1 1 Update on DoD Progress in Anti-Counterfeiting April 12, 2011 L&MR/SCI.

Slides:



Advertisements
Similar presentations
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 4: Effective Integration.
Advertisements

Copyright (C) The Open Group 2014 Securing Global IT Supply Chains and IT Products by Working with Open Trusted Technology Provider™ Accredited Companies.
Cloud computing security related works in ITU-T SG17
Secure Systems Research Group - FAU Process Standards (and Process Improvement)
No U.S. Government export controlled content. No U.S.G. export restrictions apply 1 DoD Public Meeting: Detection and Avoidance of Counterfeit Electronic.
G-12 Counterfeit Parts Activity Prepared for PSMC Meeting San Diego, CA October 25, 2007 Presenter Boeing G-12 Committee Vice Chair.
Counterfeiting Update NAVAIR DMSMS Team AIR NAVAIR DMSMS Team Lead Cleared for Public Release: NAVAIR
Standardization and GIDEP Mutual Support is Critical!
1 NDAA 2012 Section 818 Further Implementation for Trusted Suppliers March 27, 2014 Fred Schipp Naval Surface Warfare Center, Crane Division
1 Vigilance–Enforcement–Abatement World Micro Training Program Diane Hummer, Mahendran Sanggaren 23 rd, July, 2012 Ministry of Domestic Trade Cooperatives.
© The Aerospace Corporation 2013 Recommendations for changes to the Counterfeit Avoidance and Detection of Electronic Parts DFARS David Meshel Sr. Project.
Defense Contract Management Agency Quality Assurance Directorate Presented By: Michael Shields Executive Director, Quality Assurance March 15 th, 2011.
OPEN _ESCO Conference - Supply Chain Counterfeit Avoidance.ppt ESCO 6 th Anti Counterfeiting Forum London, Thursday 19 th February 2015 Avoidance.
U.S. General Services Administration Presentation to: ACT-IAC Cybersecurity SIG Improving Cybersecurity through Acquisition Emile Monette Senior Advisor.
ISO 9001 : 2000.
Summary of Revisions DoD Manual DoD Supply Chain Materiel Management Procedures 0.
SAE AS9100 Quality Systems - Aerospace Model for Quality Assurance
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
Project Management November 2, Introduction Eric Lemmons Customer Project/Program Manager III Gary Obernuefemann Business Consulting IV.
Quality Management System
TEL382 Greene Chapter /27/09 2 Outline What is a Disaster? Disaster Strikes Without Warning Understanding Roles and Responsibilities Preparing For.
Stephen S. Yau CSE , Fall Security Strategies.
1 Webinar on: Establishing a Fully Integrated National Food Safety System with Strengthened Inspection, Laboratory and Response Capacity Sponsored by Partnership.
Session 3 – Information Security Policies
DoD Public Meeting: Detection and Avoidance of Counterfeit Electronic Parts Storme Street Director, Government Relations, Policy BAE Systems, Inc. March.
Company Confidential Registration Management Committee 1 Auditing the Implementation of Counterfeit Electronic Parts Control Plan Requirements Bill Zint,
4. Quality Management System (QMS)
4. Quality Management System (QMS)
Peer Reviews. 2  Strengths and/or Best Practices across multiple Sites ◦ Internal customers involved in Acq. Planning (3) ◦ Leveraging buying power.
Objectives 4 Understand the ISO standards. Why are standards required? 4 Need standards to ensure that a term means the same for all 4 Need company standards.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
CONTRACTUAL FLOW DOWN OF DPAS PRIORITY RATINGS
Pollution Prevention Toyota Industrial Equipment Mfg., Inc. December 7, 2011.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
High Density Packaging User Group
GS1 US INITIATIVES UPDATE MARCH 18, GS1 STANDARDS MAKES IT POSSIBLE 2 SAFETYSECURITY VISIBILITYEFFICIENCY COLLABORATION To apply standards to business.
Software Quality Assurance Lecture 4. Lecture Outline ISO ISO 9000 Series of Standards ISO 9001: 2000 Overview ISO 9001: 2008 ISO 9003: 2004 Overview.
Quality Management System
Rochester Institute of Technology (RIT) Dr. Anahita Williamson Director, NYS Pollution Prevention Institute Kate Winnebeck LCACP, Senior EHS Specialist.
The Aerospac Mission: To move the aerospace supply chain from a paper-oriented information system to an online, data-based information system. The Aerospac.
ISO 9000 & TOTAL QUALITY ISO 9000 refers to a group of quality assurance standards established by the International Organization for Standardization.This.
RESPONSIBLE SHREDDING Bob Johnson CEO, NAID. Compliant and secure disposition.
U.S. Government Coordinated Approach to Intellectual Property Enforcement Third Global Congress on Counterfeiting & Piracy January 30, 2007 Office of the.
Risk Management. IT Controls Risk management process Risk management process IT controls IT controls IT Governance Frameworks IT Governance Frameworks.
Copyright© Underwriters Laboratories Inc. All rights reserved. No portion of this material may be reprinted in any form without the express written.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
The Second Annual Medical Device Regulatory, Reimbursement and Compliance Congress Presented by J. Glenn George Thursday, March 29, 2007 Day II – Track.
1 1 Detection and Avoidance of Counterfeit Electronic Parts— Further Implementation Public Meeting June 16, 2014 Scott Bousum, Director, National Security.
12.1 Plan Procurement: Introduction
Breakout Session 3 QHSE Strategic Risk Management.
Update of API Standards for Supply Chain Management API Standard 20J – Qualification of Distributors.
Rick Roelecke Director, Corporate Quality Management July 26 th, 2016 L-3 Communications DoD Policy Implementation.
QUALITY CONTROL FOR NFI
NAVSEA Material Fraud and Counterfeit Materiel Manager
Trade-offs to establish an integrated, comprehensive protection scheme
External Validation of Quality Programs
Counterfeit Materiel Program Update
NRC Cyber Security Regulatory Overview
Product Development Scenario Overview
GDPR – Practical Implementation Managing contracts, procurement and relationships with suppliers Terry Brewer Chief Executive.
Lockheed Martin Canada’s SMB Mentoring Program
Millennium HongQiao Hotel Shanghai
ISO 9000 Dr. S. Thomas Foster, Jr..
® Conference on Quality in the Space & Defense Industries CQSDI
Discussion points for Interpretation Document on Cybersecurity
External Validation of Quality Programs
Standards Working Group
Presented by Trey Hodgkins SVP of Public Sector June 16, 2014
Risk Management NDS Forum June 23rd 2010.
Anti-Counterfeit Policy Framework
Presentation transcript:

1 1 Update on DoD Progress in Anti-Counterfeiting April 12, 2011 L&MR/SCI

2 Securing the DoD Supply Chain: The Counterfeits Challenge Jan 2010 Dept of Commerce study and March 2010 GAO audit on counterfeit parts found: –A rise in counterfeit items entering DoD supply chains –Inconsistent DoD definition of counterfeit materiel –The need for more component testing –that DoD should develop and disseminate standard guidance on antip-counterfeiting DoD has a multi-layer process in place to detect and handle non-conforming material, of which counterfeit is an example. These processes have prevented serious incidents due to counterfeiting to date. 2 However, the DoD cannot be complacent against this global threat

3 Training Reporting Improvement Procurement -Approved Supplier -Authenticity -Purchase Reports Receipt - Inspect -Certify authenticity Detect - Tools -Techniques Disposal - Standard Process - Prevent Re-enter Acquisition -Parts List (IUID) -Safety Items -Controlled Inv. list What is the overall process for preventing counterfeiting? Life Cycle Controls

4 Counterfeitability Costs Critical Safety Ensure Good Quality at Source Assess Risk at Program Level Protect Gov’t Contractually How do we know we’re buying genuine material? Acquisition / Procurement Critical Mission IIM Levels Research On site inspection Prior Experience GIDEP* Warranties Indemnification / Damages Anti- counterfeit mechanisms Quality controls Flow Down * GIDEP – Government Industry Data Exchange Program Sole Source OEM Traceability Other Non-traditional Acquisition Other Database

5 Systems Industry Input Disposal Acquisition/ Procurement Receipt GIDEP Critical Items Vendor Information Outside Links Process Detection Anti-Counterfeit Information Flow

6 What we’re doing Issuing a Directive Type Memorandum (DTM) on full lifecycle anti-counterfeiting Developed a 4 year Program Objectives and Milestones to coordinate anti-counterfeiting activities Immediate focus on: –Service level programs and policy –Disposition of counterfeit materiel –Information sharing process –Input to White House lead initiative on counterfeiting and protection of intellectual property on procurement and regulatory policy