SECURING THE SUPPLY CHAIN WITH SERIAL NUMBERS

Similar documents
Connecting Your ERP with IoT and Ultimately Blockchain

BSWH Technician Continuing Education 2016 Part 2: Pharmacy Law - Controlled Substance Security & Drug Supply Chain Security Act (DSCSA) Contact

Counterfeit Pharmaceuticals Supply Chain

MARKET APPLICATION SUITE

Serialization Primer

How serialisation will change our supply chains? GS 1 Conference Addis Ababa May 9, 2018

Solution Brief Efficient ecommerce Fraud Management for Acquirers

The online counterfeit economy: consumer electronics

Fighting the battle against brand counterfeiting and diversion

Identify, Track, Count and Manage Items in Real-Time Using PortalTrack

Marking, coding and tracing of tobacco products. Leuven, 4 September 2008 Luk Joossens

PUTTING EPCIS AND VISIBILITY DATA TO WORK

Detecting counterfeit and illicit goods in the supply chain. Marking methods and security features where it matters most In the hands of the consumer

Model VP2020 Digital Color Label Printer

IOT and GS1 Revolutionizing Consumer Retail. Dr. Stephen Lam Chief Operating Officer GS1 Hong Kong

SUPPLY CHAIN SECURITY MAINTAINING INTEGRITY OF YOUR SUPPLY CHAIN

CURE FOR THE COUNTERFEITING PANDEMIC IN THE AUTOMOTIVE INDUSTRY

Brand Protection: In the face of mounting counterfeiting, diversion & other infringements. Jim Mentone Director, Consumer Global Brand Protection

Protecting Critical Care Drugs

Realtime is to late. Smarter, Safer, Faster Espen Braathe Traceability Tiger Team Europe. Smarter planet opportunities are everywhere...

Product serialization and traceability mandates. kpmg.com

REACHING THE URBANIZED, ASPIRATIONAL WORLD CONSUMER

Saudi Drug Code (SDC), and Drug Barcoding Specifications

smart label olimpias.com/rfid A unique partner to boost supply chain profitability Copyright 2014 Olimpias Spa All Rights Reserved

Build Consumer Trust Understand Your Customers

ENCODING, PRINTING & VALIDATING RFID TAGS WITH PORTALTRACK

EARLY DETECTION OF ADVANCED PERSISTENT THREATS IN THE PAYMENTS SECTOR

CONNECTING THE EVERYDAY WORLD. The Impinj Platform Delivers Item Intelligence

DEFINING REVERSE LOGISTICS PLATFORMS

Importance of GS1 Barcodes for Exports

Take on Today s Packaging Challenges with Automated Inspection and ID

Tobacco Product Directive 2 (TPD2) Challenges for Manufacturing

Optimize your processes. With Value Imaging.

Counterfeit Part Prevention & Mitigation Process

BRAND PROTECTION STRATEGIES: Defending Against Gray Market Diversion

Deltek Costpoint Manufacturing Solutions

Proficy * Plant Applications. GE Intelligent Platforms. Plant Performance Analysis and Execution Software

Q&A: EU systems for traceability and security features of tobacco products. April 2018

AI AND MACHINE LEARNING IN YOUR ORGANIZATION GET STARTED AND REAP THE BENEFITS.

Knock It Off! Protecting Your Brand From Trademark Counterfeiting. by Andrea Anderson

Counterfeit & Fraudulent Items

SAP Supply Chain Management

Brilliant Manufacturing from GE Digital: The Manufacturing Software for Hybrid Industries

Labeling Best Practice in a Challenging Manufacturing Landscape A survival guide for pharmaceutical companies

Sponsored by HOW TO DELIVER ON THE PROMISE OF INDUSTRY 4.0

Beyond Compromise - Protecting Your Brand

How to Identify, Disrupt, and Dismantle Unauthorized Product Distribution Annie Wood Client Service Manager MarkMonitor

COUNTERFEIT MEDICINES IMPACT AND POTENTIAL SOLUTIONS

Securing Your Supply Chain How to Prevent Counterfeit Plastic Parts and Products

RFID / NFC NEW POSSIBILITIES FOR THE PHARMA- CEUTICAL INDUSTRY

3 TIPS FOR TRACKING INVENTORY WITH GPS

Controller s Office Physical Inventory. Approving Physical Inventory Transactions

Insights & Ingenuity. Digitalizing the food and beverage industry

Secure SoC Manufacturing: Foundation for a Connected World

PROTECTING NEW NICOTINE PRODUCTS AGAINST COUNTERFEITS AND DIVERSION. Copyright Securikett All rights reserved! 1

CropLife Africa Verified Brands. 22 nd Partnership Meeting and Roundtable Sessions October 24-25, 2012, Zürich Rudolf Guyer

STRATEGIES FOR DRUG ANTI-COUNTERFEITING IN GLOBAL SUPPLY CHAIN

Where are Your Breakers Coming From?

cargo theft: how to reduce your risk

Patients are Counting on Us: A Little Less Conversation It s Time to Act

Healthcare. Applying GS1 Standards for DSCSA and Traceability. Addendum: Diagrams and XML Examples for Serialized Exceptions Processing

Response to: PUBLIC CONSULTATION IN PREPARATION OF A LEGAL PROPOSAL TO COMBAT COUNTERFEIT MEDICINES FOR HUMAN USE

Summary of Proposed USP General Chapter <1083> Good Distribution Practices Supply Chain Integrity 02/15/2012

Key Benefits. Overview. Field Service empowers companies to improve customer satisfaction, first time fix rates, and resource productivity.

UC! Web ASSET TRACKING SOFTWARE. A Better Way to Track Items and Manage Data

RETAIL ITEM INTELLIGENCE

Cisco s Digital Transformation Supply Chain for the Digital Age

Securing the Pharmaceutical Supply Chain The Authenticated RFID Platform

9 Questions Food and Beverage Manufacturers Need to Ask About Their ERP

Extend your brand reach with M2M

IUID COMPLIANCE TURNKEY IUID SYSTEMS. Getting on Top of IUID Compliance

Maturing IoT solutions with Microsoft Azure

High Tech: How Channel Visibility Helps Make Smarter Business Decisions You can t manage what you can t measure W. Edwards Deming

Imagine the Power of Knowing. A tour of our RFID Access Control solution

Track and Trace with Dual Serialization: A Tutorial

Sports League Fights Sophisticated Criminals with a Combination of Online Intelligence and Rogue Website Litigation

Compass 9.2 Changes by Module

TRACEABILITY: SOLVING CHALLENGES & ADDING VALUE IN ELECTRONICS MANUFACTURING

Effective Brand Protection & Supply Chain Integrity Strategies. Ron Guido President, LifeCare Services, LLC September 9, 2014

ebecs Distribution Accelerator for Microsoft Dynamics

Take on Today s Packaging Challenges with Automated Inspection and ID

Basics of EPC. Training

Supply Chain Security IGTLC

Securing. Museum & Heritage Collections

2016 CPG & Pharma packaging trends

Serialization and epedigree: New Opportunities for Life Sciences Manufacturers

Frontera CEO discusses company s role in listeria outbreak

Counterfeit Drugs and Supply Chain Security

April 13, Deployed Forensic Cloud-Based Track & Trace Platform

ITEM INTELLIGENCE FOR SUPPLY CHAIN & LOGISTICS

Your Guide to Building an Effective Analytics Strategy

GDPR and Microsoft 365: Streamline your path to compliance

Marrying machines to humanity. International Accounting Bulletin The Digital Accountancy Forum 2018 London 4 October 2018

Taking a Leap Toward Global Supply Chain Efficiency - Part II

Fighting Fraud in the e-commerce Channel: A Merchant Study. June 2018

DSCSA: DRUG SUPPLY CHAIN SECURITY ACT AND IMPLEMENTATION. Chris Smith, R.Ph. Director, Pharmacy Business Intelligence Inmar

Transform retail by building a connected business

Filling Pharma s Label Management Void

The Cross-Functional Impact of Managed Video as a Service (MVaaS) Use Cases

RETAIL ITEM INTELLIGENCE

Transcription:

SECURING THE SUPPLY CHAIN WITH SERIAL NUMBERS How secure mass serialization can help fight counterfeiting, diversion and theft. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 info@verifybrand.com (763) 235-1400

EXECUTIVE SUMMARY Brand protection and supply chain security are of critical importance to most corporations, yet only a few have begun to fully understand how traditional security measures are enhanced by software services and IT solutions. Software solutions for secure mass serialization, product authentication and item-level traceability are powerful tools brands can leverage for protecting their profitability in the face of counterfeiting, grey market diversion and other common brand protection challenges. Each of those software tools can drive profitability through a number of use cases, which depend on a brand s unique products, supply chain and operational processes. A clear understanding of secure mass serialization, product authentication and traceability can help brand owners create the best strategies for promoting and protecting their brand. This whitepaper outlines a basic definition for those three software tools and provides a brief overview of their application to some common brand protection challenges. SOFTWARE TOOLS FOR BRAND PROTECTION AND SUPPLY CHAIN SECURITY Software tools like serialization, digital authentication and traceability offer some of the most effective and efficient tools for brand protection. These tools create value by leveraging new information for business intelligence and analytics. A basic definition of each of these tools is provided below to help explain how these tools can be applied. Mass serialization refers to uniquely identifying items, commonly with barcodes, data matrix codes or alpha numeric codes. This becomes secure mass serialization when the items are uniquely identified with codes that are unpredictable and when access to those codes and the code schema is restricted. Digital product authentication is enabled when the unique serial numbers on items are checked against a database of valid serial numbers. Tools that support additional product information including visual attributes, manufacturing information or item status give brand owners additional insights into authenticity. Capturing and recording a history of when serial numbers are applied to items and where the items with those numbers travel within a supply chain creates item-level traceability. Tools that support additional information about the history of events including business transactions, logistics or operational information give brand owners even more insights into their supply chains. Many of the common challenges facing brand owners require one or more of these tools to create a cost effective solution to brand protection. The scenarios below give a brief overview of some of the most common challenges and a simple explanation of how these tools help brand owners recover profitability. Securing the Supply Chain with Serial Numbers 1

COUNTERFEITING Counterfeit products misrepresent themselves as being an authentic, genuine or authorized production of an item bearing a brand s identity. Common examples of counterfeit products include knock-off designer clothing, fake jewelry or accessories and illegally reproduced movies. But, counterfeiting also extends to pharmaceuticals, defense electronics, medical supplies and much more. Although most organizations are intimately familiar their products and manufacturing, it can still be challenging to differentiate a genuine product from a counterfeit product manufactured without authorization. Mass serialization provides a unique identity to individual items, giving brand owners a quick and easy way to screen items for authenticity. Checking the code on an item against a database of valid codes is only the simplest form of this authentication. Sophisticated tools will associate individual codes with a particular product line or even an individual item. Some tools also provide additional product information, ranging from a product image to technical statistics or even explanations of physical security. Leveraging traceability information to deduce the current state of an item (as being sold to a consumer at Retailer A, in Warehouse B or returned to Recall Center C) further helps to confirm an item as being genuine and from the legitimate supply chain. This can be especially true in the case of manufacturing overruns. MANUFACTURING OVERRUNS Counterfeit products are often made in substandard manufacturing locations, even in a residential basement. But, other counterfeits are made in the very same facility that produces the genuine items. This usually happens when workers at a factory run the machines to create additional products during hours when the facility is meant to be closed. These items are called manufacturing overruns and present equally great financial challenges to brand owners as other types of counterfeits. Secure mass serialization helps stop manufacturing overruns by individually identifying each item with an unpredictable code and issuing those codes in a controlled and documented manner. Then, individuals creating items during a manufacturing overruns have no access to the unique codes needed to be applied to these items. This helps to deter overruns from ever happening by creating a system of recording what happens within a facility, much like a video camera deters unauthorized activity by documenting events. Similarly, tools for traceability require a serial number to be checked at each step in a supply chain, creating visibility beyond a brand s four walls. Many of traceability tools create alerts for repeat numbers, invalid codes or unusual events. One unusual event would be a product with a valid code running on a manufacturing line, when the Securing the Supply Chain with Serial Numbers 2

item status associated with that code is marked as shipped to a reseller. Having an item status and history helps to track overrun items back to an individual or facility. When brands follow up with those individuals and facilities, it helps to spread the message that the brand has visibility into manufacturing overruns, in turn discouraging it from happening again. Much of the same process can be used with similar success in stopping grey market diversion. GREY MARKET DIVERSION Many products may be worth more money in one geography or market than another. This can lead to a situation where products are diverted from their authorized and intended market to a more lucrative but unauthorized market. Grey market diversion happens when a legal product is diverted from its intended recipient to be sold in a way that is inconsistent with agreements with the brand owner. Grey market diversion could include selling in an unauthorized geography, to an unauthorized party or at an unauthorized price. As such, traceability software can be a key tool for brand owners to protect themselves against this type of diversion. Traceability software can go beyond where an item is today and where it has been in the past by applying business transactions and intended distribution routes. These kinds of tools allow brand owners to see where an item was made, shipped to and sold while confirming all of that data matches the expected path. Unusual events can be flagged within a traceability system to create an alert, or even directly notify brand owners. This allows brand owners to identify key trends associated with suspicious events, recall an audit trail for applicable items and approach individuals or organizations with those findings. This help brand owners identify and successfully recover damages from those accountable while preventing future incidents with grey market diversion. Just as with manufacturing overruns, these techniques can be successfully applied to challenges with theft. THEFT Theft is one of the oldest supply chain security challenges. But, new tools like mass serialization and traceability help brand owners prevent theft from happening and hold those accountable when it does. Although many stolen products drift off to the black market, never to been seen by the brand owner again, some turn up in open, visible marketplaces. In these cases, serialization, authentication and traceability tools help to identify which products were stolen. Brands that leverage serialization and traceability tools can match serial numbers from visible products against those known to be on the stolen shipment. Product authentication and traceability information can also be used to block the sale of stolen items, to help recover stolen items and even to identify key trends in theft. Those trends could include facilities, locations, products or routes with significant correlation to thefts. Like many other brand protection challenges, theft can be best addressed by leveraging serialization, authentication and traceability tools together over an extended period of time. Securing the Supply Chain with Serial Numbers 3

CONCLUSION Secure mass serialization, digital product authentication and item-level traceability give brand owners the tools to harness the power of big data, ultimately driving profitability gains. These tools can be key advantages in the fight against counterfeiting, manufacturing overruns, grey market diversion and theft. These tools are best used in data rich environments, which brands can create through broad implementations across product lines that continue to capture data over time. Although many of these tools create significant value individually, they create the greatest value when used in conjunction with each other. Securing the Supply Chain with Serial Numbers 4