Security & ConfidentialityTraining
â All employees, including contractors, shall sign a
confidentiality agreement as new employees and
annually thereafter.
â Security training shall be imparted to all
employees as part of induction and annual
refresher
â Data privacy & security, confidentiality, intellectual
property security measures, information protection
measures, breaches of confidentiality, and
personal responsibility shall be covered in the
training
â Suspicious Security Activities Reporting shall be
encouraged as part of the training session scope.
4.
Confidentiality Agreement
â Allstaff shall sign a nondisclosure, confidentiality
agreement or oath as new employees and annually
thereafter.
â The confidentiality agreement shall state that the
employee agrees not to disclose any company
sensitive information to any unauthorized persons.
â The agreement shall be maintained in the
employeeâs personnel file.
5.
Physical Security
⢠Fencing
â˘Gates and Gate Houses
⢠Parking
⢠Building Structures
⢠Locking Devices
⢠Lighting
⢠Alarms & Video Surveillance
6.
Physical Security
â Boundary/ Fencing shall be solid wall cement construction with 6
feet height & above
â Must touch the ground and not have gaps, holes, or sections in
disrepair
â Periodical inspection of the fencing for damage and integrity and
make necessary repairs
â Doors and Windows of buildings must be secured properly with
locking devices or access control devices.
â Adequate lighting systems for effective surveillance of the facility
7.
Physical Access Control
âSecurity shall ensure that they allow access to authorized individuals only.
â All authorized individuals shall wear & display identity cards for security
identification at gate
â Access control devices shall be installed on all critical areas viz. IT room,
Labs, IP, SIP, FG area, etc.
â Personnel access shall be restricted to only legitimate business areas of
access
â Issuance & removal of access control devices & electronic access
permission shall be done by HR / IT / Security team
â All perimeter & interior access portals shall be secured, manned & monitored
8.
Vehicle & PersonnelControl
Preventing unauthorized vehicles from entering the premises to minimize threat to
cargo, electronic cargo files and SIP.
â Vehicular checks shall be done at main gate by security
â Record keeping of all vehicular access within the company premises by security
â Vehicles shall be thoroughly examined by security at gate for any explosives,
prohibited items and drugs.
â Vehicles shall be parked at their designated parking areas and that personal vehicles
are not parked in or near cargo loading and storage areas.
9.
Visitor Management
Identifying, recordingand restricting the movement of visitors to prevent access to
cargo, electronic cargo files and SIP areas where it is created, stored or processed.
â Visitor shall have a legitimate business need for purpose of visit to facility,
â Visitor shall present a valid photo ID proof for registration
â Visitor shall be issued a Visitor badge by the security
â Visitor & Visitor vehicle shall be frisked by the security at the gate
â Visitor shall be escorted at all times by the host employee
â Visitorâs arrival and departure shall be recorded in the visitor logbook
10.
CCTV / VideoSurveillance System
â CCTV for 24 hours security surveillance of the premises shall be installed.
â CCTV Control room shall be monitored by authorized security staff
â 90 days back up of the CCTV footages shall be maintained
â Alternate power supply shall be provided for continuous CCTV operations during power outage
â CCTV line of sight shall be clear and unobstructed
â CCTV shall have coverage of cargo handling & storage, seal storage, FG cargo handling &
storage, SIP, IIT inspection & storage, server, lab areas.
11.
Patrolling Procedures &Reporting
â Security shall have proper patrolling of the facility both internally and externally.
â All personnel shall be encouraged to report suspected security incidents
â Facility management shall initiate internal investigations in response to security incidents.
â Security incidents shall include but shall not be limited to: Seal changes, Cyber security
threats, Altered, suspicious or broken seals, Unauthorized entry into IIT or conveyance storage
areas, Unauthorized release of sensitive information, Cargo overages, shortages, damages,
suspicious packages & parcels, unauthorized entry, etc.
â Facility management shall outline the facilityâs internal escalation process and contact
information
Container Security
â IITinspections shall be performed by trained security under the CCTV view
â IIT Inspections must be in place to address human smuggling and concealment.
â Protections must be in place to protect against smuggling, contraband & terrorism
â IIT inspections shall be performed on empty containers, prior to loading and loaded containers while passing
through gate.
â Empty IIT inspection, pre-loading inspection and gate inspection checklist shall be filled by the security supervision
â Designated representative shall be available to oversee and monitor the loading of cargo
â IIT loading shall be done under CCTV surveillance
â IIT loading CCTV footages shall be retained for 90 days
â Seals shall be correctly affixed on the IIT using VVTT method immediately after loading
16.
IIT Seals
ISO 17712Compliant High Security Bolt Seal
Look for the âHâ stamped on the seal:
Locking body
Steel rod or bolt
17.
Seal Security
Seals shallbe stored in a secure area and a regular inventory of seals shall be
conducted to ensure that all seals are accounted for and not utilized for illegitimate
purposes.
â Seals shall be stored in a secured, access-controlled or in a password protected
digital safe under CCTV surveillance
â The volume of seals purchased shall be consumed within a 12-month period
â A comprehensive seal log shall be used to record and control seals
â Regular audits shall be performed to verify the seal logs against seal inventory.
â The seal inventory and issuance logs shall be accurate.
â ISO 17712:2013 or later compliant high security seals shall be use
â Seals shall be properly inspected using the VVTT method
â Seal certificate of conformance shall be available
18.
Container SealsâŚ
Seal AffixingProcess:
ď§ Only designated, authorized employees must distribute and affix container seals for integrity
purposes. The fewer people who have access to seal(s), the better!
ď§ Unauthorized employees must never handle container seals!
19.
Seal InspectionâŚ
Seal Verificationand Inspection Process:
ď§ A seal inspection process should be implemented throughout the
supply chain.
ď§ The V.V.T.T. Seal Inspection Process is a good example of one:
V â View seal & container locking mechanisms.
V â Verify seal number for accuracy.
T â Tug on seal to make sure it is affixed properly.
T â Twist & Turn seal to make sure it does not unscrew.
20.
Seal InspectionâŚ
Seal Verificationand Inspection Process:
ď§ View seal & container locking mechanisms.
Excessive damage to the seal or locking
mechanisms must be reported to a Supervisor
before opening the container.
Seal Verification and Inspection Process:
ď§ Verify seal number for accuracy.
ď§ Compare with shipping documents, and look
for alterations to the seal numbers!
21.
Seal InspectionâŚ
Seal Verificationand Inspection Process:
ď§ Tug on seal to make sure it is affixed properly.
ď§ Seals that come apart must be reported to a
Supervisor before opening the container.
ď§ Human error might cause this to happen, or the
container might have contraband inside!
Seal Verification and Inspection Process:
ď§ Twist & Turn seal to make sure it does not
come off.
ď§ Seals are threaded, so they can be unscrewed.
ď§ These altered seals are reusable throughout
the supply chain for multiple attacks!
22.
⢠Twist &Turn seal to make sure it does not unscrew
⢠Seals that are previously cut off from imported shipments can be used to
create duplicate seals.
Tampered Seals
Seal affixed on container Cut seal mutilated for future use
23.
Records Retention &Destruction Policy
â Records shall be classified as per their information content
â Records retention policy shall be defined
â Records shall be stored in a lock & key cabinet.
â Records shall be destroyed through crosscut shredder
24.
Electronic Data Security
âComputers, Fax Machines, and Printers
â Always use passwords with a minimum of 7 characters comprised of numbers
and letters.
â Do NOT share passwords with anyone.
â Do NOT sign on and allow someone else to access data.
â Restrict printer and fax access space and they should be maintained in a
secure locked space.
â Only use printers that do NOT store information on an internal hard drive.
25.
Electronic Data Security
âElectronic Databases
â Electronic databases should be maintained on secure servers with backups preformed
regularly on secure servers.
â Only required staff should have access to databases with the minimum level of access
granted to fulfill job responsibilities (i.e., read only access).
â Do NOT share passwords with anyone.
â Do NOT sign on and allow someone else to access data.
â Once access is no longer required, user accounts should be deactivated.
26.
Electronic Data Security
âElectronic Databases
â Pen drive access shall be restricted to authorized personnel only with âNeed to
Knowâ access basis
â Data sharing on personal gadgets viz. hard drives, mobiles, floppy drives shall
be prohibited
â Data sharing shall only be done via official transfer file system
â Data should be encrypted if removed from the secure server and always
encrypted before transfer
â Back-ups should be encrypted, if possible, before being copied to a secure
location.
27.
Protecting digital andphysical SIP and electronic cargo files
⢠Facility shall conduct regular training programs which shall mitigate the risk of human error for SIP leaks and
supply chain risks.
⢠Training conduct shall make the staff understand both what they need to do and why it is important and that
they shall be much more likely to execute the required security controls with the precision and consistency
needed to make the controls effective.
⢠Facility shall conduct some training and training topic shall be into short modules that shall be trained to
different individuals as appropriate. Some employees shall need more than one module as their
responsibilities span different aspects of handling sensitive assets or perform different roles in the supply
chain.
⢠Regardless of role, everyone that is part of the Supply Chain shall have regular training on the importance of
CTPAT, AEO, and Hasbro supply chain security controls.
⢠Training content shall emphasis on the followings -
ďź Why protecting digital and physical SIP is important
ďź Clean desk and personal belongings policies to ensure that SIP is not left unsecured or pilfered
ďź Printed and digital document security to ensure that authorized individuals use and transfer SIP appropriately
ďź Properly storing, transferring, and destroying SIP digital and physical assets
ďź Properly watermarking images and video before distribution internally or to necessary 3rd parties
ďź Restricting access to only persons that have a legitimate business need to know
ďź Recognizing IP security threats (hack, misuse of transfer methods, misuse of content by authorized or
unauthorized individuals, etc.)
28.
Digital Data SecureTransmission
All digital assets that contain images, descriptions, or depictions
of SIP items shall be transmitted that allows for secure internal
communications and encrypted external communications.
The digital data transmission follows the below protocol :
1. Email shall not be used to transmit digital data either internally or
externally
2. Data shall not be transfer via pen drive or any electronic gadgets means
3. We Transfer secure communication platform is used for internal transfer of
digital data
4. Blast secure communication platform is used for external transfer of digital
data
.
29.
Unauthorized Image Control
âVideography & Photography shall be prohibited on the company premises
â Personal cameras or cell phones shall be prohibited into SIP and restricted
items processing or storage areas
â List of authorized mobile users shall be maintained
â Security labels shall be affixed on authorized mobile users phone for security
identification
â Use of personal phones with image capturing capabilities in IP areas shall be
prohibited
â All Memory cards shall be cleared after every use
â Visitors shall be prohibited or monitored into IP areas to ensure no images
captured of SIP areas.
30.
Camera Control &Photography Policy
All cameras used to capture images of confidential information or SIP must be stored in a secured
central location, restricted to authorized employees that are responsible for capturing images.
Employee-owned cameras, including personal cell phones with image capturing capabilities, are strictly
prohibited within the facility specially inside SIP secure areas or storage rooms.
Implementation Steps:
1. Imaging restricted policy in place that prohibits the use or possession of any mobile camera or
camera within factory premises specially in a SIP secure area or storage point
2. All personnel shall deposit their camera mobiles at main gate with security. Visitors shall also deposit
their mobiles with security.
3. Imaging Device form shall be filled and duly signed by the management for camera mobile access
permission for official purpose. Such camera mobiles permitted shall be affixed with a mobile
identification sticker for security identification and verification of authorized mobile users.
4. A dedicated camera to capture images for official purpose shall be stored in a secure location and
access to this secure location shall be restricted to authorized personnel only.
31.
Camera Control &Photography Policy
1. Imaging Request Form shall be filled and duly signed / approved by the management for any
designated person to capture photos for official business needs.
2. Photographs or Videos captured on the camera shall be downloaded by the IT person on their IT
devices and shared with the authorized recipients of the photographs or videos.
3. Photographs or Videos once downloaded or shared with the authorized recipients shall be erased
from the camera for next use.
4. Logbook shall be maintained by the IT department for all such camera issuance and retrieval from
the authorized users of the camera.
32.
Clean Desk Policy
âStaff Responsibilities
â Ensure confidentiality of individual workstations.
â All hard copy records containing highly sensitive data must be shredded or disposed of
in designated confidential waste containers when ready for disposal. Under no
circumstances should this information be placed in regular wastepaper bins.
â Passwords should be secured in a location that is not visible or otherwise accessible to
others.
â âClean Deskâ Policy â Any loose paperwork containing sensitive information should be
cleaned off desktop and locked securely in a drawer when you leave office and at end of
every workday.
â Lock computer screen every time leaving the computer, even for a few minutes.
â Properly destroy documents containing confidential information when no longer needed.
33.
Email Security
⢠Emailshall not be used to transmit confidential information.
⢠Set up a user account and password to prevent unauthorized access to your computer files
⢠Beware of executable files embedded in .zip attachments â is a common way for hackers to send .exe files
that would normally be deleted by email systems
⢠Use We Transfer or other authorized source to transfer any confidential information
⢠Avoid using public WiFi
⢠Avoid opening links and attachments embedded in emails if you cannot verify the source
⢠Check with your IT manager before installing any programs on your work computer
⢠Never leave your laptop, tablet or phone unsupervised and in plain view
⢠Do not install unnecessary programs or apps on your computer or phone
⢠Install a firewall on your network and PC
⢠Run a full anti-malware scan regularly
34.
Proprietary and CONFIDENTIAL.Do Not Distribute. Š 2023 Optiv Security Inc. All Rights Reserved.
To stay safe online, make these behaviors part of your regular routine
Key Cybersecurity Behaviors
Use Strong
Passwords
Create Backups
Enable MFA
Learn From
Security Awareness
Training
Recognize and
Report Phishing
Share Cybersecurity
Knowledge With
Others
Update Software
Avoid Using Public
WiFi
Regularly Assess
Your Digital
Hygiene
Use a VPN
35.
Encrypt the dataon the USB device in
case you lose it or it gets stolen.
Safe Use of
USB
Avoid public charging stations.
They may be compromised.
Donât plug any USB that isnât
yours into your device
36.
Business Partner
Business partnersshall be vetted and monitored to ensure they are capable of meeting Global Security
Standards
â Contracts with appropriate security language shall be in place with all business partners to ensure
security obligations are legally enforceable
â All partners involved in the development, production, handling, storage or transportation of cargo,
electronic cargo files, and SIP are aware of their obligations.
â Facility management shall communicate the importance of Global Security requirements to all
business partners annually.
â Facility shall use a compliance assessment questionnaire for all logistics and general service
providers and SIP subcontractors.
â The business partner shall participate in a Customs administered supply chain certification program
37.
Maintaining Confidentiality
⢠Facilityshall conduct regular training programs which shall mitigate the risk of human error for SIP leaks and
supply chain risks.
⢠Training conduct shall make the staff understand both what they need to do and why it is important and that
they shall be much more likely to execute the required security controls with the precision and consistency
needed to make the controls effective.
⢠Facility shall conduct some training and training topic shall be into short modules that shall be trained to
different individuals as appropriate. Some employees shall need more than one module as their
responsibilities span different aspects of handling sensitive assets or perform different roles in the supply
chain.
⢠Regardless of role, everyone that is part of the Supply Chain shall have regular training on the importance of
CTPAT, AEO, and Hasbro supply chain security controls.
⢠Training content shall emphasis on the followings -
ďź Why maintaining confidentiality is important
ďź Duty to keep sensitive information pertaining to Hasbro confidential during and after employment (SIP
information, electronic cargo files, SIP samples, components, finished goods cargo, graphics, photos,
etc.)
ďź Proper sharing of information (internally to other departments, externally)
Use of JayPrecision Name
â Corporate Purchase Agreements, Purchase Orders and General
Contractor Agreement specify, Suppliers may not:
â Use Jay Precisionâs logos without a written license
â Use Jay Precisionâs name to advertise your products,
goods or services
â (rare exceptions may be granted with prior written
approval by Senior Management)
â Disclose Company as a customer or release information
about relationships with Jay Precision, by name or by an
indirect or descriptive reference.
Do not use Jay Precisionâs name or logos
40.
Misrepresentation and Useof Jay Precisionâs Name
â Suppliers may not represent themselves as
acting on Jay Precisionâs behalf
â (unless specifically authorized in writing by
Senior Management)
â Suppliers may not
â Make donations, gifts, etc. on Jay
Precisionâs behalf
â Company has our own charitable giving programs
â Make bribe payments, kickbacks, etc. on Jay
Precisionâs behalf
Protecting Company &Client Assets and Confidential Information
Suppliers must protect Jay Precision assets including but not limited to:
â Jay Precision funds
â Trade Secrets, Confidential Information and other Company intellectual Property
â Suppliers with access to confidential information must sign a Corporate Non-Disclosure Agreement (CNDA) which provides
that they not disclose JP or client confidential information to a third party and vice versa
â Appropriate security measures must be in place to address Confidential data handling, access requirements, data storage
and communications (in transit). Compliance to privacy rules, which are based on universal privacy principles, are required
when personal information (PI) is collected/used/stored.
ďź NOTE: Supplier employees who connect to Companyâs network or have access to classified information may be required to
take additional Information Security and Privacy training
⢠Equipment and buildings
ďź NOTE: Some areas of facilities are âoff limitsâ to contractors and suppliers
â Company-sponsored meetings and events
â Contingent Workers (CWs) may not attend Company-sponsored meetings and events unless specifically invited by the
Company business group and approved by the Management
â CWs may attend business meetings only where needed for specific project- or task-related reasons; then must be excused
Company expects its Suppliers to be Leaders and Role Models
in protecting Assets and Confidential information
Accurate Records
â Companyrequires keeping accurate financial and other books and records
â Both Jay Precision and Suppliers must keep accurate business records during the course of
their relationship
â Contractual and Legal requirements also require retention of such records for a period
of time beyond termination of the relationship
â Company does not permit or otherwise allow or condone falsification of documents
Immediately report to Management
any attempt to falsify information in Companyâs
records (or the appearance of doing so)
Security Incident Reporting
ReportingSuspicious Activities, Anomalies, and
Security Breaches
ď§ Jay Precision understands the importance of protecting the global
supply chain from criminal activities, such as terrorism, human
smuggling, drug trafficking, illegal contraband, and the
proliferation of weapons of mass destruction.
ď§ As a strong advocate of the CTPAT program, Jay Precision is
committed to providing the highest standards of quality, integrity,
and security throughout the supply chain and is dedicated to
promoting a culture of security to ensure that all goods within the
supply chain are protected from illicit activities.
ď§ As part of our efforts to promote security awareness, we want to
remind our clients / business partners that they play an integral
role in keeping our borders secure and our communities safe.
ď§ By working together with U.S. Customs and Border Protection
(CBP) and sharing information about security breaches or potential
threats, we can strengthen international supply chains and prevent
illegal or terrorist activities.
47.
Security Incident Reporting
ReportingSuspicious Activities, Anomalies, and
Security Breaches
Examples of suspicious activities that warrant notification include, but are not limited to, the following:
ďź Evidence that a shipping container has been tampered with
ďź Discovery of a hidden compartment in a shipping container
ďź High security seal that has been altered, tampered with, or has an incorrect number
ďź Suspicious information on shipping documentation
ďź Discovery of a cargo discrepancy or anomaly (shortages, overages, or other significant discrepancies)
ďź Smuggling of illegal contraband, including narcotics, people, weapons, etc.
ďź Counterfeit or fake goods (IPR infringement)
ďź Suspected forced labor violations
ďź Unauthorized entry into trucks, locomotives, vessels, or aircraft carriers
ďź Extortion, payments for protection, threats, and / or intimidation
ďź Unauthorized use of a Business Entity Identifier
ďź Data breaches
ďź Cyber attacks
ďź Duty evasion
ďź Country of origin violations
ďź Suspected cases of money laundering or financing of terrorist activities
To report suspicious illegal activities, shipment anomalies, or security breaches, please contact Security team, local
police, local Customs port of entry, Senior Management & Hasbro Management immediately.
48.
* Correct displayof ID badges for proper identification by Security
* Report loss of ID badge to Security
* Always keep safe custody and proper possession of ID badge
* Assign authorize key holders
* Access on your own individual ID badge
* âNeed to Knowâ basis access only
* Mandatory escort of all visitor/s by host employee
* Correct display of visitor badge & Security checks mandatory
* Mobile & laptop restriction protocol for visitor/s
* Visitor/s not allowed in âRestricted Areasâ
Key Employee Responsibilities
49.
* Log offunattended desktop / laptop
* Ensure password protected laptop at all times
* Never share your password or give computer access to strangers
* Report all suspicious persons, activities and packages
* Report suspicious vehicles in parking space
* Report compromised security infrastructure (broken locks,
windows..)
* Maintain clean desk policy
* Keep safe custody and proper storage of all documents
* Shred all documents not in use
Key Employee Responsibilities
#34Â Suggested Script:
Weâve discussed the importance of using strong passwords and a password manager, enabling MFA, recognizing and reporting phishing and updating software regularly today. Your security also depends on conducting regular digital hygiene assessments to ensure your online presence is clean, creating backups in case of data loss, learning from security awareness training, sharing your cybersecurity knowledge with coworkers, clients, family and friends, avoiding connecting to public WiFi when possible, and using a virtual private network (VPN) to shield your online activity from those who seek to use it for their benefit.
Engaging in these behaviors can help keep you safe online.
#38Â In this next section, weâll review the Use of Prothomâs Name
#39Â Suppliers may not use Prothomâs logos without a written license.
Suppliers may not use Prothomâs name to advertise your products, goods, services or company. Suppliers may not disclose that Prothom is a customer, or release information about relationships with Prothom.
Our purchase agreements and General Contractor agreements specify this obligation.
Rarely, Prothom will make an exception and allow a supplier to say that Prothom is a customerâpermission must be requested in advance, and given in writing by Prothom Senior Management.
Do not disclose Prothom as a customerâwhether you list Prothom by name, or indirectly, through your description.
#40Â Suppliers may not say that theyâre from Prothom, nor may they make donations or gifts on Prothomâs behalf.
Prothom has a charitable giving program on behalf of our corporation.
And never pay a bribe or kickback on Prothomâs behalf. This is not allowed, whether done directly or through a third party.
#41Â Now letâs discuss protecting Prothom assets and confidential information.
#42Â Suppliers must protect Prothom assets, including Prothom funds, confidential information, equipment, and buildings.
Prothom assets must not be sold, borrowed, lent, given away or modified in any way that would impair their value.
As an Prothom supplier, you are also personally responsible for safeguarding the companyâs assets from:
Loss or overuse
Inappropriate modifications
Disclosure to anyone who lacks either the authorization or the need-to-know.
Suppliers with access to confidential information sign a nondisclosure agreement or CNDA. Make sure you understand your responsibility under the CNDA, and correctly protect the confidential information.
A couple of reminders:
Any supplier employee who connects to Prothomâs network must take Prothomâs Information Security and Privacy classes. Please ensure that any of your employees who need this training, get it.
And,
Contingent Workers should only attend Prothom Business meeting where theyâre invited for specific project- or task-related reasons, and only for the relevant part of the meeting.
Prothom expects our suppliers to be leaders and role models in protecting Prothom assets and confidential information.
#43Â Letâs now talk about the importance of Accurate Records.
#44Â Doing business with highest standards of professionalism and in accordance with the Code of Conduct, means documenting and maintaining accurate books and records. This is an Prothom requirement and is also required under many laws such as the U.S. Securities and Exchange Act of 1934 and GAAP. Transparency is critical for accurate books and records.
Both Prothom and the supplier must keep accurate business records during the course of the relationship. These records may be required to be retained beyond the termination of the relationship, based on contractual or legal requirements.
Prothom does not allow falsification of records.
If you know of an attempt to falsify information in Prothomâs records, or if it appears to be such an attemptâreport this immediately to Prothom Management.
#45Â Weâve mentioned several times that Prothom wants our suppliers to report any concerns about ethical behaviour or violations of Prothomâs Code of Conduct. Now letâs discuss how to do this.
#46Â This session deals with the topic of internal quality audits.
The session is a half-day module, with approximately 60 minutes of presentation, followed by 45 minutes of group discussion and 30 minutes of feedback. Test is approximately 30 minutes and 20 minutes for discussion.
A documented and systematic tool, used by management and done periodically by independent, qualified people to verify and evaluate an organisationâs commitment to the principles of Good Manufacturing Practice (GMP) as well as compliance to regulatory requirements. An organisation that is highly committed to GMP will not only meet the regulatory requirements but far exceed them.
Internal audit is used by the organisation to better understand itself or others. The activity and its results must be documented and shared with those who can take action based on the audit findings.
The audit must be done in a planned and organised way so that the deficiencies are immediately identified and corrected before they adversely affect the products and the companyâs reputation.
#47Â This session deals with the topic of internal quality audits.
The session is a half-day module, with approximately 60 minutes of presentation, followed by 45 minutes of group discussion and 30 minutes of feedback. Test is approximately 30 minutes and 20 minutes for discussion.
A documented and systematic tool, used by management and done periodically by independent, qualified people to verify and evaluate an organisationâs commitment to the principles of Good Manufacturing Practice (GMP) as well as compliance to regulatory requirements. An organisation that is highly committed to GMP will not only meet the regulatory requirements but far exceed them.
Internal audit is used by the organisation to better understand itself or others. The activity and its results must be documented and shared with those who can take action based on the audit findings.
The audit must be done in a planned and organised way so that the deficiencies are immediately identified and corrected before they adversely affect the products and the companyâs reputation.
#48Â This session deals with the topic of internal quality audits.
The session is a half-day module, with approximately 60 minutes of presentation, followed by 45 minutes of group discussion and 30 minutes of feedback. Test is approximately 30 minutes and 20 minutes for discussion.
A documented and systematic tool, used by management and done periodically by independent, qualified people to verify and evaluate an organisationâs commitment to the principles of Good Manufacturing Practice (GMP) as well as compliance to regulatory requirements. An organisation that is highly committed to GMP will not only meet the regulatory requirements but far exceed them.
Internal audit is used by the organisation to better understand itself or others. The activity and its results must be documented and shared with those who can take action based on the audit findings.
The audit must be done in a planned and organised way so that the deficiencies are immediately identified and corrected before they adversely affect the products and the companyâs reputation.
#49Â This session deals with the topic of internal quality audits.
The session is a half-day module, with approximately 60 minutes of presentation, followed by 45 minutes of group discussion and 30 minutes of feedback. Test is approximately 30 minutes and 20 minutes for discussion.
A documented and systematic tool, used by management and done periodically by independent, qualified people to verify and evaluate an organisationâs commitment to the principles of Good Manufacturing Practice (GMP) as well as compliance to regulatory requirements. An organisation that is highly committed to GMP will not only meet the regulatory requirements but far exceed them.
Internal audit is used by the organisation to better understand itself or others. The activity and its results must be documented and shared with those who can take action based on the audit findings.
The audit must be done in a planned and organised way so that the deficiencies are immediately identified and corrected before they adversely affect the products and the companyâs reputation.