AEO Trade Security Fulfillment
The Authorized Economic Operator (AEO) programm is based on the Customs-to-Business partnership introduced by the World Customs Organisation (WCO). This relationship must be based on the principles of mutual transparency, correctness, fairness and responsibility. The programme, which aims to enhance international supply chain security and to facilitate legitimate trade, is open to all supply chain actors. It covers economic operators authorised for customs simplification, security and safety.
CapXon Electronic (Shenzhen) Co., Ltd., reaching the China highest AEO level (Senior certificate) announced to and asked its business partners to confirm and implement the "trade security standards". It is applicable to business partners who have any legal entity obligations with CapXon (including customers, major suppliers, logistics companies, customs brokers, express companies, etc.). This standard is a supporting document of the measures of the customs of the people's Republic of China on enterprise credit evaluation.
CapXon and the business partner comply in the best possible way with all applicable laws and regulations, comply with customs laws and regulations, and require downstream trading partners such as customers, major suppliers, logistics companies, etc. to meet trade security requirements. Comply with the requirements of this standard and implement them more effectively.
The enterprise has a written system and procedure to check and prevent unspecified goods and unauthorized personnel from entering the site, cargo loading and unloading and storage areas; isolation facilities are set up in the import and export areas to prevent unauthorized personnel from entering.
(1) Gate and guard room: the gate for vehicles and personnel to enter and exit is equipped with personnel.
(2) Building structure: the building is constructed in such a way as to prevent illegal entry. Regularly inspect and repair buildings to ensure that they are in good condition.
(3) Lighting: the enterprise's production and operation places are equipped with sufficient lighting, including the following areas: entrance and exit, cargo handling and storage area, surrounding fence, and parking / parking area.
(4) Alarm system and video surveillance camera: equipped with alarm system and video surveillance camera to monitor the following areas: entrances and exits, cargo handling and storage areas, perimeter walls and parking / parking areas to prevent unauthorized access to cargo storage and loading areas.
(5) Storage area: in the cargo handling and storage area, as well as the area used for storing import and export goods, isolation facilities are set to prevent any unauthorized personnel from entering.
(6) Locking device and key storage: all internal and external windows, gates and fences are equipped with sufficient locking devices, and designated personnel shall keep all locks and keys.
Access control management
Access control management shall be implemented in security enterprises, and written systems and procedures shall be implemented for employees and visitors to enter and exit to protect the company's assets.
(1) Employee: it has an employee identification system to identify and control the employee's identity. Unified management and registration shall be carried out for the distribution and recycling of the identification marks (such as keys, key cards, etc.) of employees and visitors.
(2) Visitors: the visitors who enter the enterprise should check the ID card with photos and register, and the visitors should wear temporary identification and be accompanied by internal personnel.
(3) Unauthorized entry and unidentified personnel: there are procedures for identifying, questioning, and confirming unauthorized entry and unidentified personnel; if suspicious personnel are found to enter, enterprise employees shall report in time.
Enterprise has written systems and procedures to review the proposed employees and regularly review the existing employees, and provide a dynamic list of employees, including name, date of birth, ID card number and position held.
(1) Pre-employment review: before employing an employee, the application information (such as employment experience, recommendation letter, etc.) should be verified.
(2) Background investigation: before employing employees, check or investigate their security background such as whether they have criminal records or not. Once employed, regular review and re investigation should be carried out according to the performance of employees and employees in important and sensitive positions.
(3) Employee turnover procedures: there are written systems and procedures to take back the work certificates and equipment of the employees who have left their jobs or who have been suspended, and prohibit them from entering the enterprise's production and operation sites and using the enterprise's information system.
(4) Safety training: it is necessary to conduct daily training on the safety awareness of the supply chain for employees, and the employees should understand the enterprise's response to certain situations and the reporting procedures.
Business partner security
Enterprise has a written system and procedure to assess, require and inspect the security of business partner's supply chain.
(1) Comprehensive evaluation: in the screening of business partners, we conduct a comprehensive evaluation of business partners according to this certification standard, focusing on the assessment of compliance and trade security, and there are written systems and procedures.
(2) Written documents: in contracts, agreements or other written materials, business partners are required to optimize and improve trade security management in accordance with this certification standard.
(3) Monitoring and inspection: regularly monitor or inspect the compliance of business partners with trade security requirements and have written systems and procedures.
Enterprises have measures and procedures to ensure the integrity and safety of goods in the supply chain during transportation, handling, and storage.
(1) Shipment and receipt of goods: the arrived goods shall be consistent with the information in the cargo documents, and the weight of the goods, the number of labeled pieces or boxes of goods shall be verified with the contents of the purchase order or shipping order. In the key delivery links of goods, there are protection systems such as signature and seal.
(2) Cargo discrepancy: in case of over delivery, short shipment, or other abnormal phenomena, it is necessary to report or take other measures in time, and there are written systems and procedures.
Enterprises have measures and procedures to ensure the integrity of containers to prevent unauthorized goods or personnel from mixing in.
(1) Container inspection: check the physical integrity and reliability of container structure before loading, including the reliability of door locking system, and make relevant registration. It is recommended to adopt "seven-point inspection method" (i.e. check the container in the following order: front wall, left side, right side, floor, top, inner / outer door, outer / landing gear).
(2) Container seal: the loaded container shall be sealed with high safety. All seals shall meet or exceed the standard of PASISO17712 for high safety seal. The seal shall be managed and registered by special personnel. It is necessary to establish a written system and procedure for the application and inspection of seals, as well as a reporting mechanism for seal anomalies.
(3) Container storage: containers should be kept in a safe area to prevent unauthorized entry or modification. There are procedures for reporting and resolving unauthorized access to containers or container storage areas.
Safety of means of transport
Enterprises have written systems and procedures to ensure the integrity of means of transport (trailers) and prevent unauthorized personnel or goods from mixing in.
(1) Inspection procedures of means of transport: there are special procedures or systems to check the means of transport in and out to prevent the hiding of suspicious items.
(2) Storage of means of transport: vehicles should be parked in a safe area to prevent unauthorized entry or other damage - there are procedures for reporting and resolving unauthorized entry or damage.
(3) Driver identity verification: before the goods are received or issued, the identity of the drivers who ship or receive the goods shall be identified.
Enterprises have written systems and procedures to deal with disasters or emergency safety accidents.
(1) Emergency mechanism: it has emergency procedures or mechanisms such as reporting and handling disasters or emergency safety accidents.
(2) Emergency training: to carry out emergency training for employees.
(3) Abnormal report: report to the customs or other relevant law enforcement organs in case of abnormal situations such as disasters or emergency safety accidents, illegal or suspicious activities.