SlideShare a Scribd company logo
1 of 58
Download to read offline
Avoiding Counterfeit Risk
Hosted by Supply & Demand Chain Executive
and featuring IHS, ERAI Inc, and L-3 Communications

February 23, 2011
A Global Supply Chain Problem
We’ve Entered a Generation of Counterfeiting & Piracy


     “We estimate that, based on 2008
     data, the total global economic
     value of counterfeit and pirated
     products is as much as $650 billion
     every year…
     …estimates imply that the global
     value of counterfeit and pirated
     products could be up to $1.77
     trillion by 2015.”
                 Frontier Economics, February 2011




 2
Today’s Speakers
Recognized Industry Experts

 Moderator
    Andrew K. Reese
      • Editor, Supply & Demand Chain Executive


 Panelists
    Mark A. Snider
      • President, ERAI, Inc. and IHS Partnership Executive Sponsor
    Kristal Snider
      • Vice President, ERAI, Inc. and G-19 Committee Member
    Rick Roelecke
      • Director of Quality Assurance for L-3 Wescam Sonoma Operations
      • L-3 Communications Corporate Counterfeit Parts Lead
We want your feedback!
Win for completing today’s webcast survey

          At the end of today’s survey…

          Everyone who completes the survey at
          the conclusion of today’s live event will
          be entered into a drawing for to win an
          Amazon Kindle.
ERAI Inc.
A World of Information at Your Fingertips




  • Founded in 1995, ERAI is an information services organization that monitors,
    investigates and reports issues affecting the global hi-tech electronics supply
    chain.
  • ERAI provides tools to mitigate risks on substandard parts, counterfeit parts,
    vendors and even customers.
  • Subscribers include OEMs, CMs, Distributors, OCMs, government agencies
    and industry associations.
  • Actively involved in a number of committees and task forces addressing the
    counterfeit issue.
IHS and ERAI Combat Counterfeits
Exclusive Partnership Providing Market Intelligence




                                 “ENGLEWOOD, Colo. (January 12, 2010)
                                 - IHS Inc. (NYSE:IHS), a leading global
                                 source of critical information and insight,
                                 today announced an agreement with ERAI,
                                 Inc. to be its exclusive worldwide partner
                                 for delivering products and services
                                 designed to mitigate the risks associated
                                 with counterfeit, substandard and high-risk
                                 parts found throughout global supply
                                 chains…”




  6
IHS Inc.
A Leading Information Provider




 • Founded in 1959, IHS is a leading source of information and expert analysis in
   pivotal areas shaping today’s global businesses

 • Employs 4,400 colleagues in 30 countries who speak 50 different languages

 • IHS customers include nearly 70% of the US Fortune1000 and 80% of the
   Global Fortune 500

 • Tens of thousands of customers and hundreds of thousands of end-users in
   over 100 countries
     •   Public (2005)   NYSE: IHS

     •   FY10 revenue    $ 1,075 million




 7
Why IHS?
Opportunity to Help Thousands of IHS Global Customers




      Avid
Problem: How the Market Sees It
Proactive Mitigation to Resolution when Counterfeits Detected

Challenge                                                Economic downturn…                            …shortage…                           …fake parts…




                                                                                                                                                …mission failure!

Customer Workflow Needed
         Qualify                            Manage                            Validate                      Report                   Redesign
        + Approve                           + Avoid                           + Detect                     + Resolve                 + Resupply

 Establish infrastructure to       Update processes, tools, and      Validate, sample and test      Procedures to notify       Maintain controlled
 mitigate risk through qualified   information to avoid              components for authenticity.   stakeholders, report       design/redesign cycles of
 and approved designs,             counterfeit and high risk         Quarantine suspected           occurrences, and resolve   products. Optimize parts,
 suppliers, & parts.               parts.                            counterfeits.                  incidents.                 inventory, and suppliers.



    KPI: EOL / Lifecycle Planning                                   KPI: Shortages                         KPI: Price/Lead            KPI: Counterfeit
                                                                                                                Time                     Incidents




Copyright © 20011 IHS Global Inc. All Rights Reserved.                  January 2011                                                                                9
Solution: IHS-ERAI Market Intelligence
Unrivalled Solutions from IHS iSuppli, PLC, and ERAI

Challenge                                                Economic downturn…                            …shortage…                                      …fake parts…




                                                                                                                                                          …mission failure!

Customer Workflow
         Qualify                            Manage                            Validate                      Report                           Redesign
        + Approve                           + Avoid                           + Detect                     + Resolve                         + Resupply

 Establish infrastructure to       Update processes, tools, and      Validate, sample and test      Procedures to notify              Maintain controlled
 mitigate risk through qualified   information to avoid              components for authenticity.   stakeholders, report              design/redesign cycles of
 and approved designs,             counterfeit and high risk         Quarantine suspected           occurrences, and resolve          products. Optimize parts,
 suppliers, & parts.               parts.                            counterfeits.                  incidents.                        inventory, and suppliers.



Products & Services
                   IHS iSuppli                                                   IHS PLC                                              IHS ERAI*
           Market Trackers                                            Standards Expert                                         BOM Scrubber Management Suite

           Teardown Analyses                                          Haystack                                                 Company Search

           Forecasts & Measures                                       4DOnline Product Family                                  Reported Company Search

           Analyst Inquiry Time                                       PCMS                                                     Reported Parts Search


Copyright © 20011 IHS Global Inc. All Rights Reserved.                  January 2011                                      * Our Exclusive Alliance Partnership                10
* Complimentary BOM risk
    analysis for today’s viewers *
        • You send a Parts / Materials List…
              • AVL, AML, BOM, Parts List of more than 500+ records

        • You’ll get a free Counterfeit Risk Analysis
              • Counterfeit and High Risk Parts on your BOM
        • Register via email
              • Subject: “ERAI Webcast Offer”
              • Email: ERAI@IHS.com




 Copyright © 20011 IHS Global Inc. All Rights Reserved.   January 2011   11
Best practices and techniques for mitigating risks
                                      Date: Wednesday, February 23, 2011
                   Time: 8:00 am PT | 11:00 am ET | 4:00 pm London | 16:00




Counterfeit Avoidance - Yesterday, Today, Tomorrow...



                          Kristal Snider
                  Member, SAE G-19 Committee
                    Vice President, ERAI Inc.
        3899 Mannix Drive, Ste. 421-422, Naples, FL 34114
              Tel: 239-261-6268, Fax: 239-261-9379
                    Email: ksnider@erai.com
Meeting Objective


Review available solutions/resources that can
reduce the potential of acquiring a counterfeit
electronic component.
ERAI
                                    -Overview




  •   Founded in 1995
  •   Mitigate Risk of Parts, Customers & Vendors
  •   Provide up to date information on Counterfeit, Faulty & High-Risk Parts
  •   Real-time Industry Monitoring & Reporting Services
  •   Real-time High-Risk and Counterfeit Part Reporting
  •   BOM / Assembly Cross Checking against High-Risk Parts Database
  •   Vendor & Customer Analysis
  •   Proactively Prevent Losses & Reoccurring Problems
  •   Access to Search Risk Mitigation Tools
  •   Fair & Impartial Investigation Services
  •   Stay Informed on Current Issues Affecting the Supply Chain

© 2011 ERAI Inc.
Counterfeit
              -Origin



2001 – China Admitted to WTO
Counterfeit
    -Origin
Counterfeit
   --Origin
Counterfeit
        -E-Waste



                   Laborer de-soldering
                   circuit boards over a coal-
                   fired grill. Rock in the box
                   is where boards are hit to
                   remove solder. Pliers are
                   used to pluck off chips
                   which go into various
                   buckets. The boards are
                   then tossed into a pile for
                   open burning.

             © Basel Action Network
               2006.
18
Counterfeit
   -E-Waste
Counterfeit
   -E-Waste
Counterfeit
  -Portals of Entry
Counterfeit
                        -Portals of Entry




  • Rapid access to
    millions of parts

  • Minimal membership
    requirements

  • Quick & easy access
    to a large audience of
    buyers

© 2011 ERAI Inc.
Counterfeit
                                      -What is Being Counterfeited?




                                                                      All types of
                                                                      components are
                                                                      being counterfeited,
                                                                      even passives.
% of reported counterfeits from ERAI database, 2004 to present
Counterfeit
    -Impact
Counterfeit
                          - Impact



  Impact of using counterfeit parts or materials
  • Potential loss of life
  • Espionage
  • Monetary loss
  • Liability
  • Lack of availability of products for customer use
  • Loss of customer/public trust
  • Brand damage

© 2011 ERAI Inc.
Counterfeit
                       -Where the industry has fallen short

  • Lack of dialogue between all organizations in the U.S. supply chain.

  • Companies and organizations assume that others in the supply chain are
  testing parts.

  • Lack of traceability in the supply chain.

  • Insufficient chain of accountability within organizations.

  • Recordkeeping on counterfeit incidents by organizations has been limited.

  • Stricter testing protocols and quality control practices for inventories are
  required.

  • DOD organizations have not had policies in place to prevent counterfeit parts
  from infiltrating their supply chain.

© 2011 ERAI Inc.
G-19
Formation of G-19 (Sept. 2007)
                      -Industry Working Together To Craft A Solution



                                          ERAI
                                          IDEA
                                           AIA
                        Orbital                           SMT
                       Sciences                           AERI




                  Arrow
                                                                   Jabil
               Electronics               NASA
                                          JPL
                                         G-19


                   Northrop
                                                               Boeing
                   Grumman


                                Integra
                                                 Honeywell
                              Technologies
                                                                           28
© 2011 ERAI Inc.
SAE G-19 Committee Members & Liaisons
                     Representation from Government, Aerospace, Military, & Commercial



US Government Members …                                    Industry Members …
• DCMA                                                     • 3M
• Defense Logistics Agency, DSCC                           • Boeing
• MDA                                                      • General Dynamics
• NASA/JPL                                                 • Honeywell
• Navy-Crane                                               • L-3 Communications
• NSWC Crane                                               • Lockheed Martin
• SUBMEPP                                                  • PerkinElmer
• Tinker Air Force                                         • Plexus
• US Army – AMRDEC                                         • Raytheon
 Participating Industry Associations …
 •   AIA
 •   ERAI Inc.
 •   Independent Distributors of Electronics Association (IDEA)

 Participating Test Laboratories …
 •   Center for Advanced Life Cycle Engineering (CALCE)
 •   Evans Analytical Group
 •   Hi-Reliability Microelectronics
 •   Integra Technologies
 •   Premier Semiconductor Services
 •   Process Sciences
 •   Silicon Cert Laboratories
 •   White Horse International
G-19
                      - A Multilayered Counterfeit Risk Mitigation Initiative




                      Brokers           Commercial
                                                                 Inspection
                   Independent           Defense
                                                                    Test
                     Franchise            Space




© 2011 ERAI Inc.
AS5553 Rationale
AS5553
-Requirements: 4.1 Counterfeit Electronic Parts Control Plan



 Risk Mitigation
       Disposition
              Reporting
AS5553
                 -Requirements: 4.1.1 Parts Availability




Design, Proposal, and Program Planning
Obsolescence Management (DMSMS)
AS5553
                                   - Requirements: 4.1.2 Purchasing


Assess potential sources of supply to determine the risk of receiving counterfeit
   parts
   Has the organization/part been reported by ERAI

Maintain a register of approved suppliers
   Do not buy from sources not identified on your AVL

Specify a preference to procure directly from OCMs or authorized suppliers

Audit suppliers to ensure they are maintaining effective processes for mitigating
   risk
   Coming Soon: ARP6178

Ask for supply chain traceability
   Be Careful - Paperwork can also be counterfeited

Flow down your requirements.
   In the event that one or more supply chain intermediaries do not have a counterfeit
   part control plan compliant to this document, a risk analysis shall be required for
   every application of the part.
AS5553
-Requirements: 4.1.3 Purchasing Information & 4.1.4 Verification of Purchased Product



  APPENDIX D - PROCUREMENT CONTRACT REQUIREMENTS

  APPENDIX E - PRODUCT ASSURANCE
AS5553
  -Requirements: 4.1.5 In Process Investigation & 4.1.6 Material Control


…shall address the detection, verification,
and control of suspect counterfeit parts.

…shall prevent suspect counterfeit parts
from entering the supply chain / use.

…shall preclude suspect counterfeit parts
from re-entering the supply chain.
AS5553
                   -Requirements: 4.1.7 Reporting


The documented processes shall assure that all
occurrences of counterfeit parts are reported, as
appropriate, to internal organizations, customers,
government reporting organizations (e.g., GIDEP),
industry supported reporting programs (e.g., ERAI),
and criminal investigative authorities.


   ERAI maintains a database of counterfeit and high-risk items. Data can
   be submitted by anyone on the public domain of their website
   (www.erai.com). Companies do not need to be members to report
   counterfeit and high-risk items. Submitting companies remain
   anonymous in the reporting of counterfeit/high-risk items.
   Companies must be ERAI members to view this database.
   However, virtually all electronics-related companies/organizations,
   not just resellers, are candidates for membership.
Reporting
G-19
AS5553 Adopted By DoD
G-19
                                     -ERAI Involvement




ERAI Serves On:                                Meeting Schedule:
                                               Tuesday 10:00am–12:00pm EST
• Original Member of                              G-19CI – AS5553 Re-write
  G-19 (AS5553)                                        Bi-Weekly

• Member of G-19D                              Thursday 11:00am-1:00pm EST
  (AS6081)                                        G-19D – AS6081 Development Team
                                                       Weekly
• Member of G-19DR
                                               Other
• Member of G-19CI                                G-19DR – Distributor Assessment
 (Continuous Improvement/AS5553 Rewrite           Manual/Survey Team
 to ensure document is applicable in both US
 and foreign markets)                                  As Required
Summary


Employees need clear direction from
management on combating
counterfeits as well as written guidance
on how to: avoid purchasing
counterfeit parts; test, handle and track
incoming and outgoing parts; and
manage and dispose of suspected
counterfeit components.
Thank You
Kristal Snider
Member, SAE G‐19 Committee
Vice President, ERAI Inc.
3899 Mannix Drive, Ste. 421‐422, Naples,  FL  34114
Tel:  239‐261‐6268, Fax: 239‐261‐9379
Email: ksnider@erai.com
www.erai.com
Counterfeit Parts
   Program at L-3
          Rick Roelecke
  Director of Quality Assurance
L-3 WESCAM Sonoma Operations



                  February 23, 2011
Background
The L-3 Counterfeit Parts Team was established in September 2007

Originally influenced by Orbital Sciences and BAE Systems
Requirements
   Both companies have requirements for:
    – C of Cs from Original Equipment Manufacturers or their authorized distributors
    – Approval of the procurement process if OEM certifications can not be obtained
    – Burdensome liability clauses for counterfeit escapes

It is especially difficult to manage these requirements for COTS
hardware or production lines that feed multiple customers

We needed to control our own destiny by emphasizing prevention
   Define our own procurement guidelines
   Identify our own approved Independent Distributors
   Define our own risk mitigation processes to prevent counterfeit or
   substandard parts from reaching our customer community
   Protect our liability
                                                                                       46
L-3 CPT Mission Statement



To define and provide guidelines for
managing and controlling the risks
associated with Counterfeit Parts




                                       47
Team Objectives
Establish procedural guidelines for all divisions that address:
   Procurement practices
   Supplier/Distributor controls
   Part screening requirements

Identify and survey Independent Distributors that have systems
and processes to screen for counterfeit parts
   Includes identifying approved independent test facilities

Define purchase order and subcontract flow-down requirements

Develop inspection and test guidelines to screen for counterfeit
parts

Communicate government, industry, and customer
requirements/issues via intranet and share lessons learned

       Control Your Own Destiny Or Someone Else Will
                                                                   48
The L-3 10 Counterfeit
Thou Shall
                                         Commandments
   1. Implement A Strict DMSMS Program

     2. Load Your Obsolescence BOM Into A
     Counterfeit Hit Database (ERAI)
       3. Control Independent Distributor Purchases For
       Obsolescence Only

         4. Screen All P.O. Transactions For Counterfeit Hits

             5. Control Your Independent Distributors

               6. DPA, X-Ray, Permanency Test, At A Minimum, All
               Lots Purchased from Independent Distributors

                 7. Track and Document Lessons Learned

                   8. Impound and Report All Counterfeit Parts

                     9. Influence Your Customers To Support Re-Design Efforts

                       10. Educate Your Workforce And Subcontractors

                                                                                49
1. Implement A Strict DMSMS Program

                                2. Load Your Obsolescence BOM Into A
                                Counterfeit Hit Database (ERAI)
            L-3 Companies,
               IHS Parts
             Management                                   ERAI BOM Tool




                        One Combined Obsolescence List




  Automated
  Counterfeit
Notifications to
 Each Division




                                                                          50
3. Control Independent Distributor Purchases
                       For Obsolescence Only
                         4. Screen All P.O. Transactions For Counterfeit Hits




Assure that your Buyers are not placing orders to Independent
Distributors for Cost & Schedule
  Obsolescence Only

Run all Purchases through ERAI for Counterfeit Hits
  Every procurement, every time
  Screen your Distributor even if they are on your approved list
  Screen your part number




                                                                        51
5. Control Your Independent Distributors


Desk and Physical Surveys
  IDEA Member
  ERAI Member
  AS9120 Certified
  ISO9001:2000 Certified
  ESD S20.20 Compliant
  Certified Inspectors to IDEA 3000
  Supplier controls and flow-down of counterfeit mitigation requirements
  Test and inspection processes and equipment
  Names of third part test facilities used and services performed
  Purchasing Policy, No China, India, Africa, etc.
  Have they ever delivered a counterfeit or substandard part to a customer
   – If so, how did they resolve the issue
  Do they have a die library and will they share it
  Do they offer escrow services
  What is their policy upon discovery of counterfeit or suspect parts
   – Impounding
   – Reporting
                                                                             52
6. DPA, X-Ray, Permanency Test, At A Minimum, All
Lots Purchased from Independent Distributors




                                              53
7. Track and Document Lessons Learned
  8. Impound and Report All Counterfeit Parts




                                                54
9. Influence Your Customers To Support
                     Re-Design Efforts
                       10. Educate Your Work Force And Subcontractors

Share your DMSMS system results with your Customer

Consider using authorized re-manufacturers of parts vs.
procuring from Independent Distributors

Analyze the risk and liability of the part type on the Independent
Market

Train your incoming inspection and production personnel on
counterfeit and substandard part visual characteristics

Implement a system to educate your Major Subcontractors and
Critical Assembly Suppliers
  Approve their counterfeit risk mitigation control plans
  Audit their procedures and processes


                                                                  55
So, Remember!




                56
We want your feedback!
Win for completing today’s webcast survey

          At the end of today’s survey…

          Everyone who completes the survey at
          the conclusion of today’s live event will
          be entered into a drawing for to win an
          Amazon Kindle.
* Complimentary BOM risk
analysis for today’s viewers *
• You send a Parts / Materials List…
   – AVL, AML, BOM, Parts List of more than 500+ records
• You’ll get a free Counterfeit Risk Analysis
   – Counterfeit and High Risk Parts on your BOM
• Register via email
   – Subject: “ERAI Webcast Offer”
   – Email: ERAI@IHS.com
Questions?
Thank you for attending today’s webcast.

All other inquiries, please email:
ERAI@IHS.com

More Related Content

Viewers also liked

Aerospace Elite Quality Assurance Presentation 2012
Aerospace Elite Quality Assurance Presentation 2012Aerospace Elite Quality Assurance Presentation 2012
Aerospace Elite Quality Assurance Presentation 2012nakenatter
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training Kristal Snider
 
Crimp Interconnect Systems for Printed Electronics
Crimp Interconnect Systems for Printed ElectronicsCrimp Interconnect Systems for Printed Electronics
Crimp Interconnect Systems for Printed ElectronicsPhil Heft
 
Global Technology Resources interview questions and answers
Global Technology Resources interview questions and answersGlobal Technology Resources interview questions and answers
Global Technology Resources interview questions and answersnydesti930
 
Intership Report for printing
Intership Report for printingIntership Report for printing
Intership Report for printingOmar Javed
 
Setpoint Process Automation Overview
Setpoint Process Automation OverviewSetpoint Process Automation Overview
Setpoint Process Automation OverviewJonathan Hoy
 
2011 mtf course brochure
2011 mtf course brochure2011 mtf course brochure
2011 mtf course brochureRobert Tully
 
ERRP=Addendum to resettlement action plan - package - 2 & 3
ERRP=Addendum to resettlement action plan - package - 2 & 3ERRP=Addendum to resettlement action plan - package - 2 & 3
ERRP=Addendum to resettlement action plan - package - 2 & 3zubeditufail
 
Military Aerospace Presentation
Military Aerospace PresentationMilitary Aerospace Presentation
Military Aerospace Presentationbkohlmeyer
 
Corrosion removal capitulo 4
Corrosion removal capitulo 4Corrosion removal capitulo 4
Corrosion removal capitulo 4Luis Ulakia
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1World Wide Technology
 
Frederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual ReportFrederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual ReportSandy Wagerman
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayZivaro Inc
 
GFS Chemicals Introduction
GFS Chemicals IntroductionGFS Chemicals Introduction
GFS Chemicals IntroductionGFS Chemicals
 
HYDRAULIC CYLINDER REPAIR project JUNE 2013 ppt
HYDRAULIC CYLINDER REPAIR project JUNE 2013  pptHYDRAULIC CYLINDER REPAIR project JUNE 2013  ppt
HYDRAULIC CYLINDER REPAIR project JUNE 2013 pptMarcial Jr Militante
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationDLT Solutions
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014Nanik Tolaram
 

Viewers also liked (20)

Aerospace Elite Quality Assurance Presentation 2012
Aerospace Elite Quality Assurance Presentation 2012Aerospace Elite Quality Assurance Presentation 2012
Aerospace Elite Quality Assurance Presentation 2012
 
esi profile
esi profileesi profile
esi profile
 
ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training ERAI -Counterfeit Awareness-Avoidance Training
ERAI -Counterfeit Awareness-Avoidance Training
 
Crimp Interconnect Systems for Printed Electronics
Crimp Interconnect Systems for Printed ElectronicsCrimp Interconnect Systems for Printed Electronics
Crimp Interconnect Systems for Printed Electronics
 
Global Technology Resources interview questions and answers
Global Technology Resources interview questions and answersGlobal Technology Resources interview questions and answers
Global Technology Resources interview questions and answers
 
Intership Report for printing
Intership Report for printingIntership Report for printing
Intership Report for printing
 
Swati Dubey QA 6 Yrs
Swati Dubey QA 6 YrsSwati Dubey QA 6 Yrs
Swati Dubey QA 6 Yrs
 
Setpoint Process Automation Overview
Setpoint Process Automation OverviewSetpoint Process Automation Overview
Setpoint Process Automation Overview
 
2011 mtf course brochure
2011 mtf course brochure2011 mtf course brochure
2011 mtf course brochure
 
ERRP=Addendum to resettlement action plan - package - 2 & 3
ERRP=Addendum to resettlement action plan - package - 2 & 3ERRP=Addendum to resettlement action plan - package - 2 & 3
ERRP=Addendum to resettlement action plan - package - 2 & 3
 
Military Aerospace Presentation
Military Aerospace PresentationMilitary Aerospace Presentation
Military Aerospace Presentation
 
Corrosion removal capitulo 4
Corrosion removal capitulo 4Corrosion removal capitulo 4
Corrosion removal capitulo 4
 
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1World Wide Technology Tec37 Webinar -  Deploy and Manage Windows 10 at Scale v1
World Wide Technology Tec37 Webinar - Deploy and Manage Windows 10 at Scale v1
 
24 June 2014: materials and structures enduring challenge
24 June 2014: materials and structures enduring challenge24 June 2014: materials and structures enduring challenge
24 June 2014: materials and structures enduring challenge
 
Frederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual ReportFrederick County Office of Economic Development 2015 Annual Report
Frederick County Office of Economic Development 2015 Annual Report
 
GTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech DayGTRI Splunk Overview - Splunk Tech Day
GTRI Splunk Overview - Splunk Tech Day
 
GFS Chemicals Introduction
GFS Chemicals IntroductionGFS Chemicals Introduction
GFS Chemicals Introduction
 
HYDRAULIC CYLINDER REPAIR project JUNE 2013 ppt
HYDRAULIC CYLINDER REPAIR project JUNE 2013  pptHYDRAULIC CYLINDER REPAIR project JUNE 2013  ppt
HYDRAULIC CYLINDER REPAIR project JUNE 2013 ppt
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data Virtualization
 
Odroid Magazine March 2014
Odroid Magazine March 2014Odroid Magazine March 2014
Odroid Magazine March 2014
 

Similar to Avoiding Counterfeit Risk: How to mitigate part and supplier risk

Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit RiskKristal Snider
 
IHS Webcast - Counterfeiting, Obsolescence, and Risk
IHS Webcast - Counterfeiting, Obsolescence, and RiskIHS Webcast - Counterfeiting, Obsolescence, and Risk
IHS Webcast - Counterfeiting, Obsolescence, and RiskTevia Arnold
 
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Black Duck by Synopsys
 
Eye4Insights: Ritu Abrol
Eye4Insights: Ritu AbrolEye4Insights: Ritu Abrol
Eye4Insights: Ritu AbrolRitu Abrol
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security TechnologyFlaskdata.io
 
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillPanel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillIHS
 
Predictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced AnalyticsPredictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced AnalyticsLeonard Lee
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationSinglewire Software
 
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationDMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationRory King
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)Jeremiah Grossman
 
An IP Managment for Open Innovation and the idea of a commons
An IP Managment for Open Innovation and the idea of a commonsAn IP Managment for Open Innovation and the idea of a commons
An IP Managment for Open Innovation and the idea of a commonsREA Brasil
 
Security, Economics, Technology and the Sustainability Paradox
Security, Economics, Technology and the Sustainability ParadoxSecurity, Economics, Technology and the Sustainability Paradox
Security, Economics, Technology and the Sustainability ParadoxRory King
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Site structure one or many
Site structure   one or manySite structure   one or many
Site structure one or manySteve Brewer
 
Lean Construction Webinar
Lean Construction WebinarLean Construction Webinar
Lean Construction WebinarBMGI India
 

Similar to Avoiding Counterfeit Risk: How to mitigate part and supplier risk (20)

Avoiding Counterfeit Risk
Avoiding Counterfeit RiskAvoiding Counterfeit Risk
Avoiding Counterfeit Risk
 
IHS Webcast - Counterfeiting, Obsolescence, and Risk
IHS Webcast - Counterfeiting, Obsolescence, and RiskIHS Webcast - Counterfeiting, Obsolescence, and Risk
IHS Webcast - Counterfeiting, Obsolescence, and Risk
 
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
 
Eye4Insights: Ritu Abrol
Eye4Insights: Ritu AbrolEye4Insights: Ritu Abrol
Eye4Insights: Ritu Abrol
 
Zedge PPT
Zedge PPTZedge PPT
Zedge PPT
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization BillPanel Discussion - Counterfeit Electronics and the Defense Authorization Bill
Panel Discussion - Counterfeit Electronics and the Defense Authorization Bill
 
Predictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced AnalyticsPredictive Asset Optimization - Advanced Analytics
Predictive Asset Optimization - Advanced Analytics
 
Mir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE PresentationMir3 Singlewire STUGGE Presentation
Mir3 Singlewire STUGGE Presentation
 
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk MitigationDMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
DMSMS Standardization 2011 - Integrated Methods of Counterfeit Risk Mitigation
 
11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)11th Website Security Statistics -- Presentation Slides (Q1 2011)
11th Website Security Statistics -- Presentation Slides (Q1 2011)
 
Croi4 hc
Croi4 hcCroi4 hc
Croi4 hc
 
An IP Managment for Open Innovation and the idea of a commons
An IP Managment for Open Innovation and the idea of a commonsAn IP Managment for Open Innovation and the idea of a commons
An IP Managment for Open Innovation and the idea of a commons
 
Security, Economics, Technology and the Sustainability Paradox
Security, Economics, Technology and the Sustainability ParadoxSecurity, Economics, Technology and the Sustainability Paradox
Security, Economics, Technology and the Sustainability Paradox
 
Caliper, Inc.
Caliper, Inc.Caliper, Inc.
Caliper, Inc.
 
Caliper, Inc.
Caliper, Inc.Caliper, Inc.
Caliper, Inc.
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Investor Slideset
Investor SlidesetInvestor Slideset
Investor Slideset
 
Site structure one or many
Site structure   one or manySite structure   one or many
Site structure one or many
 
Lean Construction Webinar
Lean Construction WebinarLean Construction Webinar
Lean Construction Webinar
 

More from IHS

Accelerate Procurement Performance
Accelerate Procurement PerformanceAccelerate Procurement Performance
Accelerate Procurement PerformanceIHS
 
IHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s GuideIHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s GuideIHS
 
Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications IHS
 
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingCounterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingIHS
 
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...IHS
 
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...IHS
 
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...IHS
 
Has china lost its low cost edge?
Has china lost its low cost edge?Has china lost its low cost edge?
Has china lost its low cost edge?IHS
 
Commodities Through 2013 : Buying Opportunities, or Buyer Beware?
Commodities Through 2013: Buying Opportunities, or Buyer Beware? Commodities Through 2013: Buying Opportunities, or Buyer Beware?
Commodities Through 2013 : Buying Opportunities, or Buyer Beware? IHS
 
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...IHS
 
Smart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards ManagementSmart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards ManagementIHS
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsIHS
 
Energy, Emissions, and Efficiency
Energy, Emissions, and EfficiencyEnergy, Emissions, and Efficiency
Energy, Emissions, and EfficiencyIHS
 
Supply Chain Risk Mitigation
Supply Chain Risk MitigationSupply Chain Risk Mitigation
Supply Chain Risk MitigationIHS
 
Tools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory ComplianceTools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory ComplianceIHS
 
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...IHS
 
Environmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product StewardshipEnvironmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product StewardshipIHS
 

More from IHS (17)

Accelerate Procurement Performance
Accelerate Procurement PerformanceAccelerate Procurement Performance
Accelerate Procurement Performance
 
IHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s GuideIHS Material Price Outlook: A 2014 Buyer’s Guide
IHS Material Price Outlook: A 2014 Buyer’s Guide
 
Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications Global Construction Outlook: Wage Growth, Labor Shortages and Implications
Global Construction Outlook: Wage Growth, Labor Shortages and Implications
 
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory KingCounterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
Counterfeiting and Semiconductor Value Chain Economics - COG 2013, Mr. Rory King
 
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
Resilient Supply Chains: How to Dynamically Manage Risk, Opportunity, and Bus...
 
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
Quantifying Sourcing Risk: Building Commodity Risk Ratings to Mitigate Geopol...
 
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
Improve your Negotiating Position & Achieve Cost Savings with Supplier Cost I...
 
Has china lost its low cost edge?
Has china lost its low cost edge?Has china lost its low cost edge?
Has china lost its low cost edge?
 
Commodities Through 2013 : Buying Opportunities, or Buyer Beware?
Commodities Through 2013: Buying Opportunities, or Buyer Beware? Commodities Through 2013: Buying Opportunities, or Buyer Beware?
Commodities Through 2013 : Buying Opportunities, or Buyer Beware?
 
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
From Subscriber to Silicon: Why end-to-end technology value chain insight is ...
 
Smart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards ManagementSmart Grid Innovation, Interoperability, and Standards Management
Smart Grid Innovation, Interoperability, and Standards Management
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense Regulations
 
Energy, Emissions, and Efficiency
Energy, Emissions, and EfficiencyEnergy, Emissions, and Efficiency
Energy, Emissions, and Efficiency
 
Supply Chain Risk Mitigation
Supply Chain Risk MitigationSupply Chain Risk Mitigation
Supply Chain Risk Mitigation
 
Tools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory ComplianceTools and Techniques to Effectively Manage EHS Regulatory Compliance
Tools and Techniques to Effectively Manage EHS Regulatory Compliance
 
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
Green Products and Supply Chain Disruption: Conflict Minerals in the Supply C...
 
Environmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product StewardshipEnvironmental Compliance, Risk and Product Stewardship
Environmental Compliance, Risk and Product Stewardship
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Avoiding Counterfeit Risk: How to mitigate part and supplier risk

  • 1. Avoiding Counterfeit Risk Hosted by Supply & Demand Chain Executive and featuring IHS, ERAI Inc, and L-3 Communications February 23, 2011
  • 2. A Global Supply Chain Problem We’ve Entered a Generation of Counterfeiting & Piracy “We estimate that, based on 2008 data, the total global economic value of counterfeit and pirated products is as much as $650 billion every year… …estimates imply that the global value of counterfeit and pirated products could be up to $1.77 trillion by 2015.” Frontier Economics, February 2011 2
  • 3. Today’s Speakers Recognized Industry Experts Moderator Andrew K. Reese • Editor, Supply & Demand Chain Executive Panelists Mark A. Snider • President, ERAI, Inc. and IHS Partnership Executive Sponsor Kristal Snider • Vice President, ERAI, Inc. and G-19 Committee Member Rick Roelecke • Director of Quality Assurance for L-3 Wescam Sonoma Operations • L-3 Communications Corporate Counterfeit Parts Lead
  • 4. We want your feedback! Win for completing today’s webcast survey At the end of today’s survey… Everyone who completes the survey at the conclusion of today’s live event will be entered into a drawing for to win an Amazon Kindle.
  • 5. ERAI Inc. A World of Information at Your Fingertips • Founded in 1995, ERAI is an information services organization that monitors, investigates and reports issues affecting the global hi-tech electronics supply chain. • ERAI provides tools to mitigate risks on substandard parts, counterfeit parts, vendors and even customers. • Subscribers include OEMs, CMs, Distributors, OCMs, government agencies and industry associations. • Actively involved in a number of committees and task forces addressing the counterfeit issue.
  • 6. IHS and ERAI Combat Counterfeits Exclusive Partnership Providing Market Intelligence “ENGLEWOOD, Colo. (January 12, 2010) - IHS Inc. (NYSE:IHS), a leading global source of critical information and insight, today announced an agreement with ERAI, Inc. to be its exclusive worldwide partner for delivering products and services designed to mitigate the risks associated with counterfeit, substandard and high-risk parts found throughout global supply chains…” 6
  • 7. IHS Inc. A Leading Information Provider • Founded in 1959, IHS is a leading source of information and expert analysis in pivotal areas shaping today’s global businesses • Employs 4,400 colleagues in 30 countries who speak 50 different languages • IHS customers include nearly 70% of the US Fortune1000 and 80% of the Global Fortune 500 • Tens of thousands of customers and hundreds of thousands of end-users in over 100 countries • Public (2005) NYSE: IHS • FY10 revenue $ 1,075 million 7
  • 8. Why IHS? Opportunity to Help Thousands of IHS Global Customers Avid
  • 9. Problem: How the Market Sees It Proactive Mitigation to Resolution when Counterfeits Detected Challenge Economic downturn… …shortage… …fake parts… …mission failure! Customer Workflow Needed Qualify Manage Validate Report Redesign + Approve + Avoid + Detect + Resolve + Resupply Establish infrastructure to Update processes, tools, and Validate, sample and test Procedures to notify Maintain controlled mitigate risk through qualified information to avoid components for authenticity. stakeholders, report design/redesign cycles of and approved designs, counterfeit and high risk Quarantine suspected occurrences, and resolve products. Optimize parts, suppliers, & parts. parts. counterfeits. incidents. inventory, and suppliers. KPI: EOL / Lifecycle Planning KPI: Shortages KPI: Price/Lead KPI: Counterfeit Time Incidents Copyright © 20011 IHS Global Inc. All Rights Reserved. January 2011 9
  • 10. Solution: IHS-ERAI Market Intelligence Unrivalled Solutions from IHS iSuppli, PLC, and ERAI Challenge Economic downturn… …shortage… …fake parts… …mission failure! Customer Workflow Qualify Manage Validate Report Redesign + Approve + Avoid + Detect + Resolve + Resupply Establish infrastructure to Update processes, tools, and Validate, sample and test Procedures to notify Maintain controlled mitigate risk through qualified information to avoid components for authenticity. stakeholders, report design/redesign cycles of and approved designs, counterfeit and high risk Quarantine suspected occurrences, and resolve products. Optimize parts, suppliers, & parts. parts. counterfeits. incidents. inventory, and suppliers. Products & Services IHS iSuppli IHS PLC IHS ERAI* Market Trackers Standards Expert BOM Scrubber Management Suite Teardown Analyses Haystack Company Search Forecasts & Measures 4DOnline Product Family Reported Company Search Analyst Inquiry Time PCMS Reported Parts Search Copyright © 20011 IHS Global Inc. All Rights Reserved. January 2011 * Our Exclusive Alliance Partnership 10
  • 11. * Complimentary BOM risk analysis for today’s viewers * • You send a Parts / Materials List… • AVL, AML, BOM, Parts List of more than 500+ records • You’ll get a free Counterfeit Risk Analysis • Counterfeit and High Risk Parts on your BOM • Register via email • Subject: “ERAI Webcast Offer” • Email: ERAI@IHS.com Copyright © 20011 IHS Global Inc. All Rights Reserved. January 2011 11
  • 12. Best practices and techniques for mitigating risks Date: Wednesday, February 23, 2011 Time: 8:00 am PT | 11:00 am ET | 4:00 pm London | 16:00 Counterfeit Avoidance - Yesterday, Today, Tomorrow... Kristal Snider Member, SAE G-19 Committee Vice President, ERAI Inc. 3899 Mannix Drive, Ste. 421-422, Naples, FL 34114 Tel: 239-261-6268, Fax: 239-261-9379 Email: ksnider@erai.com
  • 13. Meeting Objective Review available solutions/resources that can reduce the potential of acquiring a counterfeit electronic component.
  • 14. ERAI -Overview • Founded in 1995 • Mitigate Risk of Parts, Customers & Vendors • Provide up to date information on Counterfeit, Faulty & High-Risk Parts • Real-time Industry Monitoring & Reporting Services • Real-time High-Risk and Counterfeit Part Reporting • BOM / Assembly Cross Checking against High-Risk Parts Database • Vendor & Customer Analysis • Proactively Prevent Losses & Reoccurring Problems • Access to Search Risk Mitigation Tools • Fair & Impartial Investigation Services • Stay Informed on Current Issues Affecting the Supply Chain © 2011 ERAI Inc.
  • 15. Counterfeit -Origin 2001 – China Admitted to WTO
  • 16. Counterfeit -Origin
  • 17. Counterfeit --Origin
  • 18. Counterfeit -E-Waste Laborer de-soldering circuit boards over a coal- fired grill. Rock in the box is where boards are hit to remove solder. Pliers are used to pluck off chips which go into various buckets. The boards are then tossed into a pile for open burning. © Basel Action Network 2006. 18
  • 19. Counterfeit -E-Waste
  • 20. Counterfeit -E-Waste
  • 22. Counterfeit -Portals of Entry • Rapid access to millions of parts • Minimal membership requirements • Quick & easy access to a large audience of buyers © 2011 ERAI Inc.
  • 23. Counterfeit -What is Being Counterfeited? All types of components are being counterfeited, even passives. % of reported counterfeits from ERAI database, 2004 to present
  • 24. Counterfeit -Impact
  • 25. Counterfeit - Impact Impact of using counterfeit parts or materials • Potential loss of life • Espionage • Monetary loss • Liability • Lack of availability of products for customer use • Loss of customer/public trust • Brand damage © 2011 ERAI Inc.
  • 26. Counterfeit -Where the industry has fallen short • Lack of dialogue between all organizations in the U.S. supply chain. • Companies and organizations assume that others in the supply chain are testing parts. • Lack of traceability in the supply chain. • Insufficient chain of accountability within organizations. • Recordkeeping on counterfeit incidents by organizations has been limited. • Stricter testing protocols and quality control practices for inventories are required. • DOD organizations have not had policies in place to prevent counterfeit parts from infiltrating their supply chain. © 2011 ERAI Inc.
  • 27. G-19
  • 28. Formation of G-19 (Sept. 2007) -Industry Working Together To Craft A Solution ERAI IDEA AIA Orbital SMT Sciences AERI Arrow Jabil Electronics NASA JPL G-19 Northrop Boeing Grumman Integra Honeywell Technologies 28 © 2011 ERAI Inc.
  • 29. SAE G-19 Committee Members & Liaisons Representation from Government, Aerospace, Military, & Commercial US Government Members … Industry Members … • DCMA • 3M • Defense Logistics Agency, DSCC • Boeing • MDA • General Dynamics • NASA/JPL • Honeywell • Navy-Crane • L-3 Communications • NSWC Crane • Lockheed Martin • SUBMEPP • PerkinElmer • Tinker Air Force • Plexus • US Army – AMRDEC • Raytheon Participating Industry Associations … • AIA • ERAI Inc. • Independent Distributors of Electronics Association (IDEA) Participating Test Laboratories … • Center for Advanced Life Cycle Engineering (CALCE) • Evans Analytical Group • Hi-Reliability Microelectronics • Integra Technologies • Premier Semiconductor Services • Process Sciences • Silicon Cert Laboratories • White Horse International
  • 30. G-19 - A Multilayered Counterfeit Risk Mitigation Initiative Brokers Commercial Inspection Independent Defense Test Franchise Space © 2011 ERAI Inc.
  • 32. AS5553 -Requirements: 4.1 Counterfeit Electronic Parts Control Plan Risk Mitigation Disposition Reporting
  • 33. AS5553 -Requirements: 4.1.1 Parts Availability Design, Proposal, and Program Planning Obsolescence Management (DMSMS)
  • 34. AS5553 - Requirements: 4.1.2 Purchasing Assess potential sources of supply to determine the risk of receiving counterfeit parts Has the organization/part been reported by ERAI Maintain a register of approved suppliers Do not buy from sources not identified on your AVL Specify a preference to procure directly from OCMs or authorized suppliers Audit suppliers to ensure they are maintaining effective processes for mitigating risk Coming Soon: ARP6178 Ask for supply chain traceability Be Careful - Paperwork can also be counterfeited Flow down your requirements. In the event that one or more supply chain intermediaries do not have a counterfeit part control plan compliant to this document, a risk analysis shall be required for every application of the part.
  • 35. AS5553 -Requirements: 4.1.3 Purchasing Information & 4.1.4 Verification of Purchased Product APPENDIX D - PROCUREMENT CONTRACT REQUIREMENTS APPENDIX E - PRODUCT ASSURANCE
  • 36. AS5553 -Requirements: 4.1.5 In Process Investigation & 4.1.6 Material Control …shall address the detection, verification, and control of suspect counterfeit parts. …shall prevent suspect counterfeit parts from entering the supply chain / use. …shall preclude suspect counterfeit parts from re-entering the supply chain.
  • 37. AS5553 -Requirements: 4.1.7 Reporting The documented processes shall assure that all occurrences of counterfeit parts are reported, as appropriate, to internal organizations, customers, government reporting organizations (e.g., GIDEP), industry supported reporting programs (e.g., ERAI), and criminal investigative authorities. ERAI maintains a database of counterfeit and high-risk items. Data can be submitted by anyone on the public domain of their website (www.erai.com). Companies do not need to be members to report counterfeit and high-risk items. Submitting companies remain anonymous in the reporting of counterfeit/high-risk items. Companies must be ERAI members to view this database. However, virtually all electronics-related companies/organizations, not just resellers, are candidates for membership.
  • 39. G-19
  • 41. G-19 -ERAI Involvement ERAI Serves On: Meeting Schedule: Tuesday 10:00am–12:00pm EST • Original Member of G-19CI – AS5553 Re-write G-19 (AS5553) Bi-Weekly • Member of G-19D Thursday 11:00am-1:00pm EST (AS6081) G-19D – AS6081 Development Team Weekly • Member of G-19DR Other • Member of G-19CI G-19DR – Distributor Assessment (Continuous Improvement/AS5553 Rewrite Manual/Survey Team to ensure document is applicable in both US and foreign markets) As Required
  • 42. Summary Employees need clear direction from management on combating counterfeits as well as written guidance on how to: avoid purchasing counterfeit parts; test, handle and track incoming and outgoing parts; and manage and dispose of suspected counterfeit components.
  • 44. Counterfeit Parts Program at L-3 Rick Roelecke Director of Quality Assurance L-3 WESCAM Sonoma Operations February 23, 2011
  • 45. Background The L-3 Counterfeit Parts Team was established in September 2007 Originally influenced by Orbital Sciences and BAE Systems Requirements Both companies have requirements for: – C of Cs from Original Equipment Manufacturers or their authorized distributors – Approval of the procurement process if OEM certifications can not be obtained – Burdensome liability clauses for counterfeit escapes It is especially difficult to manage these requirements for COTS hardware or production lines that feed multiple customers We needed to control our own destiny by emphasizing prevention Define our own procurement guidelines Identify our own approved Independent Distributors Define our own risk mitigation processes to prevent counterfeit or substandard parts from reaching our customer community Protect our liability 46
  • 46. L-3 CPT Mission Statement To define and provide guidelines for managing and controlling the risks associated with Counterfeit Parts 47
  • 47. Team Objectives Establish procedural guidelines for all divisions that address: Procurement practices Supplier/Distributor controls Part screening requirements Identify and survey Independent Distributors that have systems and processes to screen for counterfeit parts Includes identifying approved independent test facilities Define purchase order and subcontract flow-down requirements Develop inspection and test guidelines to screen for counterfeit parts Communicate government, industry, and customer requirements/issues via intranet and share lessons learned Control Your Own Destiny Or Someone Else Will 48
  • 48. The L-3 10 Counterfeit Thou Shall Commandments 1. Implement A Strict DMSMS Program 2. Load Your Obsolescence BOM Into A Counterfeit Hit Database (ERAI) 3. Control Independent Distributor Purchases For Obsolescence Only 4. Screen All P.O. Transactions For Counterfeit Hits 5. Control Your Independent Distributors 6. DPA, X-Ray, Permanency Test, At A Minimum, All Lots Purchased from Independent Distributors 7. Track and Document Lessons Learned 8. Impound and Report All Counterfeit Parts 9. Influence Your Customers To Support Re-Design Efforts 10. Educate Your Workforce And Subcontractors 49
  • 49. 1. Implement A Strict DMSMS Program 2. Load Your Obsolescence BOM Into A Counterfeit Hit Database (ERAI) L-3 Companies, IHS Parts Management ERAI BOM Tool One Combined Obsolescence List Automated Counterfeit Notifications to Each Division 50
  • 50. 3. Control Independent Distributor Purchases For Obsolescence Only 4. Screen All P.O. Transactions For Counterfeit Hits Assure that your Buyers are not placing orders to Independent Distributors for Cost & Schedule Obsolescence Only Run all Purchases through ERAI for Counterfeit Hits Every procurement, every time Screen your Distributor even if they are on your approved list Screen your part number 51
  • 51. 5. Control Your Independent Distributors Desk and Physical Surveys IDEA Member ERAI Member AS9120 Certified ISO9001:2000 Certified ESD S20.20 Compliant Certified Inspectors to IDEA 3000 Supplier controls and flow-down of counterfeit mitigation requirements Test and inspection processes and equipment Names of third part test facilities used and services performed Purchasing Policy, No China, India, Africa, etc. Have they ever delivered a counterfeit or substandard part to a customer – If so, how did they resolve the issue Do they have a die library and will they share it Do they offer escrow services What is their policy upon discovery of counterfeit or suspect parts – Impounding – Reporting 52
  • 52. 6. DPA, X-Ray, Permanency Test, At A Minimum, All Lots Purchased from Independent Distributors 53
  • 53. 7. Track and Document Lessons Learned 8. Impound and Report All Counterfeit Parts 54
  • 54. 9. Influence Your Customers To Support Re-Design Efforts 10. Educate Your Work Force And Subcontractors Share your DMSMS system results with your Customer Consider using authorized re-manufacturers of parts vs. procuring from Independent Distributors Analyze the risk and liability of the part type on the Independent Market Train your incoming inspection and production personnel on counterfeit and substandard part visual characteristics Implement a system to educate your Major Subcontractors and Critical Assembly Suppliers Approve their counterfeit risk mitigation control plans Audit their procedures and processes 55
  • 56. We want your feedback! Win for completing today’s webcast survey At the end of today’s survey… Everyone who completes the survey at the conclusion of today’s live event will be entered into a drawing for to win an Amazon Kindle.
  • 57. * Complimentary BOM risk analysis for today’s viewers * • You send a Parts / Materials List… – AVL, AML, BOM, Parts List of more than 500+ records • You’ll get a free Counterfeit Risk Analysis – Counterfeit and High Risk Parts on your BOM • Register via email – Subject: “ERAI Webcast Offer” – Email: ERAI@IHS.com
  • 58. Questions? Thank you for attending today’s webcast. All other inquiries, please email: ERAI@IHS.com