IT Security Policy for Apparel Industry

IT Security Policy for Apparel Industry

IT Security Policy

IT security policy and Developments in Information and Communication Technologies (information communication technology) are transforming the Organaisation in dramatic ways. These developments are creating thereto unimaginable opportunies and possibilies, even as they post new challenges for a Organaisation like PROJECT STCH. In the garments production processes of today’s world, information and knowledge means a countless deal more than material resources and physical inputs. information communication technology has opened up the possibily of radically different information exchange patterns by facilating faster and more efficient distribution of information technology. We can visit more about C TPAT IT Security Policy

can be play a vigorous role in sustaining the culture of the PROJECT STCH ensuring a top grade of transparency and liabily in supremacy information communication technology. Information Technology Enabled Services (ES) have by now turned into major sectors of governance activy in the business world. Over the past one-and-half decades, these sectors have shown remarkable contribution to the growth of the Organaisation. In every sector of PROJECT STCH, information communication technology now playing an important ruless in optimizing the processes, thereby refining the qualy and efficiency of production, human endeavors and governance. PROJECT STCH has a comprehensive view of information communication technology as a vehicle for transforming PROJECT STCH into a most efficient and effective Organaisation in the market by implementing INFORMATION COMMUNICATION TECHNOLOGY in every sector for achieving the goal of the Organaisation.

Secury of systems for PROJECT STCH has therefore gained much greater in importance and ensure that such dangers are suitablely recognized and managed. Moreover Information and information technology systems are essential assets of the Organaisation and as well as for their customers and stake- holders. Information assets are dangerous when these are in wrong hand. Protection and maintenance of these assets are crical to the organizations’ sustainabily. Organaisation must take the responsibily of protecting the information from unauthorized system access, modification, disclosure and destruction to protect stake holder’s interest.

PROJECT STCH’s MIS team has prepared an  Policy as a guideline for Information & Communication Technology (information communication technology) for Organaisation to be used as a minimum requirement and as appropriate to the grade of computerization of their operations.

Scope of IT Security Policy

This if Policy is a systematic approach to policies required to be formulated for  and also to ensure secury of information and information systems. This Guideline covers all information technology that iare electronically made, received, stored, printed, scanned, and typed. The provisions of this Guideline apply to:

  • PROJECT STCH for all of their  systems
  • All activies and operations required for ensuring data secury including facily design, physical secury, network secury as well as disaster recovery and business continuy planingning, use of hardware and software, data disposal, and protection of copyrights and other intellectual suitablety rights

Objectives of IT Security Policy

This Guideline defines the minimum requirements to which  departments must adhere. The primary objectives of the Guideline are:

  1. To establish a standard Policy &  Management for it security policy
  2. To help the Organaisation for secured and stable setup of s platform
  3. To establish a secured environment for the processing of data
  4. To identify information secury risks and their management
  5. To communicate the responsibilies for the protection of information
  6. Priorize information and information systems that are to be protected
  7. System user awareness and training regarding information secury
  8. Procedure of periodic review of the policy & secury measures

Physical Security Policy

PROJECT STCH requires that sound business and management practices to be implemented in the workplace to ensure that information and technology resources are correctly protected.  is the duty of each departments to protect technology resources from unauthorized system access in terms of both physically hardware and data viewpoints. In fact the effective secury measure of assets in the garment factory is a responsibily held jointly by management and employees. Physical secury involves providing environmental guards as well as controlling physically system access to device and data. The following list of guards methods where believed to be practical and reasonable and reflective of sound business practices.

Physical Security Policy – Server Room Security

  • Server room must have a glass enclosure wh lock and key wh a responsible person of the dept.
  • Physical system access should be restrInformation Communication Technology, visors log must exist and to be maintained for server room.
  • System access authorization chart must be maintained and reviewed on regular basis.
Physical Security Policy - Server Room Security
Server Room Security

Environmental And Physical Security Policy

  • Desktop screen must be locked and server room security must have password protected screen brand saver that should activate after 10 seconds.
  • Administrative password of Operating procedure and kept in vault.
  • System user creation request form should be maintained.
  • Provision to replace the server room security whin quickest possible time in case of any disaster.
  • server room security should be air-condioned. Power Generator should be in place to continue operations in case of power failure.
  • UPS supply to the server during power failure.
  • Suitable attention must be wh too many device.

Fire Protection

  • Channel alongside the wall to be prepared for allow all the cabling nedd to be in neat and safe posion wh the layout of power supply and data cables.
  • Fire extinguisher needs to be placed outdoor of the server room security. This must be maintained and reviewed on an annual basis.
  • Suitable earthen of electricy to be ensured.
Fire Protection physical security policy
Fire Protection

Physical Security Policy And Guideline For Data Center

Data Center System access

  1. Data Centre must be restrInformation Communication Technology area and unauthorized system access is prohibed.
  2. Number of entrance into the Data Centre should be limed, locked and securedd.
  3. System access Authorization procedures should exist and apply to all persons (e.g employees and suppliers). Unauthorized individuals and cleaning crews must be escorted during their stay in the Data Centre.
  4. Organaisation should maintain System access Authorization list, documenting individuals who are authorized to system access the data centre, reviewed and latest periodically.
  5. System access log wh date and time, should be maintained documenting individuals who have system accessed the data centre.
  6. Visor Log should exist and need to be maintained.
  7. Secury guard should be available for 24 hours.
  8. There should be Emergency ex door available.
data center physical security
Data center security

Data Center Physical Security

  1. Sufficient documentation is required regarding the physical layout of the data centre.
  2. Documentation regarding the layout of power supplies of the data center physical security and network connectivy to be prepared.
  3. Floors to be raised wh removable square blocks or channel alongside the wall to be prepared, which allow all the data and power cabling to be in neat and safe posion.
  4. Any system accessories, not related to data center physical security should not be allowed to be stored in the Data Centre.
  5. Existence of Closed Circu Television (CCTVs) camera is required and to be monored.
    Data Centre must show the sign of “No eating, drinking or smoking.”
  6. Vehicles for any emergency purpose should always be available on se.
  7. Address and telephone or mobile numbers of all contact persons (e.g. Fire service, police station, service providers, supplier and all  personal) should be available to cope wh any emergency suation.
  8. Suitable attention must be given wh regard to overloading of electrical outlets wh too many device. Suitable and practical usage of extension cords should be reviewed annually in the office environment.
  9. The following computer environmental controls to be installed.
  10. Uninterruptible power supply (UPS) wh backup uns
  11. Backup Power Supply
  12. Temperature and humidy measuring device
  13. Air condioners wh backup uns
  14. Water leakage precautions and water drainage system from
  15. Air condioner
  16. Emergency power cut-off swches
  17. Emergency lighting arrangement
  18. Dehumidifier to be installed
  19. Fire Protection
  20. The Data Centre wall/ceiling/door should be fire resistant.
  21. Fire suppression device should be installed.
  22. Procedures must exist for giving the immediate alarm of a fire, and reporting the fire services and to be periodically tested.
  23. There should be Fire detector below the raised floor, if is raised.
  24. Electric cables in the Data Centre must maintain a qualy and concealed.
  25. Any flammable ems should not be kept in the Data Centre.

Physical Secury Guideline for Other Computers

Computers in other departmentss

  1. The PC running the other departments must be placed in the office room which can be lock and key from outside environment and held by a responsible person.
  2. System access authorization list must be maintained and reviewed on regular basis.

Environmental

  1. Operator must have the desktop password only known to him.
  2. PC must have password-protected screenbrand saver which should activate after 5 minute of inactivy.

Fire Protection

  1. Power distribution board for the PC wh a circu breaker should be placed outside the enclosure and covered wh a box under lock and key held by the Operator.
  2. Power and other connecting cables for PCs must be kept securedd from physical damage.
  3. UPS for backup power supply to be placed in the enclosure.
  4. Power supply of the PC should be swched off before leaving the branch.
  5. Fire extinguishers wh expiry date mentioned, to be placed beside the Power distribution board. This must be maintained and reviewed on an annual basis.
  6. Suitable earthen of electricy to be ensured.

Data Encryption 

There is mechanism in place to encrypt and decrypt the highly sensive data traveling through WAN or public network.

Anti Virus Protection

Anti Virus Protection
Anti Virus Protection
  1. There should be Anti-Virus installed in each server and computer whether is connected to LAN or not.
  2. Virus auto protection or auto protection mode should be enabled.
  3. The antivirus software is always latest wh the latest virus definion file.
  4. All System users are well-trained and informed about computer virus and their protection mechanism.
  5. There are procedures in place, which require that all the incoming e-email messages are scanned for virus to protect virus infection to the Organaisation’s network.

Internet and e-email

  • All Internet facily should be routed through a System lan firewall for PCs connected to network.
  • Illegal, irrelevant and injurious traffic should not be routed.
  • No System user should use personal e-email web-email account whout authorization of the network administrator.
  • System user wh web browsing should not fry to system access unnecessary, irrelevant, web ses.
  • System user wh web browsing should not download any file, software or any other shortcut whout the authorization of the net user administrator

Email Management

Net User Administrator Grade Duties:

  • Email server or exchange server should be password protected
  • All the eemail ID should be password protected and used by 1 System user only.
  • In case of group eemail ID, System user system access should be limed by the system administrator.
  • Email databases should be backed up periodically.
  • Suitable documentation should be maintained while creating, altering and giving system access permission to any group eemail ID.
  • Virus protection should be ensured and black listed lOs and domains should be regularly managed.
  • Only net user administrator should have the permission to delete email.
net user administrator
Net User Administrator

System user Duties

Email System user should not misuse the eemail account for personal or any other reasons

  • System users should not go through junk emails.
  • System users should not execute any file sent from any unknown System user or any unknown file format.
  • System user should not sent same email to more then 20 System users at a time.
  • System user should check the recipients list of any email suitablely to protect securedd data from unwanted recipients.
  • System user should to send unnecessary and unwanted attach files.
  • System user should handover his/ her System user ID and Password to the departments head over or email and net user administrator when they are leaving Organaisation or going for a holiday.

Application and Database Software:

PROJECT STCH has expert teem to develop customized software themselves. But most of the software systems are outsourced according to the need of the Organaisation and requirement of the buyers.  policy enforces the following ruless for using outsourced system and software:

  1. Organaisation must use original software.
  2. Licenses must be renewed time to time to maintain performance.

Secury and stake holder’s interests:

The  policies of the Organaisation lim the employee system access to the Organaisation’s information by System user ID and Password. Each of every System user ID is guided by customized authentication grade which is control by the  administrators and each departments’s head. System user system access and authentication control is fully automated by the smart application software, Database Administration and Domain Name System.

Net User Administrator Duties:

  • System user creation and system access authentication should be followed by Application and Departments rules.
  • Each of System users should have a unique password protected System user ID.

System user Grade Duties

  • System user must not share thefr System user ID and password wh others.
  • Departments’s superiors should not recommend excessive system access to any System user.
  • Any kind of error and failure should be informed to the application net user administrator.

Secury Seals for Application System users:

  1. Valid and allowed System user ID and Password is mandatory to system access any system in the Organaisation.
  2. There should keep detail profile for every correspondent System user ID.
  3. For every application should keeps stamps of System user ID for every activy in the database.

Shipping Documents, Forms and Data:

  1. Shipping forms, Documents and Data should be handled by only authenticated System users and employees.
  2. Data manipulations, Form filling and Documents printing should be done only by valid and active System user.
  3. Printings of shipping documents should be done only in a separated printer which is restrInformation Communication Technology from the system access of unauthorized employees.
  4. Printed documents, forms, etc should be handled by only authenticated employees, kept in a securedd separated place and shattered after use.

Adjust or Rescind System user System access:

  1. Organaisation should the procedure to adjust or rescind System user system access to the applications.
  2. Every departments should review departmentsal organogram every month and update every body’s system access permission.

IT Disaster Recovery Plan Checklist

The BCP should take into account the backup and recovery process. Keeping this into consideration this part covers BCP, Disaster Recovery Planing and Backup / Restore planing.

IT Disaster Recovery Plan Checklist
IT Disaster Recovery

It Security Policy – Business Continuy Planing (BCP)

There must be a Business Continuy Planing (in line wh business) for H’ in place.

  • All the documents related to business continuy and it disaster recovery plan checklist must be kept in a safe/securedd off se location. One copy can be stored in the office for ready reference.
  • BCP must contains the followings:
    • Action planing for i) during office hours disaster, ii) outside office hours disaster, and iii) immediate and long term action planing in the line wh business
    • Emergency contacts, address and phone numbers including venders
    • Crab list of ems such as backup tapes, laptop or notebooks etc.
    • Disaster recovery se map
    • Review of BCP must be done at least once a year.

IT Disaster Recovery Plan Checklist With Planing

  • A Disaster Recovery Se (DRS) must be in place replicating the data center physical security (Production Se).
  • DR se must be at a minimum of 10 kilometers (radius) of distance from the ‘production’ se.
  • DR se is equipped wh compatible hardware and telecommunications device to support the live systems in the event of a it disaster recovery plan checklist.
  • Physical and environmental secury at the DR se is appropriate.
  • Information secury is suitablely maintained throughout the failback and DR recovery process.
  • An up-to-date and tested copy of the DR planing is securedly held off- se. DR planings exist for all the crical services where DR requirement is agreed wh the business.
  • DR test is successfully carried out at least once a year.
  • DR Test documentation should include at a minimum:
    • Scope – defines scope of planingned tests – expected success creria
    • Planing – detailed actions wh timetable
    • Test Results

It Security Policy – Service Provider Management

  1. There should be Service Grade Deed between the supplier and Organaisation.
  2. The Annual Maintenance Contact (AMC) wh the supplier should be active and currently in force.
  3. The System user se should ensure that the device does not contain sensive live data when hardware are taken by the suppliers for servicing / repair.
  4. Service Contracts wh all service providers including third-party suppliers should include:
    1.  
    2. Measurable service/deliverables
    3. Timing/schedules, i.e. service grades
    4. Confidentialy clause
    5. Contact person names (on daily operations and relationship grades)
    6. Roles and responsibilies of contracting parties, including an escalation matrix
    7. Renewal period
    8. Modification clause
    9. Frequency of service reporting
    10. Termination clause
    11. Warranties, including service suppliers’ employee liabilies, 3rd party liabilies and the related remedies
    12. Geographical locations covered
    13. Ownership of hardware and software
    14. Documentation to be maintained (e.g. logs of changes, records of reviewing event logs)
    15. Aud rights of system access (internal aud, external aud, other aud as may be appropriate).

It Security Policy – Out Sourcing

Outsourcing activies to be evaluated based on the following practices:

  1. The objective behind Outsourcing
  2. The economic viabily
  3. The risks and secury concerns
  4. Arrangements for obtaining the source code for the software

It Security Policy – Backup E Restore

  • There is a documented back up procedure.
  • Backup copies of information are stored off-se at a geographically separate and safe environment.
  • There is at least one backup copy kept on-se for time crical delivery.
  • The backup cycle is based on the following:
    • At least 6-days (week) daily cycle
    • At least 6-month monthly cycle
    • At least 1-year yearly cycle
backup e restore
Backup and Restore
  • The backup e restore media is sent off-se immediately after the backs up have been taken.
  • The backup e restore log sheet is maintained; checked & signed by supervisor
  • The backup inventory is maintained, checked & signed by supervisor.
  • The abily to restore from backup media is tested at least quarterly as a part of it security policy
  • Backup e restore Media must be labeled suitablely indicating contents, date etc.
Engr. Kh. Mashiur Rahman, Garments Auto Machine Technologist, Web: www.autogarment.com, Email: sales@autogarment.com, Cell: +88 017 92 52 53 54
Prevention of Sharp Machine Tools in Garments

Prevention of Sharp Machine Tools in Garments

Sharp Tools

Examples of sharp tools are – Scissors, Clippers, Kimball/Tag guns, Knives, Drill hole spikes, Notch punchers, Tweezers, Cutting pins (if used on stripes, plaids and checks). All sharp tools are accounted for and issuing to the workforce by store officer with a cross reference to stock levels of that particular tool to ensure full traceability at all times. If any of the below are found in a garment, they can cause serious injury or a potential hazard to the ultimate customer, result in customer complaints as well as a possible serious fine, which can amount to thousands of money.

A garments Group is fully responsible to ensure that effective measures are in place to prevent any metal contamination such as:

  • Needle parts
  • Machine sewing needles
  • Hand sewing needles
  • Tag gun needles
  • Staples
  • Pins
  • Gimlet
  • stray clippers
  • Scissors
  • Cutters
  • Knife
  • Vertical Knife
  • Handy cutter
  • Bundling wire
  • Mechanic tools such as screwdrivers, hammers etc.
  • Broken glass
  • prong snaps
  • rivets
  • Hardware from machinery, such as nuts, bolts, screws etc.
  • personal effects or jewellery parts

Standard Operating Procedures for Sharp Tool Control

sharp machine tools

Sharp Tools:Sharp tools refers to metal and non metal components having sharp edge which may lead to injury or uneasiness/itching/irritation on contact.

Garment industry uses Sharp tools extensively and thus it is very important to control the issue, movement and disposal of Sharp Tools properly and maintain the accountability for the same.

Various Sharp Tools being used in Garment Industry: Following are various sharp tools which are extensively used in the garment industry:

  • Sewing Needles
  • Thread Cutter
  • Scissor
  • Cutting Pins/ Notchers/ M/C Knife
  • Cutting Clamps
  • Loose Metal M/C Parts

Sharp Tool Control Practices:Below mentioned are set of industrial practices which need to be followed strictly to avoid any injury to any person (this includes both the categories of people; who are involved in manufacturing of the product and also the consumers who shall be purchasing and using/wearing the garment) and to avoid any chances of Sharp Objects being shipped.

  1. Usage of Sharp tools
    • All the cutters and scissors must be tied with a string and must not be kept loose on machine, table or in surroundings of work place. They can injure any individual or can cause damage to garments. Cutter/Scissors must be tied by using string of length that after hanging down from work place the distance from floor is 01 foot above the ground level.
    • All the M/C’s should be equipped with Eye Guard and Needle Guard to avoid any injuries to the workers.
    • Cutter man should always use metal gloves while using the straight knife machines.
  2. Storage of Sharp Tools
    • All the usable sharp tool items must be stored in Red Box provided in each cutting, sewing line and finishing line with lock and key arrangement. While those are not in use, no sharp tool can be kept at any other place other than defined Red Box.
    • At the time of use sharp tools must be tied and not to keep loose.
  3. Record of Issue and Receipt
    • Line manager has to keep a daily record of issuing sharp tools to individual and receiving those back. He must issue and receive against name and card of person.
    • This is applicable to cutters, scissors, cutting pins, metal clamps and hand gloves in cutting.
  4. Control on Issue and Receipt of Machine Parts
    • All the machine parts will be issued on exchange basis from main maintenance store.
    • No mechanic is authorized to keep any kind of machine part with him/her.
    • Issue of machine parts must be executed with requisition properly signed by factory GM.
  5. Needle Policy and Broken Needle control
    • Needles stock should be placed in the trims stores and locked away
    • Small stock of needles would be transferred to production floor to a designated person in charge.
    • All records must be maintained for six months
    • Replacement against broken needles has to be provided only after receiving all the parts of the broken needle.
  6. Accountability
    • The physically used needle should match our account whatever we issue in the production floor.
    • All the use needle should be keep in our record & maintain the quantity
  7. Metal Detection Control
    • Metal detection machine should be calibration two time morning & evening before start the production & keep the proper record.
    • All the garment should be checked detector machine before ship the garments, if found any garment not passed in our detector machine this garments should be kept & log as evidence in Red Box properly.

Prevention of Sharptools:

  • Means taking all reasonable steps to avoid any metal contamination in the first place.
  • In sample room and any manufacturing operation pins and wires are not being used. This includes securing, bundling, tacking components or packing of any products.
  • No pins may be used for bulletin/notice boards in the sewing plant.
  • In cases where metal components need to be to be used such as check fabric laying, the control of the use is ensured maintaining record.
  • Scissors/clippers and any other sharptools is securely fastened to the sewing machines and inspection tables/workstations.
  • It is ensured that the production plant is free of dangerous items such as broken glass, splinters etc., since these cannot be detected by the needle detection unit.
Prevention of Sharptools
Prevention of Sharptools
  • Maintaining a metal free environment.
  • To avoid stray metal and other components, small components (such as loose poppers, studs, rivets, zips etc.) are kept in appropriate containers.
  • Workers and mechanics are complying with the policy and products are being removed from an area if risk of contamination exists.
  • Any goods entering the factory are ensured as contaminant-free. It is therefore ensuring that the policy is passed up the supply chain to other suppliers. Trims and components are often secured with pins and suppliers of those raw materials are being asked to use an alternative such as tape.
  • Check that bulk trims ‘pass’ through the metal detector prior to use in production.
  • Any packaging is removing from outer packaging outside production areas to eliminate risks of product contamination.
  • Worksharptools Detection:

    • Worksharptools means to put additional checks in place to ensure the products are safe when shipped.
    • At final inspection garments are being turned inside out and pockets checked to avoid any loose components being trapped in them.
    • We require metal detection for all our products and it is mandatory for all children’s or kids wear orders, any nightwear, underwear or lingerie.
    Worksharptools Detection
    Worksharptools Detection

    Control of Sharp Machine Tools:

    • Factory is following A ‘One in, one out’ distribution system  to minimize the loss of tools, potential injury to employee’s and the risk of tools being boxed in cartons and shipped and or lost in product presentation boxes and or pockets or lining of product.
    • All sharp tools are handing out to the workers by a nominated person (store officer) at the beginning of each shift and are collecting at the end of each shift. Counting and signed for by the store officer.
    • Kimball/Tag guns are individually numbered and named per worker.
    • This distribution system is being recorded (s. attached daily in/out log); detailing workers names, their signature and numbers of tool issued/returned and records are keeping for a minimum of 03 years for verification.
    • All tools are being securely attached to the workstation (machines, tables, benches and inspection areas) by cord or string as possible to tool type, but holes are being drilled through wooden handles and location and condition is being verified daily.
    • Scissors and clippers are not being worn around the neck or wrist as this is a safety hazard for the employee’s in case they trip and injure themselves.
    • we are following a documented control system for the issuing and collecting of scissors and clippers.
    Machine Tools
    Machine Tools
    • The employees will not remove their tools at break, lunch or dinner times in order to avoid them becoming lost or leaving the factory premises.
    • The floor supervisors are checking at least twice a day that they have not been removed without permission and keep a record of how many pairs have been issued, as per the count in/out log process.
    • Any blades or other sharp cutting tools are using within the factory floor maintaining proper sharp machine tools control policy. Snap blades are not permitted as they can break easily, cause injury and get lost in product, packaging and or cartons.
    • Metal is not using as sewing guides and or templates for pressing around to manage a shape, e.g. pockets. If guides are required thick card and or plastic is using. Cut thin metal can cause injury, split and break off into a small piece and become lost in product, packaging and or cartons, which may damage a product: or injure employees at our customer’s warehouse, stores or a customer.
    • The use of pins is not acceptable in any products of the and it is being avoided throughout the factory (incl. sample room, cutting, sewing, inspection, metal free zone, packaging or any other areas where garments/components are being handled).
    • Where pins are being using in packaging for meet up the requirement of a customer this is done in a separate area quarantined from any other production and the issue of pins is being controlled.
    • Pins/staples are not being using to assemble cartons.
    • The use of staples and staplers is being avoided in the factory environment. This includes incoming goods area, cutting room, sample room, metal free zone, and packing and is not being using on any paperwork used on the factory floor.
    • Threading wires are kept by the mechanic and if they are needed by the worker again they are kept in a controlled environment and counted in and out at the beginning and end of a working day by a nominated person.
    • Machinists is not being allowed to keep screw drivers or any other tool for altering machine settings in their machine draws, its are being kept at all times by the mechanic and or supervisor in charge authorized to amend machine settings.
    • Tools collected at the end of the day and spare parts (e.g. cutting blades) are always being kept away from the factory floor in a safe and secure environment, i.e. locked away in designated cupboards which only the store officer has access to. The record log of tool/spare part issue is being kept in the designated cup board.
    • The management is ensuring this sharp machine tools policy applied to embroidery, appliqué, printing etc. operations whether in house or at another site.
    C Tpat Audit Checklist for IT Security

    C Tpat Audit Checklist for IT Security

    C Tpat Audit

    C Tpat means Customs Trade Partnership Against Terrorism. Security practices that help to mitigate the risk of loss, theft, and contraband smuggling that could potentially introduce acts of terrorism in the global supply chain. Please be prepared to respond to each question during the audit. Only c tpat audit checklist and IT security guideline is described here. You can visit more about c tpat audit security

    (more…)
    24 Hour Pest Control in Fashion Industry

    24 Hour Pest Control in Fashion Industry

    24 Hour Pest Control

    It’s a pleasure to let you know that Sparrow Trap Pest Control is one of the leading pest controls in Bangladesh. Some company providing domestic and industrial pest control services. They have latest technical support in pest control sector…

    AIM: Auto  shirt Manufacturing Ltd is a purpose built factory and protected from pests and insects. We care for the health & hygiene of our workers and at the same time we care for our product safety. To make sure that all measures for controlling pests (insects, flies, fleas, rats, etc.) are taken at all manufacturing sites, warehousing sites and transportation vehicles that work for Tema .

    SCOPE: Auto  shall have an agreement with any one of the reputed pest control company in the country. This procedure is applicable to all our ready-to-wear suppliers, warehouses and transporters.

    Pests: Fumigation will be done every after 02(two) months in the ground floor, 3rd floor,4th floor, and outer premises. Pests are populations of living organisms (insects, fleas, flies, rats, etc.) that are undesired because of its habits or presence.

    Pesticides: Special chemical that kills pests.

    Suppliers:  The suppliers are bound to compliance with all the conditions stated in this       memorandum and take necessary precautions in the light of warnings provided.

    Auditors: auditors will pay random visits to the suppliers to make sure that the suppliers comply with all the conditions stated in this procedure.

    They give effective pest control treatment by modern instruments & latest pesticides against Mosquito, Cockroaches, Ants, Flies, Spiders, and lizards and all other flying and crawling insects & Rat.Please refer to our discussion held with you regarding annual contract for extermination of pest control of entire XYZ Garments, Savar,Dhaka. We are pleased to submit details financial and technical specification for conducting the above job.The contract will be for a period of 1(one) year beginning from your requirement. For better result we advice you routine base treatment.

    (more…)
    GSM Fire Alarm Sound and Fire Alarm Beeping System

    GSM Fire Alarm Sound and Fire Alarm Beeping System

    Fire Alarm Beeping

    GSM fire alarm sound effect and fire alarm beeping system made by cellular mobile technology. It has built-in keypad and GSM dialer. The alarm system should contain 30 wireless area, and 10 hardwired area, alarm system with features of auto-dialing and auto-SMS functions. The alarm system with rechargeable backup with system battery that can perform smoke alarm solutions for last working at least 14 hours when external power goes for down.

    (more…)