, and parking areas | |||
| M | Written pest prevention procedures including WPM (ISPM 15) |
§5 — Information Technology Security
| M/S | Requirement | Status | Verification | Notes |
|---|---|---|---|---|
| M | Individually assigned IT accounts requiring periodic password changes | |||
| M | IT security policies reviewed annually; system abuse detection in place and tested | |||
| M | Remote access requires secure technology (VPN) | |||
| M | Decommissioned IT equipment properly sanitized |
§6 — Security Training & Threat Awareness
| M/S | Requirement | Status | Verification | Notes |
|---|---|---|---|---|
| M | Threat awareness program maintained by security personnel | |||
| M | Code of conduct trained to all personnel; acknowledgment received and maintained | |||
| M | Employees aware of procedures for reporting suspicious situations | |||
| M | Shipping/receiving staff trained on container inspection and pest prevention |
Authorized Signature
The undersigned certifies that the information provided is accurate and complete to the best of their knowledge and agrees to cooperate with any C-TPAT audit conducted by WCC.