SlideShare una empresa de Scribd logo
1 de 14
Transform the Process to Protect the
Product Samples Embedded with
Intellectual Property
E-ISG Asset Intelligence (www.e-isg.com)
October, 2017
2
Global Scope of Intellectual
Property
IP theft stretches across a multitude of industries, from consumer goods and
manufacturing, to movies, music and software. Anything that can be
trademarked is susceptible to IP theft.
1. Trademark intensive industries are largest in number and contribute the most
employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010).
2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30%
from $5.06 trillion in 2010.
3
Cost of IP Theft
1. According to U.S. Department of Homeland Security, Intellectual Property
Rights Seizures statistics, in 2014, total number of IPR related seizures was
55.7 Million and the total value of IPR related seizures (MRSP) was $250
Billion.
2. Up to 5% of goods imported into the European Union are fakes, according to
the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping
the Economic Impact”.
3. In the defense industry alone, the number of known counterfeit electronic
products more than doubled from 2005 to 2008, according to a U.S.
Commerce Department report released in January 2010.
4
5
Where Does IP Theft Occur?
1. Asset Creation Stage
• When an asset is created, how does your company track its various pieces and
components?
• Do those involved in its creation understand the importance of how the asset is
moved?
• When does an asset get logged into your current tracking system?
2. Asset Transfer Stage
• From one person to another in the same building
• From one country to another
3. Asset Disposal Stage
1 . Process for disposal
2 . Evidence of disposal
6
Two Common but Inadequate
ways to track Product Samples
System 1: Manual Tracking Via Spreadsheets
1. Inability to Scale: Spreadsheets tend to get bloated once your tracking
hundreds (or even thousands) of distinct SKUs
2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of
each asset, which can lead to errors and missing information
3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to
an earlier state, it could mean the deletion of critical tracking information
System 2: Homegrown Asset Tracking System
1. Rigid and Unadaptable
2. Can Become Outdated: A high price tag combined with a non-flexible system
means that the system can become outdated and no longer meet the full
needs of team members
3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can
sometimes be hard to share tracking information with vendors and other
3rd parties that don’t have direct access to the software
7
Why Consider Using a Robust
Asset Management system
1 . Track product samples, Where, What, and Who, throughout
the Life Cycle
2 . Track chain of custody. Enforce Accountability
3 . Keep asset history, disposal record
4 . Web based – access from anywhere
5 . Mobile – use smartphone to search, update, and transfer
assets
8
5 Ways eQuip! can Transform the
process for Managing Product Samples
1. Easily Transfer or Issue Property to a Custodian
2. Automatically Record the Transaction History Transaction of an Asset
3. Know Where Your Assets Are Physical Located at All Times
4. Easily Photograph and Record Asset Images
5. Manage the Complete Asset Lifecycle with Web and Mobile Application
9
Easily Transfer or Issue Property
to a Custodian
Signature 1: The new IP custodian acknowledging
receipt (and ownership) of the IP property
Signature 2: The former IP custodian
acknowledging that
Once a custodian has signed the transfer
agreement, an email notification is automatically
sent to any designators “approvers.”
10
Automatically Record Asset
Transaction History
• When an entry modification was made
• Who made the entry modification
• The time and date of the modification
• The archival of old values
• Recording of any new values
11
Know Where Your Assets Are at
All Times
12
Photograph and Record Asset
Images
13
Manage with both Web and
Mobile Applications
14
Want to Learn more about how eQuip!
can help protecting IP samples?
1. Visit our website (www.e-isg.com)
2. Visit our blog (blog.e-isg.com)
3. Call 1-866-845-2416 to speak to our asset management experts
4. Request a software demo be emailing to Contact@e-isg.com

Más contenido relacionado

Similar a Transform process to protect product samples embedded with intellectual property

Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)Brian Brazil
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxWaterFalls2
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using BlockchainIRJET Journal
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainPaul Hofmann
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Raw honey report
Raw honey reportRaw honey report
Raw honey reportaae
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 

Similar a Transform process to protect product samples embedded with intellectual property (20)

IOT ppt1.pptx
IOT ppt1.pptxIOT ppt1.pptx
IOT ppt1.pptx
 
Blockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfBlockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdf
 
IoT_IT_Unit1.pdf
IoT_IT_Unit1.pdfIoT_IT_Unit1.pdf
IoT_IT_Unit1.pdf
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)
 
UNIT IV.pptx
UNIT  IV.pptxUNIT  IV.pptx
UNIT IV.pptx
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
 
Iot for food business
Iot for food businessIot for food business
Iot for food business
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Raw honey report
Raw honey reportRaw honey report
Raw honey report
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
 

Más de Jackie Luo

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset ManagementJackie Luo
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Jackie Luo
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesJackie Luo
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolJackie Luo
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset managementJackie Luo
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesJackie Luo
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemJackie Luo
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Jackie Luo
 

Más de Jackie Luo (8)

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal grantees
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management tool
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset management
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal grantees
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten System
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...
 

Último

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Transform process to protect product samples embedded with intellectual property

  • 1. Transform the Process to Protect the Product Samples Embedded with Intellectual Property E-ISG Asset Intelligence (www.e-isg.com) October, 2017
  • 2. 2 Global Scope of Intellectual Property IP theft stretches across a multitude of industries, from consumer goods and manufacturing, to movies, music and software. Anything that can be trademarked is susceptible to IP theft. 1. Trademark intensive industries are largest in number and contribute the most employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010). 2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30% from $5.06 trillion in 2010.
  • 3. 3 Cost of IP Theft 1. According to U.S. Department of Homeland Security, Intellectual Property Rights Seizures statistics, in 2014, total number of IPR related seizures was 55.7 Million and the total value of IPR related seizures (MRSP) was $250 Billion. 2. Up to 5% of goods imported into the European Union are fakes, according to the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact”. 3. In the defense industry alone, the number of known counterfeit electronic products more than doubled from 2005 to 2008, according to a U.S. Commerce Department report released in January 2010.
  • 4. 4
  • 5. 5 Where Does IP Theft Occur? 1. Asset Creation Stage • When an asset is created, how does your company track its various pieces and components? • Do those involved in its creation understand the importance of how the asset is moved? • When does an asset get logged into your current tracking system? 2. Asset Transfer Stage • From one person to another in the same building • From one country to another 3. Asset Disposal Stage 1 . Process for disposal 2 . Evidence of disposal
  • 6. 6 Two Common but Inadequate ways to track Product Samples System 1: Manual Tracking Via Spreadsheets 1. Inability to Scale: Spreadsheets tend to get bloated once your tracking hundreds (or even thousands) of distinct SKUs 2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of each asset, which can lead to errors and missing information 3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to an earlier state, it could mean the deletion of critical tracking information System 2: Homegrown Asset Tracking System 1. Rigid and Unadaptable 2. Can Become Outdated: A high price tag combined with a non-flexible system means that the system can become outdated and no longer meet the full needs of team members 3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can sometimes be hard to share tracking information with vendors and other 3rd parties that don’t have direct access to the software
  • 7. 7 Why Consider Using a Robust Asset Management system 1 . Track product samples, Where, What, and Who, throughout the Life Cycle 2 . Track chain of custody. Enforce Accountability 3 . Keep asset history, disposal record 4 . Web based – access from anywhere 5 . Mobile – use smartphone to search, update, and transfer assets
  • 8. 8 5 Ways eQuip! can Transform the process for Managing Product Samples 1. Easily Transfer or Issue Property to a Custodian 2. Automatically Record the Transaction History Transaction of an Asset 3. Know Where Your Assets Are Physical Located at All Times 4. Easily Photograph and Record Asset Images 5. Manage the Complete Asset Lifecycle with Web and Mobile Application
  • 9. 9 Easily Transfer or Issue Property to a Custodian Signature 1: The new IP custodian acknowledging receipt (and ownership) of the IP property Signature 2: The former IP custodian acknowledging that Once a custodian has signed the transfer agreement, an email notification is automatically sent to any designators “approvers.”
  • 10. 10 Automatically Record Asset Transaction History • When an entry modification was made • Who made the entry modification • The time and date of the modification • The archival of old values • Recording of any new values
  • 11. 11 Know Where Your Assets Are at All Times
  • 12. 12 Photograph and Record Asset Images
  • 13. 13 Manage with both Web and Mobile Applications
  • 14. 14 Want to Learn more about how eQuip! can help protecting IP samples? 1. Visit our website (www.e-isg.com) 2. Visit our blog (blog.e-isg.com) 3. Call 1-866-845-2416 to speak to our asset management experts 4. Request a software demo be emailing to Contact@e-isg.com