 Counterfeiting of Products It’s effect and Prevention Rolando Molina MECH 3620 – Advanced Manufacturing Processes Fall 2013.

Slides:



Advertisements
Similar presentations
Land transportation simply means any form of transportation that takes place onland.
Advertisements

Brand Protection through Nanotechnology Sun Innovation’s Anti-Counterfeiting Product Authentication.
Anti Counterfeiting Technologies EE126 Computer Engineering Clifford C Youn.
JJ Cavanaugh and Andrew Lue Chinese Intellectual Property Theft 1.
preventing counterfeit …
Express Stores Reducing Shoplifting. The Problem What can Express #892 do to reduce shoplifting?
Crystal A. Zarpas, Esq. ___________________________________________________________ _______ MANN & ZARPAS, LLP | Ventura Blvd., Ste. 714 Sherman.
Supply Chain Management Managing the between all of the parties directly and indirectly involved in the procurement of a product or raw material.
RFID Use In Humans Dionne Johnson and Jenna Seagraves COMP38012/06/06.
Sourcing Agreement Between
Interactive whiteboard Flexible pen-and- finger system Promotes an easy way to work together Advances student’s classroom performance.
Radio Frequency Identification (rfid) Aaron Roy Prof. Johnson November 28, 2009.
Why Comply with PCI Security Standards?
Introduction Definition of information security Importance of information security Survey Results-Bank account information Protecting your bank accounts.
A statement will be read. As a group, decide whether you believe the statement to be true or false. Hold up the card to indicate your answer when prompted.
Will Internet shopping kill off the High Street? Aim: To produce our own online retail store.
The Dollar Congress adopted the dollar as the money unit of the United States in 1785.
© 2011 Autodesk Securing AutoCAD IP in the era of WikiLeaks Presenter: Rahul Kopikar Co-Founder, Seclore Technology.
It’s everybody’s business. Marketing From the “outside in” Traditional Advertising including: Print, Radio, TV, Billboards, Signage Expansion of Operation:
 How have you faced competition?  How would you define competition in economic terms?  What does perfect competition mean to you? DO NOW.
Protecting Intellectual Property (IP) Evan Kuenzli Grant Miller.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
1 DNA-based Tracking Technology. 2 Product Protection Overt (visible) or Covert (invisible) security marking options. –DNA MultiMatrix™ Hologram –Barcodes.
Distributor Liability - What You Need to Know Presented by Anthony Lupo & Sarah Bruno Arent Fox PLLC Washington, DC March 12, 2008.
Marketing has two main functions: 1)help a business determine its target market 2)give consumers what they want Marketing Function – Questions? Who will.
Tackling the Illicit Trade – JTI’s Approach Sofia, June
Clifford Poulard Team C – Cliff Po
Radio Frequency Identification (RFID) Be Safe Security Solutions.
CONTENTS 1. Introduction 2. Smart Metering System 3. How does the system work? 4. Advantage of AMR system Electric company benefits.
1 Supply Chain Security & Brand Protection AAFA Knock It Off Conference Long Beach, CA November 7, 2007.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Back to Table of Contents pp Chapter 22 Making Consumer Decisions.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Factors that Contribute to the Selection of Products/Services in Small Business.
Illicit hardware Neil Ichiki 14 July 07. Agenda Quick background Overview of the global counterfeit market Illicit products defined & how to protect yourself.
Advanced Secure Technologies Secure Document Technologies.
SOFTWARE PIRACY OF BUSINESS ETHICS PERSPECTIVE
Justin Ward.  Chips provide the calculating power in many personal computers  Long one of the most profitable among large manufacturing companies 
JP is standing on a bridge that’s 12 feet above the ground. He throws a ball up in the air with an initial velocity of 25 ft/s. -When will the ball be.
Technology Supply Chain Management
By: Ashley, Sabiha, and Roshaan. Software Piracy is the unauthorized copying of software. By buying the software, you become a licensed user rather than.
Less Paper, More Power. Document Digitization and Management Solution. digipaper.
REA 0002 Chapter 8 Inference What is an inference? An inference is something that is implied within the sentence. It is NOT directly stated. After the.
Marketing Essentials Chapter 16 Section 2.  After the sale is finalized, the sale is considered closed.  All cash registers provide three basic sales.
SOLUTION TO PERMANENTLY STOP SALE OF FAKE, SPURIOUS, PIRATED AND DUPLICATE PRODUCTS.
Section 2 – Background to Holden plc. Lesson objectives To be able to discuss the roles of each of the shareholders To be able to discuss the 2008 move.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
Security Systems
Graphic Communications. History Graphic Communications, previously known as “Printing”: Dates back to 220 A.D. Was first found in China and Egypt Consisted.
COUNTERFEIT GOODS Detection Using Mobile Devices By Brian Wood.
Home security consultants provide hardware and customer support services to help homeowners prevent crime and fires in their homes and on their property.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Make your packaging Smarter
By: Tarun Sharma Chinta Rahul SCSE VIT University
Calculus Section 3.4 Calculate marginal cost, revenue, and profit
Preventative Measures
Business Risk Marketing Co-op.
The Decline of Hard Media
SOLUTION FOOD (Track and Trace)
Module 6 Video 4 Fulfilling omni-channel demand
Student Name Class Period
SOLUTION PHARMACEUTICALS
EXTENT OF PROBLEM OF FAKE
Competitive and Industry Analysis
Student Name Class Period
Student Name Class Period
Why Digital Marketing Career Is Important? Presented By:- Abhinav Shashtri.
Your Digital Footprint
The Best internet leads provider Deal direct lead provides the best technology development of lots of products and we improve the insurance marketing.
Anti-Counterfeit Labeling Method
Presentation transcript:

 Counterfeiting of Products It’s effect and Prevention Rolando Molina MECH 3620 – Advanced Manufacturing Processes Fall 2013

Background of Counterfeiting What is Counterfeiting?  Counterfeiting is the practice of manufacturing goods that often are of inferior quality, and selling them under a brand name without the brand owner’s authorization. It is illegal. It causes companies to lose a lot of revenue if their products are being counterfeited. Approximately $200billion dollars in losses each year. Most counterfeit goods are made in china.

How can we stop or reduce counterfeiting?  Be aware of what companies you conduct business with. Keep an eye out for leaks.  Register your trademarks in your home country and China. Or where ever you will be selling your product. Without registering your products you have no rights.  Register your products with China Customs. This increases the chances of counterfeiting products being identified before leaving the country.  You can train China Customs to be able to find your counterfeit products.  Monitor the internet to see if your product is being counterfeited.  Create a counterfeiting department within your company.

What is RFID Labeling? And how can it help?  RFID stands for Radio Frequency Identification  It is a digital finger print for products.  Flexible label containing a passive chip that contains critical information  The chips can be encoded with specific product and reference information for verification of authenticity of part or product.  The information on the chip is locked to allow no alteration of the information stored inside.  Can cost about cents to create label for each part or product.

What is RFID Labeling? And how can it help?

Conclusion  There are many ways to prevent and reduce the manufacturing of products.  Educating yourself and your company about what prevention options are available.  Make sure your products are registered in your home country and any other country it will be sold in. It makes it more difficult for others to counterfeit your product.  Monitor the internet to see if there is anyone selling counterfeits of your product.  Choose a prevention process that makes it hard for others to replicate your product. You decide what will work best for you and your product.

References    Counterfeit-RFID-Labeling.pdf Counterfeit-RFID-Labeling.pdf 