SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Counterfeit Risk Mitigation  Bob Braasch, Sr Director Technical Support, IHS  June 22, 2011
Dynamic Nature of Supply ChainsSupply chains operate in the dynamic context of external forces… Part Trends ,[object Object]
Demand
Supply
Obsolescence
PCNs
CounterfeitsUnique Market Trends & Pressures ,[object Object]
Consumer
Medical Dev.
TelecomRegulations: ,[object Object]
Export
REACH
ConflictMineralsProduct Trends: ,[object Object]
Features
Cost
Energy Efficiency
CompetitiveDemand Material Mfrs. Component Mfrs. Product Mfrs. (OEMs and EMS)  End Users Supply Materials Products Components Economy ,[object Object]
Product demandSupply ,[object Object]
Raw MaterialsCosts ,[object Object]
Energy and Shipping costsCorporate Product Stewardship  Dynamic Context
IHS Design & Supply Chain SolutionsParts, Materials and Environmental Offerings 4DOnline Products Parts Universe & BOM Manager Regulation Tracking Content Services ERAI Counterfeits Teardown,  Price Tracker PCNAlert PCNAlert:	acquired 2007 ERAI (exclusive):partnership 2011 EIATrack:	acquired 2011 iSuppli: 	acquired 2010
Obsolescence & Counterfeit Correlation Where we see Counterfeits we see Discontinued Parts
Senate Armed Services Committee is seeking information from defense contractors and subcontractors regarding the extent of suspect counterfeit electronic parts… ,[object Object]
Policies related to record keeping, handling, reporting & disposition of suspect counterfeit electronic parts…“The presence of counterfeit electronic parts in the Defense Department’s supply chain is a growing problem that government and industry share a common interest in solving.” Carl Levin, D-Michigan, and Sen. John McCain, R-Arizona March 2011 Congress Investigation LaunchedMarch of 2011 top senators launch investigation
Manufacturers ResponsibilityFake Parts in U.S. Military June 16th 2011, CNN broadcast Counterfeit parts impact 40% of Pentagon’s Supply Chain according to U.S. Commerce Dept study Senator Brown (OH) recommends DOD cancel  supplier contracts when counterfeits are found in their supply chain  http://www.cnn.com/video/#/video/bestoftv/2011/06/16/exp.nr.seg.fake.military.parts.cnn?iref=allsearch
Costs can be ExtremeHard & soft costs add up Hard costs in millions are not uncommon Unrecoverable supplier payments Entire product immediately taken off line or out of service Soft costs can include Brand damage Product rollout delays Rework delays Urgent reprioritization Possible loss of life
Industry Standards & ReportsNew & updated standards expected in 2011 IDEA 1010B update  ,[object Object]
Released April 2011AS5553A update intended for OEMs ,[object Object],AS6171 intended for Test Providers ,[object Object]
Expected in balloting by end of 2011AS6081 intended for Distributors ,[object Object]
Currently in balloting

Weitere ähnliche Inhalte

Andere mochten auch

SolTec Labs Counterfeit Detection Program Overview
SolTec Labs Counterfeit Detection Program OverviewSolTec Labs Counterfeit Detection Program Overview
SolTec Labs Counterfeit Detection Program Overviewdgluskin
 
External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015Jo_Vann
 
Counterfeit Electronic Components - Keeping One Step Ahead
Counterfeit Electronic Components - Keeping One Step AheadCounterfeit Electronic Components - Keeping One Step Ahead
Counterfeit Electronic Components - Keeping One Step AheadPartsAndComponents
 
Anti-counterfeit Paris 2016
Anti-counterfeit Paris 2016Anti-counterfeit Paris 2016
Anti-counterfeit Paris 2016Jo_Vann
 
10 Ways to Find Counterfeit Components Using X-Rays
10 Ways to Find Counterfeit Components Using X-Rays10 Ways to Find Counterfeit Components Using X-Rays
10 Ways to Find Counterfeit Components Using X-RaysBill Cardoso
 
Counterfeit prevention & detection strategies, how to do it, when to do it.
Counterfeit prevention & detection strategies, how to do it, when to do it.Counterfeit prevention & detection strategies, how to do it, when to do it.
Counterfeit prevention & detection strategies, how to do it, when to do it.Greg Caswell
 

Andere mochten auch (6)

SolTec Labs Counterfeit Detection Program Overview
SolTec Labs Counterfeit Detection Program OverviewSolTec Labs Counterfeit Detection Program Overview
SolTec Labs Counterfeit Detection Program Overview
 
External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015External Anti-counterfeit standards July 14th 2015
External Anti-counterfeit standards July 14th 2015
 
Counterfeit Electronic Components - Keeping One Step Ahead
Counterfeit Electronic Components - Keeping One Step AheadCounterfeit Electronic Components - Keeping One Step Ahead
Counterfeit Electronic Components - Keeping One Step Ahead
 
Anti-counterfeit Paris 2016
Anti-counterfeit Paris 2016Anti-counterfeit Paris 2016
Anti-counterfeit Paris 2016
 
10 Ways to Find Counterfeit Components Using X-Rays
10 Ways to Find Counterfeit Components Using X-Rays10 Ways to Find Counterfeit Components Using X-Rays
10 Ways to Find Counterfeit Components Using X-Rays
 
Counterfeit prevention & detection strategies, how to do it, when to do it.
Counterfeit prevention & detection strategies, how to do it, when to do it.Counterfeit prevention & detection strategies, how to do it, when to do it.
Counterfeit prevention & detection strategies, how to do it, when to do it.
 

Ähnlich wie Counterfeit risk mitigation 06 21 2011 (2)

Supply & Demand Chain Executive Magazine
Supply & Demand Chain Executive MagazineSupply & Demand Chain Executive Magazine
Supply & Demand Chain Executive MagazineKristal Snider
 
Setting the supply chain standard slide share
Setting the supply chain standard   slide shareSetting the supply chain standard   slide share
Setting the supply chain standard slide shareKristal Snider
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training Kristal Snider
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsKristal Snider
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-componentsozgurv
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBilcareltd
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesNEW Momentum
 
GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...
GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...
GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...GreenBiz Group
 
An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...Kristal Snider
 
Counterfeit Part Avoidance
Counterfeit Part AvoidanceCounterfeit Part Avoidance
Counterfeit Part Avoidancedandimase
 
Counterfeit parts-awareness
Counterfeit parts-awarenessCounterfeit parts-awareness
Counterfeit parts-awarenessOziel Cardenas
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductSalesforce Developers
 
Why_Telecom_Consulting_Presentation
Why_Telecom_Consulting_PresentationWhy_Telecom_Consulting_Presentation
Why_Telecom_Consulting_PresentationJerry Pollio
 
Australia Conference 2018_The $250BN annual software support and maintenance ...
Australia Conference 2018_The $250BN annual software support and maintenance ...Australia Conference 2018_The $250BN annual software support and maintenance ...
Australia Conference 2018_The $250BN annual software support and maintenance ...Martin Thompson
 
Counterfeit Components - Mitigating Risk 2014
Counterfeit Components - Mitigating Risk 2014Counterfeit Components - Mitigating Risk 2014
Counterfeit Components - Mitigating Risk 2014Rory King
 
2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities 2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities CompTIA
 
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationDMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationRory King
 
Integrated Assessment Coursework
Integrated Assessment CourseworkIntegrated Assessment Coursework
Integrated Assessment CourseworkAdit Shamanur
 

Ähnlich wie Counterfeit risk mitigation 06 21 2011 (2) (20)

Supply & Demand Chain Executive Magazine
Supply & Demand Chain Executive MagazineSupply & Demand Chain Executive Magazine
Supply & Demand Chain Executive Magazine
 
Setting the supply chain standard slide share
Setting the supply chain standard   slide shareSetting the supply chain standard   slide share
Setting the supply chain standard slide share
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
 
15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components15 livingson-updated-cqsdi-baesystems-counterfeit-components
15 livingson-updated-cqsdi-baesystems-counterfeit-components
 
Brand Protection & Security of Engineering Components
Brand Protection & Security of Engineering ComponentsBrand Protection & Security of Engineering Components
Brand Protection & Security of Engineering Components
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
Impact of counterfeits on electronics companies
Impact of counterfeits on electronics companiesImpact of counterfeits on electronics companies
Impact of counterfeits on electronics companies
 
GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...
GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...
GreenBiz Forum 2015 Workshop Slides: "Conflict Minerals: Creating Industry-wi...
 
An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...
 
Counterfeit Part Avoidance
Counterfeit Part AvoidanceCounterfeit Part Avoidance
Counterfeit Part Avoidance
 
Counterfeit parts-awareness
Counterfeit parts-awarenessCounterfeit parts-awareness
Counterfeit parts-awareness
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
Why_Telecom_Consulting_Presentation
Why_Telecom_Consulting_PresentationWhy_Telecom_Consulting_Presentation
Why_Telecom_Consulting_Presentation
 
Australia Conference 2018_The $250BN annual software support and maintenance ...
Australia Conference 2018_The $250BN annual software support and maintenance ...Australia Conference 2018_The $250BN annual software support and maintenance ...
Australia Conference 2018_The $250BN annual software support and maintenance ...
 
Counterfeit Components - Mitigating Risk 2014
Counterfeit Components - Mitigating Risk 2014Counterfeit Components - Mitigating Risk 2014
Counterfeit Components - Mitigating Risk 2014
 
2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities 2016 IoT Insights and Opportunities
2016 IoT Insights and Opportunities
 
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationDMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
 
Integrated Assessment Coursework
Integrated Assessment CourseworkIntegrated Assessment Coursework
Integrated Assessment Coursework
 
The Connected Business - An FT.com Report
The Connected Business  - An FT.com ReportThe Connected Business  - An FT.com Report
The Connected Business - An FT.com Report
 

Mehr von Kristal Snider

D.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy WithinD.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy WithinKristal Snider
 
Understanding h.r. 1540 the national defense authorization act for fy2012 se...
Understanding h.r. 1540  the national defense authorization act for fy2012 se...Understanding h.r. 1540  the national defense authorization act for fy2012 se...
Understanding h.r. 1540 the national defense authorization act for fy2012 se...Kristal Snider
 
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...Kristal Snider
 
Erai executive conference 2012 video
Erai executive conference 2012 videoErai executive conference 2012 video
Erai executive conference 2012 videoKristal Snider
 
Avoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory ComponentsAvoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory ComponentsKristal Snider
 
The wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratoryThe wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratoryKristal Snider
 

Mehr von Kristal Snider (8)

Slideshow_NEW
Slideshow_NEWSlideshow_NEW
Slideshow_NEW
 
Share Parts NEW
Share Parts NEWShare Parts NEW
Share Parts NEW
 
D.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy WithinD.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy Within
 
Understanding h.r. 1540 the national defense authorization act for fy2012 se...
Understanding h.r. 1540  the national defense authorization act for fy2012 se...Understanding h.r. 1540  the national defense authorization act for fy2012 se...
Understanding h.r. 1540 the national defense authorization act for fy2012 se...
 
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
 
Erai executive conference 2012 video
Erai executive conference 2012 videoErai executive conference 2012 video
Erai executive conference 2012 video
 
Avoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory ComponentsAvoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory Components
 
The wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratoryThe wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratory
 

Kürzlich hochgeladen

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524najka9823
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 

Kürzlich hochgeladen (20)

Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524Call Girls Contact Number Andheri 9920874524
Call Girls Contact Number Andheri 9920874524
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 

Counterfeit risk mitigation 06 21 2011 (2)

  • 1. Counterfeit Risk Mitigation Bob Braasch, Sr Director Technical Support, IHS June 22, 2011
  • 2.
  • 7.
  • 10.
  • 12. REACH
  • 13.
  • 15. Cost
  • 17.
  • 18.
  • 19.
  • 20. Energy and Shipping costsCorporate Product Stewardship Dynamic Context
  • 21. IHS Design & Supply Chain SolutionsParts, Materials and Environmental Offerings 4DOnline Products Parts Universe & BOM Manager Regulation Tracking Content Services ERAI Counterfeits Teardown, Price Tracker PCNAlert PCNAlert: acquired 2007 ERAI (exclusive):partnership 2011 EIATrack: acquired 2011 iSuppli: acquired 2010
  • 22. Obsolescence & Counterfeit Correlation Where we see Counterfeits we see Discontinued Parts
  • 23.
  • 24. Policies related to record keeping, handling, reporting & disposition of suspect counterfeit electronic parts…“The presence of counterfeit electronic parts in the Defense Department’s supply chain is a growing problem that government and industry share a common interest in solving.” Carl Levin, D-Michigan, and Sen. John McCain, R-Arizona March 2011 Congress Investigation LaunchedMarch of 2011 top senators launch investigation
  • 25. Manufacturers ResponsibilityFake Parts in U.S. Military June 16th 2011, CNN broadcast Counterfeit parts impact 40% of Pentagon’s Supply Chain according to U.S. Commerce Dept study Senator Brown (OH) recommends DOD cancel supplier contracts when counterfeits are found in their supply chain http://www.cnn.com/video/#/video/bestoftv/2011/06/16/exp.nr.seg.fake.military.parts.cnn?iref=allsearch
  • 26. Costs can be ExtremeHard & soft costs add up Hard costs in millions are not uncommon Unrecoverable supplier payments Entire product immediately taken off line or out of service Soft costs can include Brand damage Product rollout delays Rework delays Urgent reprioritization Possible loss of life
  • 27.
  • 28.
  • 29.
  • 31. ARP6178 tool to access counterfeit risk of Distributors
  • 32. Expected in 2011SAE AS5553 issued April 2009
  • 33. Where does it come from?E-Waste The vast majority of product being sold in the China Open Market originates from e-waste. Unknown quantities of e-waste are exported from China to component buyers around the world. Nearly 75 million dollars in revenue is generated for the local Chinese Government in the city of Shantou alone. What incentive does the government have to control the import or export of this product? Much of the e-waste is remarked and counterfeited. Most of the distributors operating in and around Shenzhen have no experience in handling, storing or selling electronic components.
  • 34. Source: % of reported counterfeits from ERAI, 2004 to present What’s Being Counterfeited?All types of components are being counterfeited, even passives...
  • 35. Industry Standards & ReportsGIDEP and ERAI are the counterfeit reporting entities
  • 36. Exclusive Partner to Only IHSOne provider of counterfeit alerts and supply chain risk mitigation 12
  • 37. Who is ERAI Inc? Founded in 1995 ERAI is an information services organization that monitors, investigates and reports issues affecting the global electronics supply chain ERAI provides tools to mitigate risks on substandard parts, counterfeit parts and vendors Subscribers include OEMs, CMs, Distributors, OCMs, government agencies and industry associations Founding & active participant in SAE International G-19 Counterfeit Electronic Components Committee and several sub-groups
  • 38. How Risk Enters Your Supply Chain Intended and unintended ports of entry for counterfeits Many unsafe part & supplier “sources” Online Broker Search Engines Ease & convenience of Googling potential valid parts Engineers who make maverick purchases Counterfeit Suppliers have large audience of clients Professional looking websites Rapid access to millions of parts Minimal supplier validation Quick & easy access to a large audience of buyers Request for Quote Request for Quote Request for Quote … … … … Request for Quote
  • 39. 15 But No Supplier is Immune from RiskLack of accountability and traceability allows counterfeits to enter “It is not uncommon, however, for authorized distributors to purchase parts outside of the OCM supply chain in order to fulfill customer requirements – 58 percent purchase parts from other sources. Specifically, 47 percent of authorized distributors procure parts from independent distributors, 29 percent procure from brokers, and 27 percent procure from Internet-exclusive sources.” Source: U.S. Department of Commerce, Office of Technology Evaluation, Counterfeit Electronics Survey, November 2009.
  • 40. Best Practices to Avoid RiskStay Within Your Trusted Supply Chain Buy direct from the Factory Purchase from Approved Vendor / Manufacturer Procure from Franchised and Authorized Sources Leverage only Approved Independent Distributors ERAI Members Validate Parts and Sources Aftermarket Sources Alternate Parts Leverage U.S. Government QML/QPL Leverage other qualifying authorities Test appropriately Contractually define your expectations..
  • 41. How do IHS and ERAI help?Market Intelligence to Mitigate Counterfeit Risk AUTHORIZATION REQUIRED AUTHORIZATION REQUIRED ERAI notices GIDEP notices
  • 42. Example: Infineon BTS716G Alerts are accessible via the IHS product
  • 43.
  • 44.
  • 45. Example: Rockwell R6502APReported Parts Detail
  • 46. Example: Rockwell R6502APAll Available Images, Test Reports, Inspection, etc.
  • 47. Ability to View Supplier Report CardExample
  • 48. Example: AAOK ElectronicsPast due invoices, wire fraud, faulty product for example…
  • 49. View Real Stock on Available PartsLimit risk exposure from fake sources and price games
  • 50. BOM Risk Analysis & Monitoringvia ERAI BOM Scrubber
  • 51. BOM Analysis: Risk IdentifiedProvides counterfeit details on your BOM
  • 54. Access to Counterfeit IncidentsOver 10 years of counterfeit part and supplier report history

Hinweis der Redaktion

  1. Our supply chains operate within a “dynamic context” which incorporates many things that are beyond our individual control. Some of the challenging items making up the dynamic context includes regulations, part trends, product trends, Market pressures, Corp stewardship, economy, supply constraints & cost pressures to name a few. For exampleEU RoHS regulations can drive reductions to the supply of leaded parts thus driving prices up for users of these componentsPart obsolescence has significant consequences to OEM component selection & forces expensive product redesign or last time buy purchases Product technology improvements from Apple & other market leading companies, as they upgrade their display or use more energy efficient components drive others in the supply chain to look at these newer technologiesCorporate policies can also drive supply chain constraints – for example if a company chooses to use only halogen free materials will drive new business processesNatural disasters like the Japanese earthquake reduced the availability of silicon, thus reducing the availability of memory devices Although we do not control most of these external influences on our supply chain, we can gain better visibility and management to them.Quite often our goal as is to manage these issues in the most cost-effective way and use effective and reasonable strategies that put us in leadership position compared to our peer group while adhering to our company stakeholders.
  2. IHS’s Design & Supply Chain portfolio of solutions help companies gain better visibility to triggers that impact their supply chains. From gaining insight to predicted component obsolescence to getting early visibility to End of Life notices to exposure to counterfeit components to tracking updates to new global regulations or technology & price trends, IHS can help companies improve their insight on events that can drive significant disruptions to their supply chainIn this presentation I am going to talk specifically about Counterfeit Risk mitigation. I am happy to talk about any of the other items list on this slide during the cocktail reception this evening.
  3. I would like to start off by providing you with visibility into the correlation btwn counterfeit notices and obsolete components. By reviewing the last 10 years of published counterfeit incidents, IHS found that over 50% of the counterfeit notices were for components that were obsolete. The insight here is to ensure you have a robust obsolescence program to ensure you have less exposure to counterfeit parts in your supply chain.
  4. To confirm the hightened Visibility that counterfeit risk is getting this slide summarizes the recent actions by the Senate Armed Services CommitteeThis past March, 2011, the top senators on the Senate Armed Services Committee announced a congressional investigation into counterfeit electronics being used in military equipment. Specifically this committee sent letters to the CEOs of a dozen major DOD suppliers asking them for the counterfeit incidents they have had over the past 2 years along with their company Counterfeit Risk Mitigation policy. Furthermore this committee has been verifying the reported counterfeit occurrences with the individual company test labs to verify the validity of the information they are being provided. This committee believes that there have been significant increase in counterfeit activity and the possible risks ranging from reliability failure, threats to the health and safety of our armed forces, and the potential sabotage or security breaches within the DoD supply chain due to counterfeit components.I have personally spoken with a number of the companies that received these letters and let me tell you they are scrambling to tighten up their own counterfeit mitigation corporate strategy and that of their suppliers.
  5. The costs of getting this wrong can be enormous. I can confirm based on my talks with suppliers who have been burned by counterfeits that these costs can range as high as $1M to $2M for procuring and installing counterfeit components in their products.
  6. Industry has been actively updating or creating new standards to help companies mitigate the risks of counterfeit.SAE AS5553 was one of the first standards to provide guidance on how OEMs can best mitigate counterfeit risks. This standard is being updated and due out for balloting by end of this year. Other new standards for Test Providers, and Distributors are also expected soon.One of the processes outlined in these standards is for companies to Ensure Component Source Selection includes review previously documented counterfeit problems. This is where IHS can assist companies.
  7. Lets step back for a minute and review where the counterfeits are coming from and what is driving this.China has been recognized as the primary source for counterfeits. The side effect of all the e-Waste that has been shipped to China has been the driver of the counterfeit problem. In cities such as Shenzhen China, armies of individuals are extracting used electronic components and misrepresenting them as new or higher grade then what they truly are.
  8. Counterfeits over the past 6 years have been primarily Integrated Circuits but certainly not limited to this category of parts
  9. So where can companies go to get communication on counterfeit issues? The major sources for information on counterfeit incidents have come from GIDEP and ERAI, with ERAI delivering almost 80 percent of the communications over the past 10 years. If you look at 2011 YTD, ERAI’s dominance in this communication has gotten even stronger, at 97%.
  10. IHS is very fortunate to have an exclusive agreement with ERAI to provide visibility to counterfeit incidents to our electronic parts customers. As I revealed earlier, with a strong correlation between counterfeits and obsolescence, IHS was the first to incorporate this type of data in our component obsolescence tools and is the only tool provider that contains the extensive collection of ERAI counterfeit part content.
  11. Online Broker Search Engines Ease & convenience of Googling potential valid parts Well intentioned engineers who make maverick purchasesProfessional looking websites Rapid access to millions of partsMinimal supplier validationQuick & easy access to a large audience of buyers
  12. I encourage you to purchase the SAE AS553 standard or other new counterfeit mitigation standards for a detailed review of industry best practices. Here is a very short summary of recommendations:Buy direct from the FactoryPurchase from Approved Vendor / ManufacturerProcure from Franchised and Authorized SourcesLeverage only Approved Independent DistributorsERAI MembersValidate Parts and SourcesAftermarket SourcesAlternate PartsLeverage U.S. Government QML/QPLLeverage other qualifying authoritiesEqually importantly:Test appropriately Contractually define your expectations..
  13. Acetone test revealed parts counterfeit