Language selection

Search


Partners in Protection
Before you apply: Check that your company meets security standards

From: Canada Border Services Agency

The Partners in Protection (PIP) program helps Canadian businesses strengthen their supply chain security. Companies that are eligible for the PIP program must meet standards related to corporate security, cargo and conveyance security, physical security, and supply chain partner security. This page walks you through the requirements for each area that makes up the security profile.

Provide clear answers to every question in the security profile that is found in the Trusted Trader Portal. You must submit evidence (documents or pictures) to support your application.

On this page

Corporate security

This area is about protecting your business from risks and making sure your staff and systems are secure.

Corporate security focuses on:

The requirements for this area emphasize risk assessments and aim to increase accountability across departments. To do this, your business must:

Provide documents in your application showing that your company maintains a written risk assessment document and reviews it routinely (at least once per year). Clearly show:

You will also need to prepare a statement of support signed by company leadership that shows your company’s commitment to secure trade and to preventing:

Display this document at company locations and discuss it during meetings and trainings.

Know your risks: Regularly check for security risks in your operations and take steps to reduce them.

You may increase the frequency of your supply chain review if the following happens:

Tip: If you don’t have a risk assessment document yet, start by listing areas where problems could happen and how you would fix them.

Screen your staff: Make sure employees go through background checks and ID verification.

Train your team: Teach staff about supply chain security and how to spot suspicious activity.

Provide documents in your application showing how your company prepares employees to:

Provide documents in your application showing how your company makes sure that employees understand:

Provide evidence in your application that clearly documents your training program. This should include:

Tip: Even short in-person sessions count if you document them.

Protect your data: Use strong passwords, limit access to sensitive systems, and keep computers physically secure.

Provide documents in your application showing that your company has:

Stay accountable: Put systems in place to make sure security rules are followed across your organization.

Tip: Once you become a member, set a calendar reminder to review and update your security profile in the Trusted Trader Portal every year.

Cargo and conveyance security

This area focuses on keeping goods safe while they’re being moved.

Cargo and conveyance security focuses on the physical movement and handling of the goods throughout the supply chain.

The PIP program requires:

Inspect containers and vehicles: Use a 7-point inspection method to check for tampering or damage.

Provide documents in your application showing your company’s:

Tip: Keep inspection records.

Only use high security International Standardization Organization (ISO) 17712 approved seals: You must seal containers with high-security seals and keep records of seal numbers. Apply seals yourself; don’t rely on third parties to ensure seals are properly attached.

Provide documents in your application showing that your company:

Tip: If cargo stays on site at a company location overnight, mention how you secure it (for example, locked yard, security guard).

Watch for pests: Take steps to prevent agricultural pests from getting into shipments.

Provide documents in your application showing that your company has clear, written procedures for:

Check drivers and cargo: Make sure drivers are properly identified and cargo matches the shipping documents.

Provide documents in your application showing that your company:

Report anything suspicious: If you see something unusual, report it to CBSA or local authorities.

In your application, provide a written plan for who to notify at the CBSA, police, etc. that includes up-to-date contact information.

Physical security

This area is about keeping your buildings and property safe from unauthorized access.

Physical security consists of both physical security controls and physical access controls.

Physical security controls include:

Physical access controls are necessary to prevent unauthorized access to facilities and include the positive identification of employees, visitors, and vendors at all points of entry.

Secure your facility: Use appropriate security measures, such as fences, gates, locks, lights, and cameras to protect your site.

Provide documents in your application showing:

Control access: Only allow authorized people into secure areas. Use ID badges and visitor logs, where appropriate.

Provide documents in your application showing that your company:

Escort visitors: Make sure visitors are accompanied and wear temporary ID.

Provide documents in your application showing:

Manage parking: Keep personal vehicles away from cargo areas. Describe in your application how you manage and document parking at your facilities.

Use alarms and cameras: Where this makes sense for your business operations, install monitored alarm systems and video surveillance.

Provide documents in your application showing:

Tip: If you have cameras, occasionally review the footage to check security practices.

Limit after-hours access: Have clear rules for who can enter the facility outside regular hours.

Supply chain partner security

This area is about making sure your business partners also follow good security practices.

Most companies applying for the PIP Program work with a variety of domestic and international supply chain partners. Applicants to the PIP Program must demonstrate they have a rigorous process for selecting, screening, and monitoring their supply chain partners. This is to ensure that sound security measures are in place and that all parties in the supply chain follow them. Supply chain partners must also be screened for activity related to trade-based money laundering and terrorist funding.

Choose your business partners carefully: Screen your business partners to make sure they meet security standards.

Watch for financial risks: Check for signs of money laundering or terrorist financing by your business partners. This can include but are not limited to inconsistent customer profiles, incorrect pricing, goods discrepancies, and shipping from high risk areas. These checks must be done every year.

Know your supply chain: Map out how goods and documents move through your supply chain.

Review regularly: Visit partner facilities and check their security practices based on risk.

Provide documents in your application showing that your company:

Secure storage and seals: Make sure your business partners follow proper procedures for storing and sealing goods.

Tip: If you don’t have a risk assessment document yet, start by listing areas where problems could happen and how you would fix them.

Page details

Date modified: