Security seals are applied to provide proof of entry. There are many types and degrees of security seals, but they are of little use if not used as an integral part of the procedures and systems established by users to apply and control security seals.
This information is intended to provide assistance to seal users, assisting them in establishing the appropriate control procedures and systems, in order to use security seals to prevent theft and robbery.
The process necessary for the proper management of security seals is shown below:
Security seals should always be kept in a secure area where only authorized personnel will have access. This will prevent fraudulent use of security seals. A log book of “seal release” must be kept.
Maintain one log book for outbound seal recording and a separate log book for inbound seal recording. The outbound security seal log book should contain the following information:
If the driver is not an employee of the shipper, the application of the seal should be monitored by a representative of the shipper. The driver will print the seal marking and numbering in the bill of lading, and the shipper’s representative will sign off on the shipping document.
All seals must be applied according to the instruction of the manufacturer, and a designated employee must check the seal application. Select the most suitable security seal for the shipment, based on value, destination and other logistic factors.
The following procedures for application should be used:
A guard should record the following information:
Want to find out more about the Seals Industry?
Check out our other Knowledge center pages for more information on the ins and outs of the security seal and tamper evident product market.