SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
WEBINAR
24 January, 2017
DOES SERIALIZATION COMPLIANCE
EQUAL BRAND PROTECTION?
4
What serialization is…… and isn’t
How serialization does not necessarily
equate to comprehensive brand protection
How the package itself is such an integral
component to brand protection
1
2
3
How mobile authentication can be enabled for
better brand protection
This webinar is
intended to be
interactive
Information contained in
this webinar is current as
of January 2017
Reserve your seat for upcoming
webinars at
www.SystechOne.com/Webinars
We value your
feedback!
BEFORE WE DIVE IN…
WEBINAR SERIES
JIM SINISGALLI
DIRECTOR, PRODUCT MANAGEMENT
FOR SYSTECH INTERNATIONAL
Jim Sinisgalli is Director of Product Management – Brand Protection. He presently
leads and guides Systech’s anti-counterfeit and authentication business to develop
strategies which protect brands from counterfeiting, diversion and other illicit trade. He
is responsible for developing and executing Systech’s authentication strategy working
with leaders across products and services, and sales. Jim has over an over twenty
year career as visionary leader with half of his career spent protecting customer’s most
precious assets from data to physical product.
PRESENTER
SERIALIZATION DOESN’T
NECESSARILY EQUAL BRAND
PROTECTION
SERIALIZATION IS COMPLIANCE
Whichone is
authentic?
LET’S TALK ABOUT WHAT
SERIALIZATION IS ACTUALLY
DOING
EU BOOKEND MODEL
Pharmaceutical
Manufacturer and
Parallel Distributor
Wholesaler Distributors Pharmacist Patient
Risk-based
verification
by Wholesale
distributors
National System 1 - n
Product #
Batch
Expiry
S/N
European
Hub
Verification
upon
dispense to
Patient
Upload Data
THE PEDIGREE MODEL
Track & Trace captures data at
each step in the supply chain
across partner boundaries
Data captured and saved at each step
Manufacturer Packaging Wholesale distributors Dispenser
ESSENTIALLY AN AUDIT TRAIL IS COLLECTED AND STORED
WHERE IS THE VALIDATION?
DOES THE EU FMD OR THE DSCSA STOP FALSIFIED MEDICINE?
EU FMD
• Only applies to prescription medications
• Does include Anti-Tampering requirement
• Which counterfeiters can mimic
• The first product that is scanned and verified “wins”
DSCSA
• Doesn't even require verification or authentication
• Applies similarly to other global serialization laws
NO, NEITHER THE EU FMD OR THE DSCSA STOP FALSIFIED MEDICINE
SERIALIZATION = COMPLIANCE
POLL
THE PACKAGE AS AN INTEGRAL
COMPONENT OF BRAND
PROTECTION
CORE ELEMENTS OF ANTI-COUNTERFEITING STRATEGY
• Tamper-evident packaging or tamper-resistant closures for
all medicines
• A unique serial number for each medicine pack
• Use of overt, covert or forensic authentication features,
but consider:
• Impact to current production
• Cost
• Training requirements
• Degree of accuracy
• Requires material, equipment or processes
• Authentication turn-around time
• Degree of vulnerability of being defeated by counterfeiters
ANTI-COUNTERFEITING PACKAGING STRATEGIES AVAILABLE
Overt Technologies
Authenticated with Visual Inspection
Covert Technologies
Authenticated with Technology
Holograms Security Seals
Colour Shifting Inks Watermarks
RFID Optical
Chemical Microtaggants
SYSTECH UNISECURE™
Non-Additive
Leverage existing
packaging
Covert
Counterfeiters cannot
see to replicate
Secure
Cannot be reverse
engineered
Mobile
Smartphone enabled,
trusted engagement
Barcodes
Serialized and/or non-
serialized
Global
Enables authenticated
traceability
Systech derives a
unique identification
signature from an
existing bar code
THE HEART OF UNISECURE
Vibrations Manufacturing
tolerances
Humidity Consumable
variance
UNIQUE FACTORS
Printing is dynamic – there are small-
scale variations in every print mark
Line speed
The result is a unique signature or UniSignature™ “individualizing” each and every item.
UniSecure takes advantage of these
microscopic variations to generate an
inherent, covert security feature
DATA CARRIERS
MOBILIZE AUTHENTICATION
▪ Authentication capabilities for
inspectors, consumers and third parties
▪ BYOA (Bring Your Own Application) –
UniScan will easily integrate into any
mobile application
▪ UniSecure’s Software Development Kit
enables BYOA for iOS and Android
MAXIMIZE YOUR INVESTMENT IN SERIALIZAION
Create trusted uniqueness for each and every
package
• Expand usage of regulatory compliance data
mark
• Enables serialization to become a covert
authentication layer
• Transforms serialized data mark into an authentic
and unique data mark
This is the authentic one!
POLL
A REAL-LIFE DISCUSSION ON
HOW UNISECURE PROTECTS
BEYOND SERIALIZATION
21
A UNISECURE FIELD PILOT
POINT OF PACKAGING FOR
PHARMACEUTICAL PRODUCTS
POINT OF DISPENSATION FOR
PHARMACEUTICAL PRODUCTS
SOFTWARE SOLUTION PROVIDER
/ SIMULATED DISTRIBUTOR
PILOT PROCESS
Batch 1: ESM model
scanning serialized
numbers at the supply chain
end-points (production and
dispensation)
Batch 2: Pedigree model
(DSCSA) scanning
serialized numbers at each
point in the supply chain
(production, storage,
wholesaler, dispensation)
Batch 3: UniSecure solution
capturing original print mark
for instant authentication at
any point of the supply
chain
3 Batches - Each batch contained:
500 cartons - 450 “genuine”
products and 50 “counterfeit”
PILOT PROCESS
Batch 1: ESM model
scanning serialized numbers
at the supply chain end-
points (production and
dispensation)
Batch 3: UniSecure solution
capturingoriginal print mark
for instant authenticationat
any point of the supply chain
Batches 1 & 3 were then shipped
directly to St James’s Hospital in
Ireland
PILOT PROCESS
Batch 2 was further split into 2
separate parts, simulating
distribution to multiple locations
Batch 2: Pedigree model (DSCSA)
scanning serialized numbers at
each point in the supply chain
(production, storage, wholesaler,
dispensation)
Batch 2a: Pedigree model 250 items Batch 2b: Pedigree model 250 items
PILOT RESULTS
Batch 1: ESM model
scanning serialized numbers
at the supply chain end-
points (production and
dispensation)
Batch 3: UniSecure solution
capturingoriginal print mark
for instant authenticationat
any point of the supply chain
Batches 1 & 3 were then shipped
directly to St James’s Hospital in
Ireland
PILOT RESULTS
Batch 1: ESM model scanning
serialized numbers at the supply
chain end-points (production and
dispensation)
Batches 1 & 3 were then shipped
directly to St James’s Hospital in
Ireland
36% (18 of the 50) counterfeit products that were randomly added to the
batch were incorrectly verified.
PILOT RESULTS
Batch 2: Pedigree model (DSCSA)
scanning serialized numbers at
each point in the supply chain
(production, storage, wholesaler,
dispensation
Batches 1 & 3 were then shipped
directly to St James’s Hospital in
Ireland
20% (10 of the 50) counterfeit products that were randomly added to the batch
were verified..
PILOT RESULT
Batch 3: UniSecure solution
capturing original print mark for
instant authentication at any point
of the supply chain
Batches 1 & 3 were then shipped
directly to St James’s Hospital in
Ireland
100% of the counterfeit products were identified at authentication ensuring
no counterfeit product went to patients
Serialization Compliance Serialization Compliance
Covert Protection
Uniqueness Established
Unique Authentication
Trusted Engagement
MAXIMIZE YOUR INVESTMENT IN SERIALIZATION
CREATE TRUSTED UNIQUENESS FOR EVERY PACKAGE
This is the authentic one!
SYSTECH UNISECURE
SECURE
Cannot be reverse engineered or duplicated
SMARTPHONE ENABLED
Puts authentication into many hands
UNIVERSAL BARCODES
Works for serialized or non-serialized
GLOBAL REACH
Enables authenticated traceability
NON ADDITIVE
Leverage existing package
COVERT
Counterfeiters cannot see, as it uses
existing data marks
Please submit your questions
Webinar recording and supplementalbooklet will be sent to you
within 48 hours
Let us know how we did by completing a short survey
Q&A
RECORDING
& BOOKLET
SURVEY
COMING UP
Join us for our next webinar in February 2017
Registerat www.SystechOne.com/WebinarsNEXT
WEBINAR
POLL
Q&A
JIM SINISGALLI
DIRECTOR, PRODUCT MANAGEMENT
SYSTECH
Email jim.sinisgalli@systechone.com
www.SystechOne.com
THANK YOU FOR JOINING US
SOCIAL MEDIA
LinkedIn
Twitter

Mais conteúdo relacionado

Semelhante a Does Serialization Compliance Equal Brand Protection?

Bliss adtech anti counterfieting solutions
Bliss adtech anti counterfieting solutionsBliss adtech anti counterfieting solutions
Bliss adtech anti counterfieting solutions
TVS Next
 
Track and trace
Track and traceTrack and trace
Track and trace
Bilcareltd
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety Solution
Eddie Cohen
 

Semelhante a Does Serialization Compliance Equal Brand Protection? (20)

Pharma
PharmaPharma
Pharma
 
Counterfeiting : a global problem
Counterfeiting : a global problemCounterfeiting : a global problem
Counterfeiting : a global problem
 
Agrochemicals
AgrochemicalsAgrochemicals
Agrochemicals
 
Fashion
FashionFashion
Fashion
 
GPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptxGPAS Service - Technology Overview.pptx
GPAS Service - Technology Overview.pptx
 
Bliss adtech anti counterfieting solutions
Bliss adtech anti counterfieting solutionsBliss adtech anti counterfieting solutions
Bliss adtech anti counterfieting solutions
 
Authentication Technologies An Overview
Authentication Technologies An OverviewAuthentication Technologies An Overview
Authentication Technologies An Overview
 
Track and trace
Track and traceTrack and trace
Track and trace
 
Verify me Introduction ppt for your info
Verify me Introduction ppt for your infoVerify me Introduction ppt for your info
Verify me Introduction ppt for your info
 
Introducing Source Certain - A Supply Chain Integrity and Security Solution f...
Introducing Source Certain - A Supply Chain Integrity and Security Solution f...Introducing Source Certain - A Supply Chain Integrity and Security Solution f...
Introducing Source Certain - A Supply Chain Integrity and Security Solution f...
 
BUA Anti-Counterfeit Solutions
BUA Anti-Counterfeit SolutionsBUA Anti-Counterfeit Solutions
BUA Anti-Counterfeit Solutions
 
Holistic Approaches to Virus Risk Mitigation
Holistic Approaches to Virus Risk MitigationHolistic Approaches to Virus Risk Mitigation
Holistic Approaches to Virus Risk Mitigation
 
True authentication of tablets
True authentication of tabletsTrue authentication of tablets
True authentication of tablets
 
6DCP Food Safety Solution
6DCP Food Safety Solution6DCP Food Safety Solution
6DCP Food Safety Solution
 
Blockchain-based Traceability Application In Agricultural
Blockchain-based Traceability Application In Agricultural Blockchain-based Traceability Application In Agricultural
Blockchain-based Traceability Application In Agricultural
 
IFI - Corporate Foresight - Its Impact on Future Growth
IFI - Corporate Foresight - Its Impact on Future GrowthIFI - Corporate Foresight - Its Impact on Future Growth
IFI - Corporate Foresight - Its Impact on Future Growth
 
IFI Seminar - Corporate Foresight: Its Impact on Future Growth
IFI Seminar - Corporate Foresight: Its Impact on Future GrowthIFI Seminar - Corporate Foresight: Its Impact on Future Growth
IFI Seminar - Corporate Foresight: Its Impact on Future Growth
 
Supply Chain Integrity - An Opportunity
Supply Chain Integrity - An Opportunity Supply Chain Integrity - An Opportunity
Supply Chain Integrity - An Opportunity
 
Supply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns ApplicationSupply Chain/Subcontractor Overruns Application
Supply Chain/Subcontractor Overruns Application
 
Supply Chain Usage
Supply Chain UsageSupply Chain Usage
Supply Chain Usage
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Does Serialization Compliance Equal Brand Protection?

  • 1. WEBINAR 24 January, 2017 DOES SERIALIZATION COMPLIANCE EQUAL BRAND PROTECTION?
  • 2. 4 What serialization is…… and isn’t How serialization does not necessarily equate to comprehensive brand protection How the package itself is such an integral component to brand protection 1 2 3 How mobile authentication can be enabled for better brand protection
  • 3. This webinar is intended to be interactive Information contained in this webinar is current as of January 2017 Reserve your seat for upcoming webinars at www.SystechOne.com/Webinars We value your feedback! BEFORE WE DIVE IN… WEBINAR SERIES
  • 4. JIM SINISGALLI DIRECTOR, PRODUCT MANAGEMENT FOR SYSTECH INTERNATIONAL Jim Sinisgalli is Director of Product Management – Brand Protection. He presently leads and guides Systech’s anti-counterfeit and authentication business to develop strategies which protect brands from counterfeiting, diversion and other illicit trade. He is responsible for developing and executing Systech’s authentication strategy working with leaders across products and services, and sales. Jim has over an over twenty year career as visionary leader with half of his career spent protecting customer’s most precious assets from data to physical product. PRESENTER
  • 7. LET’S TALK ABOUT WHAT SERIALIZATION IS ACTUALLY DOING
  • 8. EU BOOKEND MODEL Pharmaceutical Manufacturer and Parallel Distributor Wholesaler Distributors Pharmacist Patient Risk-based verification by Wholesale distributors National System 1 - n Product # Batch Expiry S/N European Hub Verification upon dispense to Patient Upload Data
  • 9. THE PEDIGREE MODEL Track & Trace captures data at each step in the supply chain across partner boundaries Data captured and saved at each step Manufacturer Packaging Wholesale distributors Dispenser ESSENTIALLY AN AUDIT TRAIL IS COLLECTED AND STORED WHERE IS THE VALIDATION?
  • 10. DOES THE EU FMD OR THE DSCSA STOP FALSIFIED MEDICINE? EU FMD • Only applies to prescription medications • Does include Anti-Tampering requirement • Which counterfeiters can mimic • The first product that is scanned and verified “wins” DSCSA • Doesn't even require verification or authentication • Applies similarly to other global serialization laws NO, NEITHER THE EU FMD OR THE DSCSA STOP FALSIFIED MEDICINE SERIALIZATION = COMPLIANCE
  • 11. POLL
  • 12. THE PACKAGE AS AN INTEGRAL COMPONENT OF BRAND PROTECTION
  • 13. CORE ELEMENTS OF ANTI-COUNTERFEITING STRATEGY • Tamper-evident packaging or tamper-resistant closures for all medicines • A unique serial number for each medicine pack • Use of overt, covert or forensic authentication features, but consider: • Impact to current production • Cost • Training requirements • Degree of accuracy • Requires material, equipment or processes • Authentication turn-around time • Degree of vulnerability of being defeated by counterfeiters
  • 14. ANTI-COUNTERFEITING PACKAGING STRATEGIES AVAILABLE Overt Technologies Authenticated with Visual Inspection Covert Technologies Authenticated with Technology Holograms Security Seals Colour Shifting Inks Watermarks RFID Optical Chemical Microtaggants
  • 15. SYSTECH UNISECURE™ Non-Additive Leverage existing packaging Covert Counterfeiters cannot see to replicate Secure Cannot be reverse engineered Mobile Smartphone enabled, trusted engagement Barcodes Serialized and/or non- serialized Global Enables authenticated traceability Systech derives a unique identification signature from an existing bar code
  • 16. THE HEART OF UNISECURE Vibrations Manufacturing tolerances Humidity Consumable variance UNIQUE FACTORS Printing is dynamic – there are small- scale variations in every print mark Line speed The result is a unique signature or UniSignature™ “individualizing” each and every item. UniSecure takes advantage of these microscopic variations to generate an inherent, covert security feature DATA CARRIERS
  • 17. MOBILIZE AUTHENTICATION ▪ Authentication capabilities for inspectors, consumers and third parties ▪ BYOA (Bring Your Own Application) – UniScan will easily integrate into any mobile application ▪ UniSecure’s Software Development Kit enables BYOA for iOS and Android
  • 18. MAXIMIZE YOUR INVESTMENT IN SERIALIZAION Create trusted uniqueness for each and every package • Expand usage of regulatory compliance data mark • Enables serialization to become a covert authentication layer • Transforms serialized data mark into an authentic and unique data mark This is the authentic one!
  • 19. POLL
  • 20. A REAL-LIFE DISCUSSION ON HOW UNISECURE PROTECTS BEYOND SERIALIZATION
  • 21. 21 A UNISECURE FIELD PILOT POINT OF PACKAGING FOR PHARMACEUTICAL PRODUCTS POINT OF DISPENSATION FOR PHARMACEUTICAL PRODUCTS SOFTWARE SOLUTION PROVIDER / SIMULATED DISTRIBUTOR
  • 22. PILOT PROCESS Batch 1: ESM model scanning serialized numbers at the supply chain end-points (production and dispensation) Batch 2: Pedigree model (DSCSA) scanning serialized numbers at each point in the supply chain (production, storage, wholesaler, dispensation) Batch 3: UniSecure solution capturing original print mark for instant authentication at any point of the supply chain 3 Batches - Each batch contained: 500 cartons - 450 “genuine” products and 50 “counterfeit”
  • 23. PILOT PROCESS Batch 1: ESM model scanning serialized numbers at the supply chain end- points (production and dispensation) Batch 3: UniSecure solution capturingoriginal print mark for instant authenticationat any point of the supply chain Batches 1 & 3 were then shipped directly to St James’s Hospital in Ireland
  • 24. PILOT PROCESS Batch 2 was further split into 2 separate parts, simulating distribution to multiple locations Batch 2: Pedigree model (DSCSA) scanning serialized numbers at each point in the supply chain (production, storage, wholesaler, dispensation) Batch 2a: Pedigree model 250 items Batch 2b: Pedigree model 250 items
  • 25. PILOT RESULTS Batch 1: ESM model scanning serialized numbers at the supply chain end- points (production and dispensation) Batch 3: UniSecure solution capturingoriginal print mark for instant authenticationat any point of the supply chain Batches 1 & 3 were then shipped directly to St James’s Hospital in Ireland
  • 26. PILOT RESULTS Batch 1: ESM model scanning serialized numbers at the supply chain end-points (production and dispensation) Batches 1 & 3 were then shipped directly to St James’s Hospital in Ireland 36% (18 of the 50) counterfeit products that were randomly added to the batch were incorrectly verified.
  • 27. PILOT RESULTS Batch 2: Pedigree model (DSCSA) scanning serialized numbers at each point in the supply chain (production, storage, wholesaler, dispensation Batches 1 & 3 were then shipped directly to St James’s Hospital in Ireland 20% (10 of the 50) counterfeit products that were randomly added to the batch were verified..
  • 28. PILOT RESULT Batch 3: UniSecure solution capturing original print mark for instant authentication at any point of the supply chain Batches 1 & 3 were then shipped directly to St James’s Hospital in Ireland 100% of the counterfeit products were identified at authentication ensuring no counterfeit product went to patients
  • 29. Serialization Compliance Serialization Compliance Covert Protection Uniqueness Established Unique Authentication Trusted Engagement MAXIMIZE YOUR INVESTMENT IN SERIALIZATION CREATE TRUSTED UNIQUENESS FOR EVERY PACKAGE This is the authentic one!
  • 30. SYSTECH UNISECURE SECURE Cannot be reverse engineered or duplicated SMARTPHONE ENABLED Puts authentication into many hands UNIVERSAL BARCODES Works for serialized or non-serialized GLOBAL REACH Enables authenticated traceability NON ADDITIVE Leverage existing package COVERT Counterfeiters cannot see, as it uses existing data marks
  • 31. Please submit your questions Webinar recording and supplementalbooklet will be sent to you within 48 hours Let us know how we did by completing a short survey Q&A RECORDING & BOOKLET SURVEY COMING UP Join us for our next webinar in February 2017 Registerat www.SystechOne.com/WebinarsNEXT WEBINAR
  • 32. POLL
  • 33. Q&A JIM SINISGALLI DIRECTOR, PRODUCT MANAGEMENT SYSTECH Email jim.sinisgalli@systechone.com
  • 34. www.SystechOne.com THANK YOU FOR JOINING US SOCIAL MEDIA LinkedIn Twitter