SlideShare a Scribd company logo
1 of 14
Understanding H.R.1540:
The National Defense Authorization
Act for FY2012 Section 818
Kristal Snider
Vice President, ERAI
April 2012
Copyright © 2011 ERAI Inc. All Rights Reserved.
Who is ERAI?
Copyright © 2011 ERAI Inc. All Rights Reserved.
What is the ERAI Executive Conference?
Copyright © 2011 ERAI Inc. All Rights Reserved.
What is H.R.1540: The National Defense
Authorization Act for Fiscal Year 2012?
“Counterfeit parts pose an
increasing risk to our
national security, to the
reliability of our weapons
systems and to the safety
of our men and women in
uniform.”
Arizona Senator John McCain
Nov 8th 2011
Copyright © 2011 ERAI Inc. All Rights Reserved.
What is NDAA Sec. 818. “Detection and
Avoidance of Counterfeit Electronic Parts”?
Copyright © 2011 ERAI Inc. All Rights Reserved.
What are “Trusted Supplier” requirements
to assess potential sources of supply?
• (e) IMPROVEMENT OF CONTRACTOR SYSTEMS FOR DETECTION AND AVOIDANCE OF COUNTERFEIT
ELECTRONIC PARTS
• IN GENERAL.—Not later than 270 days after the date of the enactment of this Act, the Secretary of Defense shall
implement a program to enhance contractor detection and avoidance of counterfeit electronic parts.
• ELEMENTS.—The program implemented pursuant to paragraph (1) shall—
• require covered contractors that supply electronic parts or systems that contain electronic parts to establish policies and
procedures to eliminate counterfeit electronic parts from the defense supply chain, which policies and procedures shall
address—
• the training of personnel;
• the inspection and testing of electronic parts;
• processes to abolish counterfeit parts proliferation;
• mechanisms to enable traceability of parts;
• use of trusted suppliers;
• the reporting and quarantining of counterfeit electronic parts and suspect counterfeit electronic parts;
• methodologies to identify suspect counterfeit parts and to rapidly determine if a suspect counterfeit part
is, in fact, counterfeit;
• the design, operation, and maintenance of systems to detect and avoid counterfeit electronic parts and
suspect counterfeit electronic parts; and
• the flow down of counterfeit avoidance and detection requirements to subcontractors; and (B) establish
processes for the review and approval of contractor systems for the detection and avoidance of
counterfeit electronic parts and suspect counterfeit electronic parts, which processes shall be
comparable to the processes established for contractor business systems under section 893 of the Ike
Skelton National Defense Authorization Act for Fiscal Year 2011 (Public Law 111–383; 124 Stat. 4311;
10 U.S.C. 2302 note).
Copyright © 2011 ERAI Inc. All Rights Reserved.
How does NDAA address a risk-based
approach to purchasing electronic parts?
Copyright © 2011 ERAI Inc. All Rights Reserved.
What are the “flow down” requirements in
the supply chain? What will this mean?
• (e) IMPROVEMENT OF CONTRACTOR SYSTEMS FOR DETECTION AND AVOIDANCE OF COUNTERFEIT
ELECTRONIC PARTS
• IN GENERAL.—Not later than 270 days after the date of the enactment of this Act, the Secretary of Defense shall
implement a program to enhance contractor detection and avoidance of counterfeit electronic parts.
• ELEMENTS.—The program implemented pursuant to paragraph (1) shall—
• require covered contractors that supply electronic parts or systems that contain electronic parts to establish policies and
procedures to eliminate counterfeit electronic parts from the defense supply chain, which policies and procedures shall
address—
• the training of personnel;
• the inspection and testing of electronic parts;
• processes to abolish counterfeit parts proliferation;
• mechanisms to enable traceability of parts;
• use of trusted suppliers;
• the reporting and quarantining of counterfeit electronic parts and suspect counterfeit electronic parts;
• methodologies to identify suspect counterfeit parts and to rapidly determine if a suspect counterfeit part
is, in fact, counterfeit;
• the design, operation, and maintenance of systems to detect and avoid counterfeit electronic parts and
suspect counterfeit electronic parts; and
• the flow down of counterfeit avoidance and detection requirements to subcontractors; and (B)
establish processes for the review and approval of contractor systems for the detection and avoidance
of counterfeit electronic parts and suspect counterfeit electronic parts, which processes shall be
comparable to the processes established for contractor business systems under section 893 of the Ike
Skelton National Defense Authorization Act for Fiscal Year 2011 (Public Law 111–383; 124 Stat. 4311;
10 U.S.C. 2302 note).
Copyright © 2011 ERAI Inc. All Rights Reserved.
What does NDAA discuss regarding the
definition of “counterfeit electronic part”?
Copyright © 2011 ERAI Inc. All Rights Reserved.
How is industry reacting from to legal and
contractual matters?
Copyright © 2011 ERAI Inc. All Rights Reserved.
What are the penalties of non-compliance?
Contractors
must…
• Detect and Avoid
Counterfeits
• Establish policies and
procedures to eliminate
counterfeits
• Report counterfeits to
govt. within 60 days
• Perform and bear cost of
rework or corrective action
Suppliers
must…
• Obtain parts from original
manufacturers or
authorized dealers when
possible
• Obtain obsolete parts from
―trusted‖ suppliers when
necessary
• For other sources:
• inspect, test and
authenticate electronic
parts
• Notify DoD
Penalties for non-
compliance
• Jeopardize ability to sell to
gov’t if fail to detect
counterfeits or exercise
adequate due diligence
• Criminal penalties for
intentional trafficking
• Individual: $2M + up to
10 years jail
• Company: $5M
• Additional offenses
escalate penalties
Copyright © 2011 ERAI Inc. All Rights Reserved.
What are Supply Chain implications for..
• International Companies…
Are We In Scope?
• Ignorance…
If We Ignore Counterfeits, Will All This Eventually Go Away?
• Systems Integrators…
Why Should I Assess “black box” Items?
• Contract Manufacturers and Suppliers…
Can’t I pass all responsibility to them?
Copyright © 2011 ERAI Inc. All Rights Reserved.
What does ERAI offer to assist with NDAA?
• Part Sourcing
• Company Search and AVL Management / Enforcement
• Detailed Information Regarding Reported Suppliers
• Reported Companies Database & Supplier Screening Tools
• Detailed Information Regarding Reported Parts
• Reported Parts Database and Part Screening Tools
• Images and Test/Nonconformance Reports
• ERAI Member Search
• BOM Analysis, Monitoring, and Incident Alerting
• Complaint Filing & Incident Resolution
Copyright © 2012 IHS Inc. All Rights Reserved.
Your Action Item: Join us May 17-18!
www.ERAI.com | ERAI Executive Conference
 Featured Speakers Include:
• Director Legal Affairs and Tax, AIA
• Procurement Quality Assurance, NASA
• Executive Director, IDEA
• G-19 Committee Chairman, SAE International
• Director of Advanced Technical Operations, IEC Electronics
• Senior Semiconductors/CPT Analyst, IHS iSuppli
 Presentation topics include:
• New reporting requirements
• The term ―counterfeit‖ as it is currently defined
• Processes to abolish counterfeit part proliferation
• New personnel training requirements
• Sourcing and procurement
• Obsolescence, compliance and counterfeit risks
• Component pricing forecasts, analysis, and benchmarking capabilities
• Health status and outlook of the overall supply and demand for
electronic components
• Supply chain traceability
• Identifying ―trusted sources‖
• Debarring sources who have failed to exercise due diligence
• More…

More Related Content

What's hot

Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Swant Anand
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In PakistanShakeel Ahmed
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYpattok
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT securityAdv Prashant Mali
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology ActKaran Bhagatwala
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.aviavinashmsy
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Adv Prashant Mali
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtCell Site Analysis (CSA)
 
News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017Andrey Apuhtin
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issuesSagar Rahurkar
 

What's hot (20)

Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)Cyber Law & Crime (Information Technology Act, 2000)
Cyber Law & Crime (Information Technology Act, 2000)
 
Cyber Governemace In Pakistan
Cyber Governemace In PakistanCyber Governemace In Pakistan
Cyber Governemace In Pakistan
 
INDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITYINDIAN CYBERLAW AND SECURITY
INDIAN CYBERLAW AND SECURITY
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Indian Information Technology Act
Indian Information Technology ActIndian Information Technology Act
Indian Information Technology Act
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Information technology act 2000.avi
Information technology act 2000.aviInformation technology act 2000.avi
Information technology act 2000.avi
 
IT Act,2000 - Law
IT Act,2000 - LawIT Act,2000 - Law
IT Act,2000 - Law
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Cyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation GianinoCyber Facts and Prevention Presentation Gianino
Cyber Facts and Prevention Presentation Gianino
 
ppt Cybercrime
ppt Cybercrimeppt Cybercrime
ppt Cybercrime
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Digital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the courtDigital Evidence - the defence, prosecution, & the court
Digital Evidence - the defence, prosecution, & the court
 
News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017News berthaume-sentencing-jan2017
News berthaume-sentencing-jan2017
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Privacy in India: Legal issues
Privacy in India: Legal issuesPrivacy in India: Legal issues
Privacy in India: Legal issues
 

Viewers also liked

Lucha Lotta Sales Deck
Lucha Lotta Sales DeckLucha Lotta Sales Deck
Lucha Lotta Sales DeckBrandInk Group
 
Paul Moschell Sales Deck
Paul Moschell Sales DeckPaul Moschell Sales Deck
Paul Moschell Sales DeckBrandInk Group
 
T7. la distribución
T7. la distribuciónT7. la distribución
T7. la distribuciónandrespascual
 
Kris Kros Applesauce Sales Deck
Kris Kros Applesauce Sales DeckKris Kros Applesauce Sales Deck
Kris Kros Applesauce Sales DeckBrandInk Group
 
1 c 2 aproximación a un modelo de gestión integral de planta física universit...
1 c 2 aproximación a un modelo de gestión integral de planta física universit...1 c 2 aproximación a un modelo de gestión integral de planta física universit...
1 c 2 aproximación a un modelo de gestión integral de planta física universit...Mercedes Marrero
 

Viewers also liked (6)

CryptoZu Sales Deck
CryptoZu Sales DeckCryptoZu Sales Deck
CryptoZu Sales Deck
 
Lucha Lotta Sales Deck
Lucha Lotta Sales DeckLucha Lotta Sales Deck
Lucha Lotta Sales Deck
 
Paul Moschell Sales Deck
Paul Moschell Sales DeckPaul Moschell Sales Deck
Paul Moschell Sales Deck
 
T7. la distribución
T7. la distribuciónT7. la distribución
T7. la distribución
 
Kris Kros Applesauce Sales Deck
Kris Kros Applesauce Sales DeckKris Kros Applesauce Sales Deck
Kris Kros Applesauce Sales Deck
 
1 c 2 aproximación a un modelo de gestión integral de planta física universit...
1 c 2 aproximación a un modelo de gestión integral de planta física universit...1 c 2 aproximación a un modelo de gestión integral de planta física universit...
1 c 2 aproximación a un modelo de gestión integral de planta física universit...
 

Similar to Understanding h.r. 1540 the national defense authorization act for fy2012 section 818

Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsIHS
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsKristal Snider
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyButlerRubin
 
cyber law analyst certification
cyber law analyst certificationcyber law analyst certification
cyber law analyst certificationVskills
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskShawn Tuma
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical HackingIRJET Journal
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowShawn Tuma
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comrobertleew4
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxtalhajann43
 
Ajs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comAjs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comHarrisGeorg5
 
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...Kristal Snider
 
Ajs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comAjs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comStokesCope5
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferenceBill Despo
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 

Similar to Understanding h.r. 1540 the national defense authorization act for fy2012 section 818 (20)

Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense Regulations
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components TrendsSuspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
Suspect Counterfeit, Non-Conforming and High Risk Electronic Components Trends
 
How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?How can you improve cybersecurity at your law firm?
How can you improve cybersecurity at your law firm?
 
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & PrivacyDo You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
Do You Wannacry: Your Ethical and Legal Duties Regarding Cybersecurity & Privacy
 
cyber law analyst certification
cyber law analyst certificationcyber law analyst certification
cyber law analyst certification
 
Legal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber RiskLegal Issues Associated with Third-Party Cyber Risk
Legal Issues Associated with Third-Party Cyber Risk
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
IRJET- Ethical Hacking
IRJET- Ethical HackingIRJET- Ethical Hacking
IRJET- Ethical Hacking
 
Cybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to KnowCybersecurity Legal Issues: What You Really Need to Know
Cybersecurity Legal Issues: What You Really Need to Know
 
Ajs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.comAjs 524 Enhance teaching-snaptutorial.com
Ajs 524 Enhance teaching-snaptutorial.com
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
L12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptxL12. Digital Forensics BS.pptx
L12. Digital Forensics BS.pptx
 
Ajs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.comAjs 524 Effective Communication / snaptutorial.com
Ajs 524 Effective Communication / snaptutorial.com
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
DMSMS 2012 - By Joining Forces the Procurement of Counterfeit Parts can be Av...
 
Ajs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.comAjs 524Believe Possibilities / snaptutorial.com
Ajs 524Believe Possibilities / snaptutorial.com
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 Conference
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

More from Kristal Snider

An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...Kristal Snider
 
D.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy WithinD.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy WithinKristal Snider
 
Erai executive conference 2012 video
Erai executive conference 2012 videoErai executive conference 2012 video
Erai executive conference 2012 videoKristal Snider
 
Setting the supply chain standard slide share
Setting the supply chain standard   slide shareSetting the supply chain standard   slide share
Setting the supply chain standard slide shareKristal Snider
 
Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Kristal Snider
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit RiskKristal Snider
 
Supply & Demand Chain Executive Magazine
Supply & Demand Chain Executive MagazineSupply & Demand Chain Executive Magazine
Supply & Demand Chain Executive MagazineKristal Snider
 
Avoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory ComponentsAvoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory ComponentsKristal Snider
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training Kristal Snider
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beardKristal Snider
 
The wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratoryThe wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratoryKristal Snider
 

More from Kristal Snider (13)

Slideshow_NEW
Slideshow_NEWSlideshow_NEW
Slideshow_NEW
 
Share Parts NEW
Share Parts NEWShare Parts NEW
Share Parts NEW
 
An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...An overview of historical trends related to suspect counterfeit and nonconfor...
An overview of historical trends related to suspect counterfeit and nonconfor...
 
D.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy WithinD.C. Counterfeit Microelectronics Working Group - The Enemy Within
D.C. Counterfeit Microelectronics Working Group - The Enemy Within
 
Erai executive conference 2012 video
Erai executive conference 2012 videoErai executive conference 2012 video
Erai executive conference 2012 video
 
Setting the supply chain standard slide share
Setting the supply chain standard   slide shareSetting the supply chain standard   slide share
Setting the supply chain standard slide share
 
Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)Counterfeit risk mitigation 06 21 2011 (2)
Counterfeit risk mitigation 06 21 2011 (2)
 
Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit Risk
 
Supply & Demand Chain Executive Magazine
Supply & Demand Chain Executive MagazineSupply & Demand Chain Executive Magazine
Supply & Demand Chain Executive Magazine
 
Avoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory ComponentsAvoiding and Resolving Disputes over Unsatisfactory Components
Avoiding and Resolving Disputes over Unsatisfactory Components
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training
 
Counterfeit parts prevention kristal snider and kevin beard
Counterfeit parts prevention   kristal snider and kevin beardCounterfeit parts prevention   kristal snider and kevin beard
Counterfeit parts prevention kristal snider and kevin beard
 
The wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratoryThe wrong way and right way of retaining a testing laboratory
The wrong way and right way of retaining a testing laboratory
 

Recently uploaded

Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 

Recently uploaded (20)

Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 

Understanding h.r. 1540 the national defense authorization act for fy2012 section 818

  • 1. Understanding H.R.1540: The National Defense Authorization Act for FY2012 Section 818 Kristal Snider Vice President, ERAI April 2012
  • 2. Copyright © 2011 ERAI Inc. All Rights Reserved. Who is ERAI?
  • 3. Copyright © 2011 ERAI Inc. All Rights Reserved. What is the ERAI Executive Conference?
  • 4. Copyright © 2011 ERAI Inc. All Rights Reserved. What is H.R.1540: The National Defense Authorization Act for Fiscal Year 2012? “Counterfeit parts pose an increasing risk to our national security, to the reliability of our weapons systems and to the safety of our men and women in uniform.” Arizona Senator John McCain Nov 8th 2011
  • 5. Copyright © 2011 ERAI Inc. All Rights Reserved. What is NDAA Sec. 818. “Detection and Avoidance of Counterfeit Electronic Parts”?
  • 6. Copyright © 2011 ERAI Inc. All Rights Reserved. What are “Trusted Supplier” requirements to assess potential sources of supply? • (e) IMPROVEMENT OF CONTRACTOR SYSTEMS FOR DETECTION AND AVOIDANCE OF COUNTERFEIT ELECTRONIC PARTS • IN GENERAL.—Not later than 270 days after the date of the enactment of this Act, the Secretary of Defense shall implement a program to enhance contractor detection and avoidance of counterfeit electronic parts. • ELEMENTS.—The program implemented pursuant to paragraph (1) shall— • require covered contractors that supply electronic parts or systems that contain electronic parts to establish policies and procedures to eliminate counterfeit electronic parts from the defense supply chain, which policies and procedures shall address— • the training of personnel; • the inspection and testing of electronic parts; • processes to abolish counterfeit parts proliferation; • mechanisms to enable traceability of parts; • use of trusted suppliers; • the reporting and quarantining of counterfeit electronic parts and suspect counterfeit electronic parts; • methodologies to identify suspect counterfeit parts and to rapidly determine if a suspect counterfeit part is, in fact, counterfeit; • the design, operation, and maintenance of systems to detect and avoid counterfeit electronic parts and suspect counterfeit electronic parts; and • the flow down of counterfeit avoidance and detection requirements to subcontractors; and (B) establish processes for the review and approval of contractor systems for the detection and avoidance of counterfeit electronic parts and suspect counterfeit electronic parts, which processes shall be comparable to the processes established for contractor business systems under section 893 of the Ike Skelton National Defense Authorization Act for Fiscal Year 2011 (Public Law 111–383; 124 Stat. 4311; 10 U.S.C. 2302 note).
  • 7. Copyright © 2011 ERAI Inc. All Rights Reserved. How does NDAA address a risk-based approach to purchasing electronic parts?
  • 8. Copyright © 2011 ERAI Inc. All Rights Reserved. What are the “flow down” requirements in the supply chain? What will this mean? • (e) IMPROVEMENT OF CONTRACTOR SYSTEMS FOR DETECTION AND AVOIDANCE OF COUNTERFEIT ELECTRONIC PARTS • IN GENERAL.—Not later than 270 days after the date of the enactment of this Act, the Secretary of Defense shall implement a program to enhance contractor detection and avoidance of counterfeit electronic parts. • ELEMENTS.—The program implemented pursuant to paragraph (1) shall— • require covered contractors that supply electronic parts or systems that contain electronic parts to establish policies and procedures to eliminate counterfeit electronic parts from the defense supply chain, which policies and procedures shall address— • the training of personnel; • the inspection and testing of electronic parts; • processes to abolish counterfeit parts proliferation; • mechanisms to enable traceability of parts; • use of trusted suppliers; • the reporting and quarantining of counterfeit electronic parts and suspect counterfeit electronic parts; • methodologies to identify suspect counterfeit parts and to rapidly determine if a suspect counterfeit part is, in fact, counterfeit; • the design, operation, and maintenance of systems to detect and avoid counterfeit electronic parts and suspect counterfeit electronic parts; and • the flow down of counterfeit avoidance and detection requirements to subcontractors; and (B) establish processes for the review and approval of contractor systems for the detection and avoidance of counterfeit electronic parts and suspect counterfeit electronic parts, which processes shall be comparable to the processes established for contractor business systems under section 893 of the Ike Skelton National Defense Authorization Act for Fiscal Year 2011 (Public Law 111–383; 124 Stat. 4311; 10 U.S.C. 2302 note).
  • 9. Copyright © 2011 ERAI Inc. All Rights Reserved. What does NDAA discuss regarding the definition of “counterfeit electronic part”?
  • 10. Copyright © 2011 ERAI Inc. All Rights Reserved. How is industry reacting from to legal and contractual matters?
  • 11. Copyright © 2011 ERAI Inc. All Rights Reserved. What are the penalties of non-compliance? Contractors must… • Detect and Avoid Counterfeits • Establish policies and procedures to eliminate counterfeits • Report counterfeits to govt. within 60 days • Perform and bear cost of rework or corrective action Suppliers must… • Obtain parts from original manufacturers or authorized dealers when possible • Obtain obsolete parts from ―trusted‖ suppliers when necessary • For other sources: • inspect, test and authenticate electronic parts • Notify DoD Penalties for non- compliance • Jeopardize ability to sell to gov’t if fail to detect counterfeits or exercise adequate due diligence • Criminal penalties for intentional trafficking • Individual: $2M + up to 10 years jail • Company: $5M • Additional offenses escalate penalties
  • 12. Copyright © 2011 ERAI Inc. All Rights Reserved. What are Supply Chain implications for.. • International Companies… Are We In Scope? • Ignorance… If We Ignore Counterfeits, Will All This Eventually Go Away? • Systems Integrators… Why Should I Assess “black box” Items? • Contract Manufacturers and Suppliers… Can’t I pass all responsibility to them?
  • 13. Copyright © 2011 ERAI Inc. All Rights Reserved. What does ERAI offer to assist with NDAA? • Part Sourcing • Company Search and AVL Management / Enforcement • Detailed Information Regarding Reported Suppliers • Reported Companies Database & Supplier Screening Tools • Detailed Information Regarding Reported Parts • Reported Parts Database and Part Screening Tools • Images and Test/Nonconformance Reports • ERAI Member Search • BOM Analysis, Monitoring, and Incident Alerting • Complaint Filing & Incident Resolution
  • 14. Copyright © 2012 IHS Inc. All Rights Reserved. Your Action Item: Join us May 17-18! www.ERAI.com | ERAI Executive Conference  Featured Speakers Include: • Director Legal Affairs and Tax, AIA • Procurement Quality Assurance, NASA • Executive Director, IDEA • G-19 Committee Chairman, SAE International • Director of Advanced Technical Operations, IEC Electronics • Senior Semiconductors/CPT Analyst, IHS iSuppli  Presentation topics include: • New reporting requirements • The term ―counterfeit‖ as it is currently defined • Processes to abolish counterfeit part proliferation • New personnel training requirements • Sourcing and procurement • Obsolescence, compliance and counterfeit risks • Component pricing forecasts, analysis, and benchmarking capabilities • Health status and outlook of the overall supply and demand for electronic components • Supply chain traceability • Identifying ―trusted sources‖ • Debarring sources who have failed to exercise due diligence • More…

Editor's Notes

  1. Defense Bill:  What is H.R.1540: National Defense Authorization Act for Fiscal Year 2012?How did the NDAA come to pass?What is the specific section of the Defense Bill which pertains to counterfeiting?
  2. Requirements:  Generally, what are the NDAA requirements for Sec. 818. Detection and Avoidance of Counterfeit Electronic Parts?For GovernmentFor Contractors and Sub-Contractors
  3. Parts Requirements:  What requirements does NDAA have for developing a risk-based approach to purchasing of electronic parts?For Reporting?For Detection & Avoidance Systems?
  4. Supply Chain:  What are the “flow down” requirements?What does this mean and what are the implications?Should companies be doing anything with their suppliers?  Are companies sending letters to suppliers asking for counterfeit detection and avoidance?  What are they doing?
  5. Definition of Counterfeits:  What does the NDAA discuss regarding the definition of “counterfeits”?What does this mean?
  6. Legal:  What implications or discussions is industry having from legal or contractual perspectives?What contractual implications or related discussions are going on in industry?
  7. Supply Chain Implications:  International Scope:  Are international companies immune from this U.S. regulation or do they have to participate?Ignorance:  Like a security breach of a credit card company, many companies want to ignore thinking they have a problem.  They aren’t investigating tools.  Is this a bad idea?Systems Integrators:  Many companies have “black box” parts/assemblies that SI’s provide as a finished unit.  Do they need counterfeit information from their SI/suppliers?  Can’t they just have their suppliers handle the detection, avoidance and tracking requirements of NDAA?Contract Manufacturing:  Can’t companies just flow the requirements on to contract manufacturers and have them deal with it?  Why does an OEM need to do anything?