SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
IP Fraud Protection




Author: Chris Jensen is a Vice President at New Momentum (Irvine, CA), a company that
provides brand/IP Protection software to the electronics industry.
Email: cjensen@newmo.com
Abstract
Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation

of counterfeits and sales through unauthorized channels. In 2006 U.S. Customs recorded over 15

billion IC imports. With one out of ten IT products containing counterfeits, according to a study

by AGMA and KPMG, 1.5 billion of those imported ICs are likely counterfeit. Unfortunately,

most semiconductor manufacturers don’t realize the extent of their revenue and reputation lost to

counterfeits. This paper demonstrates the impact of counterfeits on electronics companies and

gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost

to counterfeits.
IP FRAUD PROTECTION
Do You Know What Counterfeits are Costing Your Company?



Outsourcing and globalization have numerous benefits, but they have a significant downside—the

proliferation of counterfeits and sales through unauthorized channels. Semiconductor

manufacturers are losing billions every year to counterfeits and the gray market. In 2006, U.S.

Customs recorded more than 15 billion IC imports‐‐about 500 every second. Results of a study

conducted by AGMA (Association for Abatement of Gray Market and Counterfeits) and KPMG

showed that one out of every ten IT products contains counterfeit semiconductors. That means

1.5 billion of those imported ICs are likely counterfeit…about 50 counterfeits every second

flooding into the US. Do you know how many of those 1.5 billion (and the number is growing all

the time) are yours? Most semiconductor manufacturers don’t realize the extent of their revenue

loss to counterfeits.



And, revenues are not all you are losing. Company and product reputations are being eroded, and

legitimate channel partners lost. Jobs are also being lost. Especially painful in today’s economy,

counterfeits are believed to have cost 750,000 jobs in the US alone. The goal of this paper is to

demonstrate the impact counterfeits have on electronics companies, as well as provide solutions

to stop these unauthorized sales. And most important, this paper will show you why electronic

component manufacturers need to take action now before revenues and reputation are eroded

even further.
Here’s how counterfeits have impacted five semiconductor companies

The Semiconductor Industry Association (SIA) recently formed an Anti‐Counterfeiting Task

Force that conducted a study with these results:

       Company A: Over 100 part numbers have been counterfeited in the past 5 years

       Company B: 19 cases reported with 97,000 units

       Company C: Since June 2006 there have been 4 US Customs seizures of counterfeits of

        our products by US Customs; units seized ranged from 6,000 to 60,000

       Company D: We estimate that 2‐3% of the purchases of our brand are counterfeit

       Company E: A broker website indicated 40,000 of our devices available, but our

        company had only made 200 units of that device with the specified date code. If all

        40,000 were available, it would result in a $34-million loss.
Can your company afford these kinds of losses? By the way, this is the activity these

companies found without using the advanced technologies discussed later in this paper, which

would give them even greater visibility into counterfeit activity.



Why is now the time to take action?

Once thought to be too complex and sophisticated for counterfeiters, semiconductors, electronics,

and IT (information technology) products are now hot-ticket items in counterfeit manufacturing.

Lost sales, however, only account for a fraction of what companies sacrifice when their

intellectual property (IP) is stolen and their products are illegally produced. Counterfeiters steal

IP backed by million‐dollar investments in research and development, marketing, and

manufacturing. Moreover, illegitimate or substandard chips present the company with additional

costs to repair or replace defective products carrying their brand name.
A number of factors have coalesced to create a business environment in which manufacturing

counterfeit IP is not only lucrative, but also much more attainable than ever before. Counterfeiters

are becoming increasingly tech savvy, and their ability to obtain more advanced manufacturing

machinery and techniques has been one of the most crucial factors in fueling the production of

illegal high tech goods.



During the past decade, billions of dollars in foreign direct investment (FDI) have flowed into a

number of developing countries, such as China, leading to the proliferation of sophisticated

manufacturing processes and capabilities to produce high tech products. Counterfeit components

have long been a problem in the electronics industry, but as of late, companies are finding

themselves increasingly challenged with having to deal with counterfeit semiconductor

components. A second contributing factor is the popularity of e‐commerce. Many counterfeiters

are using the Internet to reach potential buyers. Without regulatory bodies able to police and

govern all product‐listing sites or advertisements sent out over email, the Web has become a

bastion for illegal sales of counterfeit products.



Why is the problem becoming more serious for semiconductor

companies?

Remarking one of the biggest problems

In the SIA study, remarking was the most common method of counterfeiting. Remarking involves

scraping a label off a chip package and printing on a new label. This can involve a different and

higher-priced brand, or a faster chip speed, or a military grade lot number on a commercial chip.

Most of the problem is coming from Shenzhen China, located on the border with Hong Kong.

You can find anything in Shenzhen—original, fake, new, and old components. It’s common to
find shops making fake “Samsung, Motorola,” etc. labels. The Chinese vendors say that making

the labels is easy—they simply select the specific component maker’s label from the program

library and then modify the data. The label quality is excellent.



Other counterfeiting tricks include incorrect die, inferior packaging materials, reproduction of

chip designs, packages without die, different labels on packages, and false RoHS (Restriction on

Hazardous Substances) notifications. Inaccurate notifications of whether a chip has lead can

affect a semiconductor manufacturer in two different, yet significant ways. First, if the chip

contains lead but has a false RoHS notification, the semiconductor manufacturer may have

products restricted from sale in some countries, face a lawsuit, and experience significant bad

publicity. Of greater concern, however, is when a part does not contain lead and the counterfeiter

asserts that it does. Parts without lead have reliability problems when used in applications in outer

space such as satellites or NASA flights.



How can you solve this problem?

There are several key areas you can focus on to reduce your company’s revenue erosion from

counterfeits: legal, operational, and technology (web search, encryption, lock & key).



What can you do through the legal system?

While many big players in the IT industry are making headlines as they break up crime rings,

small to midsize enterprises face a tough fight in their struggle to protect their IP. A number of

internal and external issues challenge companies’ ability to find, identify, and persecute

transgressors. How about encouraging US Customs to make semiconductor counterfeiting a

priority? While it may be easier to spot counterfeit luxury goods, fake semiconductors can result

much more dangerous (even deadly in the case of medical devices) situations.
How about the operational approach?

One important step in reducing counterfeiting is to focus on illegal sales on the gray market.

While some gray market brokers are legitimate, the gray market is an excellent outlet for

counterfeits. AGMA suggests examining companies trying to enter distribution channels and

monitoring contract manufacturers and distributors already in the supply chain. The organization

recommends thoroughly interviewing companies and investigating their background before

allowing them to become resellers or distributors. Once they enter the supply chain, AGMA

advises organizations to establish strict contracts, perform extensive auditing, and maintain close

relationships with its outsourcing partnerships.



Though the listings may be hidden in the deep recesses of the Internet, a couple effective search

words can bring up product listing after product listing of both legitimate and counterfeit goods.



Technology web search

Many companies that have resorted to manually scouring the Web for unauthorized product

listings and counterfeit goods have found this process time-consuming, tedious, and ineffective.

The up‐and‐coming technology is based on the collection and organization of unstructured data.

Unstructured data is information collected from a number of electronic sources that hasn’t been

arranged or organized into an understandable form. In the context of seeking out product listings,

this data can come from a number of sources including market Web sources, XML data sources,

B2B sites, forums, auctions, and emails advertising gray market sales.



Software solutions like this bring a number of benefits to manufacturers. Not only do they

eliminate the significant number of man-hours and resources manual searching required, these
systems can tap into information sources previously out of reach by traditional search methods

and thereby increase the amount of “area” a company can keep a watch on the marketplace. They

also highlight other market activity exceptions, such as new sellers entering the market and an

unexpected amount of selling or buying in a particular geographical region. When looking for an

IP-protection solution, make sure all reports and data collected are accessible through a Web

portal and that the supplier is a Software as a Service (SaaS) supplier. This makes data

immediately without any extensive installation processes and, more important, without the

involvement of other departments that may slow the deployment down.



Case Study

One Tier 1 fabless semiconductor manufacturer has already deployed this kind of system and saw

an immediate return on investment. In the first 30 days, the manufacturer found 500 cases of

unauthorized sales or counterfeit products previously undetected by its traditional monitoring

systems. Over a year’s time, if 6,000 unapproved transactions were prevented, the manufacturer

could save itself millions of dollars in lost revenue.



Collecting data and reports, however, doesn’t necessarily result in a decrease in counterfeiting;

the information needs to be put into action. Often when companies manage to receive timely

data on counterfeits or illegal gray market sales, they simply don’t know what to do with it. The

above manufacturer handled one if its instances of unauthorized sales through an unconventional

route: It tried to turn unauthorized distributors into legitimate ones.



The benefit of this strategy is two‐fold. First, if the distributor agrees to join the manufacturer’s

authorized channels, the manufacturer can then more easily monitor buying and selling activities

and more effectively ensure the products distributed are authentic. Second, in the event the
distributor declines the offer, its managers know the company has been identified as a

    counterfeiter or an unauthorized sales channel and will likely stop selling the manufacturer’s

    product.



    How much revenue can a manufacturer expect to recover?




.

    The four steps to recovering revenue

    The roadmap to revenue recovery consists of visibility, plan development, plan

    implementation, and the measurement of results.



    Visibility – Step one on the map is a concentration on visibility. That means visibility into

    the counterfeit and gray markets that require seeing who is doing what where and how much.

    This search can isolate data that weeds out duplicate offerings, separates the players

    (counterfeit, gray, suspect, etc.) and formats this information into meaningful metrics.

    Typically, use of the advanced technologies mentioned earlier are combined with a

    company’s investigation team or a company that specializes in high tech counterfeit
investigations. The technology is used to drill down not like a Google search or other search

companies, but taking it to the next level, and takes it to a dashboard and beyond to

compilation. When companies are exposed to the extent of their counterfeiting problem, their

eyes are opened.



Visibility depends upon data analysis and consequently cost analysis. This means identifying the

scope of the violations, and the first step is to identify where and with whom your products are

being sold. This translates into identifying counterfeit activity and gray market activity and their

estimated loss to the enterprise. Part of the loss may be unquantifiable as the public perception of

a brand is critical. The accuracy and speed of this information is critical. The technology needs to

find the comprehensive and unstructured market data from websites, email, file transfers as it

incorporates the information from your ERP data, PLM data, transactions history and run it

though data filtering and cleansing. The right market intelligence will help your team focus on

where you will get the highest return on your efforts. You will need to incorporate specific

technology solutions that will allow you to load your products and prices, allow for data analysis,

identify the scope of the violations and be able to report the return on investment (ROI) to

management.



Plan – Step two in revenue recovery is to develop a plan. When investigators work with a client,

they expect them to subscribe to one of the new advanced technologies and thus establish the

means to having visibility and intelligent data structure for creating a plan.



Many organizations underestimate the significance of the proper plan development. The more

time and effort the enterprise places in creating a comprehensive plan, the better the

implementation and results. Like any strong plan, the enterprise will need to set goals and
measure frequently. Its goals need to be realistic and cover a one- to two-year time frame. A

concentration on due-diligence investigations comes next. Tom McWeeney, senior VP of a high

counterfeit investigation agency, Corporate Risk International (CRI), says, “Each company we

investigate for has a different system and we work back and forth with them in a customized

manner.” An enterprise will want to plan every aspect of its program including test purchases and

due diligence. After reviewing the data, they will decide exactly how they will go about

approaching the seller that can lead to a buy. Initial questions that need to be answered include: Is

this a massive problem? Is it long-term? How much does the enterprise want to buy it for? What

quantity will allow it to become evidence if the enterprise decides to take civil/criminal action?

Do they need to purchase at a certain price? Is there a price that will strengthen their role as

evidence in future civil/criminal action? Should they get customs, FBI, Customs and Border

Patrol (CBP), and Immigration & Customs Enforcement (ICE) involved?



How should they maintain the evidence and for what time period? A test purchase can lead to the

need for test purchase engineering examination and in time to either civil action or criminal

action, or both. The enterprise may need to set goals for each of its sellers. The goal does not

always need to be civil or criminal action. An enterprise’s goal may be to make life so difficult

for the counterfeiters that they drop their product and move on to something else.



Implement plan – The third revenue recovery step is an implementation plan that carries out the

conclusions of the planning process. During this activity Tom McWeeney says, “Actionable

intelligence from the technology solution leads to whether to do buys or not.” With the right

information as background, the implementation is ready to begin. In this phase, the enterprise will

need to prioritize targets, follow through on plan, and incorporate the ability to consistently add

new data that could alter the actions that are to be taken. The enterprise should not be afraid to

outsource certain parts of its implementation to corporate risk specialists to the extent that such a
decision makes sense. With a comprehensive plan in place, the manufacturer can start assigning

due-diligence investigations and conduct strategic under cover test purchases in regard to high-

volume targets. This process identifies whether the subject in question is legally registered, has a

history of counterfeiting, or has a questionable general business profile. This step also may

include engineering analysis, civil action, and criminal action. The enterprise may want to do

some of this work with inside capabilities, but outsourcing is a viable alternative. When doing a

test purchase, CRI recommends a wire transfer because it allows the enterprise to have access to

valuable data on the counterfeiter’s financial institution.



This information may be helpful when taking civil and criminal action. Engineering analyses of

test purchases may lead to civil actions (cease and desist letters, lawsuit, etc.). The outsourced

undercover purchase of a product or part may require setting an undercover company. When

engaging in pursuit of criminal action, there may be a liaison with FBI, or CBP and ICE or all

three. Whatever actions are taken need to be coordinated in-house and with outside counsel. In

the long run, purchasing may require re-purchasing to ensure that the counterfeiters have actually

ceased their illegal activity.




Measure results

Step four is measure the results. Revenue recovery happens by intelligent discovery or as a

famous detective once said, “Just the facts Ma’am.” The measurement of the revenue recovery is

an outtake, a result of the process undergone. Part of any revenue recovery program needs to

include a method to consistently measure results. On a weekly basis, for instance, an enterprise

has to determine the value of the product on and off the market. They will want to record the

amount recovered through test purchases and document progress. They will take note of the

criminal and civil actions taken and their results. The enterprise’s management team needs to take
an active role in the revenue recovery process -- continually reviewing results data and

determining changes when needed. Or as Tom McWeeney reminds us, “Not all sales in a gray

market reflect back upon the OEM or legitimate distributor. The price has to be seen in the

context of market price and manufactured price.”



Data value requires close examination, and there are not necessarily experts in each part or

product. Companies need to look for sale prices that are not reasonable. They may do a buy, or

not, depending upon the discount. Is it a price that can lead to profit?



The results have to be presented to enterprise management. At the customer’s request, the

advanced technologies mentioned earlier can implement a monitoring process around an analysis

designed to produce a standard set of outputs that are “meeting” or “boardroom” ready. Armed

with these outputs, an intelligence group can attend high-level or even board-level meetings to

discuss changes in the gray market landscape, new brand, IP, or counterfeiting risks which may

be appearing. These risks can then be reduced with follow-up or ongoing legal action and an

overall strategy for setting priorities based on product families or technology groups. These

reports, which are provided in both a summary and detail level, consist of trending charts across

all product families; by customer assigned product family types showing change in market

activity; by individual part or part family within the product family; by geographical region for

quantity, number of buy/sell offers and number of new companies interested in the customer’s

products. The reports also include top-ten-style rankings of individual companies that trade in the

largest quantities of the customer’s products and that do the most number of transactions,

regardless of total quantity. All of the summaries and analytics above can always “drill” back to

the original open market buy/sell transaction that contributed to the total or summary. This data is

maintained historically and archived so that as patterns of activity or risk emerge in the analytics,

record-by-record research can be done back to the original time period where the pattern started.
An ongoing activity

Protecting brands and intellectual property from fraud is not a once in a lifetime event. It is an

ongoing activity. The steps above make it clear that an enterprise has to first understand its

problem and then it must develop a plan to mitigate the problem and this means getting a

management buy-in. Given the go-ahead, the plan must be implemented. After the findings and

action, the plan should be evaluated for its effectiveness.



But, the first and most critical step is to not underestimate the impact of counterfeits on revenues,

brand and distributor loyalty. A significant obstacle to successfully addressing counterfeiting

problems has been underestimating the problem due to the lack of dialogue and understanding of

the enormity of the problem in the electronics industry. Typically, companies grappling with

counterfeiting shy away from publicizing the problem. This relative silence has led many in the

industry to underestimate the enormity of counterfeiting and the amount of assets at stake. Now is

the time to take a stand against counterfeiting and push forward toward effective solutions to this

problem.

Mais conteúdo relacionado

Mais procurados

CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to KnowIronCore Labs
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Dr. Donald Macfarlane
 
E businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکیE businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکیHanieh Ghofrani
 
Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309Glenn McKnight
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Businessjoannaeagar
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)John Nicholson
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commercewelcometofacebook
 
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccContact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccRyan Thurman
 
Apple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert saysApple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert saysfatacre7807
 
**JUNK** (no subject)
**JUNK** (no subject)**JUNK** (no subject)
**JUNK** (no subject)Gaurav Kharb
 
Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010erikpelton
 
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Bernard Marr
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011Kimberly Verska
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceraviteja reddy
 
E-commerce in Bangladesh
E-commerce in BangladeshE-commerce in Bangladesh
E-commerce in BangladeshRahatKabir6
 

Mais procurados (19)

CCPA: What You Need to Know
CCPA: What You Need to KnowCCPA: What You Need to Know
CCPA: What You Need to Know
 
Ch 4
Ch 4Ch 4
Ch 4
 
Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016 Data Protection and Comnpliance with the GDPR Event 22 september 2016
Data Protection and Comnpliance with the GDPR Event 22 september 2016
 
E businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکیE businessکسب و کار الکترونیکی
E businessکسب و کار الکترونیکی
 
Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309
 
Electronic Business
Electronic BusinessElectronic Business
Electronic Business
 
Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)Blue Compliance Presentation#2 extended presentation (serif font)
Blue Compliance Presentation#2 extended presentation (serif font)
 
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-CommerceGlobal Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
Global Cyber-Laws and E-Commerce & Strategic Implication for E-Commerce
 
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And FccContact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
Contact Center Compliance Webinar 10 26 11 Direct From The Ftc And Fcc
 
Apple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert saysApple could face heat from police on refusing data access, expert says
Apple could face heat from police on refusing data access, expert says
 
**JUNK** (no subject)
**JUNK** (no subject)**JUNK** (no subject)
**JUNK** (no subject)
 
Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010Falls Church Chamber of Commerce - May 18, 2010
Falls Church Chamber of Commerce - May 18, 2010
 
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
Chinese Social Credit Score: Utopian Big Data Bliss Or Black Mirror On Steroids?
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Faktor: GDPR (Kuik)
Faktor: GDPR (Kuik)Faktor: GDPR (Kuik)
Faktor: GDPR (Kuik)
 
PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011PBPATL - Privacy Seminar 2011
PBPATL - Privacy Seminar 2011
 
ethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerceethical,social and poltical issues in E-commerce
ethical,social and poltical issues in E-commerce
 
GDPR Information
GDPR InformationGDPR Information
GDPR Information
 
E-commerce in Bangladesh
E-commerce in BangladeshE-commerce in Bangladesh
E-commerce in Bangladesh
 

Destaque

Recent learning of scrum and management
Recent learning of scrum and managementRecent learning of scrum and management
Recent learning of scrum and managementJet Wang
 
Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교valuasset
 
[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단valuasset
 
Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례valuasset
 
החזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לךהחזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לךNurit Eliram
 
Glasgow University Freshers' Week
Glasgow University Freshers' WeekGlasgow University Freshers' Week
Glasgow University Freshers' WeekNick Wade
 
Metodos especiales ejercicio en clase
Metodos especiales ejercicio en claseMetodos especiales ejercicio en clase
Metodos especiales ejercicio en claseuis
 
Outbound investments
Outbound investments  Outbound investments
Outbound investments Ashish Panday
 
Unwind your mind
Unwind your mindUnwind your mind
Unwind your mindMarie Duffy
 
Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010Eze
 

Destaque (18)

Power of one
Power of onePower of one
Power of one
 
sns
snssns
sns
 
Recent learning of scrum and management
Recent learning of scrum and managementRecent learning of scrum and management
Recent learning of scrum and management
 
Woman suffers
Woman suffersWoman suffers
Woman suffers
 
Web Standards in FLOSS development
Web Standards in FLOSS developmentWeb Standards in FLOSS development
Web Standards in FLOSS development
 
%Ba%b7%b7%d5%e8 2
%Ba%b7%b7%d5%e8 2%Ba%b7%b7%d5%e8 2
%Ba%b7%b7%d5%e8 2
 
Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교Hy solution사례(10)연금보험 연금저축사업비 비교
Hy solution사례(10)연금보험 연금저축사업비 비교
 
[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단[HY Solution]글로벌경기 긴급진단
[HY Solution]글로벌경기 긴급진단
 
Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례Hy solution사례(2)즉시연금고객제안사례
Hy solution사례(2)즉시연금고객제안사례
 
החזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לךהחזק הוא הרפה, פרשת שלח-לך
החזק הוא הרפה, פרשת שלח-לך
 
Glasgow University Freshers' Week
Glasgow University Freshers' WeekGlasgow University Freshers' Week
Glasgow University Freshers' Week
 
L thn 4
L thn 4L thn 4
L thn 4
 
Metodos especiales ejercicio en clase
Metodos especiales ejercicio en claseMetodos especiales ejercicio en clase
Metodos especiales ejercicio en clase
 
Oss for undergraduate - fossa2010
Oss for undergraduate - fossa2010Oss for undergraduate - fossa2010
Oss for undergraduate - fossa2010
 
Outbound investments
Outbound investments  Outbound investments
Outbound investments
 
Unwind your mind
Unwind your mindUnwind your mind
Unwind your mind
 
Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010Eze sg meeting mitke overall progress-poland_30.06.2010
Eze sg meeting mitke overall progress-poland_30.06.2010
 
Dokumen yang Memanaskan Jakarta
Dokumen yang Memanaskan JakartaDokumen yang Memanaskan Jakarta
Dokumen yang Memanaskan Jakarta
 

Semelhante a Impact of counterfeits on electronics companies

Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationLori Gilbert
 
2014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 12014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 1Patrick Lemoine
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Scout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramScout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramFākR™
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-componentsozgurv
 
Unpacking the Royalty Stack
Unpacking the Royalty StackUnpacking the Royalty Stack
Unpacking the Royalty StackErik Oliver
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecRapidSSLOnline.com
 
power point 115.docx
power point 115.docxpower point 115.docx
power point 115.docxwrite5
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperSue Hallen
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsIntelCollab.com
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsSubrahmanyam KVJ
 
Internet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxInternet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxmariuse18nolet
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Adler Law Group
 
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...Jeffrey Funk
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.Steven Salter
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 

Semelhante a Impact of counterfeits on electronics companies (20)

Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
The Connected Business - An FT.com Report
The Connected Business  - An FT.com ReportThe Connected Business  - An FT.com Report
The Connected Business - An FT.com Report
 
The Telephone And Telegraph Corporation
The Telephone And Telegraph CorporationThe Telephone And Telegraph Corporation
The Telephone And Telegraph Corporation
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
2014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 12014 10 22 FT Report The Connected Business Page 1
2014 10 22 FT Report The Connected Business Page 1
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Scout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection ProgramScout - How Create Successful Brand Protection Program
Scout - How Create Successful Brand Protection Program
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
 
Unpacking the Royalty Stack
Unpacking the Royalty StackUnpacking the Royalty Stack
Unpacking the Royalty Stack
 
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - SymantecCybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
 
power point 115.docx
power point 115.docxpower point 115.docx
power point 115.docx
 
IBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White PaperIBM IP Advisor with Watson White Paper
IBM IP Advisor with Watson White Paper
 
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and TacticsHow to Fight Product Counterfeiting with Investigative Strategies and Tactics
How to Fight Product Counterfeiting with Investigative Strategies and Tactics
 
SayanMitra.pdf
SayanMitra.pdfSayanMitra.pdf
SayanMitra.pdf
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
 
Internet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxInternet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docx
 
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
Managing Risk: Legal Issues for Affiliate Marketers & Affiliate Marketing Man...
 
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
The "Unproductive Bubble:" Unprofitable startups, small markets for new digit...
 
GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.GDPR: A Threat or Opportunity? www.normanbroadbent.
GDPR: A Threat or Opportunity? www.normanbroadbent.
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 

Mais de NEW Momentum

Importance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityImportance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityNEW Momentum
 
Understanding the Gray Market Strategy
Understanding the Gray Market StrategyUnderstanding the Gray Market Strategy
Understanding the Gray Market StrategyNEW Momentum
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsNEW Momentum
 
Combat gray market sales today
Combat gray market sales todayCombat gray market sales today
Combat gray market sales todayNEW Momentum
 
The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputationNEW Momentum
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
 
Intellectual Property Fraud Protection
Intellectual Property Fraud ProtectionIntellectual Property Fraud Protection
Intellectual Property Fraud ProtectionNEW Momentum
 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business caseNEW Momentum
 
Ways to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectWays to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectNEW Momentum
 
Strategies to combat grey market sales
Strategies to combat grey market salesStrategies to combat grey market sales
Strategies to combat grey market salesNEW Momentum
 
New Momentum - Overview
New Momentum - OverviewNew Momentum - Overview
New Momentum - OverviewNEW Momentum
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309NEW Momentum
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 

Mais de NEW Momentum (15)

Importance of Combating Gray Market Activity
Importance of Combating Gray Market ActivityImportance of Combating Gray Market Activity
Importance of Combating Gray Market Activity
 
Understanding the Gray Market Strategy
Understanding the Gray Market StrategyUnderstanding the Gray Market Strategy
Understanding the Gray Market Strategy
 
Counterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brandsCounterfeiting – a major threat to the brands
Counterfeiting – a major threat to the brands
 
Combat gray market sales today
Combat gray market sales todayCombat gray market sales today
Combat gray market sales today
 
The gray market effect on brand reputation
The gray market effect on brand reputationThe gray market effect on brand reputation
The gray market effect on brand reputation
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Intellectual Property Fraud Protection
Intellectual Property Fraud ProtectionIntellectual Property Fraud Protection
Intellectual Property Fraud Protection
 
Brand Protection
Brand Protection Brand Protection
Brand Protection
 
Brand protection business case
Brand protection business caseBrand protection business case
Brand protection business case
 
Ways to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its EffectWays to End Gray Market Sales & Its Effect
Ways to End Gray Market Sales & Its Effect
 
Strategies to combat grey market sales
Strategies to combat grey market salesStrategies to combat grey market sales
Strategies to combat grey market sales
 
New Momentum - Overview
New Momentum - OverviewNew Momentum - Overview
New Momentum - Overview
 
White paper stopping counterfeit pharmaceuticals 0309
White  paper stopping counterfeit pharmaceuticals 0309White  paper stopping counterfeit pharmaceuticals 0309
White paper stopping counterfeit pharmaceuticals 0309
 
How to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit PiracyHow to Stop Gray Market and Counterfeit Piracy
How to Stop Gray Market and Counterfeit Piracy
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 

Último

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Impact of counterfeits on electronics companies

  • 1. IP Fraud Protection Author: Chris Jensen is a Vice President at New Momentum (Irvine, CA), a company that provides brand/IP Protection software to the electronics industry. Email: cjensen@newmo.com
  • 2. Abstract Outsourcing and globalization have numerous benefits, but there is a downside—the proliferation of counterfeits and sales through unauthorized channels. In 2006 U.S. Customs recorded over 15 billion IC imports. With one out of ten IT products containing counterfeits, according to a study by AGMA and KPMG, 1.5 billion of those imported ICs are likely counterfeit. Unfortunately, most semiconductor manufacturers don’t realize the extent of their revenue and reputation lost to counterfeits. This paper demonstrates the impact of counterfeits on electronics companies and gives solutions for finding the violators as well as a four-step roadmap for recovering revenue lost to counterfeits.
  • 3. IP FRAUD PROTECTION Do You Know What Counterfeits are Costing Your Company? Outsourcing and globalization have numerous benefits, but they have a significant downside—the proliferation of counterfeits and sales through unauthorized channels. Semiconductor manufacturers are losing billions every year to counterfeits and the gray market. In 2006, U.S. Customs recorded more than 15 billion IC imports‐‐about 500 every second. Results of a study conducted by AGMA (Association for Abatement of Gray Market and Counterfeits) and KPMG showed that one out of every ten IT products contains counterfeit semiconductors. That means 1.5 billion of those imported ICs are likely counterfeit…about 50 counterfeits every second flooding into the US. Do you know how many of those 1.5 billion (and the number is growing all the time) are yours? Most semiconductor manufacturers don’t realize the extent of their revenue loss to counterfeits. And, revenues are not all you are losing. Company and product reputations are being eroded, and legitimate channel partners lost. Jobs are also being lost. Especially painful in today’s economy, counterfeits are believed to have cost 750,000 jobs in the US alone. The goal of this paper is to demonstrate the impact counterfeits have on electronics companies, as well as provide solutions to stop these unauthorized sales. And most important, this paper will show you why electronic component manufacturers need to take action now before revenues and reputation are eroded even further.
  • 4. Here’s how counterfeits have impacted five semiconductor companies The Semiconductor Industry Association (SIA) recently formed an Anti‐Counterfeiting Task Force that conducted a study with these results:  Company A: Over 100 part numbers have been counterfeited in the past 5 years  Company B: 19 cases reported with 97,000 units  Company C: Since June 2006 there have been 4 US Customs seizures of counterfeits of our products by US Customs; units seized ranged from 6,000 to 60,000  Company D: We estimate that 2‐3% of the purchases of our brand are counterfeit  Company E: A broker website indicated 40,000 of our devices available, but our company had only made 200 units of that device with the specified date code. If all 40,000 were available, it would result in a $34-million loss.
  • 5. Can your company afford these kinds of losses? By the way, this is the activity these companies found without using the advanced technologies discussed later in this paper, which would give them even greater visibility into counterfeit activity. Why is now the time to take action? Once thought to be too complex and sophisticated for counterfeiters, semiconductors, electronics, and IT (information technology) products are now hot-ticket items in counterfeit manufacturing. Lost sales, however, only account for a fraction of what companies sacrifice when their intellectual property (IP) is stolen and their products are illegally produced. Counterfeiters steal IP backed by million‐dollar investments in research and development, marketing, and manufacturing. Moreover, illegitimate or substandard chips present the company with additional costs to repair or replace defective products carrying their brand name.
  • 6. A number of factors have coalesced to create a business environment in which manufacturing counterfeit IP is not only lucrative, but also much more attainable than ever before. Counterfeiters are becoming increasingly tech savvy, and their ability to obtain more advanced manufacturing machinery and techniques has been one of the most crucial factors in fueling the production of illegal high tech goods. During the past decade, billions of dollars in foreign direct investment (FDI) have flowed into a number of developing countries, such as China, leading to the proliferation of sophisticated manufacturing processes and capabilities to produce high tech products. Counterfeit components have long been a problem in the electronics industry, but as of late, companies are finding themselves increasingly challenged with having to deal with counterfeit semiconductor components. A second contributing factor is the popularity of e‐commerce. Many counterfeiters are using the Internet to reach potential buyers. Without regulatory bodies able to police and govern all product‐listing sites or advertisements sent out over email, the Web has become a bastion for illegal sales of counterfeit products. Why is the problem becoming more serious for semiconductor companies? Remarking one of the biggest problems In the SIA study, remarking was the most common method of counterfeiting. Remarking involves scraping a label off a chip package and printing on a new label. This can involve a different and higher-priced brand, or a faster chip speed, or a military grade lot number on a commercial chip. Most of the problem is coming from Shenzhen China, located on the border with Hong Kong. You can find anything in Shenzhen—original, fake, new, and old components. It’s common to
  • 7. find shops making fake “Samsung, Motorola,” etc. labels. The Chinese vendors say that making the labels is easy—they simply select the specific component maker’s label from the program library and then modify the data. The label quality is excellent. Other counterfeiting tricks include incorrect die, inferior packaging materials, reproduction of chip designs, packages without die, different labels on packages, and false RoHS (Restriction on Hazardous Substances) notifications. Inaccurate notifications of whether a chip has lead can affect a semiconductor manufacturer in two different, yet significant ways. First, if the chip contains lead but has a false RoHS notification, the semiconductor manufacturer may have products restricted from sale in some countries, face a lawsuit, and experience significant bad publicity. Of greater concern, however, is when a part does not contain lead and the counterfeiter asserts that it does. Parts without lead have reliability problems when used in applications in outer space such as satellites or NASA flights. How can you solve this problem? There are several key areas you can focus on to reduce your company’s revenue erosion from counterfeits: legal, operational, and technology (web search, encryption, lock & key). What can you do through the legal system? While many big players in the IT industry are making headlines as they break up crime rings, small to midsize enterprises face a tough fight in their struggle to protect their IP. A number of internal and external issues challenge companies’ ability to find, identify, and persecute transgressors. How about encouraging US Customs to make semiconductor counterfeiting a priority? While it may be easier to spot counterfeit luxury goods, fake semiconductors can result much more dangerous (even deadly in the case of medical devices) situations.
  • 8. How about the operational approach? One important step in reducing counterfeiting is to focus on illegal sales on the gray market. While some gray market brokers are legitimate, the gray market is an excellent outlet for counterfeits. AGMA suggests examining companies trying to enter distribution channels and monitoring contract manufacturers and distributors already in the supply chain. The organization recommends thoroughly interviewing companies and investigating their background before allowing them to become resellers or distributors. Once they enter the supply chain, AGMA advises organizations to establish strict contracts, perform extensive auditing, and maintain close relationships with its outsourcing partnerships. Though the listings may be hidden in the deep recesses of the Internet, a couple effective search words can bring up product listing after product listing of both legitimate and counterfeit goods. Technology web search Many companies that have resorted to manually scouring the Web for unauthorized product listings and counterfeit goods have found this process time-consuming, tedious, and ineffective. The up‐and‐coming technology is based on the collection and organization of unstructured data. Unstructured data is information collected from a number of electronic sources that hasn’t been arranged or organized into an understandable form. In the context of seeking out product listings, this data can come from a number of sources including market Web sources, XML data sources, B2B sites, forums, auctions, and emails advertising gray market sales. Software solutions like this bring a number of benefits to manufacturers. Not only do they eliminate the significant number of man-hours and resources manual searching required, these
  • 9. systems can tap into information sources previously out of reach by traditional search methods and thereby increase the amount of “area” a company can keep a watch on the marketplace. They also highlight other market activity exceptions, such as new sellers entering the market and an unexpected amount of selling or buying in a particular geographical region. When looking for an IP-protection solution, make sure all reports and data collected are accessible through a Web portal and that the supplier is a Software as a Service (SaaS) supplier. This makes data immediately without any extensive installation processes and, more important, without the involvement of other departments that may slow the deployment down. Case Study One Tier 1 fabless semiconductor manufacturer has already deployed this kind of system and saw an immediate return on investment. In the first 30 days, the manufacturer found 500 cases of unauthorized sales or counterfeit products previously undetected by its traditional monitoring systems. Over a year’s time, if 6,000 unapproved transactions were prevented, the manufacturer could save itself millions of dollars in lost revenue. Collecting data and reports, however, doesn’t necessarily result in a decrease in counterfeiting; the information needs to be put into action. Often when companies manage to receive timely data on counterfeits or illegal gray market sales, they simply don’t know what to do with it. The above manufacturer handled one if its instances of unauthorized sales through an unconventional route: It tried to turn unauthorized distributors into legitimate ones. The benefit of this strategy is two‐fold. First, if the distributor agrees to join the manufacturer’s authorized channels, the manufacturer can then more easily monitor buying and selling activities and more effectively ensure the products distributed are authentic. Second, in the event the
  • 10. distributor declines the offer, its managers know the company has been identified as a counterfeiter or an unauthorized sales channel and will likely stop selling the manufacturer’s product. How much revenue can a manufacturer expect to recover? . The four steps to recovering revenue The roadmap to revenue recovery consists of visibility, plan development, plan implementation, and the measurement of results. Visibility – Step one on the map is a concentration on visibility. That means visibility into the counterfeit and gray markets that require seeing who is doing what where and how much. This search can isolate data that weeds out duplicate offerings, separates the players (counterfeit, gray, suspect, etc.) and formats this information into meaningful metrics. Typically, use of the advanced technologies mentioned earlier are combined with a company’s investigation team or a company that specializes in high tech counterfeit
  • 11. investigations. The technology is used to drill down not like a Google search or other search companies, but taking it to the next level, and takes it to a dashboard and beyond to compilation. When companies are exposed to the extent of their counterfeiting problem, their eyes are opened. Visibility depends upon data analysis and consequently cost analysis. This means identifying the scope of the violations, and the first step is to identify where and with whom your products are being sold. This translates into identifying counterfeit activity and gray market activity and their estimated loss to the enterprise. Part of the loss may be unquantifiable as the public perception of a brand is critical. The accuracy and speed of this information is critical. The technology needs to find the comprehensive and unstructured market data from websites, email, file transfers as it incorporates the information from your ERP data, PLM data, transactions history and run it though data filtering and cleansing. The right market intelligence will help your team focus on where you will get the highest return on your efforts. You will need to incorporate specific technology solutions that will allow you to load your products and prices, allow for data analysis, identify the scope of the violations and be able to report the return on investment (ROI) to management. Plan – Step two in revenue recovery is to develop a plan. When investigators work with a client, they expect them to subscribe to one of the new advanced technologies and thus establish the means to having visibility and intelligent data structure for creating a plan. Many organizations underestimate the significance of the proper plan development. The more time and effort the enterprise places in creating a comprehensive plan, the better the implementation and results. Like any strong plan, the enterprise will need to set goals and
  • 12. measure frequently. Its goals need to be realistic and cover a one- to two-year time frame. A concentration on due-diligence investigations comes next. Tom McWeeney, senior VP of a high counterfeit investigation agency, Corporate Risk International (CRI), says, “Each company we investigate for has a different system and we work back and forth with them in a customized manner.” An enterprise will want to plan every aspect of its program including test purchases and due diligence. After reviewing the data, they will decide exactly how they will go about approaching the seller that can lead to a buy. Initial questions that need to be answered include: Is this a massive problem? Is it long-term? How much does the enterprise want to buy it for? What quantity will allow it to become evidence if the enterprise decides to take civil/criminal action? Do they need to purchase at a certain price? Is there a price that will strengthen their role as evidence in future civil/criminal action? Should they get customs, FBI, Customs and Border Patrol (CBP), and Immigration & Customs Enforcement (ICE) involved? How should they maintain the evidence and for what time period? A test purchase can lead to the need for test purchase engineering examination and in time to either civil action or criminal action, or both. The enterprise may need to set goals for each of its sellers. The goal does not always need to be civil or criminal action. An enterprise’s goal may be to make life so difficult for the counterfeiters that they drop their product and move on to something else. Implement plan – The third revenue recovery step is an implementation plan that carries out the conclusions of the planning process. During this activity Tom McWeeney says, “Actionable intelligence from the technology solution leads to whether to do buys or not.” With the right information as background, the implementation is ready to begin. In this phase, the enterprise will need to prioritize targets, follow through on plan, and incorporate the ability to consistently add new data that could alter the actions that are to be taken. The enterprise should not be afraid to outsource certain parts of its implementation to corporate risk specialists to the extent that such a
  • 13. decision makes sense. With a comprehensive plan in place, the manufacturer can start assigning due-diligence investigations and conduct strategic under cover test purchases in regard to high- volume targets. This process identifies whether the subject in question is legally registered, has a history of counterfeiting, or has a questionable general business profile. This step also may include engineering analysis, civil action, and criminal action. The enterprise may want to do some of this work with inside capabilities, but outsourcing is a viable alternative. When doing a test purchase, CRI recommends a wire transfer because it allows the enterprise to have access to valuable data on the counterfeiter’s financial institution. This information may be helpful when taking civil and criminal action. Engineering analyses of test purchases may lead to civil actions (cease and desist letters, lawsuit, etc.). The outsourced undercover purchase of a product or part may require setting an undercover company. When engaging in pursuit of criminal action, there may be a liaison with FBI, or CBP and ICE or all three. Whatever actions are taken need to be coordinated in-house and with outside counsel. In the long run, purchasing may require re-purchasing to ensure that the counterfeiters have actually ceased their illegal activity. Measure results Step four is measure the results. Revenue recovery happens by intelligent discovery or as a famous detective once said, “Just the facts Ma’am.” The measurement of the revenue recovery is an outtake, a result of the process undergone. Part of any revenue recovery program needs to include a method to consistently measure results. On a weekly basis, for instance, an enterprise has to determine the value of the product on and off the market. They will want to record the amount recovered through test purchases and document progress. They will take note of the criminal and civil actions taken and their results. The enterprise’s management team needs to take
  • 14. an active role in the revenue recovery process -- continually reviewing results data and determining changes when needed. Or as Tom McWeeney reminds us, “Not all sales in a gray market reflect back upon the OEM or legitimate distributor. The price has to be seen in the context of market price and manufactured price.” Data value requires close examination, and there are not necessarily experts in each part or product. Companies need to look for sale prices that are not reasonable. They may do a buy, or not, depending upon the discount. Is it a price that can lead to profit? The results have to be presented to enterprise management. At the customer’s request, the advanced technologies mentioned earlier can implement a monitoring process around an analysis designed to produce a standard set of outputs that are “meeting” or “boardroom” ready. Armed with these outputs, an intelligence group can attend high-level or even board-level meetings to discuss changes in the gray market landscape, new brand, IP, or counterfeiting risks which may be appearing. These risks can then be reduced with follow-up or ongoing legal action and an overall strategy for setting priorities based on product families or technology groups. These reports, which are provided in both a summary and detail level, consist of trending charts across all product families; by customer assigned product family types showing change in market activity; by individual part or part family within the product family; by geographical region for quantity, number of buy/sell offers and number of new companies interested in the customer’s products. The reports also include top-ten-style rankings of individual companies that trade in the largest quantities of the customer’s products and that do the most number of transactions, regardless of total quantity. All of the summaries and analytics above can always “drill” back to the original open market buy/sell transaction that contributed to the total or summary. This data is maintained historically and archived so that as patterns of activity or risk emerge in the analytics, record-by-record research can be done back to the original time period where the pattern started.
  • 15. An ongoing activity Protecting brands and intellectual property from fraud is not a once in a lifetime event. It is an ongoing activity. The steps above make it clear that an enterprise has to first understand its problem and then it must develop a plan to mitigate the problem and this means getting a management buy-in. Given the go-ahead, the plan must be implemented. After the findings and action, the plan should be evaluated for its effectiveness. But, the first and most critical step is to not underestimate the impact of counterfeits on revenues, brand and distributor loyalty. A significant obstacle to successfully addressing counterfeiting problems has been underestimating the problem due to the lack of dialogue and understanding of the enormity of the problem in the electronics industry. Typically, companies grappling with counterfeiting shy away from publicizing the problem. This relative silence has led many in the industry to underestimate the enormity of counterfeiting and the amount of assets at stake. Now is the time to take a stand against counterfeiting and push forward toward effective solutions to this problem.