5 Step Cargo Risk Assessment Process
The 5 Step
- Submission Editing
- Reference Data
Cargo Risk Assessment Process mobile app assists in signing numerical values to threats and vulnerabilities identified during a supply chain security risk assessment (e.g. 1-Low, 2-Medium, and 3-High). The app covers: 1. Mapping Cargo Flow and Identifying Business Partners (directly or indirectly contracted) 2. Conducting a Threat Assessment focusing on: Terrorism, Contraband Smuggling, Human Smuggling, Organized Crime, and conditions in a country/region which may foster such threats and rate threat – High, Medium, Low 3. Conducting a Vulnerability Assessment in accordance with C-TPAT Minimum Security Criteria and rate vulnerability – High, Medium, Low 4. Preparing an Action Plan 5. Documenting How Risk Assessments are Conducted.