SlideShare une entreprise Scribd logo
1  sur  12
RFID & The Supply Chain Mandate Presented By: Pratik Mehta
Agenda What is RFID? Benefits & Drawbacks Successful Implementations RFID & C-Suite Executives RFID & the CA Profession
What is RFID? Components Tag Reader Antenna/Coil Types of tags Active Semi- active Passive
Benefits of RFID Technology Cost savings along the supply chain Reduced labour costs Savings of 7.5% in warehouses and 5-40% in a distribution center Reduction in stock outs, leading to an increase in revenues 3-4% increase in sales  Restock 3 times quicker Lose approximately 20% of customers due to stock outs
Benefits of RFID Technology (continued) Reduction in theft & shrinkage of inventory Shrinkage cause retailers over $30 billion a year  Reduction of errors due to manual input Cost $2 million for every $1 billion in sales Reduction in inventory storage costs Savings of 20% due to lowering the inventory levels
Drawbacks of RFID Technology Significant capital investment required Costs range from $500K-$20M Readers cost $2k-$3K each Maintenance costs are approx. 18-20% a year Privacy concerns Tags can be tracked continuously   unauthorized individuals can intercept transmission Location tracking
Drawbacks of RFID Technology (continued) Processing requirements  Large volumes of data System crashes Slower processing speeds Data integrity issues Clone tagging  Active attacks Passive attacks
RFID Implementation Wal-Mart $287M in cost savings due to 10% reduction in misplaced inventory Mandated their top 100 suppliers to adopt the technology Reduce stock outs by 8% worldwide Improved perpetual inventory by 20% American Apparel Inc.  14.3% increase in revenue due to RFID implementation
RFID & C-Suite Executives CIO Sufficient processing requirements Analyzing benefits & advantages Addressing privacy & data integrity issues CFO Capital budgeting Allocation of financial resources ROI Cost savings
RFID & C-Suite Executives (continued) CEO Ensure process of implementation goes smooth Ultimately responsible for success/failure of project Convince board
RFID & the CA Profession Internal controls Stronger vs. weaker controls Audit Approach Substantive vs. combined approach SOX  compliance SOX 409
Conclusion Inventory accuracy rate is 65% without RFID Expected growth of RFID tech worldwide is 28% from 2011-2013 $1 billion tags to be used in 2011 (retailers) Every business is different

Contenu connexe

Similaire à Rfid presentation (podcast slides)

RFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management SystemRFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management SystemSiddharth Chandrasekar
 
Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Richard Sebastian
 
RFID in Manufacturing
RFID in ManufacturingRFID in Manufacturing
RFID in Manufacturingiaitoinfotech
 
RFID in PV Solar Manufacturing Industry
RFID in PV Solar Manufacturing IndustryRFID in PV Solar Manufacturing Industry
RFID in PV Solar Manufacturing Industryiaitoinfotech
 
15251179 pss7
15251179 pss715251179 pss7
15251179 pss7fghsjsh
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfidMandar Jagtap
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Bhautik Vaghela
 
Tracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDTracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDMetalcraft Inc
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauHIMSS
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slidesguestbed1dd
 
RFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management SystemRFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management SystemSumeet Main
 
Rfid in oil and gas applications
Rfid in oil and gas applicationsRfid in oil and gas applications
Rfid in oil and gas applicationsmena kaheel
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentImpinj RFID
 
RFID in APAC
RFID in APACRFID in APAC
RFID in APACkumarpg
 

Similaire à Rfid presentation (podcast slides) (20)

RFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management SystemRFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management System
 
Rfid ajal
Rfid ajalRfid ajal
Rfid ajal
 
Scm Rfid
Scm  RfidScm  Rfid
Scm Rfid
 
Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...Driving Value to the Next Generation Supply Chain through Technology - What N...
Driving Value to the Next Generation Supply Chain through Technology - What N...
 
Avi solution2
Avi solution2Avi solution2
Avi solution2
 
Pharma rfid-solution
Pharma rfid-solutionPharma rfid-solution
Pharma rfid-solution
 
RFID in Manufacturing
RFID in ManufacturingRFID in Manufacturing
RFID in Manufacturing
 
RFID in PV Solar Manufacturing Industry
RFID in PV Solar Manufacturing IndustryRFID in PV Solar Manufacturing Industry
RFID in PV Solar Manufacturing Industry
 
15251179 pss7
15251179 pss715251179 pss7
15251179 pss7
 
Applications of rfid
Applications of rfidApplications of rfid
Applications of rfid
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )
 
Tracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFIDTracking and Controlling Assets Using Bar Code and RFID
Tracking and Controlling Assets Using Bar Code and RFID
 
RFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim BloedauRFID In Health Care In 2005 by Jim Bloedau
RFID In Health Care In 2005 by Jim Bloedau
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
RFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management SystemRFID Assisted Supply Chain Management System
RFID Assisted Supply Chain Management System
 
Equippment management
Equippment managementEquippment management
Equippment management
 
Rfid in oil and gas applications
Rfid in oil and gas applicationsRfid in oil and gas applications
Rfid in oil and gas applications
 
Space Cycles Rfid Primer
Space Cycles Rfid PrimerSpace Cycles Rfid Primer
Space Cycles Rfid Primer
 
Using RFID to Track Tools and Equipment
Using RFID to Track Tools and EquipmentUsing RFID to Track Tools and Equipment
Using RFID to Track Tools and Equipment
 
RFID in APAC
RFID in APACRFID in APAC
RFID in APAC
 

Dernier

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Dernier (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Rfid presentation (podcast slides)

  • 1. RFID & The Supply Chain Mandate Presented By: Pratik Mehta
  • 2. Agenda What is RFID? Benefits & Drawbacks Successful Implementations RFID & C-Suite Executives RFID & the CA Profession
  • 3. What is RFID? Components Tag Reader Antenna/Coil Types of tags Active Semi- active Passive
  • 4. Benefits of RFID Technology Cost savings along the supply chain Reduced labour costs Savings of 7.5% in warehouses and 5-40% in a distribution center Reduction in stock outs, leading to an increase in revenues 3-4% increase in sales Restock 3 times quicker Lose approximately 20% of customers due to stock outs
  • 5. Benefits of RFID Technology (continued) Reduction in theft & shrinkage of inventory Shrinkage cause retailers over $30 billion a year Reduction of errors due to manual input Cost $2 million for every $1 billion in sales Reduction in inventory storage costs Savings of 20% due to lowering the inventory levels
  • 6. Drawbacks of RFID Technology Significant capital investment required Costs range from $500K-$20M Readers cost $2k-$3K each Maintenance costs are approx. 18-20% a year Privacy concerns Tags can be tracked continuously unauthorized individuals can intercept transmission Location tracking
  • 7. Drawbacks of RFID Technology (continued) Processing requirements Large volumes of data System crashes Slower processing speeds Data integrity issues Clone tagging Active attacks Passive attacks
  • 8. RFID Implementation Wal-Mart $287M in cost savings due to 10% reduction in misplaced inventory Mandated their top 100 suppliers to adopt the technology Reduce stock outs by 8% worldwide Improved perpetual inventory by 20% American Apparel Inc. 14.3% increase in revenue due to RFID implementation
  • 9. RFID & C-Suite Executives CIO Sufficient processing requirements Analyzing benefits & advantages Addressing privacy & data integrity issues CFO Capital budgeting Allocation of financial resources ROI Cost savings
  • 10. RFID & C-Suite Executives (continued) CEO Ensure process of implementation goes smooth Ultimately responsible for success/failure of project Convince board
  • 11. RFID & the CA Profession Internal controls Stronger vs. weaker controls Audit Approach Substantive vs. combined approach SOX compliance SOX 409
  • 12. Conclusion Inventory accuracy rate is 65% without RFID Expected growth of RFID tech worldwide is 28% from 2011-2013 $1 billion tags to be used in 2011 (retailers) Every business is different

Notes de l'éditeur

  1. Hi My name is Pratik Mehta and today I will be providing you with a presentation of RFID and the Supply Chain Mandate from the view of the retailing industry.
  2. Before I begin I would like to just go over the agenda with you. I will start by providing a brief over view of what RFID technology is and then move into talking about the various benefits and drawbacks of the technology. We will then take a look at some implementation cases followed by a short discussion of how RFID impacts C-Suite executives and the CA profession.
  3. To begin RFID, technology helps to transmit unique information relating to an object or item wirelessly within a certain radius. In order for this technology to be used, it must have an antenna/coil, a tag, and a transceiver with decoder. The process begins when the antenna emits a radio signal to activate the tag which enables data to be written or read. RFID tags are considered to be intelligent bar codes that communicate with a network system in order to keep track of certain object(s) at all times while storing information about the product on a microchip which emits waves. Once the information is transmitted, the transceiver decodes the information on the microchip which is then processed by the computer system in order to provide meaningful data relating to the object such as product specifications. These tags can come in various forms and have different features, however with the more features you have the more costly it will be. The main difference in the tags are due to their power source. Active tags have their own power source and are able to transmit a greater distanceSemi active tags relies on the antenna for some power as wellPassive tags have a full reliance on the antenna for power in order to transmit
  4. Based on the description provided on the previous slide, it’s very easy to see how practical and efficient this technology can be to many retailers, however it is important to step back and look at the benefits and drawbacks of this technology in order to determine how feasible and appropriate it is for businesses in this industry. RFID projects can cut costs by up to three to five percent and achieve an overall increase of revenues by two to seven percent due to better visibility and accuracyThis is achieved due to the automation in the process that reduces the labour costs involved in a more manual process. This translates into productivity improvements which reduce labour costs by 7.5% in warehouse applications and 5-40% in a distribution applicationEven in the event of a stock out, having RFID technology can enable retailers to re-stock three times faster than others who have not employed this technology which translates into a 3%-4% increase in sales
  5. A study conducted by Ernst and Young revealed that shrinkage relating to inventory theft can cause retailers over $30 billion dollars a year which is approximately 1.7% of overall sales. As a result, RFID helps to mitigate this loss due to its superior tracking ability.RFID can also reduce the manual input by using bar code scanners. Companies can reduce the risk of inputting the wrong data which costs retailers and manufacturers $2 million dollars for every $1 billion in sales per year. IbidLastly, they can help reduce storage costs and help in the decision making process. Companies can have less safety inventory stock on hand which would translate into savings of 20%.
  6. However, there are many drawbacks with this technology that should be addressed as well One drawback with this technology can be seen by the large costs. The large upfront costs associated with this implementation are discouraging many companies from adopting RFID as the costs range from as low as $500,000 to $20,000,000 plus. In addition to this, companies would have to spend an additional $2,000-$3,000 for each reader they require. Depending on the tag that the company wants to adopt, it can cost them on average ten cents a tag which can add up to be quite significant depending upon the needs of the business.Once the implementation is complete, it is estimated that there would be on going maintenance costs equivalent to an additional 18%-20%.Another concern relates to the privacy issues surrounding the technologyPrivacy is a concern since these tags can still be tracked even after the item has been sold to the ultimate consumer. Using the data transmitted by the tag, an unauthorized individual reading the data can know exactly where the item is and determine the unique identity of the user. Another concern is that a third party may have a reader and start capturing product data. This can be sold to advertisers which help data miners extract valuable information from the data collected and learn about customer’s private lifestyles
  7. Another drawback with the use of this technology can be seen when the company does not have a sufficient infrastructure to handle the large volumes of data that needs to be processed by the back-end computer systems. If the company does not have the adequate system requirements to process the data, they can run the risk of overloading the system which may cause it to crash or reduce the processing speed and make the system lag. The RFID tags are scanned more frequently and generate more information per scan causing a great deal of growth in the amount of data. In fact, RFID tags create about 10-100 times more data then produced by a traditional bar code system. For example, Wal-Mart`s systems are expected to handle 7 terabytes of data daily as this is how much data is transferred through their RFID system.Lastly, Data integrity is also a concern when using this technology as clone tagging can occur.Clone tagging is the process by which the unique identity of the tag is copied and its identity is stolen. This can cause a potential hacker who created the tag to convince the system that the cloned tag is the original.An active attack is one that occurs in real time where the tag is physically removed from an object and attached to another. For example, an attacker may switch tags from a low cost product to a high priced item in order to get a lower priceIbidPassive attacks on the other hand consist of capturing the tags identity by copying and storing it for a future attack which can be performed repeatedly. This can be done by the attacker coercing the system to reveal its identity or intercepting the transmission between the tag and the reader.
  8. Now I would like to take a few minutes to talk about some companies that have already adopted RFID technology. In the case of Wal-Mart, they have been able to achieve significant cost savings and efficiencies in their supply chain through the adoption of this technology. This has helped them to reduce stock outs, labour costs, storage costs and theft. In fact, Wal-Mart in 2007 claimed, that they had achieved cost savings of $287 million by correcting only 10% of their problems relating to misplaced inventory. As one of the first major retailers to adopt this technology, Wal-Mart felt that other members in their supply chain should also follow suite in order to further streamline the process. In 2003, Wal-Mart mandated that their top 100 suppliers adopt RFID technology/More recently, in 2010 Wal-Mart began to introduce removable item level RFID tags on men’s denim jeans and underwear which would help them control their inventory on the floor and help employees’ track which size, colour and style of jeans have been sold so they can restock the shelves accordingly. The removeable tag will help address the privacy concerns with the tag. Americian apparel has also adopted the technology and seen a 14.3% increase in their revenue.
  9. Now that we have seen what RFID can do. WE have to look at how this would effect C-Suite executives.the Chief Information Officer gets quite involved with this process as many of these new innovations in technology require a great deal of consideration to determine if the technology is right for the organization and whether it can be implemented effectively factoring in the benefits and drawbacks. For example, ensuring the current back-end systems can handle the new RFID application and processing requirements would have to be determined before such an implementation could take place. The CIO would also be responsible to ensure that the technology does not infringe on privacy or lead to data integrity issues where an attacker could decrypt the data and use it to attack the system. Appropriate safeguards would need to be considered to protect the integrity of the data such as encrypting the data and reduce the transmission distancethe Chief Financial Officer would get involved in order to determine if the project would provide a reasonable return on investment and whether the company has the required resources to undergo such a project
  10. The ultimate decision and responsibility rests with the CEO who would be expected to ensure the process of implementation goes smoothly and the technology actually enhances their supply chain and bottom line. The CEO would have to convince the board of its business use and application in order to substantiate such a large capital investment in the technology.
  11. Lastly, I would like to discuss how RFID impacts the CA profession A CA who is performing the auditing function can find that RFID can help provide assurance over various accounts on the balance sheet and require them to perform additional procedures to test the adequacy of the controls to ensure they have been designed/ working effectively. An external auditor can gather data from the RFID tags that can be used when testing the existence assertion relating to the inventory account since this technology keeps track of all items taggedExternal auditors have to know if tags can be changed and if so how unauthorized changes of tags are prevented. With this being said, even though an RFID system can provide great benefit, if not designed effectively, it can increase the audit risk due to deficient controlsIn addition to this, the use of an RFID system will have a significant impact on the internal control system that will require testing in order for the auditor to be able to rely on the systems controls which will have an effect on the audit approach used. This technology can also prove to cause difficulties for CA’s, especially those that have U.S. clients or are involved with compliance work in accordance with SOX 409. SOX 409 requires companies to have rapid and current disclosure of material changes in the financial and operational position within four days. RFID enables businesses to do this as it provides real time information; however there are risks that auditors as well as preparers of financial statements should be aware of. This technology has an opportunity to cause read errors. For companies such as Wal-Mart who have a great deal of inventory in transit continuously, a read error could cause a large misstatement of their inventory balance.
  12. There have been many projections made in regards to the future of RFID as seen on the slide. Much discussion has taken place over whether RFID is ready for wide scale implementation and examples in this paper have demonstrated its success with many retailers, however 61% of companies surveyed in a study mentioned that they would not adopt the technology as it lacks a business case and also due to the fact that they lack understanding. The decision whether to adopt RFID is very specific to the company and its ability to leverage the technology to its benefit. It should be evaluated on a case by case basis to determine the practicality of implementation.