Audits



1. Well trained and qualified with inspective Auditor Training, Certification and experiences.
2. Can customize + develope Audit Protocols as required.
3. Covers Quality & Technical (QMS, SQP, GMP, HACCP); Factory Capabilities & Capacities; Social Compliance (SA8000, BSCI, SLCP, ETI, SMETA, WRAP, ICTI, RBA, WCA); Environmental (HIGG, GRS); Supply Chain Security (C-TPAT, SCAN, GSV)



Supply Chain Security


CTPAT Five - Step Risk Assessment

Step 1. Mapping Goods and Cargo and Identifying Business Partners
Step 2. Conducting a Threat Assessment: Identifying Threats to the Supply Chain within the Country, Region, and /or City
Step 3. Conducting a Vulnerability Assessment: Identifying Weaknesses in a Company’s Procedures and Supply Chain
Step 4. Action Plan: Developed Once Threats and Weaknesses have been Identified
Step 5. Documenting the Processes and Procedures on how Risk Assessments Should be Conducted