Industrial Engineering Research Topics List

Industrial Engineering Research Topics List

Industrial Engineering Research Topics

Industrial Engineering Research Topics is the technique for developing productivity by proper using of manpower, machine, current infrastructures & facilities of the factory. A simple definition of IE is a logical way to find out-The best way to do something, The time required to do it and the way to measure results. The goal of IE are Optimize the productivity, Minimize the wastage, Optimize the productivity, Optimize the productivity. To ensure that, Smooth & planned activities in production process design & development. Processes are validated. This procedure is applicable to all activities related to process design from operation breakdown to all the steps of process development. Its means the production of per man per hr.

Example:

  •     1. Man-40, prdn-120/hr
  •      productivity: 120/40=3
  •     2. Man-25, prdn-100/hr
  •      productivity: 100/25=4
  •      Better one is 2
Industrial Engineering Thesis Topics
IE Example

Industrial Engineering Thesis Topics

Sop for Industrial Engineering

  • When doing sample development work-study officer prepare the operation break down with the help of sample technician. Further he is responsible for the making technical detail sheet with the help of sample room technician. Further IE officer is responsible for costing & planning SMV providing.
Sop for Industrial Engineering
Sop for Industrial Engineering
  • Production IE officer is responsible to collect the OB from the sample room and prepare layout. While making lay out he is responsible for x-checking the OB against the sample to avoid mistakes in the OB. If there is deviation he has to amend the OB and layout, it should be discuss in the PP meeting before implementing.
  • After making layout or line balancing he is responsible for providing it to the mechanics, supervisors & technicians. This has to distribute before PP meeting and before line sample making.
  • Before line feeding IE officer is responsible to ensure all operator skills and machines available with relevant persons. If not he is responsible for finding solution with top management or enforcing training etc.
  • Before or during line feeding IE officer should be in the line and make sure all pre-setting and work placement as per their SMV calculation.
  • IE officer is responsible for educating operators about individual targets, efficiency etc.
  • IE is responsible for driving the feeding team to achieve feeding targets.
  • After line feeding complete he is responsible for achieving learning curves using work study techniques. If there is any discrepancy he has to revise the line balancing as per the situation or improve the work method.
  • IE department is responsible for providing bellow management information reports, daily efficiency report, daily loss time report, weekly manpower status, weekly efficiency report, weekly performance report. The above are the industrial engineering sop.
  • Further IE officers are responsible for method improvement & SMV reductions, maintain SMV data base, maintain skill matrix, operator training requirements etc.

Industrial Engineering More Concept

What is Industrial Engineering ?

  • Industrial Engineering is the abbreviation of Industrial Engineering.
  • IE is a science to design, improve and set the integrated system of personnel, material, equipment, source and information.
  • The mission of IE is to raise the efficiency, lower the cost and improve quality.

The present situation of IE spreading in auto garment:

We have set up IE department, the organization contains IE officer, assistant and clerk. Besides the Adm. Center and Sample Room have their IE staffs, there are IE staffs stationed in 2 factories to render service.

Main function of Center IE:

  • Instruct, supervise and cooperate with factory IE.
  • Analyses and appraises the concerned data of each factory, and report to management.

Main function of Sample Room IE:

Confirm the SAM of all samples and bulk.

industrial engineering sop
IE SOP

Main function of  Factory IE:

  • Determine the operation time of each process and unit price.
  • Efficiency analysis and prepare the related report forms.
  • Working method studies, working flow improvement, workshop layout design, and render variety of suggestion contributed to raise efficiency and lower cost.
  • Execute the job assigned by the factory manager.

Industrial Engineering Thesis Topics Documents:

  • Operation analysis sheet.
  • Technical sheet.
  • Lay out sheet.
  • SMV bank.
  • Operators training record.
Fire Safety Devices. Safety and Security Management System

Fire Safety Devices. Safety and Security Management System

Safety and Security Management

The Customs Trade Partnership Against Terrorism (C-TPAT) is a comparative endeavor among the trade, community and US customs service to develop safety and security management system and maintain co-operative relationship that strengthen overall supply system and garment border security. The expectation for the trade on this program is to make commitment toward the common industrial goal of creating a more safety security  system and efficient supply chain through partnership. Fire safety devices is not intended to create any new “liability” for the company beyond their existing security practices. However, joining C-TPAT will commit company to follow the actions specified in the signed agreement. C-TPAT recognizes that a safe and security supply chain is the most critical part of both the vendors and the buyers. For this reason, a strong anti-terrorism partnership with the community through C-TPAT is required to safeguard the supplied commodities. The fire safety devices are listed here.

Fire Safety Devices

Network Access Control PG-2750 Installation Procedures

Access Control & Attendance Solutions

IT Security Policy for Apparel Industry

C Tpat Audit Checklist for IT Security

Prevention of Sharp Machine Tools in Garments

24 Hour Pest Control in Fashion Industry

GSM Fire Alarm Sound With Fire Safety Devices

How To Install CCTV Camera? 

What Does CCTV Stand For?

What is CCTV ? How Hidden Surveillance Cameras Work

Jewelry in Garments

Hard Plastic Glasses Control Policy

Fully Automatic Capsule Filling Machine 

Guidelines for Safety Security

Autogarment has developed guidelines for every employee in this factory to follow as part of the factory’s regulations and are posted on the readily accessible place to alert all employees concern on security. These guidelines were developed to cover the security of the following 7 areas:

Container/Covered van Security:Focus on the physical integrity of the incoming and outgoing covered vans prior to stuffing and the procedures of the seals and the reliability of the locking mechanisms of the doors.

Physical Access Controls: Focus on prevention of unauthorized access to the shipping, loading and cargo areas. Implement controls on identification of all employees, visitors and vendors. It also includes procedures for challenging unauthorized /unidentified persons.

Personnel Security: Autogarment shall enhance the factory’s recruitment system to include interviewing and background checks/verifications

Procedural Security: There are set systems and methodology to handle the incoming and outgoing goods. Engaged with Security Officers on controls of in/out cargo; record on shipping marks, weights, number etc; procedures for verifying seals on containers, trucks etc; reporting shortages and overages; storage of empty and fill containers to prevent unauthorized access; and a tracking system of all cargo movements.

Security Training and Threat Awareness: This security plan also provides to employees a security awareness training, that includes operation procedures, awareness, identity and reporting of crime, and determining and addressing unauthorized access. The training program encourages active employee’s participation in security controls.

Physical Security: Focus on buildings & constructions; external and internal locking devices; warehouse safety; lighting inside and outside the facility; shipping, loading & cargo areas; as well as internal and external communications systems for assurance of factory’s physical security.

Information Technology Security: Focus on the protection and accountability policy on the Information Technology (IT)

Safety and Security Management in Main Gate

  • Report to the duty place on time.
  • Know the scope of the security of the post.
  • Allow only the authorized persons to enter and exit the factory – checking the ID Cards are hanged with the neck.
  • Do body check of the out-going persons- workers, staffs.
  • Check the bags on suspicion — by showing courtesy.
  • Scrutiny for carrying anything by any worker or staff.
  • Be vigilant at the gate and out of the factory premises.
  • Observe for any suspected movement of any person- own or outsider.
  • Scrutiny about the vehicles coming for loading and offloading.
  • Examine the Challan and gate passes regarding the goods and enter the same into respective register.
  • Inform with full particular at the reception if any person needs to enter with car or other vehicle.
  • Shall not leave the post with permission.

Safety Security for Loading and Off Loading Point

  • While on the loading and off loading duty ask for the gate pass and delivery Challan to know about the number and quantity of the materials.
  • Ensure that concerned person is present at the time of loading and off loading.
  • Count the item in the tally sheet and submit the same to the supervisor for further record.
  • If it is observed that the quantity I number is not matching with the gate pass Challan or packet or bundle is torn or broken inform the matter to security officer / supervisor immediately.]
  • Check the lock before and after loading and off loading for its effectiveness.

Safety and Security Management in Floor Area

  • Restricting the movement of the unauthorized persons.
  • Frequently check and ensure the identity of the person working there.
  • Observe for any susceptive activities of any person.
  • Observe for any stealing and sabotaging activities.
  • Not to leave the post with any replacement
  • Be vigilant and alert by using the light and whistle.
  • Do not leave the post without permission.

Safety and Security Management in Guards Place

  • Main Gate
  • Warehouse Gate.
  • Loading Area.
  • Exit Gate (01)
  • Exit Gate (02)
  • Parking Area

Security Guidelines for IT Department

  • Password logon be set up to control employees to access to network and sensitive information
  • Conduct periodic internal audits of the IT system
  • Employees are required to change passwords on a regular basis
  • System in place to identify & the abuse of IT including improper access, tampering or altering of business data.
  • All system violators are subjected to appropriate disciplinary actions for abuse.
  • All system violators must be reported to the management and be recorded. All records should be kept for at least 12 months.
  • All illegal activities must be reported to the management and police.

Emergency Telephone Numbers

The following numbers are maintained by the security personnel

  • Nearest police station
  • Nearest Fire Brigade
  • Ambulance
  • Nearest Clinics & hospital
  • Key Factory Personnel

Safety and Security Management in Van

Arrangements and Procedures to meet different types of business needs after getting approval for loading cartons to ship, store team should count the cartons to be loaded physically. After counting, comparing and confirming with commercial invoice, the cartons should be loaded into covered vans. A delivery Challan & Gate pass should be made truck wise for each shipment. Company), security sign and van driver sign (on behalf of C&F agent). After loading a shipment into a truck from factory, Truck driver are the responsible persons to hand over the shipment to customer. The Shipment Truck/Van should be locked and sealed by the security in front of truck driver, Store person and commercial person. If the seal is found broken before handing over to customer, customer will not accept the Shipment. Goods of the truck and should inform the incidence to commercial personnel and to factory management immediately.

Awareness on Usages of Hazardous Materials

In order to ensure safe and secured work environment, the factory employees are trained on the hazards, precautions and procedure for the safe storages, handling and use of all potentially harmful materials relevant to each employee’s task and work area. Personnel are also trained in environment, health and safety mailers including accident prevention, safe lifting practices, safe handling of chemical and proper control and maintenance of equipment and facilities. Although PROJECT STITCH is not using any hazardous materials or chemicals right now the policy has been developed for future.

Customers Audit of C-T PAT:

The buyers make audit of the vendors’ factory security system to ensure overall trade compliance. The factory must pass the audit and get approval of the concerned buyers to continue business on a long term bais. The buyers may recommend additional guidelines, which the vendors need to follow for overall security of the supply chain.

Safety and Security Management in Drug Controls

Autogarment does not tolerate the introduction of drugs into its work premises whether it is by inmates, visitors or staff. The management intends to prosecute to the fullest extent of the law against those individuals involved in any illegal drug transaction into the frontier of factory premise, if any. To ensure the process, management has introduced the following guide lines and restrictions which every individual associated with PROJECT STITCH needs to follow and abide by:

  • Any campaign encouraging usage of drug or any kind of alcohol is strictly prohibited associating the company name.
  • The employees are kept under close observation during lunch hour, break hour and any other time through surprise visit of assigned personnel.
  • The management carries out surprise visit to the toilets, canteen area, and other suspected places where the employees take rest during off hour to restrict the employee intervention with any illegal drugs transaction.
  • The employee & the authority arrange drug eradication program by organizing workshop, seminars and training program to explain the hazards of taking drugs.
  • The factory is totally restricted of carrying, taking, selling or distributing of illegal drug of any kind of sensitive fire safety devices
  • The factory premise is a no smoking and nonalcoholic zone to ensure safety security system
An Overview of Rotary Garment Dyeing Machine

An Overview of Rotary Garment Dyeing Machine

Garments Dyeing Machine

For more than last 70 years, regular research and development is going on garment dyeing machine, process and technique. Different types of garments dyeing machines have been developed and all types of dyeing machines can be classified into the following two groups- (a)Overhead padel type (b)Side padel type. This type of garments dyeing machines are the first and oldest type of garments dyeing machine still used is European countries and also used in our country.

Features of Garment Dyeing Machine

  • Used for woolen knit wear type garments dyeing
  • Dyeing cost is higher due to-
  • Manual operation
  • Higher labour load
  • Manual loading and unloading of garments
  • Manual chemical feeding etc.
Rotary Garment Dyeing Machine
Garment Dyeing Machine Inside

Rotary Garment Dyeing Machine

Rotary garment dyeing  machine is the modified version of padel dyeing machine. It is of two types-

  • Normal atmospheric pressure type (>100˚c)
  • High temperature type (<100˚c)

Normal Atmospheric Pressure Type Machine

This type of rotary garments dyeing machines are widely used in our country.

Capacity: capacity of this machine is 50 kg to 500 kg. but 300 kg capacity garments dyeing machine is mostly in garments dyeing industry.

Advantages of Garment Dyeing Machine

The main advantage of this machine is that same machine can be used for desizing, scouring, bleaching, dyeing and washing treatment of the garments.

High Temperature Rotary Garment Dyeing Machine

High temperature rotary garments dyeing machine is the modified and latest version of  the normal atmospheric pressure type rotary garments dyeing machine. It is a microprocessor control high temperature dyeing machine. Garments dyeing can be carried out upto 140˚c in the machine.

Features of Rotary Garment Dyeing Machine

  • Very big central door facilities, material loading and unloading mechanically.
  • Light m/c structure facilities, high speed m/c running with safe balance.
  • Simple A/C drive and A/C converter facilities with 5-35 rpm of main cylinder.
  • Additional two chemical tanks facilities, auto dozing of dyes and chemicals during operation without any manual effort.
  • Separate chemical dozing tanks may be attached besides those two chemical dozing tanks for auto dozing of more number of items to the dye solution during operation.
  • Separate liquor circulating pump, heater and filter facilities. Hence better dyeing quality.
  • The m/c is available only built in form. Hence less risk of installation and running problem.
  • Zoo dyeing or pre-treatment program could be saved and reused easily.
  • The microprocessor can also be set for different questions and answers about product and production parameters.

Selection Of Interlining Before Garments Dyeing

Garments to be dyed after  manufacturing. So needs careful selection of interlining. As because, during garments dyeing, the performance of interlining used in the garments may be destroyed due to effect of chemicals and temperature used in the dye bath. To avoid such problem, interlining for garments to be dyed should have the following properties-

  • Interlining used in garments should take up equal amount of dyes and chemicals as the garments fabric take up.
  • Due to garments dyeing, bond strength between interlining and garments fabric should be unaffected.
  • Handle property of the interlining attached areas of garments should be as per expectation.
  • During garments dyeing resin present in the interlining may be pick up dye molecules. Hence color depth problem should not arise in the interlining areas of the garments with remaining areas of the garments.

Fusible Interlining

In the ready-made garments manufacturing industries fusible interlining is mostly used for making garments. The fusible interlining is composed of the following types of materials-

  1. Base fabric should be cotton
  2. Base fabric finishing should be done with Di-methynol Urea derivatives.
  3. Fusible resin coating temperature should be equal to 140˚c or more.

Basic Theory of Garments Dyeing

  • Depending on wet fastness requirement of fabric, garments made from cotton grey fabric are mainly dyed with direct dye and reactive dye.
  • For low color fastness direct dyes are used and for high color fastness reactive dyes are used for cotton garments.
  • If cotton garments are dyed with direct dyes then hand wash separately should be marked on the care lebel of the garments.
  • If reactive dyes are used for cotton garments dyeing then the following advantages may be gained-
  • Good level dyeing is achieved.
  • Dye migration and diffusion is better.
  • Color fastness is better.
  • Total color range is available.
  • If the cotton garments are dyed with reactive dyes, then two types of reactive dyes are available in the market, namely- Hot brand reactive dyes and Cold brand reactive dyes
  • Between these two brands of reactive dyes, hot brand reactive dyes are mostly used for garments dyeing. Because cotton garments dyeing with reactive dyes facilitates easier and quick dyeing process with reasonably good dyeing quality.

Cotton Garments Dyeing Process (dyed the garments in reactive dye)

Cotton garments made of grey fabric are dyed with reactive dyes. Before dyeing the garments need pre-treatment.

Pre-treatment process of 100 kg cotton garments are described below-

Desizing of Garment Dyeing :

Recipe :  garment dyeing

sample weight : 100 kg.

M:L = 1:5 ( liquor = 100X5 =500 liter)

Desizing agent : 2 g/l i.e 1 kg.

Leonil SR : 1 g/l i.e 0.5 kg.

Steam supply to raise temp.  : 90˚c

Processing time: 15 minutes.

Procedure:Rotery

Pigment Dyeing Process

Cationization Process:

  • Add 2-10% of STARCAT PD at room temperature
  • Adjust pH to 8.5 with soda ash and run for 10 minutes
  • Increase temperature to 50 oC at rate of 1 oC/minute and run for 15 minutes
  • Drain and re-fill at room temperature and rinse 5 minutes

Dyeing Process:

  • In new bath adjust pH to 9.0 by ammonia solution
  • Add pigment and binder and run for 10 minutes at room temperature then
  • increase temperature to 60 oC, run for 15 minutes then drain, rinse and dry

Drying and Curing:

  • After garment is dried, cure binder at 150 oC for 5 minutes
Prof. M Kenedy, London Metropolitan University, Dept of Textile Engineering.
Types of Needles . Mechanism of Butterfly Needle

Types of Needles . Mechanism of Butterfly Needle

What is Needles

There are different types of needles are developed day to day. In the early history of the human instinct of self-defense based, and made Clothes. Production technology was also very simple, is to use an awl made of animal bones do. Stitched weapon, these bones may only be used to pre-piercing cone to Lipi Sheng or Through the vines.  The use of animal bones, horn, ivory manufacturing. Made by bone, horn, ivory. 17500 BC in the first hole of the needle has come out root. Manufacturing 3500 BC copper is used in the needle. 1000 BC iron began to be applied to enhance hardness than in the past many. You can visit more about some types of needles replacement system

Types of Needles:

  • Knitting types of needles (circular knitting machine needles, sewing    machine needles cross)
  • Medical types of needles (surgery, minimally invasive surgical needles, acupuncture, medical america)
  • Instrument with a needle (flute, saxophone with a needle )
  • Electronic semiconductor with a needle (air filters, discharge needle, probe)
  • Nonwoven (needles)
  • Finishing with a needle
  • Hand stitches
  • Needle arts (ceramics, quilting)
  • Bur
  • Computerized embroidery needles
  • Schiffli lace with a embroidery needles
  • Costume with a needle (underwear, jeans, knitted …)
  • Leather (footwear) with a needle
  • Bindings with a needle
  • AD 1851 FRED. SCHMETZ GMBH (Blue Lion) was founded in Germany? Country Anchen
types of needles
Types of needles

METAL CONTAMINATION

  1. The in charge or nomination person should hold all the spares in a secured location, and only he shall be permitted to allocate to the operators.
  2. Mechanics must ensure that no needles are left on the machines after servicing
  3. The operator must not hold any spare needles.
  4. The issues of needles against broken needle should be one for one basis.
  5. Old and worn needles should be disposed off securely in a sealed container.
  6. If a needle breaks, all parts must be found or case defined (in case part of the fragments cannot be found) before the work is allowed to continue. The in charge must ensure that proper searches have been carried out if all the parts of the needle have not been located.

Major industrial burs manufacturers with Butterfly Needle:

  • SCHMETZ (Blue Lion): engaged in production in Germany and India.
  • GROZ-Beckert (Baker): engaged in the production or testing in Germany or India.
  • ORGAN (organ): engaged in production in Japan and Vietnam.
  • ORANGE (orange card): South Korea engaged in production.
  • TNC (Triumph Needle): engaged in production in Taiwan
  • Dotec (Dott needle): Production in Zhangzhou, Fujian
  • World every year on average produce about 600,000,0000 support industrial burs

Production Process of All Types of Needles:

Production Process of All Types of Needles
Production Process

Triumph Needle Company (TNC):

  • Tricyclic needles in 1978 in collaboration with the Japanese company Green wooden needles
  • 1988 Triumph Needle Corp. (TRIUMPH NEEDLE CORP.)
  • And West Germany Aires card (Lammertz needle GmbH.) Technical cooperation
  • Nearly 300 employees at the company’s services
  • Product Category: Industrial vehicles needles, knitting needles
  • Yield: about 250 branches
  • Major markets: China, Thailand, the Middle East, South America, Vietnam, more than 47 countries
  • Address: Taipei, Taiwan

Second, the material analyzed :/ Material report:

The company uses the best steel in Germany, with the most well-known of the Blue Lion needle (SCHMETZ NEEDLE) is the same supplier and is the same material, the German number is N100, similar to the Japanese steel SK3, is a high-carbon steel, but the difference is to add a small amount of N100 Cr (chromium), V (V) and Mn (manganese) alloys after heat treatment makes for a better performance in terms of hardness and toughness. N100 and the P (phosphorus), the impurity content of S (sulfur) can be said to approach zero, the purity is far better than the other countries in the current steel. It is the ball of the organization doing the best companies all over the world

Neede Illustration :

triumph needle ilustration
Needle ilustration

DBM: Blade diameter

HKFR:Length of scarf

DBO:Width of eye side

LAO:Butt to eye length

DDC:Tapered part diameter

LC:Shank to shoulder length

DK:Shank diameter

LDC:Shank to tapered part length

HT:Depth of scarf

LG:Total length

LK:Length of shank

OB:Eye width

OL:Length of eye

RBL:Width of groove

RGL:Depth of blade diameter without depth of groove

STEG: Depth of blade diameter without both sides depth of groove

Needlepoint Kits  – Sharp Point:

Sharp point means:- Tip of the Needle looks like  “V” shape.

Needlepoint Kits - Sharp Point
Sharp Point

Needlepoint Kits – BALL POINT:

Ball point means:- Tip of the Needle looks like  “U” shape.

Cause of Needle Cut:

  • Needle Size.
  • Size & Shape Of Needle Ball.
  • Needle Blade System & Shape.

How Can We Remove Needle Cut ?

  • Smaller needle size
  • Slim kn
  • KN+SPI
  • KK+KN
  • SPI POINT

Skipped Stitches:

  • Larger Needle Size
  • NY Needle
  • USP Shape Needle
  • USP Needle

Seam Puckering

  • Smaller needle size
  • Slim kn
  • Spi point
  • KN+SPI
  • KK+KN

Seam Puckering Construction Rules:

  • Must be use correct needle for the material/ product, e.g. rounded top of needle on knits
  • Must not use needles with blunt point, this to avoid fabric damage
  • Must stitch density should generally be 4 – 5 stitches/ cm, 10 – 12.5 stitches/ inch but must
  • be suitable for the specific product and thread
  • Must all exposed seams must be over-locked or covered with binding/ tape, if no other instructions have been given
  • Must have elasticity on seams matching to the product’s quality
  • Must use suitable thread tension/ elasticity matching to the material/ product
  • Must have an even and equal length on stitches
  • Seam puckering must use 4 thread over lock
  • Must have an even seam allowance, minimum 7 mm wide, after over locking. Width on seam
  • Seam puckering must allowance must be suitable for the actual material, e.g. some heavy knits need wider
  • Must seam allowance to keep stable
  • Must have no puckering/ stretched out seams, if no other instructions has been given
  • Must not have joint stitches at visible areas
  • Seam puckering must have tape/ reinforcement at shoulder seams
  • Must be stretchable enough to meet minimum extended neck measurement
  • Must 2 – needle top stitches should be made by 2-needle machine

Needle Selection Logic:

  1. The external structure of the first election of the first needle. A. nature of the car object.
  2. Soft and hard
  3. Thick and thin
  4. Fever or heat degree
  5. Impact resistance  B. Sewing Machine want to accomplish a step performance needle hole as small as possible (breakage rates may be higher) Measures: SPI, KN, KN + SPI, or drop the more straight stitch one. b better. (rigid needle is better)  responses enhanced needle dry, a bigger needle
  6. is the car color or adhesive under layer material not to be brought to the surface (decrease destructive) Measures: KN + SPI, HS + CL + CM design
  7. functional or decorative effect (touch, thick line) Countermeasures : S, LR, LE
  8. holes to increase the rate of low-jumper (and outlet must be high, hook line space to more) Measures: USP design
  9. After the election of the structure, with a fit of the coating, further extending the life of the needle or
  10. lower penetration resistance of titanium Long life ceramic membrane
  11. Long life, reducing heat generation
  12. Polymer film anti-adhesion, reduce heat to produce
  13. diamond films – long life, anti-adhesion, reducing heat generation

Application of Butterfly Needle:

Sharp round point : Standard for blind stitch needles. For precise stitch sequences in lockstitch operations. A sensitive point, susceptible to damage.

Application of Butterfly Needle
Sharp Round

Example: Blouses, fine skirts and trousers, curtains

Round point with slightly rounded tip: Standard for all chain stitch operations

Application of Butterfly Needle - Round Point
Round Point

Example: For fine, sensitive knitted fabrics, micro fiber, multi head embroidery

Regular round point: Most common for all kinds of lockstitch applications particularly for woven fabrics, artificial leather, coated fabrics.

Application of Butterfly Needle - Regular Point
Regular Point

Example: Shirts, trousers, various kinds of garments

Light ball point: For knitted fabrics and for wovens.

Example: T-shirts, underwear, fine sweaters

Application of Butterfly Needle
Application of Butterfly Needle 3 Point

Medium ball point: For elastic fabrics with Rubber or elastomeric contents.

Example: Sweaters, lace, under wear, Schiffli embroidery

Heavy ball point: For very coarse and open structured elastic fabrics.

Example: Sweaters, cardigans

Special ball point: For warp fabrics with high elastomeric contents.

Example: Underwear, orthopedic Clothes

Special ball point: For Schiffli embroidery applications.

Example: Curtains, tablecloth

Coating Needles:

  • Reduce Adhesion Trouble
  • Ceramic Coating Needle (CM)
  • Diamond Like Film Coating Needle (DLC)
  • Heat Proof Coating Needle (HP)
  • PVD Coating Needle
  • KN+SPI Needle
Coating titanium needles
Coating needles

Features Titanium Needles:

  • HV 2000 ultra-high hardness
  • Beyond corrosive resistant stainless steel
  • Durable high penetration
  • Reduce the cost of the best weapon
  • 2-3 times the life of traditional titanium needles
Features Titanium Needles
Titanium Needles
Engr. Kh. Mashiur Rahman, Garments Auto Machine Technologist, Web: www.autogarment.com, Email: [email protected], Cell: +88 017 92 52 53 54
IT Security Policy for Apparel Industry

IT Security Policy for Apparel Industry

IT Security Policy

IT security policy and Developments in Information and Communication Technologies (information communication technology) are transforming the Organaisation in dramatic ways. These developments are creating thereto unimaginable opportunies and possibilies, even as they post new challenges for a Organaisation like PROJECT STCH. In the garments production processes of today’s world, information and knowledge means a countless deal more than material resources and physical inputs. information communication technology has opened up the possibily of radically different information exchange patterns by facilating faster and more efficient distribution of information technology. We can visit more about C TPAT IT Security Policy

can be play a vigorous role in sustaining the culture of the PROJECT STCH ensuring a top grade of transparency and liabily in supremacy information communication technology. Information Technology Enabled Services (ES) have by now turned into major sectors of governance activy in the business world. Over the past one-and-half decades, these sectors have shown remarkable contribution to the growth of the Organaisation. In every sector of PROJECT STCH, information communication technology now playing an important ruless in optimizing the processes, thereby refining the qualy and efficiency of production, human endeavors and governance. PROJECT STCH has a comprehensive view of information communication technology as a vehicle for transforming PROJECT STCH into a most efficient and effective Organaisation in the market by implementing INFORMATION COMMUNICATION TECHNOLOGY in every sector for achieving the goal of the Organaisation.

Secury of systems for PROJECT STCH has therefore gained much greater in importance and ensure that such dangers are suitablely recognized and managed. Moreover Information and information technology systems are essential assets of the Organaisation and as well as for their customers and stake- holders. Information assets are dangerous when these are in wrong hand. Protection and maintenance of these assets are crical to the organizations’ sustainabily. Organaisation must take the responsibily of protecting the information from unauthorized system access, modification, disclosure and destruction to protect stake holder’s interest.

PROJECT STCH’s MIS team has prepared an  Policy as a guideline for Information & Communication Technology (information communication technology) for Organaisation to be used as a minimum requirement and as appropriate to the grade of computerization of their operations.

Scope of IT Security Policy

This if Policy is a systematic approach to policies required to be formulated for  and also to ensure secury of information and information systems. This Guideline covers all information technology that iare electronically made, received, stored, printed, scanned, and typed. The provisions of this Guideline apply to:

  • PROJECT STCH for all of their  systems
  • All activies and operations required for ensuring data secury including facily design, physical secury, network secury as well as disaster recovery and business continuy planingning, use of hardware and software, data disposal, and protection of copyrights and other intellectual suitablety rights

Objectives of IT Security Policy

This Guideline defines the minimum requirements to which  departments must adhere. The primary objectives of the Guideline are:

  1. To establish a standard Policy &  Management for it security policy
  2. To help the Organaisation for secured and stable setup of s platform
  3. To establish a secured environment for the processing of data
  4. To identify information secury risks and their management
  5. To communicate the responsibilies for the protection of information
  6. Priorize information and information systems that are to be protected
  7. System user awareness and training regarding information secury
  8. Procedure of periodic review of the policy & secury measures

Physical Security Policy

PROJECT STCH requires that sound business and management practices to be implemented in the workplace to ensure that information and technology resources are correctly protected.  is the duty of each departments to protect technology resources from unauthorized system access in terms of both physically hardware and data viewpoints. In fact the effective secury measure of assets in the garment factory is a responsibily held jointly by management and employees. Physical secury involves providing environmental guards as well as controlling physically system access to device and data. The following list of guards methods where believed to be practical and reasonable and reflective of sound business practices.

Physical Security Policy – Server Room Security

  • Server room must have a glass enclosure wh lock and key wh a responsible person of the dept.
  • Physical system access should be restrInformation Communication Technology, visors log must exist and to be maintained for server room.
  • System access authorization chart must be maintained and reviewed on regular basis.
Physical Security Policy - Server Room Security
Server Room Security

Environmental And Physical Security Policy

  • Desktop screen must be locked and server room security must have password protected screen brand saver that should activate after 10 seconds.
  • Administrative password of Operating procedure and kept in vault.
  • System user creation request form should be maintained.
  • Provision to replace the server room security whin quickest possible time in case of any disaster.
  • server room security should be air-condioned. Power Generator should be in place to continue operations in case of power failure.
  • UPS supply to the server during power failure.
  • Suitable attention must be wh too many device.

Fire Protection

  • Channel alongside the wall to be prepared for allow all the cabling nedd to be in neat and safe posion wh the layout of power supply and data cables.
  • Fire extinguisher needs to be placed outdoor of the server room security. This must be maintained and reviewed on an annual basis.
  • Suitable earthen of electricy to be ensured.
Fire Protection physical security policy
Fire Protection

Physical Security Policy And Guideline For Data Center

Data Center System access

  1. Data Centre must be restrInformation Communication Technology area and unauthorized system access is prohibed.
  2. Number of entrance into the Data Centre should be limed, locked and securedd.
  3. System access Authorization procedures should exist and apply to all persons (e.g employees and suppliers). Unauthorized individuals and cleaning crews must be escorted during their stay in the Data Centre.
  4. Organaisation should maintain System access Authorization list, documenting individuals who are authorized to system access the data centre, reviewed and latest periodically.
  5. System access log wh date and time, should be maintained documenting individuals who have system accessed the data centre.
  6. Visor Log should exist and need to be maintained.
  7. Secury guard should be available for 24 hours.
  8. There should be Emergency ex door available.
data center physical security
Data center security

Data Center Physical Security

  1. Sufficient documentation is required regarding the physical layout of the data centre.
  2. Documentation regarding the layout of power supplies of the data center physical security and network connectivy to be prepared.
  3. Floors to be raised wh removable square blocks or channel alongside the wall to be prepared, which allow all the data and power cabling to be in neat and safe posion.
  4. Any system accessories, not related to data center physical security should not be allowed to be stored in the Data Centre.
  5. Existence of Closed Circu Television (CCTVs) camera is required and to be monored.
    Data Centre must show the sign of “No eating, drinking or smoking.”
  6. Vehicles for any emergency purpose should always be available on se.
  7. Address and telephone or mobile numbers of all contact persons (e.g. Fire service, police station, service providers, supplier and all  personal) should be available to cope wh any emergency suation.
  8. Suitable attention must be given wh regard to overloading of electrical outlets wh too many device. Suitable and practical usage of extension cords should be reviewed annually in the office environment.
  9. The following computer environmental controls to be installed.
  10. Uninterruptible power supply (UPS) wh backup uns
  11. Backup Power Supply
  12. Temperature and humidy measuring device
  13. Air condioners wh backup uns
  14. Water leakage precautions and water drainage system from
  15. Air condioner
  16. Emergency power cut-off swches
  17. Emergency lighting arrangement
  18. Dehumidifier to be installed
  19. Fire Protection
  20. The Data Centre wall/ceiling/door should be fire resistant.
  21. Fire suppression device should be installed.
  22. Procedures must exist for giving the immediate alarm of a fire, and reporting the fire services and to be periodically tested.
  23. There should be Fire detector below the raised floor, if is raised.
  24. Electric cables in the Data Centre must maintain a qualy and concealed.
  25. Any flammable ems should not be kept in the Data Centre.

Physical Secury Guideline for Other Computers

Computers in other departmentss

  1. The PC running the other departments must be placed in the office room which can be lock and key from outside environment and held by a responsible person.
  2. System access authorization list must be maintained and reviewed on regular basis.

Environmental

  1. Operator must have the desktop password only known to him.
  2. PC must have password-protected screenbrand saver which should activate after 5 minute of inactivy.

Fire Protection

  1. Power distribution board for the PC wh a circu breaker should be placed outside the enclosure and covered wh a box under lock and key held by the Operator.
  2. Power and other connecting cables for PCs must be kept securedd from physical damage.
  3. UPS for backup power supply to be placed in the enclosure.
  4. Power supply of the PC should be swched off before leaving the branch.
  5. Fire extinguishers wh expiry date mentioned, to be placed beside the Power distribution board. This must be maintained and reviewed on an annual basis.
  6. Suitable earthen of electricy to be ensured.

Data Encryption 

There is mechanism in place to encrypt and decrypt the highly sensive data traveling through WAN or public network.

Anti Virus Protection

Anti Virus Protection
Anti Virus Protection
  1. There should be Anti-Virus installed in each server and computer whether is connected to LAN or not.
  2. Virus auto protection or auto protection mode should be enabled.
  3. The antivirus software is always latest wh the latest virus definion file.
  4. All System users are well-trained and informed about computer virus and their protection mechanism.
  5. There are procedures in place, which require that all the incoming e-email messages are scanned for virus to protect virus infection to the Organaisation’s network.

Internet and e-email

  • All Internet facily should be routed through a System lan firewall for PCs connected to network.
  • Illegal, irrelevant and injurious traffic should not be routed.
  • No System user should use personal e-email web-email account whout authorization of the network administrator.
  • System user wh web browsing should not fry to system access unnecessary, irrelevant, web ses.
  • System user wh web browsing should not download any file, software or any other shortcut whout the authorization of the net user administrator

Email Management

Net User Administrator Grade Duties:

  • Email server or exchange server should be password protected
  • All the eemail ID should be password protected and used by 1 System user only.
  • In case of group eemail ID, System user system access should be limed by the system administrator.
  • Email databases should be backed up periodically.
  • Suitable documentation should be maintained while creating, altering and giving system access permission to any group eemail ID.
  • Virus protection should be ensured and black listed lOs and domains should be regularly managed.
  • Only net user administrator should have the permission to delete email.
net user administrator
Net User Administrator

System user Duties

Email System user should not misuse the eemail account for personal or any other reasons

  • System users should not go through junk emails.
  • System users should not execute any file sent from any unknown System user or any unknown file format.
  • System user should not sent same email to more then 20 System users at a time.
  • System user should check the recipients list of any email suitablely to protect securedd data from unwanted recipients.
  • System user should to send unnecessary and unwanted attach files.
  • System user should handover his/ her System user ID and Password to the departments head over or email and net user administrator when they are leaving Organaisation or going for a holiday.

Application and Database Software:

PROJECT STCH has expert teem to develop customized software themselves. But most of the software systems are outsourced according to the need of the Organaisation and requirement of the buyers.  policy enforces the following ruless for using outsourced system and software:

  1. Organaisation must use original software.
  2. Licenses must be renewed time to time to maintain performance.

Secury and stake holder’s interests:

The  policies of the Organaisation lim the employee system access to the Organaisation’s information by System user ID and Password. Each of every System user ID is guided by customized authentication grade which is control by the  administrators and each departments’s head. System user system access and authentication control is fully automated by the smart application software, Database Administration and Domain Name System.

Net User Administrator Duties:

  • System user creation and system access authentication should be followed by Application and Departments rules.
  • Each of System users should have a unique password protected System user ID.

System user Grade Duties

  • System user must not share thefr System user ID and password wh others.
  • Departments’s superiors should not recommend excessive system access to any System user.
  • Any kind of error and failure should be informed to the application net user administrator.

Secury Seals for Application System users:

  1. Valid and allowed System user ID and Password is mandatory to system access any system in the Organaisation.
  2. There should keep detail profile for every correspondent System user ID.
  3. For every application should keeps stamps of System user ID for every activy in the database.

Shipping Documents, Forms and Data:

  1. Shipping forms, Documents and Data should be handled by only authenticated System users and employees.
  2. Data manipulations, Form filling and Documents printing should be done only by valid and active System user.
  3. Printings of shipping documents should be done only in a separated printer which is restrInformation Communication Technology from the system access of unauthorized employees.
  4. Printed documents, forms, etc should be handled by only authenticated employees, kept in a securedd separated place and shattered after use.

Adjust or Rescind System user System access:

  1. Organaisation should the procedure to adjust or rescind System user system access to the applications.
  2. Every departments should review departmentsal organogram every month and update every body’s system access permission.

IT Disaster Recovery Plan Checklist

The BCP should take into account the backup and recovery process. Keeping this into consideration this part covers BCP, Disaster Recovery Planing and Backup / Restore planing.

IT Disaster Recovery Plan Checklist
IT Disaster Recovery

It Security Policy – Business Continuy Planing (BCP)

There must be a Business Continuy Planing (in line wh business) for H’ in place.

  • All the documents related to business continuy and it disaster recovery plan checklist must be kept in a safe/securedd off se location. One copy can be stored in the office for ready reference.
  • BCP must contains the followings:
    • Action planing for i) during office hours disaster, ii) outside office hours disaster, and iii) immediate and long term action planing in the line wh business
    • Emergency contacts, address and phone numbers including venders
    • Crab list of ems such as backup tapes, laptop or notebooks etc.
    • Disaster recovery se map
    • Review of BCP must be done at least once a year.

IT Disaster Recovery Plan Checklist With Planing

  • A Disaster Recovery Se (DRS) must be in place replicating the data center physical security (Production Se).
  • DR se must be at a minimum of 10 kilometers (radius) of distance from the ‘production’ se.
  • DR se is equipped wh compatible hardware and telecommunications device to support the live systems in the event of a it disaster recovery plan checklist.
  • Physical and environmental secury at the DR se is appropriate.
  • Information secury is suitablely maintained throughout the failback and DR recovery process.
  • An up-to-date and tested copy of the DR planing is securedly held off- se. DR planings exist for all the crical services where DR requirement is agreed wh the business.
  • DR test is successfully carried out at least once a year.
  • DR Test documentation should include at a minimum:
    • Scope – defines scope of planingned tests – expected success creria
    • Planing – detailed actions wh timetable
    • Test Results

It Security Policy – Service Provider Management

  1. There should be Service Grade Deed between the supplier and Organaisation.
  2. The Annual Maintenance Contact (AMC) wh the supplier should be active and currently in force.
  3. The System user se should ensure that the device does not contain sensive live data when hardware are taken by the suppliers for servicing / repair.
  4. Service Contracts wh all service providers including third-party suppliers should include:
    1.  
    2. Measurable service/deliverables
    3. Timing/schedules, i.e. service grades
    4. Confidentialy clause
    5. Contact person names (on daily operations and relationship grades)
    6. Roles and responsibilies of contracting parties, including an escalation matrix
    7. Renewal period
    8. Modification clause
    9. Frequency of service reporting
    10. Termination clause
    11. Warranties, including service suppliers’ employee liabilies, 3rd party liabilies and the related remedies
    12. Geographical locations covered
    13. Ownership of hardware and software
    14. Documentation to be maintained (e.g. logs of changes, records of reviewing event logs)
    15. Aud rights of system access (internal aud, external aud, other aud as may be appropriate).

It Security Policy – Out Sourcing

Outsourcing activies to be evaluated based on the following practices:

  1. The objective behind Outsourcing
  2. The economic viabily
  3. The risks and secury concerns
  4. Arrangements for obtaining the source code for the software

It Security Policy – Backup E Restore

  • There is a documented back up procedure.
  • Backup copies of information are stored off-se at a geographically separate and safe environment.
  • There is at least one backup copy kept on-se for time crical delivery.
  • The backup cycle is based on the following:
    • At least 6-days (week) daily cycle
    • At least 6-month monthly cycle
    • At least 1-year yearly cycle
backup e restore
Backup and Restore
  • The backup e restore media is sent off-se immediately after the backs up have been taken.
  • The backup e restore log sheet is maintained; checked & signed by supervisor
  • The backup inventory is maintained, checked & signed by supervisor.
  • The abily to restore from backup media is tested at least quarterly as a part of it security policy
  • Backup e restore Media must be labeled suitablely indicating contents, date etc.
Engr. Kh. Mashiur Rahman, Garments Auto Machine Technologist, Web: www.autogarment.com, Email: [email protected], Cell: +88 017 92 52 53 54