Findlay strictly adheres to a best practices security methodology with regard to handling its customers’ sensitive and confidential information. All Findlay employees must undergo specialized training to learn the proper way to handle sensitive customer data. Findlay’s C.I.A. Standards (Confidentiality, Integrity, and Authorization) are in place to protect all information entrusted to Findlay. Enforcement of this policy carries over to any and all Findlay affiliates that may be required to facilitate a move. Furthermore, all personnel employed by Findlay must agree in writing not to disclose information about a customer that may be considered sensitive.

CIA Standards

Information Security Policy

As part of the C-TPAT certification process, it must be demonstrated to the Department of Homeland Security that Findlay’s procedures for security meet their stringent requirements. Every member of the Findlay team has received training in threat awareness, recognizing internal conspiracies, and protecting access controls. It is important for our team members to understand their responsibility for identifying breaches and anomalies and how to report such occurrences.

Practices include but are not limited to the following actions/ circumstances, as appropriate:

Suspicious Activity:

Every Findlay employee is responsible to be constantly on alert for suspicious activities. This activity may consist of: unauthorized personnel loitering near the facility, asking questions, observing procedures, or taking pictures. Attempts to bypass security, activity out of the norm, and clothing not suited to the weather are additional examples. If any such activity is noted, the employee will inform their manager. The appropriate law enforcement agency will be notified at once.

Suspicious Items:

A suspicious item is identified as any box, package, or container that is not recognized as belonging in the place where it is found.  If such device is found, it will not be moved, touched, opened or disturbed.   It may be necessary to immediately evacuate the building.  The appropriate law enforcement agency will be notified at once.

Suspicious Mail:

A suspicious envelope or package will be placed in a plastic bag or other type of container to prevent contents from leaking.  All employees will leave the room and section off the area to prevent others from entering.  The appropriate law enforcement agency will be notified.

Vehicular Threats:

Any of the following signs would be immediately reported: vehicle is illegally or suspiciously parked, vehicle is a rental or in general disrepair, tag is improper or outdated, unusual odors, smoke or liquid emanate from the vehicle. The appropriate law enforcement agency will be notified.

Computer Violations:

The Vice President of Systems has the ability to review computer logs if there are suspected infringements or abuses. The President, Manager or audit department review shipment files before they are closed to ensure data integrity and proper usage of documentation.

Personnel violating information system policies are subject to disciplinary action. Depending on the severity of the violation, disciplinary action could result in dismissal. Findlay maintains a “zero tolerance policy” regarding technology security.

Any activity deemed suspicious or inappropriate by any staff member will immediately be reported to their supervisor. Depending on the nature and severity, appropriate enforcement personnel will be notified.