Tuesday, December 26, 2017
Monday, December 25, 2017
Bolt Seal Policy in Bangla for Security Audit in Garments Factory
Bolt seals are used to secure shipping containers, trucks and trailers. A bolt seal used for securing containers must conform to the ISO 17712 high security seal in order to be accepted by customs all around the world in ocean shipping.
Tuesday, December 19, 2017
Annual Leave or Earn Leave Rules as per BLL Rules 2015
107| gRywimn evrmwiK QzwU| (Earn
Leave)
(1) aviv 117 Abyhvqx evrmwiK ev
AwR©Z QzwU MYbvi †¶‡Î c~e©eZx© 12 (evi) gv‡m kªwg‡Ki Kv‡R Dcw¯’wZi w`b¸wj‡K MY¨
Kwi‡Z nB‡e|
(2) †Kvb kªwgK Pvwn‡j Zvnvi Ae¨wqZ
AwR©Z QzwUi wecix‡Z bM` A_© MÖnY Kwi‡Z cvwi‡eb :
Z‡e kZ© _v‡K †h, ermiv‡šÍ AwR©Z
QywUi A‡a©‡Ki AwaK bM`vqb Kiv hvB‡e bv Ges GBiƒc bM`vqb erm‡i gvÎ GKevi Kiv
hvB‡e|
(3) ‡Kvb kªwgK Zvnvi gRywimn QzwU cvIbv _vKv
Ae¯’vq g„Zy¨eiY Kwi‡j, Zvnvi QzwU eve` gRywi Zvnvi g‡bvbxZ ev AvBbMZ
DËivwaKvix‡K cwi‡kva Kwi‡Z nB‡e|
Calculation:
aA. Earning Day = Actual Working Day or Pay Day (without Absent ) ÷ 18 Day
bB. Earn Leave Rate = Last Month Gross Salary ÷
30 Day (Fixed by BLL 2015)
Earn Leave Amount = A ×B
= (224 ÷ 18) × (5300 ÷ 30)
=
12.44 × 176.67
=
Tk. 2197.77/- or Tk.2198/- × 50% ( According to BLL 2015)
= Tk. 1099/-
Monday, December 18, 2017
Fabric Relaxation Procedure for Garments Factory ( Technical Audit Issue)
Fabric relaxation is very important for
some kinds of fabrics to release tension of the layers. If the layers contain
improper (too much or too less) tension in the lay then it will affect the
ultimate garments quality especially in the measurement and shapes.
Sunday, December 17, 2017
Background Verification Form of Worker Mandatory for Security Audit in Garments Factory
Check Someone's Background mean check his or her Court Cases, Contact Information, Assets, Police Records and Much More! Arrest Records , Birth Records , Court Records , Criminal Records , Criminal Wants and Arrest Warrants , Death Records , Divorce Records , Jail and Inmate Records , Marriage Records , Police Records etc. from permanent & local address.
Friday, December 8, 2017
SCAN Security Audit - Pre-Audit Questionnaire
SCAN Supplier Compliance Audit Network. The current Board and Committee consist of members of these companies: Walmart Stores, The Home Depot, The Coleman. Company, Husky Injection Moldings, Celgene, and Boeing. SCAN Benefits. SCAN will benefit corporate members and their business partners through an audit sharing network.
Thursday, December 7, 2017
Security Audit Documents Checklist for Garments Factory
Security Audit Checklist for Garments Factory. Security Audit Documents for Garments Factory. C-TPAT Audit Checklist. GSV Audit Checklist.
Wednesday, December 6, 2017
All Register for Security Audit (C-TPAT, GSV & SCS) for Garments Factory
The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrorism.
All Register for Security Audit (C-TPAT, GSV & SCS)
C-TPAT AUDIT CHECK LIST as COC for Garments Factory
The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrorism.
C-TPAT Audit Document Checklist for Garments Factory
The Customs-Trade Partnership Against Terrorism (C-TPAT) is a voluntary supply-chain security program led by U.S. Customs and Border Protection (CBP) focused on improving the security of private companies' supply chains with respect to terrorism.
Monday, December 4, 2017
Access Control Policy & Procedure in Garments Factory for Security Audit
Access Control in Garments Factory for Worker, Visitor, Head Office Staff, Outside Worker
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
Locks and login credentials are two analogous mechanisms of access control.
Access control is a security technique that can be used to regulate who or what can view or use resources in a computing environment.
There are two main types of access control: physical and logical. Physical access control limits access to campuses, buildings, rooms and physical IT assets. Logical access limits connections to computer networks, system files and data.
Subscribe to:
Posts (Atom)