INDEPENDENT RESELLERS EFFORTS TO FIGHT COUNTERFEITING IN THE INFORMATION TECHNOLOGY INDUSTRY



From this document you will learn the answers to the following questions:

What does the term " damage " mean?

What is the main purpose of the ASCDI Anti - Counterfeit Policy?

What is the goal of ASCDI Anti - Counterfeit Policy Next Steps?

Similar documents
QCI Counterfeit Avoidance and Mitigation Procedure

Anti-Counterfeit Policy Mouser has adopted this Anti-Counterfeit Policy to eliminate the impact of counterfeit products on Mouser and its customers.

Industry Assessment. Awareness and Industry Efforts to Combat Counterfeits in Aerospace & Military Electronic Component Procurement

Electronic Communications System

KOLLMORGEN. Title: Standard Operating Procedure Counterfeit Parts

The New DoD Rules on Counterfeit Electronic Parts. Chris Haile Cathy Kunz Richard Arnholt Grant Book Jason Lynch June 5, 2014

"CYBERSECURITY: AN EXAMINATION OF THE COMMUNICATIONS SUPPLY CHAIN"

DIRECT PURCHASING & DISTRIBUTION POLICY (DPDP)

Product Liability. Risk Control

Fighting Counterfeiting in Asia. Douglas Clark. Partner. Lovells, Shanghai

Recycling Electronics to Create Local Jobs for People with disabilities

GENERAL OPERATIONS MANUAL FOR ASTM PRODUCT CERTIFICATION PROGRAM

How Alternative Service Providers Enhance Juniper Contract Maintenance and Make You Look Brilliant

Children s Product Safety and Recall Effectiveness Act

How To Get A License From A Business To A Computer (For A Business)

Information Security Policy

Chapter 2: Analyzing a Dealership s Financial Statements & Operations

Principles of Marketing. by Jeff Tanner and Mary Anne Raymond

This Policy supersedes the Terex Corporation Policy on Transactions in Iran, dated June 7, 2013.

GEORGIA LEMON LAW SUMMARY

Extensive Reorientation of Siemens Enterprise Communications

Antifraud program and controls assessment grid*

Products and Services

ANTI BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY

Aerospace Industries Association (AIA) Counterfeit Parts IPT

Primary Logistics Activities

Achieving Security and Agility in DoD Networks

North Clackamas School District 12

SOFTWARE LICENSE AGREEMENT (Site License Version) A. Xerox grants to customer ( you ) a non-exclusive, non-transferable license to:

Cloud Agreements: Ensuring a Sunny Forecast July 28, 2011

Norwich University Information Assurance Security Policy. Final Version 10.0 for Implementation

Presentation of April 22, 2015

A Guide to the Ings USA Wholesale Program

GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks

CORPORATE MEMBERSHIP APPLICATION FORM NON-HEDGE FUND

Fraud Waste and Abuse Training First Tier, Downstream and Related Entities. ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009

The Drug Quality and Security Act (the DQSA), enacted. Complying with the Authorized Trading Partner Requirements of the DQSA.

ACE Recall Plus SM. Consumer Goods Application Form

POLICY SUBJECT: EFFECTIVE DATE: 5/31/2013. To be reviewed at least annually by the Ethics & Compliance Committee COMPLIANCE PLAN OVERVIEW

Pharmaceutical Distribution Security Alliance (PDSA)

KAM Specialties, Inc. (KAM) Code of Ethics

Four Ways Counterfeit Electronics are Killing Your Profits and Steps to Fight Back A PLAYBOOK FOR THE ELECTRONICS INDUSTRY

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce

Children s Internet Protection Plan. IIBGA Children s Internet Protection Plan (CIPA) Plan. Children s Internet Protection Act (CIPA) Safety Plan

Privacy Policy. February, 2015 Page: 1

Microsoft Authorized Refurbisher (MAR) Program Guide

DELIVERY AND HANDLING (D&H): COLORADO COMPLIANCE GUIDANCE

BLOOMFIELD COLLEGE ACCEPTABLE USE POLICY

Chandler-Arrow Division Arrow Supplier Quality Requirements

Joseph P. Benkert, P.C.

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

DEPARTMENT OF PUBLIC HEALTH AND ENVIRONMENT. Health Facilities and Emergency Medical Services Division

Computing Privileges. Policy: Scope. Policy

Magic Quadrant for Storage Services, 2Q05 25 May 2005 Adam W. Couture Robert E. Passmore

How To Be A Supply Management Professional

Addressing the Sale of Counterfeits on the Internet

InnoCaption TM Service Terms of Use

Sales compensation, Profit Margin and Multi-rep Splits

Broadlinc Communications LLC Internet Service Agreement and Acceptable Use Policy

Best Practices for. Protecting Privacy, Civil Rights & Civil Liberties. Unmanned Aircraft Systems Programs

INFORMATION TECHNOLOGY Policy 8400 (Regulation 8400) Data Security

How-To Guide. Optimizing Asset Management for Sales Success EXECUTIVE SUMMARY WHAT IS ASSET MANAGEMENT? By Clare Price, VP of Research April 2014

B2B Strategies: from EDI to e-commerce. Objectives. In this chapter, you will learn about:

Partner Sales Enablement Guide

MINNETONKA PUBLIC SCHOOLS

How To Get A Credit Card From Dsostingprotection

Quality Management System Manual ISO9001:2008

How To Use An Elavon App For A Business

RESPONSIBLE COMPUTER USE POLICY (ADOPTED AUGUST 3, 2006)

STATEMENT FROM THE CHAIRMAN

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

KEMIRA CODE OF CONDUCT

Marion County School District Computer Acceptable Use Policy

Chapter I: Anti-counterfeiting measures

Misuse of Trademarks by Distributors, Affiliates or Licensees Presented by:

Marketing: Helping Buyers Buy

Enterprise and SMB Reseller Course Guide. RapidRamp Training Curriculum For New Avaya Partners

VCU HEALTH SYSTEM Compliance Program. Updated August 2015

Revelstoke Board of Education Policy Manual

ANTI-BRIBERY AND FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY

itransact Payment Facilitator User Agreement

We will pursue our business with honor, fairness, and respect for the individual and. the public at large ever mindful that there

Guide to Filing Ethics Complaints and Arbitration Requests

Optimize your service supply chain

ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES

Electronic Security Association, Inc. Code of Ethics and Standards of Conduct Amended May 14, 2010 by Executive Committee

Web Logistics Web Hosting

Supplier Integrity Guide

Program Integrity (PI) for Network Providers

June 17, 2008 by Steven M. Goldman, Commissioner, Department of Banking and Insurance. N.J.S.A. 17:1-8.1, 17:1-15e, 17:22A-26 et seq. and 17:29A-15.

Agreement Addendum for Hosting Services. 1. Definitions. 2. Service Provision. 3. Scope of Client's Use 1/6

TERMS AND CONDITIONS OF SERVICE

MICROSEMI CORPORATION FOREIGN CORRUPT PRACTICES ACT CORPORATE LEGAL MANUAL 1. POLICY 2. PURPOSE 3. SCOPE 4. PROVISIONS

Legislative Language

A (800) (800)

ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE

IEC Electronics Terms and Conditions

Ximo365 Brand Ambassador Policies and Procedures Agreement

Investor Presentation

Transcription:

INDEPENDENT RESELLERS EFFORTS TO FIGHT COUNTERFEITING IN THE INFORMATION TECHNOLOGY INDUSTRY IEEE Joseph Marion- President jmarion@ascdi.com 1-561-266-9016 www.ascdi.com www.natd.com Association of Service and Computer Dealers International & North American Association of Telecommunications Dealers

ASCDI and NATD The Association of Service and Computer Dealers International, founded in 1981 is a nonprofit organization of companies whose Members buy, sell, lease and maintain new and used IT business solutions to governmental subdivisions and business throughout the world. Members include OEMS, authorized OEM resellers and independent resellers. The North-American Association of Telecommunications Dealers, founded in 1985, is a nonprofit organization of companies whose Members buy, sell, lease and maintain new and used TELECOM business solutions to governmental subdivisions and business throughout the world. Members consist of OEM s, OEM authorized and independent companies.

Self Regulated Industry The ASCDI-NATD promotes and enforces high standards of ethical and professional business practices Member Companies are required to abide by the Industry Standard Code of Ethics The Code of Ethics requires members to honor all transactions expeditiously and in a manner which brings credit to our Industry Buyers of technology equipment (including the U.S. Government) may file a grievance (Ethics Complaint) with the respective association if the buyer feels that the seller violated the Code of Ethics Violation of the Code of Ethics subjects member to possible suspension or expulsion from the respective association

The Secondary Market 4000 Manufacturers IBM, HP, Avaya, Nortel, Sun, CISCO, EMC, Fujitsu-Siemens, Dell $312 Billion Dollar Market $187 Billion traded by 40,000 independent computer brokers, wholesalers and value added resellers worldwide Half of secondary market resellers are based in the U.S. ASCDI-NATD estimates that the US industry employs 100,000 people.

The Flow of Authentic Equipment Equipment begins to enter the Secondary Market after 3 months usage but most enter the market after being written down over 5 years Equipment life averages 10 years and may be resold several times Fate of equipment- Reuse, Refurbishment, Recycling, Donation or Landfill 36% of all new equipment is reused

Government and Industry Developments 2008- US Government holds hearings on acquisition of counterfeit goods 2009- US Department of Defense adopts preference/requirement to buy only new equipment from Authorized Resellers Raids & investigations of independent resellers Threatening letters from Manufacturers to our Members Public Relations campaign by Manufacturers that secondary market = counterfeit 6

ASCDI Anti-Counterfeit Policy Adopted 3/25/2011 by its 250+ members Objective: To eliminate, or mitigate the impact of, counterfeit IT goods and develop best practices to identify, inspect, test, properly dispose of and report encounters with counterfeit product.

ASCDI Anti-Counterfeit Policy Key elements: Zero Tolerance of knowingly and intentionally trafficking in counterfeit products Quarantine of any/all counterfeit product; no returns into supply chain Suppliers of counterfeit product must give full refund to customer and cannot demand return of goods Adoption and enforcement of internal anti-counterfeit protocols and reporting requirements Must cooperate with investigations Adjudication through existing ASCDI ethics process (investigation, hearing, disciplinary action if found guilty)

ASCDI Anti-Counterfeit Policy Has been embraced and implemented by the membership (Association and Individual Policies) Stumbling blocks encountered: Lack of manufacturer cooperation in evaluating suspected counterfeit product (US DOD Reports) Reporting requirements are inconsistent and unclear Law enforcement Industry databases

ASCDI Anti-Counterfeit Policy Next Steps: Continued outreach to manufacturers, law enforcement and industry reporting entities Phase 2 Policy objectives: Prescription of detailed inspection, testing, traceability, reporting and material control/disposition requirements Certification process

Collateral Damage Anti-Competitive Effects

Collateral Damage- Creates sole-source contracts Customer has a requirement for OEM s infrastructure equipment and hardware. The vendor shall certify that they are an OEM s registered partner The vendor shall source OEM s products directly from OEM or through the US authorized distribution channels only In the event the OEM s products have been acquired from unauthorized channels, customer reserves the right to return the products for a full refund. The item or items being purchased by [customer] in this contract shall be new. Used, refurbished, reprogrammed or equipment of a reconstructed state is absolutely unacceptable.

Collateral Damage Increased Costs to Government and Industrial Buyers Gartner Group Study Nov. 2010: Introducing a second vendor will: Reduce total cost of ownership by at least 15% to 25% over five years Reduce upfront capital costs by 30% to 50% Reduce maintenance costs from 40% to 95% Refurbished IT equipment costs 50% less than equivalent new gear Refurbished is not a dirty word in IT End-of-Life supply avoids forced upgrades

Collateral Damageforced upgrades by government and industry Limits/eliminates support for end-of-life and/or discontinued products, forcing government purchasers to upgrade unnecessarily

Collateral Damage- Hurts business of Independent Resellers In the past two years, Federal government business conducted by independent IT resellers has plummeted One example Federal government business down by 54% from 2009 to 2010 Downsizing resources devoted to Federal government business; possible complete withdrawal

Counterfeit is a problem for authorized Manufacturer Resellers too. 21% of organizations reporting counterfeit product sourced it from authorized distributors 12% sourced it from contract manufacturers 10% sourced it from OEMs Source: Defense Industrial Assessment: Counterfeit Electronics, U.S. Dept. of Commerce, January 2010, page 18, Fig. II-12

IT Manufacturer Cooperation (Or Lack Thereof) IT manufacturers do not cooperate with independent resellers or their customers to clarify suspect vs. confirmed counterfeit items This hinders independents from fully implementing anti-counterfeit policies Legal & reporting issues suspect vs. confirmed

Manufacturers Are Sole Arbiters (1) Increasing frequency of commercial and government deals being overturned by IT manufacturers Allegations of counterfeit, misuse of trademark, not in our database With few exceptions, no appeal process or cooperation in investigation Lawsuits are too expensive, time consuming, and damaging to customer relationships

Manufacturers Are Sole Arbiters (2) Increased frequency of seizures of imported equipment by Customs & Border Protection Equipment turned over to manufacturer for exclusive determination of status Again, little explanation; no cooperation or appeal process Fox guarding the henhouse

The AGMA Story AGMA is a consortium of the major IT and Telecom equipment manufacturers Originally Anti Gray Market Alliance Now Alliance For Gray Market and Counterfeit Abatement Attempting to conflate gray market and unauthorized with counterfeit AGMA website 10 reasons to join: #2 Stop loss of profit margins to brokers

Potential Solution Independent Third-Party Evaluation Service IEEE/EEPROM authentication Success depends upon acceptance of results by key entities such as standardssetting bodies Would not need manufacturer involvement

Summary The independent IT reseller channel has raised its game with meaningful effect in the fight against counterfeit product Increased counterfeit publicity has increased costs for government customers, eliminated competition, and severely damaged the independent reseller channel Requiring government customers to buy only from the authorized channel does not solve the counterfeit problem IT equipment manufacturers will not cooperate with independent resellers or their customers in evaluating suspect counterfeit product Independent resellers can help manufacturers pursue and shut down the counterfeiters, if only allowed to do so An independent third-party testing service is in the interest of all parties (including, most importantly, the customer)

INDEPENDENT RESELLERS EFFORTS TO FIGHT COUNTERFEITING IN THE INFORMATION TECHNOLOGY INDUSTRY IEEE Joseph Marion- President jmarion@ascdi.com 1-561-266-9016 www.ascdi.com www.natd.com Association of Service and Computer Dealers International & North American Association of Telecommunications Dealers