SlideShare une entreprise Scribd logo
1  sur  14
Transform the Process to Protect the
Product Samples Embedded with
Intellectual Property
E-ISG Asset Intelligence (www.e-isg.com)
October, 2017
2
Global Scope of Intellectual
Property
IP theft stretches across a multitude of industries, from consumer goods and
manufacturing, to movies, music and software. Anything that can be
trademarked is susceptible to IP theft.
1. Trademark intensive industries are largest in number and contribute the most
employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010).
2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30%
from $5.06 trillion in 2010.
3
Cost of IP Theft
1. According to U.S. Department of Homeland Security, Intellectual Property
Rights Seizures statistics, in 2014, total number of IPR related seizures was
55.7 Million and the total value of IPR related seizures (MRSP) was $250
Billion.
2. Up to 5% of goods imported into the European Union are fakes, according to
the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping
the Economic Impact”.
3. In the defense industry alone, the number of known counterfeit electronic
products more than doubled from 2005 to 2008, according to a U.S.
Commerce Department report released in January 2010.
4
5
Where Does IP Theft Occur?
1. Asset Creation Stage
• When an asset is created, how does your company track its various pieces and
components?
• Do those involved in its creation understand the importance of how the asset is
moved?
• When does an asset get logged into your current tracking system?
2. Asset Transfer Stage
• From one person to another in the same building
• From one country to another
3. Asset Disposal Stage
1 . Process for disposal
2 . Evidence of disposal
6
Two Common but Inadequate
ways to track Product Samples
System 1: Manual Tracking Via Spreadsheets
1. Inability to Scale: Spreadsheets tend to get bloated once your tracking
hundreds (or even thousands) of distinct SKUs
2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of
each asset, which can lead to errors and missing information
3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to
an earlier state, it could mean the deletion of critical tracking information
System 2: Homegrown Asset Tracking System
1. Rigid and Unadaptable
2. Can Become Outdated: A high price tag combined with a non-flexible system
means that the system can become outdated and no longer meet the full
needs of team members
3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can
sometimes be hard to share tracking information with vendors and other
3rd parties that don’t have direct access to the software
7
Why Consider Using a Robust
Asset Management system
1 . Track product samples, Where, What, and Who, throughout
the Life Cycle
2 . Track chain of custody. Enforce Accountability
3 . Keep asset history, disposal record
4 . Web based – access from anywhere
5 . Mobile – use smartphone to search, update, and transfer
assets
8
5 Ways eQuip! can Transform the
process for Managing Product Samples
1. Easily Transfer or Issue Property to a Custodian
2. Automatically Record the Transaction History Transaction of an Asset
3. Know Where Your Assets Are Physical Located at All Times
4. Easily Photograph and Record Asset Images
5. Manage the Complete Asset Lifecycle with Web and Mobile Application
9
Easily Transfer or Issue Property
to a Custodian
Signature 1: The new IP custodian acknowledging
receipt (and ownership) of the IP property
Signature 2: The former IP custodian
acknowledging that
Once a custodian has signed the transfer
agreement, an email notification is automatically
sent to any designators “approvers.”
10
Automatically Record Asset
Transaction History
• When an entry modification was made
• Who made the entry modification
• The time and date of the modification
• The archival of old values
• Recording of any new values
11
Know Where Your Assets Are at
All Times
12
Photograph and Record Asset
Images
13
Manage with both Web and
Mobile Applications
14
Want to Learn more about how eQuip!
can help protecting IP samples?
1. Visit our website (www.e-isg.com)
2. Visit our blog (blog.e-isg.com)
3. Call 1-866-845-2416 to speak to our asset management experts
4. Request a software demo be emailing to Contact@e-isg.com

Contenu connexe

Similaire à Transform process to protect product samples embedded with intellectual property

Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)Brian Brazil
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxWaterFalls2
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using BlockchainIRJET Journal
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainPaul Hofmann
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Raw honey report
Raw honey reportRaw honey report
Raw honey reportaae
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 

Similaire à Transform process to protect product samples embedded with intellectual property (20)

IOT ppt1.pptx
IOT ppt1.pptxIOT ppt1.pptx
IOT ppt1.pptx
 
Blockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfBlockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdf
 
IoT_IT_Unit1.pdf
IoT_IT_Unit1.pdfIoT_IT_Unit1.pdf
IoT_IT_Unit1.pdf
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)
 
UNIT IV.pptx
UNIT  IV.pptxUNIT  IV.pptx
UNIT IV.pptx
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
 
Iot for food business
Iot for food businessIot for food business
Iot for food business
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Raw honey report
Raw honey reportRaw honey report
Raw honey report
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
 

Plus de Jackie Luo

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset ManagementJackie Luo
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Jackie Luo
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesJackie Luo
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolJackie Luo
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset managementJackie Luo
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesJackie Luo
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemJackie Luo
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Jackie Luo
 

Plus de Jackie Luo (8)

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal grantees
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management tool
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset management
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal grantees
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten System
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Transform process to protect product samples embedded with intellectual property

  • 1. Transform the Process to Protect the Product Samples Embedded with Intellectual Property E-ISG Asset Intelligence (www.e-isg.com) October, 2017
  • 2. 2 Global Scope of Intellectual Property IP theft stretches across a multitude of industries, from consumer goods and manufacturing, to movies, music and software. Anything that can be trademarked is susceptible to IP theft. 1. Trademark intensive industries are largest in number and contribute the most employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010). 2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30% from $5.06 trillion in 2010.
  • 3. 3 Cost of IP Theft 1. According to U.S. Department of Homeland Security, Intellectual Property Rights Seizures statistics, in 2014, total number of IPR related seizures was 55.7 Million and the total value of IPR related seizures (MRSP) was $250 Billion. 2. Up to 5% of goods imported into the European Union are fakes, according to the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact”. 3. In the defense industry alone, the number of known counterfeit electronic products more than doubled from 2005 to 2008, according to a U.S. Commerce Department report released in January 2010.
  • 4. 4
  • 5. 5 Where Does IP Theft Occur? 1. Asset Creation Stage • When an asset is created, how does your company track its various pieces and components? • Do those involved in its creation understand the importance of how the asset is moved? • When does an asset get logged into your current tracking system? 2. Asset Transfer Stage • From one person to another in the same building • From one country to another 3. Asset Disposal Stage 1 . Process for disposal 2 . Evidence of disposal
  • 6. 6 Two Common but Inadequate ways to track Product Samples System 1: Manual Tracking Via Spreadsheets 1. Inability to Scale: Spreadsheets tend to get bloated once your tracking hundreds (or even thousands) of distinct SKUs 2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of each asset, which can lead to errors and missing information 3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to an earlier state, it could mean the deletion of critical tracking information System 2: Homegrown Asset Tracking System 1. Rigid and Unadaptable 2. Can Become Outdated: A high price tag combined with a non-flexible system means that the system can become outdated and no longer meet the full needs of team members 3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can sometimes be hard to share tracking information with vendors and other 3rd parties that don’t have direct access to the software
  • 7. 7 Why Consider Using a Robust Asset Management system 1 . Track product samples, Where, What, and Who, throughout the Life Cycle 2 . Track chain of custody. Enforce Accountability 3 . Keep asset history, disposal record 4 . Web based – access from anywhere 5 . Mobile – use smartphone to search, update, and transfer assets
  • 8. 8 5 Ways eQuip! can Transform the process for Managing Product Samples 1. Easily Transfer or Issue Property to a Custodian 2. Automatically Record the Transaction History Transaction of an Asset 3. Know Where Your Assets Are Physical Located at All Times 4. Easily Photograph and Record Asset Images 5. Manage the Complete Asset Lifecycle with Web and Mobile Application
  • 9. 9 Easily Transfer or Issue Property to a Custodian Signature 1: The new IP custodian acknowledging receipt (and ownership) of the IP property Signature 2: The former IP custodian acknowledging that Once a custodian has signed the transfer agreement, an email notification is automatically sent to any designators “approvers.”
  • 10. 10 Automatically Record Asset Transaction History • When an entry modification was made • Who made the entry modification • The time and date of the modification • The archival of old values • Recording of any new values
  • 11. 11 Know Where Your Assets Are at All Times
  • 12. 12 Photograph and Record Asset Images
  • 13. 13 Manage with both Web and Mobile Applications
  • 14. 14 Want to Learn more about how eQuip! can help protecting IP samples? 1. Visit our website (www.e-isg.com) 2. Visit our blog (blog.e-isg.com) 3. Call 1-866-845-2416 to speak to our asset management experts 4. Request a software demo be emailing to Contact@e-isg.com