Rx-360 Supply Chain Security White Paper: Incident Management

Size: px
Start display at page:

Download "Rx-360 Supply Chain Security White Paper: Incident Management"

Transcription

1 Rx-360 Supply Chain Security White Paper: Incident Management 1

2 Contents Background... 3 Scope... 3 Definitions... 4 Introduction... 5 Discovery & Investigation... 5 Incident Management... 6 Lessons Learned Analyzing Incident Data/Investigating Root Cause Continuous Improvement Concluding Remarks End Notes

3 Background The threats of intentional adulteration, cargo theft, counterfeiting, illegal diversion, and tampering are a serious problem in our global marketplace; where criminals are profiting by putting unassuming patients at risk. These threats are product security issues. No pharmaceutical company is isolated from this rising challenge; a challenge that has caught even our world leaders attention 1. Effective incident management of product security issues equips a company to respond quickly, effectively, and in the interest of patient safety. As an industry, most pharmaceutical companies can attest to having rigorous, standardized processes for handling quality incidents internally. While many pharmaceutical companies already have systems and processes in place to prevent, detect, and respond to product security issues, the maturity of these systems and processes vary from company to company. The intent of this white paper is to share good practices for the incident management of product security issues, with the ultimate goal protecting patient safety. Scope This white paper is a high level overview of process considerations for the incident management of product security issues. Product security issues in the legitimate supply chain are, once confirmed, per definition called an incident (see also definitions). While the process considerations proposed are primarily targeted for product security issues in the legitimate supply chain, they can also be applied to the illegitimate supply chain. Product security issues related to investigations in the illegitimate supply chain (e.g. illegal internet sales) do however have specific investigation techniques, which are not covered in this white paper. 3

4 Definitions Counterfeit А counterfeit medicine is one which is deliberately and fraudulently mislabeled with respect to identity and/or source. Illegal Diversion Unlawful drug diversion is the unlawful, out of channel sales of medicines. This can include: geographic diversion (illegal importation of unapproved product or illegal importation of approved product intended for another market), contract diversion (breach of own use government or contracted pricing terms), and sale of stolen, unsalable returns. Intentional Adulteration/Manipulation Intentional adulteration/manipulation incidents occur prior to manufacturing when unscrupulous suppliers of raw materials or packaging components deliberately dilute or substitute ingredients. In doing so, they compromise the product s integrity and safety. Forensics Testing completed on a material or product to determine authenticity, typically applied to materials or products to confirm a suspected counterfeit. Product Security Issue An umbrella term for any occurrence of intentional adulteration, counterfeiting, product theft, unlawful diversion or tampering. Singularly, these product security issues are often referred to as incidents. Product Theft The unlawful taking of a product/material by a person or persons with the intent to resell or distribute for personal gain. 4

5 Introduction There are several process stages companies may progress through while addressing a product security issue. The graphic below depicts these stages: discovery, investigation, incident management and lessons learned. The primary focus of this white paper is incident management; supporting information is provided for the other stages for context only. Companies should apply the content of this white paper as appropriate to their specific businesses. Discovery Investigation Incident Management Lessons Learned Discovery & Investigation Companies should have a process and tools to gather, store and analyze any reports on potential or factual threats and signals indicative of product security issues. For counterfeit and diversion, at a minimum, there should be a record of the received information of product security issues so that they can be reviewed and assessed. The record can range from a document or spreadsheet, to a sophisticated relational database that can record the threat/signal data to use in the human or automated analysis and discovery of trends/patterns that may warrant further investigation by the company. The sooner a trend/pattern or a single data point is recognized as suspect or potential counterfeit, diverted or unapproved product and reported out to the appropriate company management/functions the more value this external monitoring has for the company. Another patient safety consideration for counterfeits is the importance of forensic testing. Counterfeits may not only lack medicinal ingredients, they may contain ingredients that are harmful if ingested. Timely forensic testing can equip a company to respond more effectively to the dangers of counterfeits. See the Rx-360 Supply Chain Security White Paper on Threats and Monitoring Processes, published in May 2012 for more information on this topic. 5

6 For theft, potential and confirmed thefts tend to be more obvious as there is likely more readily available evidence that signals an incident. Security and Supply Chain professionals are typically involved in confirming thefts. Effective monitoring and reporting tools should help a company respond, not only to the specific incident and possible recovery of the product, but also in reporting to various agencies and for planning to replace or replenish the product within their supply chain process. See the Rx-360 Supply Chain Security White Paper on Cargo Risk Assessment, published in May 2012, for more information on the threat of theft. Initially, many product security issues fall into a suspected incident category. Depending on the type of issue, it varies who is involved in this initial investigation. As all supply chain security incidents are considered criminal, security functions should be involved in all confirmed incidents. Other applicable parties may include Quality, Regulatory, Procurement, Supply Chain, Supply Chain Security, Product Business Managers, Local/Country/Regional Leads/Managers, Legal, Medical, Crisis Management, Manufacturing, Customer Service (order taking), and Transportation depending on the type of incident and the initial perceived severity/risk. The investigation should confirm the legitimacy of the signals/alerts in the discovery phase. Often times, the trigger for starting the incident management process is when an incident is confirmed. Incident Management For the purposes of this white paper, incident management is the part of the overall process where the information needed for a risk assessment, including patient safety impact, is gathered, analyzed and reviewed. In general, companies should consider the development and deployment of an incident management protocol. The protocol should include guidelines for information needed about the incident to make good decisions, such as a summary of what happened, any available information from the investigation, actions taken to work with law enforcement or health authorities, immediate decisions or actions already taken to contain the risk or communication with external partners and any planned next steps. A list of items that many companies include in initial reports follows below. 6

7 This list is not exhaustive and availability of information often varies on an incident to incident basis: Brand name of product(s) involved, including lot number, quantity, expiry dates, batch distribution information (impacted and overall lot) Date of incident discovery/confirmed date of incident Date incident is reported Country/geographic location where incident was first discovered Law enforcement actions taken Health authority notifications/actions taken Consumer notifications Stakeholder groups notifications (partners/affiliates, internal and external) Tracking identification (linked to other documents for reference) Additional information that briefly adds context to the situation, such as a description of known events leading up to the incident, immediate actions taken to secure product integrity, the value of the product compromised, or other information that may be helpful for the risk assessment and investigation of root cause. Some considerations for which individuals or functions should be involved in the process are outlined in the table that follows. While all parts of this table are important, patient safety is unequivocally paramount in incident management decisions. 7

8 Incident Specific Roles Responsible for: Common for all Incident types Product Theft Counterfeit / Tampering Illegal Diversion Intentional Adulteration Security Considerations (Investigation Prosecution) Patient Safety Considerations (Pharmacovigilance Quality Assurance) o Investigation/Facts of the Crime o Legal/External Prosecution Review/Liability/IPRs o Communicating with Law Enforcement o Safety Risk Assessment (incl. type of product, product administration, quantity of product, market/geographic impact) o Communicating with Regulatory Authorities o Reporting requirements o Audit/CAPA analysis/lessons learned o Potential for Product Recall o Product Recovery/ Source o Storage Considerations o Distribution Flow of the Product involved o Forensics/product or package authentication o o Forensics /product or package authentication Distribution Flow of the Product involved o Storage Considerations o Product packaging/ labeling and patient information leaflet o Forensics Business Considerations (Supply Chain Business Unit) General Considerations (cross functional) o Distribution flows of the product involved product/material or touched material o Supply and Inventory Impact o Communicating w/ affected customer(s) o Quantity of Product o Potential for product recall o Audit/CAPA Analysis o Product/Brand/ Market/ Geographic Impact o Technology o o Communication o Reputation/Brand Management o Potential for product recall o Lessons Learned 8

9 Companies should strive for timely decision making. Confirming any suspected product security issue should be an urgent priority, as confirmation triggers the incident management process, including risk management and resulting patient safety decisions. Companies should have an established reporting method and distribution list to consistently frame the information and communicate it to all applicable parties. Many companies have established risk assessment methodologies. The considerations in this table may be helpful in building consistent risk assessment methodologies for product security issues. If a suspected product security issue is confirmed and patient safety is a concern, immediate action should be taken minimally as required in the local law. Companies should be familiar with the response requirements for the relevant local or regional board/ministry of health. This varies globally. Most companies have an existing business process that assesses product quality issues. For supply chain security incidents, companies should consider including, Quality, Supply Chain, Commercial, Medical Affairs, Regulatory, Legal, Toxicology and Security functions and/or any role that the company deems necessary to make immediate decisions in determining patient safety risk/impact. Companies should engage health authorities early with any information that can help reduce patient safety risks. When a recall is involved, follow local and regional regulatory and business procedures to notify the public. As all incidents are criminal in nature, notification to the local/regional authorities is advisable even if not required by local law. In some jurisdictions, notification to local/regional authorities is mandatory. Other business actions to consider may include written notifications to external partners also affected, such as Health Care Professionals (HCPs), suppliers, distributors or wholesalers, where applicable. While patient safety is the primary driver for all incident management, there might be other business consequences of confirmed product security issues (incidents) related to the supply chain. To read more about Rx-360 s views on other consequences, go to the Rx-360 Supply Chain Security White Paper: A Comprehensive Supply Chain Security Management System. 9

10 Lessons Learned Analyzing Incident Data/Investigating Root Cause Incidents should be tracked, trended and reported out on a periodic basis to aid the lessons learned and continual improvement process. Bringing visibility to the issues often facilitates healthy discussions of the appropriate actions to take and the right resources to engage. A crossfunctional database may be useful in enabling a company to monitor, analyze and trend incident risk analysis. Companies should take the time to identify root or probable cause of incidents where possible. It is recognized that some incidents, due to their criminal nature, may have no root cause associated with a process within a company s control. The results of the root cause investigation, or finding the source of the problem, should be turned into continuous improvement plan or be tracked in some way that the incident receives priority review and attention to closing the actions. Continuous Improvement As mentioned previously in this white paper, the incident management of product security issues has many parallels to quality systems. Confirmed product security issues, unlike many quality incidents, are often external to a company s process controls (e.g. a cargo theft involving hijackers). Companies approach continuous improvement for product security issues in varying ways and there are currently no mandatory requirements. It is good practice to review trends and implement improvements to eliminate the cause of the product security issues where possible. It is also a good practice to develop and implement strategies that seek to eliminate the potential of the incidents from happening again. Similar to quality deviations, continuous improvement plans related to product security issues should have a level of effort and formality commensurate with the level of risk. Companies should also set up a process for verifying effectiveness of the continuous improvement plans. A database may be helpful in organizing this information. 10

11 Concluding Remarks As noted throughout this white paper, there are various stakeholders involved in responding effectively and expeditiously to an incident. Transparency, collaboration, and communication cannot be stressed enough all are fundamental enablers to ensuring patient safety and brand protection. Internally, companies will likely benefit from collaborating and expanding existing processes to enable an effective incident management program that is nimble enough to respond expeditiously. As an industry, it is important to speak with one voice on the topic of supply chain security as well as on product security issues and share our incident management lessons learned. These criminal events have not yet caused wide distrust in the legitimate supply chain, but the potential exists. Compromised products and imitations of our medicines in the legitimate supply chain could destroy our business reputation. Worse, the criminals who are focused on how lucrative stealing, diverting or creating fake pharmaceuticals can be, have complete disregard for the human lives they impact or even destroy in the process. As the environmental factors continue to change and industry resources are stretched, the industry must ensure that incident management continuously improves and evolves to address emerging trends at the global, regional, and local levels. There are many risk factors that companies may want to consider when developing their incident management process. To find additional white papers and webinars published by Rx-360 that provide suggestions for prevention go to org/ and navigate to the Supply Chain Security White Papers and Webinars. Team Members Dale Schliech, Amgen, Jamie McNulty, Takeda, Kola Stucker, BMS Megan Coatesworth, Pfizer, Johannes Schoen, Boehringer Ingelheim, Lourdes Gonzales, Genentech, Ashley Goldberg, Merz Aesthetics, Sergio Mayorga, GSK, Stephan Schwarze, Bayer HealthCare Pharmaceuticals, Carin Johansson AstraZeneca, Jennifer Porter, Amgen 11

12 End Notes 1. US President Obama emphasizes support: 12

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY

1083.4 SUPPLY CHAIN INTEGRITY AND SECURITY BRIEFING 1083.4 Supply Chain Integrity and Security. A new series of general informational chapters describing various aspects of the pharmaceutical supply chain replaces Good Distribution Practices Supply

More information

Track/Trace Solutions. for the Manufacturing Industry

Track/Trace Solutions. for the Manufacturing Industry Track/Trace Solutions for the Manufacturing Industry Today s manufacturers, regardless of what they produce, have no choice but to follow private sector and government required mandates. As examples, two

More information

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products David M. Dreyfus Justin A. Heinonen Rod Kinghorn A-CAPP Backgrounder October 2013 Supply chain management can be the

More information

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities

Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities Rx-360 Supply Chain Security White Paper: Audits and Assessments of Third Party Warehousing and Distribution Facilities 6 June 2012 INTRODUCTION Today s global corporations frequently outsource various

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guidelines Building a Roadmap for Continued Success Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

Advancing Online Drug Safety: FDA Perspective

Advancing Online Drug Safety: FDA Perspective Advancing Online Drug Safety: FDA Perspective Leigh Verbois, PhD Acting Deputy Director Division of Supply Chain Security Office of Drug Security, Integrity, and Recalls Office of Compliance Center for

More information

SADC GUIDELINES ON IMPORT AND EXPORT PROCEDURES FOR PHARMACEUTICAL PRODUCTS

SADC GUIDELINES ON IMPORT AND EXPORT PROCEDURES FOR PHARMACEUTICAL PRODUCTS SADC GUIDELINES ON IMPORT AND EXPORT PROCEDURES FOR PHARMACEUTICAL PRODUCTS June 2006 1 INTRODUCTION Public health concerns demand that the manufacture of pharmaceutical products and their subsequent handling

More information

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand

FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand FOOD DEFENSE STRATEGIES: Four Ways to Proactively Protect Your Brand Food Defense: Proactively protecting the food supply chain is paramount for protecting company profitability, liability, and survival.

More information

Rx-360 Supply Chain Security White Paper: A Comprehensive Supply Chain Security Management System

Rx-360 Supply Chain Security White Paper: A Comprehensive Supply Chain Security Management System Rx-360 Supply Chain Security White Paper: A Comprehensive Supply Chain Security Management System 16 April 2012 Executive Summary Protecting patients is the obligation of the pharmaceutical industry and

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

Guidance for Industry Drug Supply Chain Security Act Implementation: Identification of Suspect Product and Notification

Guidance for Industry Drug Supply Chain Security Act Implementation: Identification of Suspect Product and Notification Guidance for Industry Drug Supply Chain Security Act Implementation: Identification of Suspect Product and Notification DRAFT GUIDANCE This guidance document is being distributed for comment purposes only.

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet.

Risk Assessment tools for Food Defence. Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk lynn.patterson@btinternet. Risk Assessment tools for Food Defence Lynn Patterson LP Associates (NI) Ltd www.lp-associates.co.uk [email protected] Reduce likelihood of attack Protect brand/ reputations Reassure customers

More information

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD

CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD CLICK TO OPEN FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Click on tabs below FOOD AUTHENTICITY FIVE STEPS TO HELP PROTECT YOUR BUSINESS FROM FOOD FRAUD Food and drink manufacturers

More information

Procedure for Managing a Privacy Breach

Procedure for Managing a Privacy Breach Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access

More information

Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer

Management of the Supply Chain: Excipients & APIs. Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer Management of the Supply Chain: Excipients & APIs Janeen Skutnik Wilkinson Director, Quality Strategy Pfizer 1.8 Quality Manual/Quality Policy Pfizer has integrated much of the supply chain Quality elements

More information

White Paper. Trust Hi-Speed to show you the way. A Guide to Pharmaceutical Serialization Choosing the Right Equipment Supplier

White Paper. Trust Hi-Speed to show you the way. A Guide to Pharmaceutical Serialization Choosing the Right Equipment Supplier White Paper Trust Hi-Speed to show you the way Choosing the Right Equipment Supplier Contents 1. Introduction 2. The Basics of Serialization 3. Minimum Serialization Implementation Requirements 4. Complexity

More information

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND

More information

NetSuite. Goes Natural. We have spoken to dozens of small business executives about their move to adopt technology.

NetSuite. Goes Natural. We have spoken to dozens of small business executives about their move to adopt technology. NetSuite Goes Natural We have spoken to dozens of small business executives about their move to adopt technology. Certain companies, though, stand out as powerful examples for others who may be considering

More information

TURN BACK CRIME. Global awareness campaign

TURN BACK CRIME. Global awareness campaign TURN BACK CRIME Global awareness campaign ABOUT THE CAMPAIGN Together, we can turn back crime Turn Back Crime is a global awareness campaign developed by INTERPOL. Using a variety of media channels including

More information

Pharmaceutical Distribution Security Alliance (PDSA)

Pharmaceutical Distribution Security Alliance (PDSA) Pharmaceutical Distribution Security Alliance (PDSA) Our Mission The Pharmaceutical Distribution Security Alliance's (PDSA) mission is to develop and help enact a federal policy proposal that enhances

More information

Drug Distribution Management Policy in Korea

Drug Distribution Management Policy in Korea Drug Distribution Management Policy in Korea Regarding introduction of Drug Serial Number System (Serialization) Ministry of Health and Welfare Drug Distribution Management Policy Overview Policy Objectives

More information

G. Recalls. http://www.fda.gov/safety/recalls/industryguidance/ucm129259.htm.

G. Recalls. http://www.fda.gov/safety/recalls/industryguidance/ucm129259.htm. G. Recalls 1. Background When an FDA-regulated product is defective, potentially harmful, or mislabeled, recalling that product removing it from the market or correcting the problem is often the most effective

More information

Eighth UPS Pain in the Chain Survey. Survey Snapshot

Eighth UPS Pain in the Chain Survey. Survey Snapshot Eighth UPS Pain in the Chain Survey Survey Snapshot 1 About Pain in the Chain UPS has been surveying the healthcare and life sciences industry about supply chain issues since 2008. We started with a simple

More information

Hidden Challenges to Achieving Desired Patient Outcomes

Hidden Challenges to Achieving Desired Patient Outcomes Hidden Challenges to Achieving Desired Patient Outcomes Breaches to supply chain integrity are converting medicines into lethal doses Ron Guido CEO, ExxPharma Therapeutics, LLC President, LifeCare Services,

More information

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012 2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit

More information

Addressing the Sale of Counterfeits on the Internet

Addressing the Sale of Counterfeits on the Internet Addressing the Sale of Counterfeits on the Internet The Issue In the global environment, the sale of counterfeit goods remains a significant issue facing consumers, industry and governments alike. The

More information

White Paper Healthcare Supply Chain Traceability

White Paper Healthcare Supply Chain Traceability Executive Summary This white paper focuses on Healthcare supply chain Traceability, from manufacture to patient, going beyond, for example, what is currently regulated by the US 21 CFR Part 820 and ISO

More information

Pharmaceutical Counterfeiting: Issues, Trends, Measurement

Pharmaceutical Counterfeiting: Issues, Trends, Measurement Pharmaceutical Counterfeiting: Issues, Trends, Measurement Harvey Bale, Ph.D. DG, International Federation of Pharmaceutical Manufacturers & Associations (IFPMA) President, Pharmaceutical Security Institute

More information

Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace

Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace Understanding the Flow of Counterfeit and Gray Market Goods though the U.S. Automotive and Commercial Vehicle Parts Marketplace MEMA Brand Protection Council January 20091 Understanding the Flow of Counterfeit

More information

IBM Solution for Pharmaceutical Track & Trace

IBM Solution for Pharmaceutical Track & Trace Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace The underlying problem: Complexity in the pharmaceutical supply chain At its core, the pharmaceutical industry is about

More information

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009

OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 OREGON IDENTITY THEFT RANKING BY STATE: Rank 20, 68.1 Complaints Per 100,000 Population, 2552 Complaints (2007) Updated January 10, 2009 Current Laws: A person commits the crime of identity theft if the

More information

Standard: Information Security Incident Management

Standard: Information Security Incident Management Standard: Information Security Incident Management Page 1 Executive Summary California State University Information Security Policy 8075.00 states security incidents involving loss, damage or misuse of

More information

Risk Considerations for Internal Audit

Risk Considerations for Internal Audit Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013

More information

Privacy and Electronic Communications Regulations

Privacy and Electronic Communications Regulations ICO lo Notification of PECR security breaches Privacy and Electronic Communications Regulations Contents Introduction... 2 Overview... 2 Relevant security breaches... 3 What is a service provider?... 3

More information

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.4 Information Security Incident Response Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Information Security Incident Response Part 1. Purpose. This guideline establishes the minimum requirements for Information

More information

Guidance for Industry: Starting Material Supplier Management

Guidance for Industry: Starting Material Supplier Management Guidance for Industry: Starting Material Supplier Management Version 1.0 Drug Office Department of Health. Contents 1. Introduction... 3 2. Purpose of this document... 3 3. Scope... 3 4. Selecting and

More information

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: rny@crlaw.com Phone: (336) 478-1131 CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations

More information

Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products

Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products Decree N 152 (24 January 2013) Administrative Measure on Inspection, Quarantine and Supervision of Imports and Exports of Dairy products Chapter 1 General Principle Article 1 In order to enhance inspection,

More information

Track and Trace in the Pharmaceutical Supply Chain

Track and Trace in the Pharmaceutical Supply Chain Track and Trace in the Pharmaceutical Supply Chain Edmund W. Schuster Visiting Operations Researcher Robin Koh Associate Director Auto-ID Labs Massachusetts Institute of Technology Cambridge, MA husetts

More information

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008

COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

HIPAA Breach Notification Policy

HIPAA Breach Notification Policy HIPAA Breach Notification Policy Purpose: To ensure compliance with applicable laws and regulations governing the privacy and security of protected health information, and to ensure that appropriate notice

More information

IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance

IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance Secure and responsive supply chains IBM Solution for Pharmaceutical Track & Trace: Supply chain visibility drives overall performance Lack of product visibility in pharmaceutical supply chains At its core,

More information

ASSESSMENT OF QUALITY RISK MANAGEMENT IMPLEMENTATION

ASSESSMENT OF QUALITY RISK MANAGEMENT IMPLEMENTATION PHARMACEUTICAL INSPECTION CONVENTION PHARMACEUTICAL INSPECTION CO-OPERATION SCHEME PI 038-1 26 March 2012 AIDE-MEMOIRE ASSESSMENT OF QUALITY RISK MANAGEMENT IMPLEMENTATION PIC/S March 2012 Reproduction

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01)

New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01) Safeguarding public health New Guidelines on Good Distribution Practice of Medicinal Products for Human Use (2013/C 68/01) Tony Orme, Senior GDP Inspector Inspection, Enforcement and Standards Division

More information

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE

DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE DATA SECURITY BREACH MANAGEMENT POLICY AND PROCEDURE 1. INTRODUCTION Annex C 1.1 Surrey Heath Borough Council (SHBC) processes personal data and must respond appropriately against unauthorised or unlawful

More information

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy

CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy CREATIVE SOLUTIONS IN HEALTHCARE, INC. Privacy Policy Amended as of February 12, 2010 on the authority of the HIPAA Privacy Officer for Creative Solutions in Healthcare, Inc. TABLE OF CONTENTS ARTICLE

More information

EFPIA Good Practice Revision 1, October 2014

EFPIA Good Practice Revision 1, October 2014 EFPIA Good Practice Revision 1, October 2014 Reducing Risk of Drug Products Shortages Introduction Authorities, industry and healthcare providers have a responsibility to ensure a modern and sustainable

More information

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY

SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY Transported Asset Protection Association SETTING THE STANDARD FOR SUPPLY CHAIN SECURITY YOUR INVITATION TO JOIN TAPA EMEA Making your supply chain more resilient The Transported Asset Protection Association

More information

Visa global Compromised Account

Visa global Compromised Account Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers

More information

MOBILE AND THE HEALTH CARE SUPPLY CHAIN

MOBILE AND THE HEALTH CARE SUPPLY CHAIN A Novation White Paper MOBILE AND THE HEALTH CARE SUPPLY CHAIN Welcome to the age of mobility and the pervasive Internet an age that allows us to be highly interactive, make personalized decisions and

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

CRISIS MANAGEMENT PLAN

CRISIS MANAGEMENT PLAN CRISIS MANAGEMENT PLAN Table of Contents Introduction... 3 Purpose... 3 Objectives... 3 Types & Levels of a Crisis... 4 Plan Activation... 6 Crisis Management Team (CMT) Structure... 6 CMT Responsibilities...

More information

Blood-clotting disorders XARELTO Identifying genuine products of Bayer HealthCare

Blood-clotting disorders XARELTO Identifying genuine products of Bayer HealthCare Blood-clotting disorders XARELTO Identifying genuine products of Bayer HealthCare Product presentation, packaging design, and selected security features Imprint Bayer HealthCare AG 51368 Leverkusen Germany

More information

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

Accenture Risk Management. Industry Report. Life Sciences

Accenture Risk Management. Industry Report. Life Sciences Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive

More information

COMPLIANCE ALERT 10-12

COMPLIANCE ALERT 10-12 HAWAII HEALTH SYSTEMS C O R P O R A T I O N "Touching Lives Every Day COMPLIANCE ALERT 10-12 HIPAA Expansion under the American Recovery and Reinvestment Act of 2009 The American Recovery and Reinvestment

More information

DATA BREACH RESPONSE READINESS Is Your Organization Prepared?

DATA BREACH RESPONSE READINESS Is Your Organization Prepared? March 30, 2015 DATA BREACH RESPONSE READINESS Is Your Organization Prepared? Peter Sloan Pete Enko Jeff Jensen Deborah Juhnke The data security imperatives of Prevention, Detection, and Response do not

More information

FOOD FRAUD Vulnerability & Impact

FOOD FRAUD Vulnerability & Impact FOOD FRAUD Vulnerability & Impact THE INDUSTRY S RESPONSE Aldin Hilbrands, Royal Ahold Outline Food Fraud Types Drivers Impact Food Industry s Response Food Fraud in the Context of Food Safety Economically

More information

Risk-Based Approach to Managing Supply Chain Security and Compliance

Risk-Based Approach to Managing Supply Chain Security and Compliance Risk-Based Approach to Managing Supply Chain Security and Compliance Supply chain security remains a U.S. policy priority, and the U.S. Government continues to work closely with the trade community to

More information

Drug Supply Chain Security Act (Title II of the Drug Quality and Security Act) Overview and Implementation

Drug Supply Chain Security Act (Title II of the Drug Quality and Security Act) Overview and Implementation Drug Supply Chain Security Act (Title II of the Drug Quality and Security Act) Overview and Implementation Connie Jung, RPh, PhD U.S. Food and Drug Administration NACDS Total Store Expo August 24, 2014

More information

CSC Best Practice Guide. 10 Steps to Tackling Online Counterfeiting

CSC Best Practice Guide. 10 Steps to Tackling Online Counterfeiting CSC Best Practice Guide Steps to Tackling As the world becomes more connected and the appetite for brands in fast-developing economies grows, the commercial risk for companies increases. While online marketplaces

More information

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec

Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,

More information

Procedure for EFISC, operators and CB s

Procedure for EFISC, operators and CB s Feed Safety Incident and Crisis Management Procedure for EFISC, operators and CB s Version 1.0 final Date : March 2014 EFISC Feed Safety Incident and Crisis Management Procedure version 1.0, March 2014

More information

Rx-360 An International Pharmaceutical Supply Chain Consortium

Rx-360 An International Pharmaceutical Supply Chain Consortium Rx-360 An International Pharmaceutical Supply Chain Consortium Overview Rx-360 and the Audit Sharing Program September 2011 Rx-360 Members (Continuously updated list at www.rx-360.org) Manufacturers (24)

More information

Draft guidance for registered pharmacies preparing unlicensed medicines

Draft guidance for registered pharmacies preparing unlicensed medicines Draft guidance for registered pharmacies preparing unlicensed medicines January 2014 1 The General Pharmaceutical Council is the regulator for pharmacists, pharmacy technicians and registered pharmacies

More information

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS

PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS PROFESSIONAL RISK PRIVACY CLAIMS SCENARIOS The following claim scenarios are hypothetical and are offered solely to illustrate the types of situations that may result in claims. Although sorted by industry,

More information

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, 175.9 Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009 Current Laws: It is unlawful to intentionally use or attempt

More information

2015 Visa Payment Security Symposium Webinar

2015 Visa Payment Security Symposium Webinar The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director,

More information

Virtual Pharmacy Practice and Wholesale Distribution. Out of Thin Air

Virtual Pharmacy Practice and Wholesale Distribution. Out of Thin Air Virtual Pharmacy Practice and Wholesale Distribution Out of Thin Air Virtual Wholesalers and Dysfunction in s Prescription Medication Supply Virginia Herold Executive Officer CA State Board of Pharmacy

More information

FOOD FRAUD Threats & Impacts

FOOD FRAUD Threats & Impacts FOOD FRAUD Threats & Impacts THE INDUSTRY S RESPONSE YVES Rey, Corporate Quality General Manager Danone GFSI Board Member and Former Chairman Outline Introduction to GFSI Food Fraud Types Drivers Impact

More information

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

ITL BULLETIN FOR JULY 2012. Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance ITL BULLETIN FOR JULY 2012 Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance Paul Turner, Venafi William Polk, Computer Security Division, Information

More information

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised

How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised ACE USA Podcast Released June 24, 2010 How to Respond When Sensitive Customer and Employee Data is Breached, Stolen or Compromised Moderator: Richard Tallo Senior Vice President, ACE North America Marketing

More information

Selecting the right cybercrime-prevention solution

Selecting the right cybercrime-prevention solution IBM Software Thought Leadership White Paper Selecting the right cybercrime-prevention solution Key considerations and best practices for achieving effective, sustainable cybercrime prevention Contents

More information

Opinion and recommendations on challenges raised by biometric developments

Opinion and recommendations on challenges raised by biometric developments Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future

More information