• Advertise
  • Contact Us
  • About Us
  • Supplier Directory
  • SCB YouTube
  • Login
  • Subscribe
  • Logout
  • My Profile
  • LOGISTICS
    • Air Cargo
    • All Logistics
    • Express/Small Shipments
    • Facility Location Planning
    • Freight Forwarding/Customs Brokerage
    • Global Gateways
    • Global Logistics
    • Last Mile Delivery
    • Logistics Outsourcing
    • LTL/Truckload Services
    • Ocean Transportation
    • Rail & Intermodal
    • Reverse Logistics
    • Service Parts Management
    • Transportation & Distribution
  • TECHNOLOGY
    • All Technology
    • Artificial Intelligence
    • Cloud & On-Demand Systems
    • Data Management (Big Data/IoT/Blockchain)
    • ERP & Enterprise Systems
    • Forecasting & Demand Planning
    • Global Trade Management
    • Inventory Planning/ Optimization
    • Product Lifecycle Management
    • Sales & Operations Planning
    • SC Finance & Revenue Management
    • SC Planning & Optimization
    • Sourcing/Procurement/SRM
    • Supply Chain Visibility
    • Transportation Management
  • GENERAL SCM
    • Business Strategy Alignment
    • Education & Professional Development
    • Global Supply Chain Management
    • Global Trade & Economics
    • HR & Labor Management
    • Quality & Metrics
    • Regulation & Compliance
    • SC Security & Risk Mgmt
    • Supply Chains in Crisis
    • Sustainability & Corporate Social Responsibility
  • WAREHOUSING
    • All Warehouse Services
    • Conveyors & Sortation
    • Lift Trucks & AGVs
    • Order Fulfillment
    • Packaging
    • RFID, Barcode, Mobility & Voice
    • Robotics
    • Warehouse Management Systems
  • INDUSTRIES
    • Aerospace & Defense
    • Apparel
    • Automotive
    • Chemicals & Energy
    • Consumer Packaged Goods
    • E-Commerce/Omni-Channel
    • Food & Beverage
    • Healthcare
    • High-Tech/Electronics
    • Industrial Manufacturing
    • Pharmaceutical/Biotech
    • Retail
  • THINK TANK
  • WEBINARS
    • On-Demand Webinars
    • Upcoming Webinars
  • PODCASTS
  • VIDEOS
  • WHITEPAPERS
Home » Anti-counterfeiting Strategies at the Source and for End Products

Anti-counterfeiting Strategies at the Source and for End Products

March 18, 2013
Chi-Pong Wong, Senior Supply Chain Strategy Development Manager, Hewlett-Packard

Counterfeit sources that creep into businesses' supply chains and used as building blocks can seriously compromise the quality of end products and post grave impacts to the businesses. There must be anti-counterfeiting strategies on both fronts - supply source counterfeiting and end product counterfeiting.

CNN Money reported that in 2012, U.S. Customs and Border Protection seized 25,000 shipments of counterfeits totaling $178.9m making their ways into the United States. In the same year, SCM World survey showed that counterfeiting is the second-highest concern on the minds of supply chain executives. Counterfeits hurt brand reputations, customer loyalty, revenue, and could damage national security, public health and even lives. This is why implementing anti-counterfeiting measures is becoming one of business executives' top priorities.

To fight counterfeits on both fronts, businesses not only need to establish mechanisms to prevent counterfeits from sneaking into their supply chains, and detect fakes before using them as building blocks to their end products, they also need to make forging their end products difficult and costly, incriminate exposed counterfeiters, and terminate counterfeiters' sales and distribution channels. Strategies involving these counter forgery measures on both fronts can be represented below by the acronym REMIT:

"¢ Reduce counterfeit sources in the supply chain.

"¢ Espy counterfeit sources before using them to build end products.

"¢ Make it difficult or costly for the forgers to counterfeit end products.

"¢ Impair forgers by exposing them and taking litigation actions.

"¢ Terminate counterfeiters' sales and distribution channels.

The below sections suggest approaches for each of these REMIT strategies.

Reduce counterfeit sources in the supply chain

As the old saying goes; garbage in, garbage out. Counterfeit parts used as building blocks could severely impact the quality of the end products. This in turn tarnishes businesses' brands which could be very costly to repair or even be irreparable. Therefore businesses must guard their material and component sources stringently. To accomplish this goal, the first strategy is to procure high quality source materials by adopting a set of very stringent supplier requirement criteria. These supplier requirement criteria establish high standards for the suppliers to meet in the following areas:

"¢ Supplier's own upstream supplier requirement criteria

"¢ Supplier's quality validation standards and processes of their upstream sources

"¢ Supplier's experience and processes in counterfeit detection

"¢ Supplier's commitment to certify their parts and share mitigation cost should their parts be forged and/or used

"¢ Supplier's membership in general and industry-pertinent, reputable anti-counterfeiting associations like IACC (International AntiCounterfeiting Coalition, IMPACT (International Medical Products Anti-Counterfeiting Taskforce, ERA (Electronic Retailing Association, IAA (International Authentication Association, IDEA (Independent Distributors of Electronics Association, etc.

"¢ Supplier's certification status by the aforementioned associations.

"¢ Supplier's compliance status on REACH (Registration, Evaluation, Authorization, and restriction of Chemical substances, RoHS (Restriction of Hazardous Substances, etc.

Espy counterfeit sources before using them to build end products

The second strategy for businesses to guard their supply sources against counterfeits is to implement early detection apparatus to filter out infiltrated counterfeit parts. Businesses need to remember that there would always be counterfeits crept into businesses' supply chains potentially no matter how rigorously businesses screened and selected their suppliers. Here are a few main test and audit strategies to enable detecting fake parts early.

"¢ Test and audit any part that has never been used by the businesses (new part from an existing qualified supplier, or a part from a newly qualified supplier).

"¢ Continually test and audit critical components to ensure the parts' quality even when such parts have been used in building the end products before.

"¢ Test and audit the end products to re-validate product functionality against specifications to verify that new parts do not compromise end product quality.

Make it difficult or costly for the forgers to counterfeit end products

Businesses should also make their end products difficult or very costly to forge. There exist different mechanisms, varying in cost and complexity, for businesses to achieve this goal to dissuade would-be copycats. Below are a couple of leading methods:

"¢ Use seals, labels, and packaging tapes that are difficult or costly to imitate on the inside and outside of the products and the packages. Holographic stickers, self destructive hologram labels, dot-matrix kinematic effect labels, and some other counterfeit and tamper resistant labels have been increasingly used for anti-counterfeiting because of these merits.

"¢ Attach RFID tags to end products to allow businesses to trace their transitory path and history to guard against counterfeits from creeping into distribution centers and warehouses before reaching the end retail stores. Wal-Mart and the United States Department of Defense published in 2005 requirements for their vendors to place RFID tags on all shipments. Walmart and Sam's Club started enforcing this requirement by 2008.

Impair forgers by exposing them and taking litigation actions

When forgers know that they can be found, publicized and sued, they will be less inclined to commit the deeds. To accomplish this effect, businesses should expose counterfeiters to as many highly impactful private and governmental associations and sites as possible. The former exposes the counterfeiters and their counterfeits to a large customer audience whereas the latter enables government authorities to identify these counterfeits and take counter measures.

"¢ Expose counterfeiters by reporting the counterfeit incidents to all pertinent parties, including customers, suppliers, industry pertinent associations, government entities, social media (Facebook, Twitter, etc.), etc. to rapidly make the forgery incidents known to a wide audience and governing authorities.

"¢ Pursue litigation against counterfeiters to recuperate business losses, punish the offenders, and warn off would-be forgers.

Terminate counterfeiters' sales and distribution channels

Businesses should leverage custom authorities around the world to destroy seized forgeries, and also curb the counterfeiters' sales and distribution channels. These are among the least costly measures that could be used very effectively to hurt counterfeiters.

"¢ Register the trademarks of their core brands in the countries where they distribute, where they manufacture, where their suppliers reside, and where known counterfeiters manufacture their fakes. Many countries do not have legal means to protect unregistered brands. By registering their trademarks, businesses are effectively empowering those governing authorities to go after the counterfeiters and their counterfeits - many local customs authorities destroy counterfeits when they were seized.

"¢ Monitor their retail partners' physical stores as well as major online trade sites such as eBay, Amazon, Alibaba, Tradekey, Tradezone, etc., to identify fakes. Once identified, businesses should request retail partners to stop selling the fakes and the online sites to unlist the counterfeits.

Conclusion

Businesses should tackle counterfeiting at two fronts. One is to fight the fake source (materials, components or parts), and the other is to fight the fake end products. There are multiple strategies of anti-counterfeiting on these two fronts. Although there can never be one set of anti-counterfeiting strategies to fight off counterfeits 100 percent, the tactics suggested by REMIT should give businesses a very powerful arsenal to do the job effectively.

Source: Hewlett-Packard


Keywords: supply chain risk management, supply chain management, value chain, REMIT, brand protection, anti-counterfeiting initiatives, intellectual property protection

RELATED CONTENT

RELATED VIDEOS

Business Strategy Alignment Global Supply Chain Management Quality & Metrics Regulation & Compliance Supply Chain Security & Risk Mgmt Retail
KEYWORDS anti-counterfeiting initiatives brand protection Business Strategy Alignment Global Supply Chain Management Intellectual Property Protection Quality & Metrics Regulation & Compliance REMIT Retail SC Security & Risk Mgmt Supply Chain Analysis & Consulting Supply Chain Management Supply Chain Risk Management Value chain
  • Related Articles

    Anti-Counterfeiting Technologies - Authenticating the Global Supply Chain

    Tougher Anti-counterfeiting Laws Bitter Pill for Pharma

    Anti-Counterfeiting in the Pharma Supply Chain

Chi-Pong Wong, Senior Supply Chain Strategy Development Manager, Hewlett-Packard

More from this author

Wake up to live
“Supply Chains in Crisis”
updates and the latest Supply Chain News!

Subscribe to our Daily Newsletter

Timely, incisive articles delivered directly to your inbox.

Popular Stories

  • A PERSON HOLDS UP A TABLET COMPUTER IN A WAREHOUSE, SUPER-IMPOSED BY A GRAPHIC SHOWING A COMPLEX WEB OF SUPPLY CHAIN ELEMENTS

    Three Post-Pandemic Actions for Repairing Global Supply Chains

    Data Management (Big Data/IoT/Blockchain)
  • A MAN IN A SUIT SHAKES HANDS WITH A WOMAN IN A HARD HAT, NEXT TO A STACK OF CONTAINERS

    Three Procurement Technology Evolutions for 2023

    Sourcing/Procurement/SRM
  • The blank stare of a child's eye who is standing behind what appears to be a wooden frame

    The Alarming Continued Rise of Modern Slavery in Supply Chains: How Procurement Can Help Reverse the Trend

    Sourcing/Procurement/SRM
  • A GROUP OF WORKERS RANGED IN AN OFFICE, OF DIVERSE RACE, GENDER, AGE AND PHYSICAL ABILITY

    Podcast | The Supply Chain Workforce of the Future Is Already Here

    HR & Labor Management
  • A YELLOW AND BLACK TRAFFIC SIGN THAT READS "VOLATILITY AHEAD"

    Four Strategies for Addressing Supply Chain Disruption

    Sourcing/Procurement/SRM

Digital Edition

Scb nov 2022 sm

2022 Supply Chain Innovator of the Year

VIEW THE LATEST ISSUE

Case Studies

  • New Revenue for Cloud-Based TMS that Embeds Orderful’s Modern EDI Platform

  • Convenience Store Client Maximizes Profit and Improves Customer Service

  • A Digitally Native Footwear Brand Finds Rapid Fulfillment

  • Expanding Apparel Brand Scales Seamlessly with E-Commerce Technology

  • How a Global LSP Scaled its Security Program and Won More Business

Visit Our Sponsors

Orderful Yang Ming Alithya
Barcoding Blue Yonder BNSF Logistics
CoEnterprise Data Capture Deposco
E2open GAINSystems Generix
Geodis GEP GreyOrange
Here Honeywell Intelligrated IFM
Infor Inmar Keelvar
Kinaxis Korber Lean Solutions Group 2H
Liberty SBF Locus Robotics Logility
LogistiVIEW Lucas Systems MCA Connect
MPO Nvidia Old Dominion
OpenText ORTEC Overhaul
Parsyl PMMI QIMA
Redwood Logistics Ryder E-commerce by Whiplash Saddle Creek Logistics
Schneider Dedicated Setlog Holding AG Ship4WD
Shipwell Tecsys TGW Systems
Thomson Reuters Tive Trailer Bridge
Vecna Robotics Verity
Verusen
  • More From SCB
    • Featured Content
    • Video Library
    • Think Tank Blog
    • SupplyChainBrain Podcast
    • Whitepapers
    • On-Demand Webinars
    • Upcoming Webinars
  • Digital Offerings
    • Digital Issue
    • Subscribe
    • Manage Your Subscription
    • Newsletters
  • Resources
    • Events Calendar
    • SCB's Great Supply Chain Partners
    • Supplier Directory
    • Case Study Showcase
    • Supply Chain Innovation Awards
    • 100 Great Partners Form
  • SCB Corporate
    • Advertise on SCB.COM
    • About Us
    • Privacy Policy
    • Contact Us
    • Data Sharing Opt-Out

All content copyright ©2023 Keller International Publishing Corp All rights reserved. No reproduction, transmission or display is permitted without the written permissions of Keller International Publishing Corp

Design, CMS, Hosting & Web Development :: ePublishing