International Standard Basc 6.0.2
International Standard Basc 6.0.2
INTERNATIONAL OF
BASC SECURITY
6.0.2
COMPANIES WITH INDIRECT RELATIONSHIP TO THE
LOAD, THE LOAD UNITS AND THE
Freight Transport Units
Version 6 - 2022
Approval date: March 2, 2022
0. INTRODUCTION 3
5. INFORMATION SECURITY 10
5.1 Generalities 10
5.2 Cybersecurity and Information Technologies 11
Version: 06
Approved:
World BASC Organization 02-MAR-2022
Business Alliance for Secure Commerce
International Safety Standard
6.0.2 Page:
3 of 12
0 INTRODUCTION
Three documents were issued with the intention of consolidating the requirements.
corresponding to the interaction with the load defined in the scope of the SGCS. The
International Safety Standard BASC 6.0.1 applies to companies that have
direct relationship with the load, with the load units or the transport units of
load.
The International Security Standard BASC 6.0.2 applies to companies that have
an indirect relationship with the load, with the loading units or the transport units
of charge.
The International Security Standard BASC 6.0.3 is applicable to all types of companies.
that wish to manage the risks and minimum operational controls that allow them a
secure operation of products and provision of services, that do not apply to the Standard
International 6.0.1 and 6.0.2.
WBO Board of Directors 2021-23: Emilio Aguiar (BASC Ecuador), President; Ricardo
Sanabria (BASC Colombia), Vice President; Patricia Siles (BASC Peru), Secretary;
Armando Rivas (BASC Dominican Republic), Treasurer; Álvaro Alpízar (BASC Costa
Rich), Vocal.
WBO Technical Committee 2021-23: Fermín Cuza, WBO International President; Directors
Executives: Giomar González, BASC Panama; Luis Bernardo Benjumea, BASC Colombia;
Omar Castellanos, BASC Dominican Republic; Fabricio Muñoz, BASC Guayaquil; César
Venegas, BASC Peru; Jorge Wellmann, BASC Guatemala; María Andrea Caldas,
WBO Certifications Coordinator and Luis Renella, WBO Operations Director.
Version: 06
Approved:
World BASC Organization 02-MAR-2022
Business Alliance for Secure Commerce
International Safety Standard
6.0.2 Page:
4 out of 12
1.2.1 The company must establish a procedure, in accordance with current legislation,
to prevent money laundering, financing of terrorism, and other crimes
related to international trade. The company must appoint a
responsible for complying with these procedures. This procedure must
include:
a) Knowledge of its business associates, which includes: identity and legality of the
company, partners, and representatives.
b) Legal, criminal, and financial background taking into account national lists
and international.
c) Timely report to the competent authorities when identified
suspicious operations (see 2.4).
d) Verification of membership in recognized guilds or associations.
1.2.2 The documented procedure for the selection of business associates (see
1.1) must, based on risk management, consider at least the following
Version: 06
Approved:
World BASC Organization 02-MAR-2022
Business Alliance for Secure Commerce
International Safety Standard
6.0.2 Page:
5 out of 12
2.2.1 A documented procedure for the management and control of must be established.
loading documentation.
packaging, waste, debris, and leftovers that affect the safety of operations
the company.
3.2.1 The company must document and annually evaluate the effectiveness of programs
related to:
3.2.2 It must establish and maintain a documented annual training program for
raise awareness among staff about their responsibility to recognize vulnerabilities in
the companies related to the SGCS BASC, which should include at least:
4.1.3 Inspect the mail and packages received before distributing them, maintaining a
a record that includes the identification of who receives it and to whom it is intended.
4.1.4 Inspect the vehicles entering and exiting your facility, maintaining
the corresponding records.
4.1.5 Access to authorities and emergency response vehicles according to the plan
and event response preparation or when necessary.
a) Display the ID card or temporary identification in a visible place, under the rules of
applicable industrial safety. Applies to employees, visitors, contractors and
third parties.
b) Control the locker areas of the collaborators and these should
to be separated from the loading and storage handling area.
c) Identify and remove unauthorized persons.
d) Ensure that the security personnel are monitoring the entry doors
and exit from the facilities.
4.2.1 Generalities
The company, based on risk management and its role in the supply chain, must
establish documented procedures related to physical security that
include:
3. Perimeter fences.
4. Parking areas.
5. Other defined critical areas.
Having competent security service in accordance with the requirements
legal and that guarantees a timely response action, preferably
BASC certificate.
e) Parking areas for employees, visitors, and vehicles that deliver or
They collect cargo.
f) Operational and maintenance inspections with their respective records.
g) Use of security technologies:
Alarm operating system that identifies unauthorized access.
2. Video surveillance system that covers the identified critical areas and
monitored by qualified personnel.
3. Backup system for images and video (recording) with the capability of
sufficient storage to respond to possible events.
4. Others that the company considers for the BASC SGCS.
4.2.3 The company must carry out inspections to assess the implementation,
operation and maintenance of physical security controls, preserving
record of findings.
5 INFORMATION SECURITY
5.1 Generalities
a) Establish, document, and maintain security criteria that allow for identification and
protect information technology systems and recover it
promptly if necessary.
b) Identify stakeholders and their level of criticality in the IT infrastructure
(hardware and software) of the company.
c) Timely communicate information about cybersecurity threats
identified the relevant stakeholders.
d) Classify the information according to current legislation, systems, and access
according to the level of criticality and establish access policies for it.
e) Use assigned accounts for each user accessing the system, with their
own access credentials through passwords or other means of
authentication that generates secure access. These must be updated.
periodically, when there are indications or reasonable suspicions that they are
committed.
f) Limit access and permissions for users according to their roles and tasks
assigned, reviewing them periodically.
g) Remove access to information for all collaborators, third parties, and users
externals upon completing their contract or agreement.
h) Prevent the installation of unauthorized software.
i) Use and maintain licensed and updated hardware and software to protect the
IT infrastructure against computer threats such as viruses, programs
spies, worms, trojans, malware, ransomware, among others.
j) Make backups of sensitive information, keeping a
backup outside the facilities (physical or virtual) with security measures
necessary to prevent third parties from accessing the information.
k) Maintain an updated record of users, their level of criticality, and access.
assigned.
l) Close/block the session on unattended devices.
m) Evaluate at least once a year the security of the IT infrastructure (hardware and
software), implementing relevant actions when detected
vulnerabilities.
n) Establish procedures and controls to identify and review unauthorized access.
authorized to information systems, websites, or the breach of the
policies and procedures (including the handling or alteration of data
commercials by collaborators or contractors.
o) Review the cybersecurity policies and procedures at least once a
year and update them when changes occur in the internal or external context,
or when a risk materializes.
Version: 06
Approved:
World BASC Organization 02-MAR-2022
Business Alliance for Secure Commerce
International Safety Standard
6.0.2 Page:
12 out of 12