Flow chart explains supply chain steps and security procedures

Aug 29, 2006 3:48 PM


         Subscribe in NewsGator Online   Subscribe in Bloglines

The Retail Industry Leaders Association (RILA) has created an interactive flow chart called "From Factory to Shelf: Navigating the Global Supply Chain" with a glossary of supply chain terms to help the public, policymakers and the media better understand the processes and security measures in place to protect U.S. maritime cargo.
The chart can be found at www.retail-leaders.org/.
"We hope the chart and glossary will help provide those participating in and observing the port security debate in Washington with a better understanding of the way the supply chain system works," says Al Thompson, RILA's vice president of global supply chain policy. "The debate on port and supply chain security often involves numerous acronyms and jargon. We posted the chart and glossary to give a simple overview of the various steps in the maritime cargo supply chain, and the security procedures now in place."
The interactive chart provides users with a step-by-step explanation of the supply chain security processes and procedures from the purchase order to the final destination. By clicking each step, the user receives an explanation of each stop made along the supply chain, and the definitions associated with each. In addition, users can view supply chain security measures applicable at each step, by rolling the cursor over an adjacent inspector icon.

Want to use this article? Click here for options!
© 2014 Penton Media Inc.

Today's New Product

Product 1 Image

Privaris Biometric Verification Software

In support of the Privaris family of personal identity verification tokens for secure physical and IT access, an updated version of its plusID Manager Version 2.0 software extends the capabilities and convenience to administer and enroll biometric tokens. The software offers multi-client support, import and export functionality, more extensive reporting features and a key server for a more convenient method of securing tokens to the issuing organization.

To read more...


Govt Security

Cover

This month in Access Control

Latest Jobs

Popular Stories

Back to Top