SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
©2012 iNEMI
Assessing the Risk
of Counterfeit
Components
iNEMI Counterfeit
Project Team
Counterfeit Components Team
1
2©2012 iNEMI
Tasks Completed by project team
•Develop a methodology to evaluate or assess the risk of
counterfeit use
•Develop a methodology to evaluate or assess the aggregated
risk of untrusted sources of supply
•Develop an assessment / mitigation strategy which includes a
methodology to estimate long term cost of ownership
Assessing the Risk of Counterfeit Components
3©2012 iNEMI
For more detailed information please go to….
• Risk Calculators are available for download at Counterfeit
Calculators Download Page
• Project White paper and more information on the project is
available at iNEMI Counterfeit Components Project Page
Assessing the Risk of Counterfeit Components
©2012 iNEMI
Risk of Counterfeit
Use
Calculator #1
5©2012 iNEMI
Risk of Counterfeit Use – Calculator #1
• This calculator quantitatively asses the relative risk of a product being
counterfeit
• Can be used by
– Component Manufacturers – identify risk for their product
– Product Designers – identify risk of products to be used or of end product
– Distributors – identify products at risk and those requiring extra controls
– End Users – identify risks of selected products and provide product ranking
• It is based on 4 key attributes – product profile, supplier and supply line
characteristics, counterfeit deterrents used on the product and channel
characteristics
• The user selects the appropriate rating for each of the elements from the
rating table and the calculator provides an overall risk assessment for that
product.
• The higher the rating, the higher the risk of counterfeit for that product
• The relative ratings for a product portfolio enables the company to focus
their efforts on the high risk products.
6©2012 iNEMI
Risk of Counterfeit Use - Calculator #1
1. Select the Product Type
& Profile 2. Select the supply
Line profile
3. Select the counterfeit
Process controls
4. Select the output & channel
characteristics
©2012 iNEMI
Risk Calculator for
Untrusted Sources
Calculator #2
8©2012 iNEMI
The risk calculator for untrusted sources (#2)
• Based on objective information, the calculator produces
relative ratings which are expected to be correlated to the risk
of receiving counterfeits from untrusted sources.
• The ratings can support a decision whether to purchase from
a particular source or which of several suppliers to choose.
9©2012 iNEMI
Risk Calculator for Untrusted Sources - Examples
Select memberships
& accreditations
Rate mitigation &
controls
Fill in information on
company characteristics
©2012 iNEMI
Counterfeit Losses
and Costs
Calculator #3
11©2012 iNEMI
Counterfeit Losses & Costs – Calculator #3
• This calculator provides an estimate of the costs and losses
associated with counterfeit product
• There are 3 assessments provided
– A) Total loss estimate by product
– B) Loss estimate by GEO or market
– C) Total Counterfeit Cost & Losses estimate.
• The total loss estimate is based on the output from calculator
#1 … where the counterfeit risk result is classified as low,
medium or high
• The loss by GEO or market is generated using the World Bank
Corruption Control index
• The Total Counterfeit Cost is an estimate of all aggregated
costs & losses incurred by a company where counterfeit
product has entered that company’s supply chain.
12©2012 iNEMI
Total Counterfeit Loss – Calculator #3 (A)
1. Input the products
to be assessed
2. Input risk of counterfeit
use from calculator #1
3. Input industry estimate
of counterfeit use 4. Input the estimated w/w
Revenue for the product
Estimated Counterfeit Revenue
Losses
13©2012 iNEMI
Counterfeit Loss by GEO – Calculator #3 (B)
1. Input all countries / markets
the product is sold 2. Input estimated or target
Revenue for that market 3. Input the Corruption Control Index
for that market ( World Bank )
1. Input all countries / markets
the product is sold
Estimated Counterfeit Revenue
Loss by Country / Market
14©2012 iNEMI
Total Counterfeit Cost – Calculator #3 (C)
2. Input all costs – actual
or estimated
1. Input estimated counterfeit
Rate (internal or external data)
Total Counterfeit Cost
©2012 iNEMI
www.inemi.org
Email contacts:
Mark Schaffer
marks@inemi.org

Weitere ähnliche Inhalte

Andere mochten auch

02 opti x rtn 900 v100r002 configuration guide-20100119-a
02 opti x rtn 900 v100r002 configuration guide-20100119-a02 opti x rtn 900 v100r002 configuration guide-20100119-a
02 opti x rtn 900 v100r002 configuration guide-20100119-a
Waheed Ali
 
Mw training slide
Mw training slideMw training slide
Mw training slide
dedoyin
 
Basic knowledge of antenna and antenna selection
Basic knowledge of antenna and antenna selectionBasic knowledge of antenna and antenna selection
Basic knowledge of antenna and antenna selection
swatisabnis87
 
Digital microwave communication principles
Digital microwave communication principles Digital microwave communication principles
Digital microwave communication principles
Mohamed Sewailam
 

Andere mochten auch (18)

02 opti x rtn 900 v100r002 configuration guide-20100119-a
02 opti x rtn 900 v100r002 configuration guide-20100119-a02 opti x rtn 900 v100r002 configuration guide-20100119-a
02 opti x rtn 900 v100r002 configuration guide-20100119-a
 
Mw training slide
Mw training slideMw training slide
Mw training slide
 
Basic knowledge of antenna and antenna selection
Basic knowledge of antenna and antenna selectionBasic knowledge of antenna and antenna selection
Basic knowledge of antenna and antenna selection
 
Microwave link design
Microwave link designMicrowave link design
Microwave link design
 
TYPES OF ANTENNA
TYPES OF ANTENNA TYPES OF ANTENNA
TYPES OF ANTENNA
 
Antenna
AntennaAntenna
Antenna
 
Microwave Antenna
Microwave AntennaMicrowave Antenna
Microwave Antenna
 
corrosion presentation
corrosion presentationcorrosion presentation
corrosion presentation
 
Digital microwave communication principles
Digital microwave communication principles Digital microwave communication principles
Digital microwave communication principles
 
Corrosion.ppt
Corrosion.pptCorrosion.ppt
Corrosion.ppt
 
Prevention of corrosion
Prevention of corrosionPrevention of corrosion
Prevention of corrosion
 
Principles of corrosion
Principles of corrosionPrinciples of corrosion
Principles of corrosion
 
FUNDAMENTALS OF MICROWAVE RADIO COMMUNICATION FOR IP AND TDM
FUNDAMENTALS OF MICROWAVE RADIO COMMUNICATION FOR IP AND TDMFUNDAMENTALS OF MICROWAVE RADIO COMMUNICATION FOR IP AND TDM
FUNDAMENTALS OF MICROWAVE RADIO COMMUNICATION FOR IP AND TDM
 
HVAC Cooling Load Calculation
HVAC Cooling Load CalculationHVAC Cooling Load Calculation
HVAC Cooling Load Calculation
 
Point to point microwave
Point to point microwavePoint to point microwave
Point to point microwave
 
How to think like a startup
How to think like a startupHow to think like a startup
How to think like a startup
 
The State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B CompaniesThe State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
The State of Sales & Marketing at the 50 Fastest-Growing B2B Companies
 
Teaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & TextspeakTeaching Students with Emojis, Emoticons, & Textspeak
Teaching Students with Emojis, Emoticons, & Textspeak
 

Ähnlich wie I nemi counterfeit components project information 09 09 13 final

Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...
Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...
Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...
Jonathan Isernhagen
 

Ähnlich wie I nemi counterfeit components project information 09 09 13 final (20)

Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
Improve the Security of Your Application Portfolio in a Few Days with On-Dema...
 
CMO critical assessment to support EU FMD readiness
CMO critical assessment to support EU FMD readinessCMO critical assessment to support EU FMD readiness
CMO critical assessment to support EU FMD readiness
 
final (2)
final (2)final (2)
final (2)
 
IRJET-Recommendation in E-Commerce using Collaborative Filtering
IRJET-Recommendation in E-Commerce using Collaborative FilteringIRJET-Recommendation in E-Commerce using Collaborative Filtering
IRJET-Recommendation in E-Commerce using Collaborative Filtering
 
20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology20cs2024 Ethics in Information Technology
20cs2024 Ethics in Information Technology
 
Cost Terms, Concepts, and Classifications
Cost Terms, Concepts, and ClassificationsCost Terms, Concepts, and Classifications
Cost Terms, Concepts, and Classifications
 
India electromagnetic lock industry
India electromagnetic lock industryIndia electromagnetic lock industry
India electromagnetic lock industry
 
India electromagnetic lock industry
India electromagnetic lock industryIndia electromagnetic lock industry
India electromagnetic lock industry
 
Rate overview 2016
Rate overview 2016Rate overview 2016
Rate overview 2016
 
Open source code
Open source codeOpen source code
Open source code
 
Project Planning and Management.pptx
Project Planning and Management.pptxProject Planning and Management.pptx
Project Planning and Management.pptx
 
Mba 2 Sem Demand For Casting
Mba 2  Sem Demand For CastingMba 2  Sem Demand For Casting
Mba 2 Sem Demand For Casting
 
Know the various facts in hat sourcing.
Know the various facts in hat sourcing.Know the various facts in hat sourcing.
Know the various facts in hat sourcing.
 
Hat Sourcing - Case Study
Hat Sourcing - Case StudyHat Sourcing - Case Study
Hat Sourcing - Case Study
 
Hat Sourcing - Case Study
Hat Sourcing - Case StudyHat Sourcing - Case Study
Hat Sourcing - Case Study
 
Understanding Basic Risk Management System - Session 5 Managing Project Prep...
Understanding Basic Risk Management System -  Session 5 Managing Project Prep...Understanding Basic Risk Management System -  Session 5 Managing Project Prep...
Understanding Basic Risk Management System - Session 5 Managing Project Prep...
 
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN WATCH MANUFACTURING PROCESS
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN WATCH MANUFACTURING PROCESSHAZARD IDENTIFICATION AND RISK ASSESSMENT IN WATCH MANUFACTURING PROCESS
HAZARD IDENTIFICATION AND RISK ASSESSMENT IN WATCH MANUFACTURING PROCESS
 
Operational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysisOperational Risk: Solvency II and the external factors’ analysis
Operational Risk: Solvency II and the external factors’ analysis
 
Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...
Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...
Digital Travel Summit LAS 2015 - Confronting The Challenges Of Attribution Mo...
 
Supply chain risks
Supply chain risksSupply chain risks
Supply chain risks
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

I nemi counterfeit components project information 09 09 13 final

  • 1. ©2012 iNEMI Assessing the Risk of Counterfeit Components iNEMI Counterfeit Project Team
  • 3. 2©2012 iNEMI Tasks Completed by project team •Develop a methodology to evaluate or assess the risk of counterfeit use •Develop a methodology to evaluate or assess the aggregated risk of untrusted sources of supply •Develop an assessment / mitigation strategy which includes a methodology to estimate long term cost of ownership Assessing the Risk of Counterfeit Components
  • 4. 3©2012 iNEMI For more detailed information please go to…. • Risk Calculators are available for download at Counterfeit Calculators Download Page • Project White paper and more information on the project is available at iNEMI Counterfeit Components Project Page Assessing the Risk of Counterfeit Components
  • 5. ©2012 iNEMI Risk of Counterfeit Use Calculator #1
  • 6. 5©2012 iNEMI Risk of Counterfeit Use – Calculator #1 • This calculator quantitatively asses the relative risk of a product being counterfeit • Can be used by – Component Manufacturers – identify risk for their product – Product Designers – identify risk of products to be used or of end product – Distributors – identify products at risk and those requiring extra controls – End Users – identify risks of selected products and provide product ranking • It is based on 4 key attributes – product profile, supplier and supply line characteristics, counterfeit deterrents used on the product and channel characteristics • The user selects the appropriate rating for each of the elements from the rating table and the calculator provides an overall risk assessment for that product. • The higher the rating, the higher the risk of counterfeit for that product • The relative ratings for a product portfolio enables the company to focus their efforts on the high risk products.
  • 7. 6©2012 iNEMI Risk of Counterfeit Use - Calculator #1 1. Select the Product Type & Profile 2. Select the supply Line profile 3. Select the counterfeit Process controls 4. Select the output & channel characteristics
  • 8. ©2012 iNEMI Risk Calculator for Untrusted Sources Calculator #2
  • 9. 8©2012 iNEMI The risk calculator for untrusted sources (#2) • Based on objective information, the calculator produces relative ratings which are expected to be correlated to the risk of receiving counterfeits from untrusted sources. • The ratings can support a decision whether to purchase from a particular source or which of several suppliers to choose.
  • 10. 9©2012 iNEMI Risk Calculator for Untrusted Sources - Examples Select memberships & accreditations Rate mitigation & controls Fill in information on company characteristics
  • 11. ©2012 iNEMI Counterfeit Losses and Costs Calculator #3
  • 12. 11©2012 iNEMI Counterfeit Losses & Costs – Calculator #3 • This calculator provides an estimate of the costs and losses associated with counterfeit product • There are 3 assessments provided – A) Total loss estimate by product – B) Loss estimate by GEO or market – C) Total Counterfeit Cost & Losses estimate. • The total loss estimate is based on the output from calculator #1 … where the counterfeit risk result is classified as low, medium or high • The loss by GEO or market is generated using the World Bank Corruption Control index • The Total Counterfeit Cost is an estimate of all aggregated costs & losses incurred by a company where counterfeit product has entered that company’s supply chain.
  • 13. 12©2012 iNEMI Total Counterfeit Loss – Calculator #3 (A) 1. Input the products to be assessed 2. Input risk of counterfeit use from calculator #1 3. Input industry estimate of counterfeit use 4. Input the estimated w/w Revenue for the product Estimated Counterfeit Revenue Losses
  • 14. 13©2012 iNEMI Counterfeit Loss by GEO – Calculator #3 (B) 1. Input all countries / markets the product is sold 2. Input estimated or target Revenue for that market 3. Input the Corruption Control Index for that market ( World Bank ) 1. Input all countries / markets the product is sold Estimated Counterfeit Revenue Loss by Country / Market
  • 15. 14©2012 iNEMI Total Counterfeit Cost – Calculator #3 (C) 2. Input all costs – actual or estimated 1. Input estimated counterfeit Rate (internal or external data) Total Counterfeit Cost