As Supply Chain resilience and risks take center stage, Morpheus.Network, a SaaS middleware platform that provides exporters with a safe and secure Digital Footprint and Hanhaa, an IoT innovator with an intelligent cargo tracking and monitoring device, have once again developed a unique solution to implement the new USMCA rules for cross border shipments travelling from Mexico to the USA.
While medical supplies are rightly being prioritized, agro industrial products are following closely behind. Using a shipment of premium drinks as a case study, Hanhaa and Morpheus.Network will help companies understand the opportunities for trade, the political and economic climate and compliance challenges such as security.
Everybody Loves a Tequila
The rhetoric of recent years has led to escalating tariffs on imports from Mexico and has focused on forcing action on illegal immigration and drug trafficking.
The United States imported more than $345 billion in goods from Mexico last year, and shipped $265 billion south. There is a tight relationship in the supply chain whereby 30 percent of the content of Mexican exports, “La Maquilla”, originated in the United States, according to a recent study.
The United States imported nearly $28 billion in food and drink from Mexico last year, including more than two-fifths of its total imports of fruit, vegetables and 204 million litres of tequila worth $1.4 billion.
Have your Guacamole and Eat It. Trade and Security = C-TPAT
The dual threats of terrorism and smuggling require knowing the provenance, custody of ownership and the companies or persons handling goods during every step of the shipment. (C-TPAT) is a voluntary supply-chain security program led by Customs and Border Protection (CBP). Using approved technology and a focus on processes and risk analysis, a shipper, carrier and customs broker can ensure compliance without requiring large investments into IT infrastructure or resources.
A Quick Primer on C-TPAT
While most C-TPAT members typically focus on Section 4. cyber security policies, such as intrusion threats and disaster recovery, there are other areas equally important.
For Carriers and 3PLs, Section 5 on Asset states: