Recent Posts

Under the Magnifying Glass: Supply Chain Publications

Aug 10, 2018

Several of AIAG’s established Supply Chain documents are being revised! The Intercontinental Pallet and Carton Standard (RC-12), and the Basics of Export Compliance publication (TC-7) are both in the final revision phase to ensure the information provided is as up-to-date and relevant as possible.

Read More

FREE Conflict Minerals Web Training Videos Now Available!

Jul 30, 2018

Whether you’re new to the issue, or the go-to person in your organization for conflict minerals reporting, AIAG’s new web training videos* are for you! (Senior managers, managers, engineers, and quality and purchasing professionals will also find value in this content, which includes basic introductory information as well as more advanced details.)

Read More

Returnable Container Data Mapping Project Update

Jul 12, 2018

The automotive supply chain has been steadily plagued by the issue of effectively tracking and mitigating loss on returnable transport items (i.e. returnable racks and containers). While this is certainly not a new pain point, multiple AIAG member companies – including a number of OEMs, Tier 1 suppliers, and logistics service providers – have assembled to tackle this issue in new ways, utilizing cutting edge RFID technology and standardized process flows! 

Read More

AIAG is Moving!

Jun 27, 2018

If you haven’t heard the news yet, the title says it all: we’re moving!

As of Monday, July 9, 2018, we will be fully operational in our new building, just down the road from current AIAG headquarters.

Read More

AIAG Core Tool Software (CTS) Project Status

Jun 14, 2018

The AIAG Core Tool Software (CTS) Project is making great progress with the help of several dedicated volunteers. The project team is focused on improving the former XLS based Core Tools Software Disc with an “Excel like” front end supported by a robust database backend.

Read More

NEW AIAG Special Process Assessment Resource Center

Jun 14, 2018

Special process components’ quality, reliability, and durability can be compromised by variation in the process itself – and since the resulting defects aren’t easily detected prior to use, faulty components can get passed on to the end user, resulting in field actions and warranty claims.

Read More

Secure Shared Data With AIAG’s Cyber Security 3rd Party Information Security Guidelines

May 24, 2018

In today’s increasingly technology driven and connected world, protecting data is more challenging – and more critical – than ever before. In fact, according to the World Economic Forum (WEF), a significant portion of cybercrime goes undetected, which only underscores the difficulty of securing sensitive information.

Read More

CMRT 5.11 Available for Download

May 16, 2018

CMRT 5.11 is available for download here.

In addition, a downloadable version of the most up-to-date Smelter Reference List is available here, and you can see the revision history here. You can also access the completion guide in English, Chinese, German, and Japanese here.

Read More

How Does Your Knowledge of AIAG’s Quality Core Tools Stack Up?

May 10, 2018

In 2012, AIAG introduced its free online Core Tools Self-Assessment (CTSA) as a way to measure an employee’s competency with the Automotive Core Tools and identify areas that require improvement.   Available in eight languages, the CTSA is a timed (75 minutes) open book self-assessment that covers APQP/PPAP, FMEA, MSA, and SPC. When completed, each individual receives an e-mail detailing his or her scores for each Core Tool. These results are confidential, and shared only with the participant. The CTSA can be taken every 30 days, allowing individuals time to address any knowledge gaps, and monitor their improvement in the Core Tools. 

Read More

AIAG’s New Cybersecurity Guidelines Publication Has Arrived!

May 03, 2018

In today’s increasingly technology driven and connected world, protecting data is more challenging – and more critical – than ever before. Given the growing complexity of global supply chains, and the sheer volume of highly sensitive information being exchanged, the need for a standardized approach in addressing information security is also more vital than ever before. 

Read More


Subscribe to Email Updates