Rx-360 Supply Chain Security White Paper: Incident Management
|
|
|
- Emil Watkins
- 9 years ago
- Views:
Transcription
1 Rx-360 Supply Chain Security White Paper: Incident Management 1
2 Contents Background... 3 Scope... 3 Definitions... 4 Introduction... 5 Discovery & Investigation... 5 Incident Management... 6 Lessons Learned Analyzing Incident Data/Investigating Root Cause Continuous Improvement Concluding Remarks End Notes
3 Background The threats of intentional adulteration, cargo theft, counterfeiting, illegal diversion, and tampering are a serious problem in our global marketplace; where criminals are profiting by putting unassuming patients at risk. These threats are product security issues. No pharmaceutical company is isolated from this rising challenge; a challenge that has caught even our world leaders attention 1. Effective incident management of product security issues equips a company to respond quickly, effectively, and in the interest of patient safety. As an industry, most pharmaceutical companies can attest to having rigorous, standardized processes for handling quality incidents internally. While many pharmaceutical companies already have systems and processes in place to prevent, detect, and respond to product security issues, the maturity of these systems and processes vary from company to company. The intent of this white paper is to share good practices for the incident management of product security issues, with the ultimate goal protecting patient safety. Scope This white paper is a high level overview of process considerations for the incident management of product security issues. Product security issues in the legitimate supply chain are, once confirmed, per definition called an incident (see also definitions). While the process considerations proposed are primarily targeted for product security issues in the legitimate supply chain, they can also be applied to the illegitimate supply chain. Product security issues related to investigations in the illegitimate supply chain (e.g. illegal internet sales) do however have specific investigation techniques, which are not covered in this white paper. 3
4 Definitions Counterfeit А counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Illegal Diversion Unlawful drug diversion is the unlawful, out of channel sales of medicines. This can include: geographic diversion (illegal importation of unapproved product or illegal importation of approved product intended for another market), contract diversion (breach of own use government or contracted pricing terms), and sale of stolen, unsalable returns. Intentional Adulteration/Manipulation Intentional adulteration/manipulation incidents occur prior to manufacturing when unscrupulous suppliers of raw materials or packaging components deliberately dilute or substitute ingredients. In doing so, they compromise the product s integrity and safety. Forensics Testing completed on a material or product to determine authenticity, typically applied to materials or products to confirm a suspected counterfeit. Product Security Issue An umbrella term for any occurrence of intentional adulteration, counterfeiting, product theft, unlawful diversion or tampering. Singularly, these product security issues are often referred to as incidents. Product Theft The unlawful taking of a product/material by a person or persons with the intent to resell or distribute for personal gain. 4
5 Introduction There are several process stages companies may progress through while addressing a product security issue. The graphic below depicts these stages: discovery, investigation, incident management and lessons learned. The primary focus of this white paper is incident management; supporting information is provided for the other stages for context only. Companies should apply the content of this white paper as appropriate to their specific businesses. Discovery Investigation Incident Management Lessons Learned Discovery & Investigation Companies should have a process and tools to gather, store and analyze any reports on potential or factual threats and signals indicative of product security issues. For counterfeit and diversion, at a minimum, there should be a record of the received information of product security issues so that they can be reviewed and assessed. The record can range from a document or spreadsheet, to a sophisticated relational database that can record the threat/signal data to use in the human or automated analysis and discovery of trends/patterns that may warrant further investigation by the company. The sooner a trend/pattern or a single data point is recognized as suspect or potential counterfeit, diverted or unapproved product and reported out to the appropriate company management/functions the more value this external monitoring has for the company. Another patient safety consideration for counterfeits is the importance of forensic testing. Counterfeits may not only lack medicinal ingredients, they may contain ingredients that are harmful if ingested. Timely forensic testing can equip a company to respond more effectively to the dangers of counterfeits. See the Rx-360 Supply Chain Security White Paper on Threats and Monitoring Processes, published in May 2012 for more information on this topic. 5
6 For theft, potential and confirmed thefts tend to be more obvious as there is likely more readily available evidence that signals an incident. Security and Supply Chain professionals are typically involved in confirming thefts. Effective monitoring and reporting tools should help a company respond, not only to the specific incident and possible recovery of the product, but also in reporting to various agencies and for planning to replace or replenish the product within their supply chain process. See the Rx-360 Supply Chain Security White Paper on Cargo Risk Assessment, published in May 2012, for more information on the threat of theft. Initially, many product security issues fall into a suspected incident category. Depending on the type of issue, it varies who is involved in this initial investigation. As all supply chain security incidents are considered criminal, security functions should be involved in all confirmed incidents. Other applicable parties may include Quality, Regulatory, Procurement, Supply Chain, Supply Chain Security, Product Business Managers, Local/Country/Regional Leads/Managers, Legal, Medical, Crisis Management, Manufacturing, Customer Service (order taking), and Transportation depending on the type of incident and the initial perceived severity/risk. The investigation should confirm the legitimacy of the signals/alerts in the discovery phase. Often times, the trigger for starting the incident management process is when an incident is confirmed. Incident Management For the purposes of this white paper, incident management is the part of the overall process where the information needed for a risk assessment, including patient safety impact, is gathered, analyzed and reviewed. In general, companies should consider the development and deployment of an incident management protocol. The protocol should include guidelines for information needed about the incident to make good decisions, such as a summary of what happened, any available information from the investigation, actions taken to work with law enforcement or health authorities, immediate decisions or actions already taken to contain the risk or communication with external partners and any planned next steps. A list of items that many companies include in initial reports follows below. 6
7 This list is not exhaustive and availability of information often varies on an incident to incident basis: Brand name of product(s) involved, including lot number, quantity, expiry dates, batch distribution information (impacted and overall lot) Date of incident discovery/confirmed date of incident Date incident is reported Country/geographic location where incident was first discovered Law enforcement actions taken Health authority notifications/actions taken Consumer notifications Stakeholder groups notifications (partners/affiliates, internal and external) Tracking identification (linked to other documents for reference) Additional information that briefly adds context to the situation, such as a description of known events leading up to the incident, immediate actions taken to secure product integrity, the value of the product compromised, or other information that may be helpful for the risk assessment and investigation of root cause. Some considerations for which individuals or functions should be involved in the process are outlined in the table that follows. While all parts of this table are important, patient safety is unequivocally paramount in incident management decisions. 7
8 Incident Specific Roles Responsible for: Common for all Incident types Product Theft Counterfeit / Tampering Illegal Diversion Intentional Adulteration Security Considerations (Investigation Prosecution) Patient Safety Considerations (Pharmacovigilance Quality Assurance) o Investigation/Facts of the Crime o Legal/External Prosecution Review/Liability/IPRs o Communicating with Law Enforcement o Safety Risk Assessment (incl. type of product, product administration, quantity of product, market/geographic impact) o Communicating with Regulatory Authorities o Reporting requirements o Audit/CAPA analysis/lessons learned o Potential for Product Recall o Product Recovery/ Source o Storage Considerations o Distribution Flow of the Product involved o Forensics/product or package authentication o o Forensics /product or package authentication Distribution Flow of the Product involved o Storage Considerations o Product packaging/ labeling and patient information leaflet o Forensics Business Considerations (Supply Chain Business Unit) General Considerations (cross functional) o Distribution flows of the product involved product/material or touched material o Supply and Inventory Impact o Communicating w/ affected customer(s) o Quantity of Product o Potential for product recall o Audit/CAPA Analysis o Product/Brand/ Market/ Geographic Impact o Technology o o Communication o Reputation/Brand Management o Potential for product recall o Lessons Learned 8
9 Companies should strive for timely decision making. Confirming any suspected product security issue should be an urgent priority, as confirmation triggers the incident management process, including risk management and resulting patient safety decisions. Companies should have an established reporting method and distribution list to consistently frame the information and communicate it to all applicable parties. Many companies have established risk assessment methodologies. The considerations in this table may be helpful in building consistent risk assessment methodologies for product security issues. If a suspected product security issue is confirmed and patient safety is a concern, immediate action should be taken minimally as required in the local law. Companies should be familiar with the response requirements for the relevant local or regional board/ministry of health. This varies globally. Most companies have an existing business process that assesses product quality issues. For supply chain security incidents, companies should consider including, Quality, Supply Chain, Commercial, Medical Affairs, Regulatory, Legal, Toxicology and Security functions and/or any role that the company deems necessary to make immediate decisions in determining patient safety risk/impact. Companies should engage health authorities early with any information that can help reduce patient safety risks. When a recall is involved, follow local and regional regulatory and business procedures to notify the public. As all incidents are criminal in nature, notification to the local/regional authorities is advisable even if not required by local law. In some jurisdictions, notification to local/regional authorities is mandatory. Other business actions to consider may include written notifications to external partners also affected, such as Health Care Professionals (HCPs), suppliers, distributors or wholesalers, where applicable. While patient safety is the primary driver for all incident management, there might be other business consequences of confirmed product security issues (incidents) related to the supply chain. To read more about Rx-360 s views on other consequences, go to the Rx-360 Supply Chain Security White Paper: A Comprehensive Supply Chain Security Management System. 9
10 Lessons Learned Analyzing Incident Data/Investigating Root Cause Incidents should be tracked, trended and reported out on a periodic basis to aid the lessons learned and continual improvement process. Bringing visibility to the issues often facilitates healthy discussions of the appropriate actions to take and the right resources to engage. A crossfunctional database may be useful in enabling a company to monitor, analyze and trend incident risk analysis. Companies should take the time to identify root or probable cause of incidents where possible. It is recognized that some incidents, due to their criminal nature, may have no root cause associated with a process within a company s control. The results of the root cause investigation, or finding the source of the problem, should be turned into continuous improvement plan or be tracked in some way that the incident receives priority review and attention to closing the actions. Continuous Improvement As mentioned previously in this white paper, the incident management of product security issues has many parallels to quality systems. Confirmed product security issues, unlike many quality incidents, are often external to a company s process controls (e.g. a cargo theft involving hijackers). Companies approach continuous improvement for product security issues in varying ways and there are currently no mandatory requirements. It is good practice to review trends and implement improvements to eliminate the cause of the product security issues where possible. It is also a good practice to develop and implement strategies that seek to eliminate the potential of the incidents from happening again. Similar to quality deviations, continuous improvement plans related to product security issues should have a level of effort and formality commensurate with the level of risk. Companies should also set up a process for verifying effectiveness of the continuous improvement plans. A database may be helpful in organizing this information. 10
11 Concluding Remarks As noted throughout this white paper, there are various stakeholders involved in responding effectively and expeditiously to an incident. Transparency, collaboration, and communication cannot be stressed enough all are fundamental enablers to ensuring patient safety and brand protection. Internally, companies will likely benefit from collaborating and expanding existing processes to enable an effective incident management program that is nimble enough to respond expeditiously. As an industry, it is important to speak with one voice on the topic of supply chain security as well as on product security issues and share our incident management lessons learned. These criminal events have not yet caused wide distrust in the legitimate supply chain, but the potential exists. Compromised products and imitations of our medicines in the legitimate supply chain could destroy our business reputation. Worse, the criminals who are focused on how lucrative stealing, diverting or creating fake pharmaceuticals can be, have complete disregard for the human lives they impact or even destroy in the process. As the environmental factors continue to change and industry resources are stretched, the industry must ensure that incident management continuously improves and evolves to address emerging trends at the global, regional, and local levels. There are many risk factors that companies may want to consider when developing their incident management process. To find additional white papers and webinars published by Rx-360 that provide suggestions for prevention go to org/ and navigate to the Supply Chain Security White Papers and Webinars. Team Members Dale Schliech, Amgen, Jamie McNulty, Takeda, Kola Stucker, BMS Megan Coatesworth, Pfizer, Johannes Schoen, Boehringer Ingelheim, Lourdes Gonzales, Genentech, Ashley Goldberg, Merz Aesthetics, Sergio Mayorga, GSK, Stephan Schwarze, Bayer HealthCare Pharmaceuticals, Carin Johansson AstraZeneca, Jennifer Porter, Amgen 11
12 End Notes 1. US President Obama emphasizes support: 12
1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY
BRIEFING 1083.4 Supply Chain Integrity and Security. A new series of general informational chapters describing various aspects of the pharmaceutical supply chain replaces Good Distribution Practices Supply
Track/Trace Solutions. for the Manufacturing Industry
Track/Trace Solutions for the Manufacturing Industry Today s manufacturers, regardless of what they produce, have no choice but to follow private sector and government required mandates. As examples, two
A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products
A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the
Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities
Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various
Internet Reputation Management Guide. Building a Roadmap for Continued Success
Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company
Internet Reputation Management Guidelines Building a Roadmap for Continued Success
Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.
Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the
Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005
Advancing Online Drug Safety: FDA Perspective
Advancing Online Drug Safety: FDA Perspective Leigh Verbois, PhD Acting Deputy Director Division of Supply Chain Security Office of Drug Security, Integrity, and Recalls Office of Compliance Center for
SADC GUIDELINES ON IMPORT AND EXPORT PROCEDURES FOR PHARMACEUTICAL PRODUCTS
SADC GUIDELINES ON IMPORT AND EXPORT PROCEDURES FOR PHARMACEUTICAL PRODUCTS June 2006 1 INTRODUCTION Public health concerns demand that the manufacture of pharmaceutical products and their subsequent handling
FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand
FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.
Rx-360 Supply Chain Security White Paper: A Comprehensive Supply Chain Security Management System
Rx-360 Supply Chain Security White Paper: A Comprehensive Supply Chain Security Management System 16 April 2012 Executive Summary Protecting patients is the obligation of the pharmaceutical industry and
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Guidance for Industry Drug Supply Chain Security Act Implementation: Identification of Suspect Product and Notification
Guidance for Industry Drug Supply Chain Security Act Implementation: Identification of Suspect Product and Notification DRAFT GUIDANCE This guidance document is being distributed for comment purposes only.
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.
Risk Assessment tools for Food Defence Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk [email protected] Reduce likelihood of attack Protect brand/ reputations Reassure customers
CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD
CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Click on tabs below FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Food and drink manufacturers
Procedure for Managing a Privacy Breach
Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access
Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer
Management of the Supply Chain: Excipients & APIs Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer 1.8 Quality Manual/Quality Policy Pfizer has integrated much of the supply chain Quality elements
White Paper. Trust Hi-Speed to show you the way. A Guide to Pharmaceutical Serialization Choosing the Right Equipment Supplier
White Paper Trust Hi-Speed to show you the way Choosing the Right Equipment Supplier Contents 1. Introduction 2. The Basics of Serialization 3. Minimum Serialization Implementation Requirements 4. Complexity
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND
NetSuite. Goes Natural. We have spoken to dozens of small business executives about their move to adopt technology.
NetSuite Goes Natural We have spoken to dozens of small business executives about their move to adopt technology. Certain companies, though, stand out as powerful examples for others who may be considering
TURN BACK CRIME. Global awareness campaign
TURN BACK CRIME Global awareness campaign ABOUT THE CAMPAIGN Together, we can turn back crime Turn Back Crime is a global awareness campaign developed by INTERPOL. Using a variety of media channels including
Pharmaceutical Distribution Security Alliance (PDSA)
Pharmaceutical Distribution Security Alliance (PDSA) Our Mission The Pharmaceutical Distribution Security Alliance's (PDSA) mission is to develop and help enact a federal policy proposal that enhances
Drug Distribution Management Policy in Korea
Drug Distribution Management Policy in Korea Regarding introduction of Drug Serial Number System (Serialization) Ministry of Health and Welfare Drug Distribution Management Policy Overview Policy Objectives
G. Recalls. http://www.fda.gov/safety/recalls/industryguidance/ucm129259.htm.
G. Recalls 1. Background When an FDA-regulated product is defective, potentially harmful, or mislabeled, recalling that product removing it from the market or correcting the problem is often the most effective
Eighth UPS Pain in the Chain Survey. Survey Snapshot
Eighth UPS Pain in the Chain Survey Survey Snapshot 1 About Pain in the Chain UPS has been surveying the healthcare and life sciences industry about supply chain issues since 2008. We started with a simple
Hidden Challenges to Achieving Desired Patient Outcomes
Hidden Challenges to Achieving Desired Patient Outcomes Breaches to supply chain integrity are converting medicines into lethal doses Ron Guido CEO, ExxPharma Therapeutics, LLC President, LifeCare Services,
2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012
2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit
Addressing the Sale of Counterfeits on the Internet
Addressing the Sale of Counterfeits on the Internet The Issue In the global environment, the sale of counterfeit goods remains a significant issue facing consumers, industry and governments alike. The
White Paper Healthcare Supply Chain Traceability
Executive Summary This white paper focuses on Healthcare supply chain Traceability, from manufacture to patient, going beyond, for example, what is currently regulated by the US 21 CFR Part 820 and ISO
Pharmaceutical Counterfeiting: Issues, Trends, Measurement
Pharmaceutical Counterfeiting: Issues, Trends, Measurement Harvey Bale, Ph.D. DG, International Federation of Pharmaceutical Manufacturers & Associations (IFPMA) President, Pharmaceutical Security Institute
Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace
Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace MEMA Brand Protection Council January 20091 Understanding the Flow of Counterfeit
IBM Solution for Pharmaceutical Track & Trace
Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009
OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the
Standard: Information Security Incident Management
Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Privacy and Electronic Communications Regulations
ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response
Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Information Security Incident Response Part 1. Purpose. This guideline establishes the minimum requirements for Information
Guidance for Industry: Starting Material Supplier Management
Guidance for Industry: Starting Material Supplier Management Version 1.0 Drug Office Department of Health. Contents 1. Introduction... 3 2. Purpose of this document... 3 3. Scope... 3 4. Selecting and
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products
Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products Chapter 1 General Principle Article 1 In order to enhance inspection,
Track and Trace in the Pharmaceutical Supply Chain
Track and Trace in the Pharmaceutical Supply Chain Edmund W. Schuster Visiting Operations Researcher Robin Koh Associate Director Auto-ID Labs Massachusetts Institute of Technology Cambridge, MA husetts
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
DATA BREACH COVERAGE
THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000
HIPAA Breach Notification Policy
HIPAA Breach Notification Policy Purpose: To ensure compliance with applicable laws and regulations governing the privacy and security of protected health information, and to ensure that appropriate notice
IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance
Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance Lack of product visibility in pharmaceutical supply chains At its core,
ASSESSMENT OF QUALITY RISK MANAGEMENT IMPLEMENTATION
PHARMACEUTICAL INSPECTION CONVENTION PHARMACEUTICAL INSPECTION CO-OPERATION SCHEME PI 038-1 26 March 2012 AIDE-MEMOIRE ASSESSMENT OF QUALITY RISK MANAGEMENT IMPLEMENTATION PIC/S March 2012 Reproduction
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01)
Safeguarding public health New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01) Tony Orme, Senior GDP Inspector Inspection, Enforcement and Standards Division
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE
DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy
CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE
EFPIA Good Practice Revision 1, October 2014
EFPIA Good Practice Revision 1, October 2014 Reducing Risk of Drug Products Shortages Introduction Authorities, industry and healthcare providers have a responsibility to ensure a modern and sustainable
SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY
Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association
Visa global Compromised Account
Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers
MOBILE AND THE HEALTH CARE SUPPLY CHAIN
A Novation White Paper MOBILE AND THE HEALTH CARE SUPPLY CHAIN Welcome to the age of mobility and the pervasive Internet an age that allows us to be highly interactive, make personalized decisions and
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
CRISIS MANAGEMENT PLAN
CRISIS MANAGEMENT PLAN Table of Contents Introduction... 3 Purpose... 3 Objectives... 3 Types & Levels of a Crisis... 4 Plan Activation... 6 Crisis Management Team (CMT) Structure... 6 CMT Responsibilities...
Blood-clotting disorders XARELTO Identifying genuine products of Bayer HealthCare
Blood-clotting disorders XARELTO Identifying genuine products of Bayer HealthCare Product presentation, packaging design, and selected security features Imprint Bayer HealthCare AG 51368 Leverkusen Germany
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Accenture Risk Management. Industry Report. Life Sciences
Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive
COMPLIANCE ALERT 10-12
HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment
DATA BREACH RESPONSE READINESS Is Your Organization Prepared?
March 30, 2015 DATA BREACH RESPONSE READINESS Is Your Organization Prepared? Peter Sloan Pete Enko Jeff Jensen Deborah Juhnke The data security imperatives of Prevention, Detection, and Response do not
FOOD FRAUD Vulnerability & Impact
FOOD FRAUD Vulnerability & Impact THE INDUSTRY S RESPONSE Aldin Hilbrands, Royal Ahold Outline Food Fraud Types Drivers Impact Food Industry s Response Food Fraud in the Context of Food Safety Economically
Risk-Based Approach to Managing Supply Chain Security and Compliance
Risk-Based Approach to Managing Supply Chain Security and Compliance Supply chain security remains a U.S. policy priority, and the U.S. Government continues to work closely with the trade community to
Drug Supply Chain Security Act (Title II of the Drug Quality and Security Act) Overview and Implementation
Drug Supply Chain Security Act (Title II of the Drug Quality and Security Act) Overview and Implementation Connie Jung, RPh, PhD U.S. Food and Drug Administration NACDS Total Store Expo August 24, 2014
CSC Best Practice Guide. 10 Steps to Tackling Online Counterfeiting
CSC Best Practice Guide Steps to Tackling As the world becomes more connected and the appetite for brands in fast-developing economies grows, the commercial risk for companies increases. While online marketplaces
Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec
Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,
Procedure for EFISC, operators and CB s
Feed Safety Incident and Crisis Management Procedure for EFISC, operators and CB s Version 1.0 final Date : March 2014 EFISC Feed Safety Incident and Crisis Management Procedure version 1.0, March 2014
Rx-360 An International Pharmaceutical Supply Chain Consortium
Rx-360 An International Pharmaceutical Supply Chain Consortium Overview Rx-360 and the Audit Sharing Program September 2011 Rx-360 Members (Continuously updated list at www.rx-360.org) Manufacturers (24)
Draft guidance for registered pharmacies preparing unlicensed medicines
Draft guidance for registered pharmacies preparing unlicensed medicines January 2014 1 The General Pharmaceutical Council is the regulator for pharmacists, pharmacy technicians and registered pharmacies
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS
PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009
WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt
2015 Visa Payment Security Symposium Webinar
The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director,
Virtual Pharmacy Practice and Wholesale Distribution. Out of Thin Air
Virtual Pharmacy Practice and Wholesale Distribution Out of Thin Air Virtual Wholesalers and Dysfunction in s Prescription Medication Supply Virginia Herold Executive Officer CA State Board of Pharmacy
FOOD FRAUD Threats & Impacts
FOOD FRAUD Threats & Impacts THE INDUSTRY S RESPONSE YVES Rey, Corporate Quality General Manager Danone GFSI Board Member and Former Chairman Outline Introduction to GFSI Food Fraud Types Drivers Impact
ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance
ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information
How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised
ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing
Selecting the right cybercrime-prevention solution
IBM Software Thought Leadership White Paper Selecting the right cybercrime-prevention solution Key considerations and best practices for achieving effective, sustainable cybercrime prevention Contents
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
