Auto-ID Technologies and their Impact on Counterfeiting

Size: px
Start display at page:

Download "Auto-ID Technologies and their Impact on Counterfeiting"

Transcription

1 Auto-ID Technologies and their Impact on Counterfeiting Institute of Technology Management (ITEM-HSG), St.Gallen University Department Management, Technology, and Economics (D-MTEC), ETH Zurich January

2 Agenda Page 2 The Need for Secure Authentication Technologies Research Questions and Anticipated Challenges Preliminary Results

3 Counterfeiting is a severe threat to the economy Page Worldwide Merchandise Trade [bn USD ] Counterfeit [ bn USD ] Impact on the economy: 400 Impact on foreign investments 300 Impact on employment 200 Loss of tax Important source of income for some countries Impact on users: Physical injuries Financial losses Less secure environment Possible short-term financial benefit! Impact on companies: Loss of revenue Unjustified liability claims Quality perception Negative impact on the brand / loss of goodwill Negative impact on the ROI of R&D

4 Future authentication of identification documents can be seen as a best practice in averting cloning attacks Page 4 High level of security using a combination of high-tech nonelectronic and electronic techniques Extremely difficult to duplicate Secure match of document and entity to be authenticated Privacy must be maintained Key management is an issue Î Low-cost solutions for objects with a sufficient level of security allowing for automated authentications are not yet available.

5 Mission Page 5 The Special Interest Group Anti-Counterfeiting will identify the true potential that RFID / EPC technology offers to combat counterfeiting For the Anti-Counterfeiting Initiative is interesting for many reasons: - Business Impact - All Network Issues - Focuses on currents shortcomings of the EPC Network, e.g. Security - Cross Industry

6 Agenda Page 6 The Need for Secure Authentication Technologies Research Questions and Anticipated Challenges Preliminary Results

7 How can Auto-ID technologies reduce illicit trade? Page 7 Research questions and practical challenges: Q1: What is the economy of illicit trade? Problem Description Impact of Auto-ID Technology Q4: What is the impact of an Auto-ID based solution? Q2: How to quantify the impact of illicit trade? Impact of Illicit Trade Requirements of a Technical Solution Q3: What are requirements for a solution based on Auto- ID technologies?

8 Agenda Page 8 The Need for Secure Authentication Technologies Research Questions and Anticipated Challenges Preliminary Results

9 Strategies to combat illicit trade Page 9 Illicit products encounter at least two licit actors: End-users and Customs Luxury Goods Intended Suppy Chain Licit Gray and Illicit Market Factory Illicit Manufacturer Pack Center Packaging Distribution Center Special sales to employees Distribution Company Boutiques Retail Distribution Center Licit trade Retail Backstore Retail Backstore Retai l Shopfloor Retail Shopfloor Consumer Illicit Retail: Illicit Stores, Flea Markets Consumer Illicit Retail: ebay, Internet Shops Theft Licit gray trade Illicit gray trade / smuggle Counterfeit / piracy trade Return flow Source: Thorsten Staake, Auto-ID Lab St.Gallen/Zurich Î An efficient strategy to combat illicit trade should utilize at least one of these actors

10 Reasons for buying faked products Page 10 In case of perceptive counterfeiting, cost of the original product as well as a good cost performance ratio of the counterfeit are the most important motives for buying fakes 22.8% 17.5% 42.1% 50.9% 28.1% 31.6% 28.1% 15.8% 19.3% 8.8% 12.3% 12.3% 5.3% 12.3% 12.3% 15.8% 5.3% 3.5% 3.5% 1.8% 29.8% 8.8% 1.8% 10.5% Strong impact / main reason Considerable impact Moderate impact Some impact No impact / no reason Not answered Good costperformace ratio Original too expensive Just for fun Spontaneous bargain Source: Own survey, N=152

11 Reasons against buying faked products Page 11 Bad expected quality and no purchase due to missing opportunity are the main reasons for not buying faked products 13.6% 18.2% 36.4% 13.6% 31.8% 27.3% 27.3% 27.3% 27.3% 18.2% Strong impact / main reason Considerable impact Moderate impact Some impact No impact / no reason 13.6% 31.8% 18.2% 18.2% 4.5% 18.2% 4.5% 13.6% 18.2% 18.2% No purchase due to bad quality of fakes No purchase due to missing guarantee No purchase due to missing opportunity No purchase due to attitude Source: Own survey, N=152

12 Q4: What is the impact of an Auto-ID based solution? Page 12 Automated product authentication Liability Cost per check Frequency of checks Number of faked products Revenue Return Better relation to customs High res. data on illicit actors Optimized enforcement strategies Reputation Optimized product strategies Extended competitor strategy Standard procedures to treat cases Outsourcing (AC service provider) Cost per action

13 Two solutions based on RFID Page 13 Cost to break a feature >> Financial gain (or possible harm) due to a counterfeit within the products lifetime 1. Basic EPC tags 2. RFID tags with secure authentication mechanisms Track & trace data allows to assemble a products history Based on challenge response authentication Product History Digital Fingerprint One infrastructure for various levels of security! But: What does this mean for the Network?

14 Secure Authentication Mechanisms Digital Fingerprint Page 14 The EPC network forms the IT infrastructure The EPC network has to be extended by an authentication service (EPC- PAS) The communication infrastructure does not have to be updated Local ONS Tag ID A = f(k, RAND) A Root ONS Channel Server K = Key(ID) RAND B = f(k, RAND) A = B? Request / Response Address Update EPC-IS EPC-PAS EPC-DS Manufacturer EPC-IS Distributor Product with EPC+ Retailer

Combining the INTERNET of THINGS and the INTERNET of SERVICES

Combining the INTERNET of THINGS and the INTERNET of SERVICES On RFID Conference and Exhibition LAGOAS PARK, LISBON Combining the INTERNET of THINGS and the INTERNET of SERVICES Dr. Joachim Schaper Vice President SAP Research EMEA, SAP AG Agenda 1 2 3 4 5 The VISION

More information

Position Paper Cross Border e-logistics

Position Paper Cross Border e-logistics Position Paper Cross Border e-logistics A Need for Integrated European E-Logistics Solutions www.ecommerce-europe.eu POSITION PAPER 3 Table of contents Summary Summary & Recommendations 3 Introduction

More information

Using RFID Technology to Stop Counterfeiting

Using RFID Technology to Stop Counterfeiting Using RFID Technology to Stop Counterfeiting By Eustace Asanghanwa, Crypto & RF Memory Applications Summary RFID technology is well known for providing labeling solutions to automate inventory control.

More information

T H E D A R K T R A D E. From Inception to Consumption Understanding the Global Supply Chain. Activity #1. 40 min

T H E D A R K T R A D E. From Inception to Consumption Understanding the Global Supply Chain. Activity #1. 40 min T H E D A R K T R A D E ILLICIT LESSON PLAN GRADES 9-12 STANDARDS: ECONOMICS, 3; GEOGRAPHY, 11 From Inception to Consumption Understanding the Global Supply Chain Overview: Supply chains consist of a network

More information

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security. Applying the 80/20 approach for Operational Excellence How to combat new age threats, optimize investments and increase security Vinod Vasudevan Agenda Current Threat Landscape The 80/20 Approach Achieving

More information

Reducing Cyber Risk in Your Organization

Reducing Cyber Risk in Your Organization Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than

More information

Securing, Monitoring & Tracking Documents and Flow of Goods. Real Time Supply Chain Visibility

Securing, Monitoring & Tracking Documents and Flow of Goods. Real Time Supply Chain Visibility Securing, Monitoring & Tracking Documents and Flow of Goods Real Time Supply Chain Visibility Pivot88TM All4R : All & All Rights 4RTM reserved : All Rights October reserve 2013 March 2013 Pivot88TM All4R

More information

AN INTRODUCTION TO THE GLOBAL DOCUMENT TYPE IDENTIFIER (GDTI) TABLE OF CONTENTS

AN INTRODUCTION TO THE GLOBAL DOCUMENT TYPE IDENTIFIER (GDTI) TABLE OF CONTENTS TABLE OF CONTENTS What Is a Global Document Type Identifier?... 3 What Is a GDTI Used For?... 3 Key Attributes of the GDTI... 3 Business Benefits of Using GDTIs... 4 How Is the GDTI Formed?... 4 Frequently

More information

SmartCERT. Amugada Stephen Ambani Bsc. Information Technology SIT/0537/12 0716547283. Powered by: CAS

SmartCERT. Amugada Stephen Ambani Bsc. Information Technology SIT/0537/12 0716547283. Powered by: CAS SmartCERT Reliability Robustness Security A Radio Frequency Identification (RFID) based solution to Certificate Counterfeiting. Amugada Stephen Ambani Bsc. Information Technology SIT/0537/12 0716547283

More information

Customer Experience Audit

Customer Experience Audit SOLUTION OVERVIEW Customer Experience Audit Understanding customer experience is vital Developed in partnership with Customer Experience Foundation The Customer Experience Audit provides a fast, independent

More information

SOURCE ID RFID Technologies and Data Capture Solutions

SOURCE ID RFID Technologies and Data Capture Solutions SOURCE ID RFID Technologies and Data Capture Solutions RFID - a vital link for streamlining in-store inventory and supply chain management Source ID believes that worldwide demand for RFID based technology

More information

IBM Solution for Pharmaceutical Track & Trace

IBM Solution for Pharmaceutical Track & Trace Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about

More information

ERM Symposium April 2009. Moderator Nancy Bennett

ERM Symposium April 2009. Moderator Nancy Bennett ERM Symposium April 2009 RI4-Implementing a Comprehensive Privacy Program John Kelly Joseph Nocera Moderator Nancy Bennett Data & Identity Theft: Keeping sensitive data out of the wrong hands Presented

More information

Four Ways Counterfeit Electronics are Killing Your Profits and Steps to Fight Back A PLAYBOOK FOR THE ELECTRONICS INDUSTRY

Four Ways Counterfeit Electronics are Killing Your Profits and Steps to Fight Back A PLAYBOOK FOR THE ELECTRONICS INDUSTRY Four Ways Counterfeit Electronics are Killing Your Profits and Steps to Fight Back A PLAYBOOK FOR THE ELECTRONICS INDUSTRY INTRODUCTION We all know that counterfeit products exist on the market. Whether

More information

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015

Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Distributor Liability Contract Risk Management THOMAS DOUGLASS APRIL 15, 2015 Today s Agenda What are we talking about today? What is Risk Evolution of risk management Understand the importance of Risk

More information

IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance

IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance Lack of product visibility in pharmaceutical supply chains At its core,

More information

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda

More information

Your guide to creating a customer experience program that works

Your guide to creating a customer experience program that works Your guide to creating a customer experience program that works CONTENTS Customer Love Stories The Customer Experience Challenge Create Customer Love Stories in 4 Steps Total Voice of the Customer Customer

More information

Efficient Data Sharing in Healthcare

Efficient Data Sharing in Healthcare Efficient Data Sharing in Healthcare More and more efforts are underway in different countries on sharing data among doctors and hospitals in healthcare for achieving higher quality and efficiency of clinical

More information

MERCHANDISE VISIBILITY SOLUTION. Helping retailers reduce out-of-stocks, reduce on-hand inventory and increase sales

MERCHANDISE VISIBILITY SOLUTION. Helping retailers reduce out-of-stocks, reduce on-hand inventory and increase sales MERCHANDISE VISIBILITY SOLUTION Helping retailers reduce out-of-stocks, reduce on-hand inventory and increase sales MERCHANDISE VISIBILITY SOLUTION POWERFUL INSIGHTS, ENABLING REAL-TIME RETAIL OPERATIONS

More information

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic.

CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12. CentralNic. Version 1.0. July 31, 2012. https://www.centralnic. CentralNic Privacy Policy Last Updated: July 31, 2012 Page 1 of 12 CentralNic Privacy Policy Version 1.0 July 31, 2012 https://www.centralnic.com/ CentralNic Privacy Policy Last Updated: February 6, 2012

More information

AN INTRODUCTION TO THE GLOBAL TRADE ITEM NUMBER (GTIN) TABLE OF CONTENTS

AN INTRODUCTION TO THE GLOBAL TRADE ITEM NUMBER (GTIN) TABLE OF CONTENTS TABLE OF CONTENTS What Is a Global Trade Item Number?... 3 What Is a GTIN Used For?... 3 Key Attributes of the GTIN... 3 Business Benefits of Using GTINs... 3 How Is the GTIN Formed?... 4 Which GTIN Is

More information

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark

RFID Security. April 10, 2006. Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark April 10, 2006 Martin Dam Pedersen Department of Mathematics and Computer Science University Of Southern Denmark 1 Outline What is RFID RFID usage Security threats Threat examples Protection Schemes for

More information

Mass Serialization and Traceability Implementation in the Pharma Industry. Mathieu Aman, Global Program Lead F. Hoffmann-La Roche Ltd, Switzerland

Mass Serialization and Traceability Implementation in the Pharma Industry. Mathieu Aman, Global Program Lead F. Hoffmann-La Roche Ltd, Switzerland Mass Serialization and Traceability Implementation in the Pharma Industry Mathieu Aman, Global Program Lead F. Hoffmann-La Roche Ltd, Switzerland What drives the industry towards more traceability Strategic

More information

How To Help The Global Healthcare User Group (Hug)

How To Help The Global Healthcare User Group (Hug) HUG Global Healthcare User Group - HUG GS1 s Brand Architecture 2 The global Healthcare User Group - HUG Mission: Lead the healthcare industry to the effective utilization and development of global standards

More information

How to get from laws to technical requirements

How to get from laws to technical requirements How to get from laws to technical requirements And how the OPM hack relates technology, policy, and law June 30, 2015 Isaac Potoczny-Jones ijones@galois.com www.galois.com Galois, Inc. Overview Outline!

More information

DRAFT REPORT. EN United in diversity EN 2014/2151(INI) 5.2.2015

DRAFT REPORT. EN United in diversity EN 2014/2151(INI) 5.2.2015 EUROPEAN PARLIAMT 2014-2019 Committee on Legal Affairs 2014/2151(INI) 5.2.2015 DRAFT REPORT on Towards a renewed consensus on the enforcement of Intellectual Property Rights: An EU Action Plan (2014/2151(INI))

More information

Using QR codes to track and identify counterfeit products

Using QR codes to track and identify counterfeit products perspective Using QR codes to track and identify counterfeit products Abstract The development of a new product or technology always comes with the risk of counterfeiting, something that could affect company

More information

Paying the Price of Inaction? Why Original Equipment Manufacturers Must Reinvent Competitive Parts Pricing

Paying the Price of Inaction? Why Original Equipment Manufacturers Must Reinvent Competitive Parts Pricing Paying the Price of Inaction? Why Original Equipment Manufacturers Must Reinvent Competitive Parts Pricing Original Equipment Manufacturers know that things must change In the spare parts market, overpriced

More information

From Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud.

From Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud. From Edge to the Core. Sicurezza dati nelle infrastrutture condivise, virtualizzate e cloud. Claudio Olati Sales Manager - Gemalto Sergio Sironi Regional Sales Manager - Safenet We are the world leader

More information

AN INTRODUCTION TO THE GLOBAL INDIVIDUAL ASSET IDENTIFIER (GIAI) TABLE OF CONTENTS

AN INTRODUCTION TO THE GLOBAL INDIVIDUAL ASSET IDENTIFIER (GIAI) TABLE OF CONTENTS TABLE OF CONTENTS What Is a Global Individual Asset Identifier?... 3 What Is a GIAI Used For?... 3 Key Attributes of the GIAI... 3 Business Benefits of Using GIAIs... 3 How Is the GIAI Formed?... 4 Frequently

More information

Part I Assessing the Economic Impact, Comments on the Coordination and Strategic Planning of the Federal Effort

Part I Assessing the Economic Impact, Comments on the Coordination and Strategic Planning of the Federal Effort To: Re: Office of Management and Budget, Executive Office of the President, Intellectual Property Rights Enforcement Coordinator, Victoria A. Espinel Intellectualproperty@omb.eop.gov Part I Assessing the

More information

Strategic Brand Management Building, Measuring and Managing Brand Equity

Strategic Brand Management Building, Measuring and Managing Brand Equity Strategic Brand Management Building, Measuring and Managing Brand Equity Part 1 Opening Perspectives 开 放 视 觉 Chapter 1 Brands and Brand Management ------------------------------------------------------------------------

More information

RFID Security: Threats, solutions and open challenges

RFID Security: Threats, solutions and open challenges RFID Security: Threats, solutions and open challenges Bruno Crispo Vrije Universiteit Amsterdam crispo@cs.vu.nl 1 Table of Content RFID technology and applications Security Issues Privacy Proposed (partial)

More information

RFID Lab Testing, research and development activities in the field of RFID application in business

RFID Lab Testing, research and development activities in the field of RFID application in business Dipartimento di Ingegneria Industriale Università degli Studi di Parma RFID Lab Testing, research and development activities in the field of RFID application in business Antonio Rizzi, Prof., Ph.D. Full

More information

Two Approaches to PCI-DSS Compliance

Two Approaches to PCI-DSS Compliance Disclaimer Copyright Michael Chapple and Jane Drews, 2006. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes,

More information

Security and Privacy Issues of Wireless Technologies

Security and Privacy Issues of Wireless Technologies Security and Privacy Issues of Wireless Technologies Collin Mulliner http://www.cs.ucsb.edu/~mulliner/ Agenda Introduction Issues Technology specific issues Wi Fi Bluetooth RFID

More information

WHITE PAPER. ABCs of RFID

WHITE PAPER. ABCs of RFID WHITE PAPER ABCs of RFID Understanding and using Radio Frequency Identification Basics - Part 1 B.Muthukumaran Chief Consultant Innovation & Leadership Gemini Communication Ltd #1, Dr.Ranga Road, 2nd Street,

More information

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities

More information

IP Enforcement and Anti- Counterfeiting in Latin America. J. Michael Martinez de Andino Hunton & Williams LLP February 6, 2013

IP Enforcement and Anti- Counterfeiting in Latin America. J. Michael Martinez de Andino Hunton & Williams LLP February 6, 2013 IP Enforcement and Anti- Counterfeiting in Latin America J. Michael Martinez de Andino Hunton & Williams LLP February 6, 2013 Table of Contents I. Counterfeiting in Latin America II. International Efforts

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

WUG 2016 - How Target Supports a Large Winshuttle Community. Shon Kane Target Corporation

WUG 2016 - How Target Supports a Large Winshuttle Community. Shon Kane Target Corporation WUG 2016 - How Target Supports a Large Winshuttle Community Shon Kane Target Corporation Agenda About the Presenter About Target Corporation Winshuttle at Target Technology Support Model Winshuttle Case

More information

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business. S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in

More information

Review: The IACC Payment Processor Program

Review: The IACC Payment Processor Program Written Testimony of Robert C. Barchiesi President On Behalf of The International AntiCounterfeiting Coalition The Role of Voluntary Agreements in the U.S. Intellectual Property System United States House

More information

Effective Intelligence Functions:

Effective Intelligence Functions: Effective Intelligence Functions: The Role of Management February 13 th, 2006 Today s Discussion: Objectives Setting the stage Study description and preliminary findings Applying a management framework

More information

Trends and Challenges in IT Security. itec08, Darmstadt, 6th Nov. 2008

Trends and Challenges in IT Security. itec08, Darmstadt, 6th Nov. 2008 Trends and Challenges in IT Security Claudia Eckert Fraunhofer Institute for Secure Information Technology SIT Darmstadt, Germany, Darmstadt, 6th Nov. 2008 Outline 1. Internet of smart Things and Services

More information

Counterfeit Parts Prevention

Counterfeit Parts Prevention Counterfeit Parts Prevention 1 Introduction / Objectives Counterfeiting is an age-old issue, but is growing in exponential proportions with respect to the types of: Products being counterfeited Industries

More information

How to use Text Mining in Social and CRM to Improve Quality Control and Save Money

How to use Text Mining in Social and CRM to Improve Quality Control and Save Money How to use Text Mining in Social and CRM to Improve Quality Control and Save Money Olle Hagelin Field Data Mgmt Sony Mobile Communications Olle Hagelin 20+ years within Mobile Industry 10 years working

More information

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)

More information

FlexNet Embedded Product Roadmap & User Group Session. Vikram Koka, VP, R&D Priya Rajagopalan, Director, Product Management

FlexNet Embedded Product Roadmap & User Group Session. Vikram Koka, VP, R&D Priya Rajagopalan, Director, Product Management FlexNet Embedded Product Roadmap & User Group Session Vikram Koka, VP, R&D Priya Rajagopalan, Director, Product Management 1 Confidentiality All information contained in this presentation is confidential

More information

www.casece.com kwanchit.netprapa@cnhind.com Tel. +66 2645 8147 CNH INDUSTRIAL SERVICE LTD. 173 South Sathorn Asia Center 23rd floor, Bangkok,

www.casece.com kwanchit.netprapa@cnhind.com Tel. +66 2645 8147 CNH INDUSTRIAL SERVICE LTD. 173 South Sathorn Asia Center 23rd floor, Bangkok, www.casece.com kwanchit.netprapa@cnhind.com Tel. +66 2645 8147 CNH INDUSTRIAL SERVICE LTD. 173 South Sathorn Asia Center 23rd floor, Bangkok, Thailand A DEALERSHIP OPPORTUNITY WITH A LEADING COMPANY AWAITS

More information

TECHNOLOGY BRIEF. Business Benefits from Radio Frequency Identification (RFID)

TECHNOLOGY BRIEF. Business Benefits from Radio Frequency Identification (RFID) TECHNOLOGY BRIEF Business Benefits from Radio Frequency Identification (RFID) Executive summary Today the largest government and business enterprises in the world are developing plans to deploy electronic

More information

RFID in Food & Beverage Industry

RFID in Food & Beverage Industry RFID in Food & Beverage Industry WHITE PAPER Ver 1. (April 213) As the world continues to evolve, demand for profitability and expediency increases. It is difficult to maintain the food supply safer by

More information

Anti illicit trade : scale and opportunities. Neil Withington

Anti illicit trade : scale and opportunities. Neil Withington Anti illicit trade : scale and opportunities Neil Withington AIT: scale of the problem Size of illicit market - Current estimates between 6% - 12% of consumption - This represents between 300bn 600bn cigarettes

More information

TURN BACK CRIME. Global awareness campaign

TURN BACK CRIME. Global awareness campaign TURN BACK CRIME Global awareness campaign ABOUT THE CAMPAIGN Together, we can turn back crime Turn Back Crime is a global awareness campaign developed by INTERPOL. Using a variety of media channels including

More information

Full year results. March 2012

Full year results. March 2012 2 0 1 1 Full year results March 2012 1 DISCLAIMER Safe Harbour Statement This presentation contains forward-looking statements (made pursuant to the safe harbour provisions of the Private Securities Litigation

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Bruce Rogers. Forbes. Chief Insights Officer and Head of the CMO Practice

Bruce Rogers. Forbes. Chief Insights Officer and Head of the CMO Practice Publish or Perish Bruce Rogers Forbes Chief Insights Officer and Head of the CMO Practice Publish or Perish A CMO Roadmap for Managing, Systematizing, and Optimizing The Marketing Content Supply Chain

More information

Tim Salt. Managing Director, Diageo Australia

Tim Salt. Managing Director, Diageo Australia Tim Salt Managing Director, Diageo Australia Tim Salt Managing Director, Diageo Australia Tim Salt Managing Director, Diageo Australia & New Zealand Nationality: Australian (UK born) Role description:

More information

How To Transform The Retail And Shopping Experience

How To Transform The Retail And Shopping Experience A Estratégia OmniChannel Key elements to succeed Pere Rosell, Standards and Technology Director, GS1 Spain Lisbon, 24 th September 2015 GS1 Spain Strategic Plan Conclusions Digital Transformation Value

More information

Industry Assessment. Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military Electronic Component Procurement

Industry Assessment. Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military Electronic Component Procurement Electronic Supply Chain Solutions, Inc. 3023 Eastland Blvd., Bldg. H-109 Clearwater, FL 33761 (727) 723-8255 Industry Assessment Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military

More information

Key IT Anti-Fraud Challenges for Banking & Financial Institutions in Latin America

Key IT Anti-Fraud Challenges for Banking & Financial Institutions in Latin America Key IT Anti-Fraud Challenges for Banking & Financial Institutions in Latin America TABLE OF CONTENTS Latin American IT Security Markets Overview 03 Rising Internet Usage and Vulnerabilities 04 Low Threat

More information

Overview, Goals, & Introductions

Overview, Goals, & Introductions Improving the Retail Experience with Predictive Analytics www.spss.com/perspectives Overview, Goals, & Introductions Goal: To present the Retail Business Maturity Model Equip you with a plan of attack

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

Seven Best Practices for Fighting Counterfeit Sales Online

Seven Best Practices for Fighting Counterfeit Sales Online White Paper Seven Best Practices for Fighting Counterfeit Sales Online Executive Summary Counterfeit sales represent 5 to 7 percent of world merchandise trade today 1. The damage these sales do to rightful

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013 Ponemon Institute Research Report

More information

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual

More information

Write a Winning Business Plan based on Anatomy of a Business Plan & Automate Your Business Plan

Write a Winning Business Plan based on Anatomy of a Business Plan & Automate Your Business Plan Write a Winning Business Plan based on Anatomy of a Business Plan & Automate Your Business Plan 2015 Linda Pinson B usiness Planning: What are the Benefits to You? Every wholesale, retail, and/or service

More information

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title

RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference

More information

NOT ALL CODES ARE CREATED EQUAL

NOT ALL CODES ARE CREATED EQUAL NOT ALL CODES ARE CREATED EQUAL Why some serial numbers are better than others. Verify Brand 3033 Campus Drive, Minneapolis MN 55441 info@verifybrand.com (763) 235-1400 EXECUTIVE SUMMARY Serial numbers

More information

Callaway Golf Company (ELY) - Financial and Strategic SWOT Analysis Review

Callaway Golf Company (ELY) - Financial and Strategic SWOT Analysis Review Brochure More information from http://www.researchandmarkets.com/reports/1936043/ Callaway Golf Company (ELY) - Financial and Strategic SWOT Analysis Review Description: Callaway Golf Company (ELY) - Financial

More information

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant Seccuris is Canada s premier Information Assurance integrator. We enable organizations to achieve business goals through effective management of information risk. We are agile, innovative, flexible, and

More information

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC. Top Ten Fraud Risks That Impact Your Financial Institution Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC Agenda Education on understanding the fraud risk Take away.. Education to

More information

Authenticating and policing the internet for consumer confidence and security

Authenticating and policing the internet for consumer confidence and security Authenticating and policing the internet for consumer confidence and security Secure On-Line ID Introduction Unique zero intervention at a glance solution Built on positive site validation Allows policing

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report

More information

Tracking & Managing Safety Performance

Tracking & Managing Safety Performance American Construction Safety Solutions, LLC Where the goal is ultimately to help give Clients the safest jobsites Tracking & Managing Safety Performance HOW CAN YOU BENEFIT FROM THE ACSS LLC SAFETY TRACKING

More information

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX

Mobile Banking. Secure Banking on the Go. Matt Hillary, Director of Information Security, MX Mobile Banking Secure Banking on the Go Matt Hillary, Director of Information Security, MX Mobile Banking Channels SMS / Texting Mobile Banking Channels Mobile Web Browser Mobile Banking Channels Mobile

More information

A Prescription for RFID Success in the Pharmaceutical Industry

A Prescription for RFID Success in the Pharmaceutical Industry A Prescription for RFID Success in the Pharmaceutical Industry Words like counterfeiting, gray market, and out of stock are anathema to any industry, but for pharmaceuticals the implications are particularly

More information

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers Agenda Introductions The rise of machine-based identities

More information

Seven Best Practices for Fighting Counterfeit Sales Online

Seven Best Practices for Fighting Counterfeit Sales Online White Paper Seven Best Practices for Fighting Counterfeit Sales Online Executive Summary Counterfeit sales represent seven percent of all global trade. 1 The damage these sales do to rightful brand owners

More information

By Janet M. Garetto. Trademark Issues in Social Media

By Janet M. Garetto. Trademark Issues in Social Media By Janet M. Garetto Trademark Issues in Social Media What Types of Trademark Misuse Can Occur on Social Media Sites? Backdrop = traditional trademark law New sources of problems General rule: activities

More information

1. What Is Risk? 3. Perspectives on Risk. Risk Management. 6. Characteristics of Risk Management 7. Advantages of Risk Management

1. What Is Risk? 3. Perspectives on Risk. Risk Management. 6. Characteristics of Risk Management 7. Advantages of Risk Management Risk Management 1. What Is Risk? 2. Why Do We Accept or Assume Risks? 3. Perspectives on Risk 4. What is Risk Management? 5. The Risk Management Process 6. Characteristics of Risk Management 7. Advantages

More information

Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs

Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs Managed Smart Pallet Services: Improving Supply Chain Efficiency While Driving Down Costs CHALLENGE Logistics networks across the world depend on millions of returnable transport items (RTIs) to keep goods

More information

RFID current applications and potential economic benefits

RFID current applications and potential economic benefits OECD ICCP Foresight Forum on RFID Applications and Public Policy Considerations RFID current applications and potential economic benefits Naji Najjar Director, IBM South West Europe IBM is involved in

More information

Channel Incentive Travel: A Case Study

Channel Incentive Travel: A Case Study The Benefits of Incentive Travel For Channel Partners Channel Incentive Travel: A Case Study A channel incentive travel program is a travel experience awarded from a manufacturer to a retailer for meeting

More information

InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry

InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry InsureTech 2015: Addressing cybersecurity and fraud in the ME insurance industry Dino Wilkinson Partner Norton Rose Fulbright (Middle East) LLP 3 February 2015 The growing challenge of cyber risks From

More information

Creating a Mailing List

Creating a Mailing List Creating a Mailing List by BNET Editorial Tags: marketing, mailing list, direct marketing, tool A quality mailing list is probably the most important element in a direct-marketing program, and assembling

More information

The Protocol to Eliminate Illicit Trade in Tobacco Products: an overview

The Protocol to Eliminate Illicit Trade in Tobacco Products: an overview The Protocol to Eliminate Illicit Trade in Tobacco Products: an overview Background The Protocol to Eliminate Illicit Trade in Tobacco Products is an international treaty with the objective of eliminating

More information

Building the business case for continuity and resiliency

Building the business case for continuity and resiliency Global Technology Services Research Analysis Risk Management Building the business case for continuity and resiliency The economics of IT risk and reputation and their importance to business continuity

More information

Qingxin Chen University of Central Lancashire, Preston, UK

Qingxin Chen University of Central Lancashire, Preston, UK Qingxin Chen University of Central Lancashire, Preston, UK ICFSNPH 2015: 17th International Conference on Food Safety, Nutrition and Public Health Zurich, Switzerland on July, 29-30, 2015. 1. Background

More information

Cloud-based trading & financing ecosystem for global ecommerce

Cloud-based trading & financing ecosystem for global ecommerce Cloud-based trading & financing ecosystem for global ecommerce specializing in China inbound and outbound trade for small online retailers and social commerce players Our Motto MAKING BUY AND SELL EASY!

More information

Fighting Counterfeiting in Asia. Douglas Clark. Partner. Lovells, Shanghai

Fighting Counterfeiting in Asia. Douglas Clark. Partner. Lovells, Shanghai Fighting Counterfeiting in Asia Douglas Clark Partner Lovells, Shanghai Introduction "Counterfeiting in China has reached a crisis point" This is a common view heard from many western executives and government

More information

Understanding the Business Risk

Understanding the Business Risk AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 jgold@andersonkill.com Disclaimer The views expressed

More information

RFID Tags - Advantages, Disadvantages and Solutions

RFID Tags - Advantages, Disadvantages and Solutions RFID Takes Time, Risk and Cost Out of Satisfying IT Asset Tracking Requirements RFID is the tool for the times to efficiently meet today s IT asset tracking requirements. Manual and bar codebased asset

More information

DIGITAL MARKETING. The Page Title Meta Descriptions & Meta Keywords

DIGITAL MARKETING. The Page Title Meta Descriptions & Meta Keywords DIGITAL MARKETING Digital Marketing Basics Basics of advertising What is Digital Media? Digital Media Vs. Traditional Media Benefits of Digital marketing Latest Digital marketing trends Digital media marketing

More information

Factors Influencing Laptop Buying Behavior a Study on Students Pursuing Ug/Pg in Computer Science Department of Assam University

Factors Influencing Laptop Buying Behavior a Study on Students Pursuing Ug/Pg in Computer Science Department of Assam University Commerce Factors Influencing Laptop Buying Behavior a Study on Students Pursuing Ug/Pg in Computer Science Department of Assam University Keywords Laptop, Buying behavior, Students of computer science,

More information

Compliance and Tax Authority

Compliance and Tax Authority Compliance and Tax Authority 1 Compliance In general, compliance means conforming to comply with relevant laws or regulations Administrative compliance. Complying with the administrative rules of lodging

More information

REPORT. Next steps in cyber security

REPORT. Next steps in cyber security REPORT March 2015 Contents Executive summary...3 The Deloitte and Efma questionnaire...5 Level of awareness...5 Level of significance...8 Level of implementation...11 Gap identification and concerns...15

More information

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department VISA International Security Summit Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department Hanoi June 2010 Vietnam Economic Outlook One of the fastest growing economies in South-East

More information

How Fashion and Luxury Brands are Turning the Tide Against Rogue Websites

How Fashion and Luxury Brands are Turning the Tide Against Rogue Websites White Paper How Fashion and Luxury Brands are Turning the Tide Against Rogue Websites Executive Summary As counterfeiting in digital channels proliferates, fashion and luxury brands find themselves in

More information