Monday, December 25, 2017

Bolt Seal Policy in Bangla for Security Audit in Garments Factory




Bolt seals are used to secure shipping containers, trucks and trailers. A bolt seal used for securing containers must conform to the ISO 17712 high security seal in order to be accepted by customs all around the world in ocean shipping.




Tuesday, December 19, 2017

Annual Leave or Earn Leave Rules as per BLL Rules 2015



107| gRywimn evrmwiK QzwU| (Earn Leave)

(1) aviv 117 Abyhvqx evrmwiK ev AwR©Z QzwU MYbvi †¶‡Î c~e©eZx© 12 (evi) gv‡m kªwg‡Ki Kv‡R Dcw¯’wZi w`b¸wj‡K MY¨ Kwi‡Z nB‡e|

(2) †Kvb kªwgK Pvwn‡j Zvnvi Ae¨wqZ AwR©Z QzwUi wecix‡Z bM` A_© MÖnY Kwi‡Z cvwi‡eb :
Z‡e kZ© _v‡K †h, ermiv‡šÍ AwR©Z QywUi A‡a©‡Ki AwaK bM`vqb Kiv hvB‡e bv Ges GBiƒc bM`vqb erm‡i gvÎ GKevi Kiv hvB‡e|

(3) ‡Kvb kªwgK Zvnvi gRywimn QzwU cvIbv _vKv Ae¯’vq g„Zy¨eiY Kwi‡j, Zvnvi QzwU eve` gRywi Zvnvi g‡bvbxZ ev AvBbMZ DËivwaKvix‡K cwi‡kva Kwi‡Z nB‡e|

Calculation:
aA.  Earning Day = Actual Working Day or Pay Day (without Absent ) ÷ 18 Day
bB.  Earn Leave Rate = Last Month Gross Salary ÷ 30 Day (Fixed by BLL 2015)

Earn Leave Amount = A ×B

                                       = (224 ÷ 18) × (5300 ÷ 30)
                                       =  12.44  ×  176.67
                                       =  Tk. 2197.77/-  or Tk.2198/-  × 50% ( According to BLL 2015)

                                       = Tk. 1099/-

Monday, December 18, 2017

Fabric Relaxation Procedure for Garments Factory ( Technical Audit Issue)





Fabric relaxation is very important for some kinds of fabrics to release tension of the layers. If the layers contain improper (too much or too less) tension in the lay then it will affect the ultimate garments quality especially in the measurement and shapes.





Sunday, December 17, 2017

Background Verification Form of Worker Mandatory for Security Audit in Garments Factory





Check Someone's Background mean check his or her Court Cases, Contact Information, Assets, Police Records and Much More! Arrest Records , Birth Records , Court Records , Criminal Records , Criminal Wants and Arrest Warrants , Death Records , Divorce Records , Jail and Inmate Records , Marriage Records , Police Records etc. from permanent & local address.






Friday, December 8, 2017

SCAN Security Audit - Pre-Audit Questionnaire





SCAN Supplier Compliance Audit Network. The current Board and Committee consist of members of these companies: Walmart Stores, The Home Depot, The Coleman. Company, Husky Injection Moldings, Celgene, and Boeing. SCAN Benefits. SCAN will benefit corporate members and their business partners through an audit sharing network.



Thursday, December 7, 2017

Security Audit Documents Checklist for Garments Factory



Security Audit Checklist for Garments Factory. Security Audit Documents for Garments Factory. C-TPAT Audit Checklist. GSV Audit Checklist.




Wednesday, December 6, 2017

All Register for Security Audit (C-TPAT, GSV & SCS) for Garments Factory


The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrorism.

All Register for Security Audit (C-TPAT, GSV & SCS)






C-TPAT AUDIT CHECK LIST as COC for Garments Factory


The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrorism.








C-TPAT Audit Document Checklist for Garments Factory



The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrorism.




Monday, December 4, 2017

Access Control Policy & Procedure in Garments Factory for Security Audit



Access Control in Garments Factory for Worker, Visitor, Head Office Staff, Outside Worker


In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

Locks and login credentials are two analogous mechanisms of access control.


Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.

There are two main types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data.