Counterfeit Parts Prevention

Similar documents
Anti-Counterfeit Policy Mouser has adopted this Anti-Counterfeit Policy to eliminate the impact of counterfeit products on Mouser and its customers.

KOLLMORGEN. Title: Standard Operating Procedure Counterfeit Parts

QCI Counterfeit Avoidance and Mitigation Procedure

Presentation of April 22, 2015

Independent Distributor / Broker - Requirement Specification / Questionneire Version 3. exceet electronics

Industry Assessment. Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military Electronic Component Procurement

IEC Electronics Terms and Conditions

Purchase Order Clauses and Conditions

SUPPLY CHAIN INTEGRITY AND SECURITY

Supplier Quality Requirements F16 Program

Quality Assurance Provisions

Aerospace Industries Association (AIA) Counterfeit Parts IPT

A Supply Chain Management Perspective on Mitigating the Risks of Counterfeit Products

Supplier Quality Requirements and Clauses

Supplier Quality Assurance Requirements Manual

DEPARTMENT OF DEFENSE Defense Contract Management Agency INSTRUCTION. Counterfeit Mitigation

New FAR/DFARS Compliance Challenges for Small Businesses in Frank S. Murray

Self-Audit Checklist

April 28, Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC

DEFENSE INDUSTRIAL BASE ASSESSMENT: COUNTERFEIT ELECTRONICS

Texas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009

Kevin Sink VP of Quality TTI, Inc Fort Worth, Texas, USA

A Special Report. Counterfeit Parts: Increasing Awareness and Developing Countermeasures. March 2011

N a t i o n a l F u n e r a l D i r e c t o r s A s s o c i a t i o n

Appendix QX. Supplier Quality Requirements

Helical Products Co., Inc.

Quality Management System Manual

Z1.01 Guideline: Identity Theft Prevention Program

General Terms of Purchasing and (Sub)- Contracting

CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY

University of Alaska. Identity Theft Prevention Program

Table of Contents. Useful Links

Card Not Present Fraud Webinar Transcript

MEDFORD FABRICATION CSC, INC. Quality System Manual. Date of issue: 03/25/2010 Revision : F

Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index

AEROSPACE AS6174 REV.

You ve Been Served: What Does the Company Do When a Federal Grand Jury Subpoena Arrives at the Door?

Supplier Quality Assurance Requirements Manual

Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009

Chandler-Arrow Division Arrow Supplier Quality Requirements

Product Liability Risk Control Checklist

II. F. Identity Theft Prevention

Appendix QX. Supplier Quality Requirements

How To Prevent Food Fraud

Turbo Resources International Quality Procedure

How To Ensure Quality Assurance

MSC Group Chain of Custody (CoC) Guidance for Non-Reduced Risk Groups

ALL PRODUCTS MFG & SUPPLY

Identity theft. A fraud committed or attempted using the identifying information of another person without authority.

Lockheed Martin Supplier Quality Management Website

Schweppes Australia Head Office Level 5, 111 Cecil Street South Melbourne Victoria

Quality Management System Manual Revision L

RED FLAGS RULE. Identifying, Detecting, & Mitigating Possible Identity Theft

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

ORACLE QUALITY ORACLE DATA SHEET KEY FEATURES

Supplier Quality Agreements

welcome to Telect s Minimum Security Criteria for Customs-Trade Partnership Against Terrorism (C-TPAT) Foreign Manufacturers Training Presentation

Identity Theft Prevention Program

Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008

L-3 Communications Corporation AMI Purchase Order Supplement No. 3 Quality Assurance

Presentation from: The Cyclops Group. Everything you expect from a class leading independent stocking distributor... and more.

Flexible Circuits Inc. Purchase Order Standard Terms and Conditions

UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT DETECTION POLICY

Vendor Requirements and Compliances

Product Liability. Risk Control

Standards of. Conduct. Important Phone Number for Reporting Violations

PPI/TZ Standard Quality Requirements for Suppliers -SQRS-

Additional Chain of Custody requirements

Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14

FY13 Core Training. Click next to continue

14620 Henry Road Houston, Texas PH: FX: WEB: QUALITY MANUAL

DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:

ACCEPTANCE CRITERIA FOR QUALITY DOCUMENTATION (AC10) June 2014

Transcription:

Counterfeit Parts Prevention 1

Introduction / Objectives Counterfeiting is an age-old issue, but is growing in exponential proportions with respect to the types of: Products being counterfeited Industries affected Potential consequences caused by counterfeits If this threat is not adequately addressed, counterfeit items have the potential to seriously compromise the safety and operational effectiveness of our products. The objective of this training is to raise awareness of: The risks and impacts of counterfeit parts infiltrating the supply chain. Best practices to eliminate or mitigate those risks Lockheed Martin counterfeit prevention requirements for suppliers. Note: This training is provided as guidance and information. If there are any instructions in this guide that conflict with your Purchase Order (PO), your specific LMC PO takes precedence.

Impact of Counterfeit Parts Counterfeit parts can cause: Personal injury Mission failure Reduced reliability and product recall Potential loss of contracts Shutdown of manufacturing lines Negative cost and schedule impacts Penalties for companies and individuals Damage to our corporate image Our defense systems must be of a quality sufficient to protect our soldiers, our friends, our cities and ourselves without failure on a moments notice, anytime, anywhere. Don t allow the counterfeit part you let get into the system be the one to cause mission failure.

What is Counterfeit? Lockheed Martin contracts utilize the term Counterfeit Work Work consists of the lowest level of separately identifiable items delivered to LM. "Counterfeit Work" means Work that is or contains items misrepresented as having been designed and/or produced under an approved system or other acceptable method. The term also includes approved Work that has reached a design life limit or has been damaged beyond possible repair, but is altered and misrepresented as acceptable Examples of Counterfeit Work include, but are not limited to, used components represented as new, parts from an unapproved manufacturer represented as though they were manufactured by the approved source Counterfeit items often have the appearance of being genuine but are later revealed that they were not: Manufactured by the original component or material manufacturer Built to the same quality standards or tested as rigorously as a genuine item Many types of counterfeits are very difficult to detect visually and can be made such that they seem to be functional and pass early levels of testing.

Sources of Counterfeit Parts Counterfeit parts can come from many different sources. This flow illustrates how counterfeit parts can be sourced and eventually sold. *Stacks of Scrapped Circuit Boards **Components Being Removed From Boards *Components Being Washed In River *Market Place for Components *Components Being Sorted * Bags of Various Components While this slide shows a flow for an electronic component, bear in mind that anything can be counterfeited. Counterfeiting is a complex criminal enterprise. * China photos courtesy of Tom Sharpe & SMT Corporation ** Photo courtesy of Basal Action Network

Strategies to Eliminate Counterfeit Avoidance LM - Detection Solutions Mitigation - Overview - Disposition and Communication What are the best ways for communication of Incidents and information?

Avoidance Most cost effective step in the process Avoidance in acquiring these items

Avoidance Government and Industry investigations have shown that the risks of receiving counterfeit parts varies based on the supplier entity providing the parts. The risk ladder shown here is a useful frame of reference for understanding the counterfeit risk hierarchy from a procurement or sourcing point of view. Procuring directly from the Original Component or Equipment manufacturer (OCM/OEM) results in lowest risk of counterfeit. OCM Authorized Distributors are the next lowest risk. OCM Authorized distributors have documented agreements with a manufacturer to sell their items. Authorized distributor status should be verified with the manufacturer. Lockheed Martin purchase orders typically require that suppliers use OCMs or their authorized sources for products that will ultimately be delivered to Lockheed Martin Counterfeit Avoidance Requirements are contained in Lockheed Martin s Purchase Order Terms and Conditions as well as Quality Requirements. Refer to your specific PO for review of your requirements.

Avoidance Strategies Key Counterfeit Avoidance Strategies include the following : Procurement Processes Require the exclusive utilization of OCMs/OEMs or their authorized distributors Procuring through independent distributors and brokers results in a higher risk of obtaining a counterfeit item. LM purchase order requirements typically require notification and LM written approval in order to incorporate product procured through non-ocm approved/non-ocm franchised sources into Lockheed Martin products. Chain of Custody Require a documented unbroken chain of custody from the original source of manufacture for all components provided to LM either directly or indirectly as parts included in assemblies delivered to LM LM purchase order requirements typically require that our suppliers provide OCM/OEM traceability documentation when requested which could include OCM/Authorized supplier certificates of conformance OCM/Authorized supplier shipping and receiving documents OCM/Authorized supplier packing slips Supply Chain Management Flowdown counterfeit avoidance strategies, including requirement to use OCM/OEM authorized sources, throughout supply chain Formally assess sources of supply for compliance Obsolescence Management and Parts Management Processes Anticipate obsolescence issues in time to initiate actions such as redesign or lifetime buys Counterfeit Awareness Training Provide training in house, and also to suppliers

Detection Making sure counterfeits are stopped at the front door How do we ensure detection of counterfeit items in our products?

Cost & Schedule Probability of Detection This chart shows that more time, effort, and expenditure on validating parts increases the level of confidence that the part is authentic. C of C Only DPA = Destructive Physical Analysis C of C = Certificate of Compliance QCI = Quality Conformance Inspection Visual Inspection Confidence

DETECTION: Suspect Warning Flags Listed below are a few examples of some counterfeit warning flags that can indicate to your sourcing, receiving, inspection, and test groups that there could be a counterfeit issue with a part or material. The bottom line: the more flags you see, the more suspicion you should have that a part or material may not be authentic. If things don t look right, Investigate! Review the warning flags shown here. Item coming from source other than the OCM or authorized sources from suspect locations (e.g., China) Price too low/significantly different from history Scarce items are suddenly available Chain of ownership unverifiable No certificate of conformance Obsolete item Unknown supplier Non-homogeneous lot Prohibited materials present Item marking issues: Does not match similar items Alterations/resurfacing Incomplete Wrong size/location/methods Quality difference Lot number/date code issue Package/construction issues Size/shape/color/finish/materials Evidence of rework/repair/refinishing/resurfacing Poor quality Additional inspection recommendations that can identify red flags can be found in SAE standards AS5553 or AS6174

Mitigation Minimizing damage to our programs & reputation How do we mitigate issues with the item?

Mitigation Strategies: When solid traceability to the OCM cannot be established. If extenuating circumstances dictate the use of a supplier that is not part of the OCM authorized supply chain, your Lockheed Martin procurement representative must be notified with the details in accordance with your purchase order requirements. Standard LM PO terms and conditions include requirements for notification and written approval to utilize a non-authorized source. This notification must occur before the procurement with the Independent Distributor or Broker takes place. LM will review contract to determine reporting requirements to the end customer LM will review criticality information and may require specific authenticity or detection testing be completed in order to aide with proving authenticity. Ensure processes are in place to quarantine parts that require testing and verification until they are verified as authentic - treat them as suspect until evidence proves otherwise. Mitigation Strategies and Authenticity testing should be developed using a risk-based approached. Cross checking Independent Suppliers and part numbers against the GIDEP and/or ERAI can be beneficial in the evaluation of risk that given part or supplier may be introducing a high risk for counterfeit. TEST IF YOU CANNOT TRACE!

Counterfeit Item Mitigation: Actions if a Counterfeit Item Suspected If you suspect that a counterfeit item may have infiltrated your supply chain, the following items must be addressed immediately as initial steps in effort to minimize or bound the impact. Quarantine affected parts Locate any parts in stock and on assemblies, ensure they are quarantined and clearly marked as nonconforming Identify any suspect items that may have left your facility Notify your Lockheed Martin procurement representative in accordance with your purchase order requirements. Gather all traceability or chain of custody information, or authenticity testing records associated with the suspect part This may include Purchase order Certificates of Conformance Test Data Inspection or DPA reports Other information relevant to detection Review information to assist with bounding the issue Verify the item is or is not counterfeit Conduct additional testing in an effort to confirm if the item is counterfeit Engage the manufacturer of the part for assistance to the extent possible Remediation /Corrective Action If required, a plan for Rework/Replacement/Repair of fielded product will be determined in conjunction with the LM program team, LM legal, and Customer input.

Disposition & Communication Decide on proper actions & resolution, Reduce the risk for others What is the proper disposition of these items? What are the best ways for communication of incidents, information and solutions?

Disposition protecting supply chain and ourselves Counterfeiting invariably involves fraud (often from an upstream supplier that can be several tiers removed), therefore, coordination with appropriate officials must take place prior to making any disposition of parts. If the suspect items are contained within your facility, best practices dictate: Maintaining counterfeit parts or materials in quarantine, clearly identified as nonconforming/counterfeit product pending a review by your organization s management and legal representation. Counterfeit parts should not be returned to the supplier in such a way that they could be reintroduced into the supply chain to be sold again to another victim. Legal authorities may be contacted to initiate an investigation into the counterfeiting activity. If an investigation is initiated, parts may be required as evidence. In cases where product may have been delivered to LM, and returned for rework or replacement, suspect components must not be disposed of until such time as it is determined that legal authorities will not require the parts for an investigation. Do not throw parts away until it is clear they aren t needed for investigation.

Communication: Timely & Effective Reporting Lockheed Martin requires suppliers to provide notification if it is suspected that a counterfeit item has been delivered to us. This notification must be directed to your LM Procurement Representative. Ensure that communication and reporting of counterfeit issues is timely and effective. Structures that may require communication include: Internal organizations: o Program o Legal o Business Operations Customers Criminal investigators Government reporting (e.g., GIDEP)* Industry programs (e.g., ERAI) *LM strongly encourages all eligible suppliers to join GIDEP for reporting and monitoring of counterfeit and other nonconformance alerts. Visit www.gidep.org for information on joining GIDEP Reference AS5553 Appendix G for additional information and guidelines for reporting.

DoD and LM Combating Counterfeits: Potential consequences and Liabilities Section 818 of the 2012 Defense Authorization Act mandates requirements concerning the detection and mitigation of counterfeit parts. The DOD is required by law to: Make costs of counterfeit rework and corrective actions unallowable Require that counterfeit risk be managed throughout the supply chain Implement criminal penalties and possible debarment for intentional failure to exercise adequate counterfeit prevention methods. Lockheed Martin Purchase Order terms and conditions detail liability requirements for cases where our suppliers allow counterfeit items to infiltrate LM products. These terms may require suppliers: Replace counterfeit items at their expense Cover LM s costs related to the removal, replacement, retesting, and installation of replacement items. Counterfeit Risk Must Be Managed Throughout the Supply Chain.

Conclusion The counterfeiting of electronic parts and materials is a serious threat and can compromise the integrity of the important products we provide. The use of Original Component or Equipment manufacturers and their authorized sources results in the least risk for counterfeit items infiltrating our products. If needed parts or materials can not be acquired from low risk sources in order to fulfill your Lockheed Martin purchase order, you must notify your procurement representative and parts must be authenticated in accordance with the terms and conditions of your contract. If you suspect counterfeit items may have been supplied to LM, you must notify your LM procurement representative immediately. Counterfeit risk must be controlled throughout the entire supply chain. Thank you so much for your continued efforts to ensure counterfeit components do not infiltrate our supply chains.

Reference Info for Counterfeit Parts Lockheed Martin Webinar Counterfeit Parts Prevention https://embastion.external.lmco.com/qis/supplier/standardpoinfo.htm Lockheed Martin Terms & Conditions: (Corp Docs) http://www.lockheedmartin.com/us/suppliers/tandc.html Department of Commerce Defense Industrial Base Assessment Counterfeit http://www.bis.doc.gov/index.php/forms-documents/doc_view/37-defense-industrialbase-assessment-of-counterfeit-electronics-2010 IDEA-1004-C Electronic Components Inspection Manual Independent Distributors of Electronics Association http://www.idofea.org DOE G 414.1-3 Suspect / Counterfeit Items Guide http://www.directives.doe.gov/pdfs/doe/doetext/neword/414/g4141-3.pdf Suspect / Counterfeit Items Awareness Training http://www.hss.energy.gov/csa/csp/sci Coalition Against Counterfeiting and Piracy (CACP) type toolkit http://www.theglobalipcenter.com/pages/coalition-against-counterfeiting-andpiracy AS5553 - Counterfeit Electronic Parts http://www.sae.org/technical/standards/as5553 AS6081 - Fraudulent/Counterfeit Electronic Parts: Avoidance, Detection, Mitigation, and Disposition Distributors Counterfeit Electronic Parts; Avoidance Protocol, Distributors http://standards.sae.org/as6081/ PIRA Release ORL201311001

GIDEP Participation in the Government Industry Data Exchange Program (GIDEP) is an important risk prevention step Suppliers with counterfeit risks, suspect or confirmed counterfeits should enter that part incident into GIDEP Purpose is to share risks with DoD and industry to ensure appropriate risk mitigation measures are being taken For additional guidance, go to the GIDEP members website (http://www.gidep.org). Non-participants may contact the GIDEP Help Desk (951-898-3207) for guidance. DoD Provides Tools to Reduce Industry Risks/Costs