Concept

Supply chain security

Summary
NOTOC Supply chain security (also "supply-chain security") activities aim to enhance the security of the supply chain or value chain, the transport and logistics systems for the world's cargo and to "facilitate legitimate trade". Their objective is to combine traditional practices of supply-chain management with the security requirements driven by threats such as terrorism, piracy, and theft. A healthy and robust supply chain absent from security threats requires safeguarding against disturbances at all levels such as facilities, information flow, transportation of goods, and so on. A secure supply chain is critical for organizational performance. Typical supply-chain security activities include: Credentialing of participants in the supply chain Screening and validating of the contents of cargo being shipped Advance notification of the contents to the destination country Ensuring the security of cargo while in transit, for example through the use of locks and tamper-proof seals Inspecting cargo on entry According to the Office of the Director of National Intelligence in the United States, "adversaries exploit supply chain vulnerabilities to steal America’s intellectual property, corrupt our software, surveil our critical infrastructure, and carry out other malicious activities. They infiltrate trusted suppliers and vendors to target equipment, systems, and information used every day by the government, businesses, and individuals." Local police departments often lack the resources to properly address supply chain security. Package theft Theft and shrinkage can take place anywhere in the logistics chain: from the shipper, carrier, or consignee. It may be packages, pallet loads, and full truck loads. It can involve individuals with an opportunity to take cargo or can involve organized crime. Security systems involving surveillance systems, tracking systems, and broader corporate security are needed to reduce the theft of material. The terrorist attacks of 9/11 were the defining event for modern supply chain security.
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.