Here follows an article, published by Dr. James Giermanski, an internationally renowned expert in container and supply chain security, international transportation and trade issues. It deals with a crucial but mostly forgotten/unknown aspect of international supply chains – who packed the cargo?
Tracking, tracing, and custody are all generally accepted concepts involving the control of movement. All these concepts have in their fundamental cognitive structure the idea of path, corridor, multiple parts, flow, and coordination.
However, what is often omitted or overlooked is the fundamental sine qua non core principle of “beginning”. What is the beginning of a chain of custody? This article focuses on this core concept and the role it plays as the beginning of the connective custody and control process. Specifically, it addresses the significance of cargo stuffing, the concept of authorized or trusted agent, the means of connectivity, the legal role of the authorized agent, and the consequences of a connected and visible supply chain.
Cargo stuffing
Establishing and maintaining cargo integrity begins with stuffing the container at origin. A chain of custody – chronological documentation or paper trail – involves “the movement and location of physical evidence from the time it is obtained until the time it is presented in court.” As in a criminal case comparison, a supply chain “chain of custody” needs three types of essential assertions:
-
That the cargo is what it purports to be and in the quantity stated;
-
That the cargo was in the continuous possession or control by the carrier who took charge of the cargo from the time it was loaded in the container at origin until the time it is delivered at final destination; and
-
That there is evidence of the identify of each person or entity who had access to it during its movement, and that the cargo remained in the same condition from the moment it was sealed in the container for transfer to the carrier that controlled possession until the moment it released the cargo into the receipted custody of another.
Trusted partner
It is imperative that the initial point of a connectivity process begins at the beginning! Loading cannot take place without a human agent. The agent could be the company’s forklift driver, the dispatcher, the loading dock supervisor, or even an authorizing manager who has a specific duty to verify the cargo and its quantity. It could even be a third party hired by the shipper, for instance, companies that currently provide inspection services around the world.
Various Customs programs discuss, in one way or the other, the concept that supply chain security begins at “stuffing”: the Secure Export Scheme Program (New Zealand); the Partners in Protection Program (Canada); the Golden List Program (Jordan); the Authorized Economic Operator Program (Japan); the Authorized Economic Operator Program (Korea); the Secure Trade Partnership Plus Program (Singapore); and the Authorized Economic Operator.
Establishing ‘connectivity’
Maintaining connectivity depends on the security program, software and hardware utilized. While no system is 100% effective, and one cannot depend on technology alone, there are ‘off-the-shelf’ container security devices (CSDs) that provide connectivity through a sophisticated, comprehensive chain of custody system that begins with loading the container at origin, monitoring it, and reporting on its integrity at the end of the global supply chain path, i.e. at final destination.
CSDs can include the identity of the trusted agent verifying the cargo at loading and the agent’s counterpart at destination. Both parties are electronically connected by a unique identifier to the smart container system along with bill of lading or booking information, or data needed by Customs authorities. Therefore, when the CSD is activated, the accountable party becomes the initiating element in the smart container security system.
Consequences of chain of custody – standards, laws and litigation
If a smart container is opened at destination by an equally accountable person and cargo is missing, and there were no breaches detected, recorded or reported, the accountable person at origin can face either disciplinary, or worse, criminal action by appropriate authorities.
This ESI becomes a source of evidence, should legal action follow. The concept of custody and control from origin to destination also supports Incoterms 2010, a publication of the International Chamber of Commerce (ICC) which provides the playbook of international rules involving international sales of goods. These new terms now contain security requirements for the shipper, making a chain of custody system essential for compliance. There are also changes coming for shippers, consignees, and vessel carriers with respect to carriage of goods by sea: the new Rotterdam Rules.
According to the UN General Assembly, the Rotterdam Rules are a “…uniform and modern global legal regime governing the rights and obligations of stakeholders in the maritime transport industry under a single contract for door-to-door carriage” (cf. American Shipper). The new door-to-door liability places the vessel carrier directly in a chain of custody. Instead of the vessel carrier filing what the shipper said is in the container, the vessel carrier will be automatically and really responsible for knowing what is in the container.
What are the benefits?
The shipper, the consignee, the carrier, and control and regulatory authorities all benefit from a chain of custody system that begins with the loading of the container at origin. CSDs incorporating the identity of the trusted agent at stuffing would assist law enforcement officials to comply with international security and trade standards, solve transhipment problems, impair illegal access to the cargo conveyance, improve supply chain efficiencies, aid in securing hazardous materials and other dangerous cargo movement, reduce counterfeiting, eliminate the in-bond problem of unauthorized container access, and improve bottom line revenue generation for the firms using them. Source: Supply Chain Digest.
Like this:
Like Loading...
You must be logged in to post a comment.