Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Transform process to protect product samples embedded with intellectual property

1,059 views

Published on

Intellectual Property theft frequently occurred when product samples are being stolen during the development stage. Instituting better asset management process can prevent that.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Transform process to protect product samples embedded with intellectual property

  1. 1. Transform the Process to Protect the Product Samples Embedded with Intellectual Property E-ISG Asset Intelligence (www.e-isg.com) October, 2017
  2. 2. 2 Global Scope of Intellectual Property IP theft stretches across a multitude of industries, from consumer goods and manufacturing, to movies, music and software. Anything that can be trademarked is susceptible to IP theft. 1. Trademark intensive industries are largest in number and contribute the most employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010). 2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30% from $5.06 trillion in 2010.
  3. 3. 3 Cost of IP Theft 1. According to U.S. Department of Homeland Security, Intellectual Property Rights Seizures statistics, in 2014, total number of IPR related seizures was 55.7 Million and the total value of IPR related seizures (MRSP) was $250 Billion. 2. Up to 5% of goods imported into the European Union are fakes, according to the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact”. 3. In the defense industry alone, the number of known counterfeit electronic products more than doubled from 2005 to 2008, according to a U.S. Commerce Department report released in January 2010.
  4. 4. 4
  5. 5. 5 Where Does IP Theft Occur? 1. Asset Creation Stage • When an asset is created, how does your company track its various pieces and components? • Do those involved in its creation understand the importance of how the asset is moved? • When does an asset get logged into your current tracking system? 2. Asset Transfer Stage • From one person to another in the same building • From one country to another 3. Asset Disposal Stage 1 . Process for disposal 2 . Evidence of disposal
  6. 6. 6 Two Common but Inadequate ways to track Product Samples System 1: Manual Tracking Via Spreadsheets 1. Inability to Scale: Spreadsheets tend to get bloated once your tracking hundreds (or even thousands) of distinct SKUs 2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of each asset, which can lead to errors and missing information 3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to an earlier state, it could mean the deletion of critical tracking information System 2: Homegrown Asset Tracking System 1. Rigid and Unadaptable 2. Can Become Outdated: A high price tag combined with a non-flexible system means that the system can become outdated and no longer meet the full needs of team members 3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can sometimes be hard to share tracking information with vendors and other 3rd parties that don’t have direct access to the software
  7. 7. 7 Why Consider Using a Robust Asset Management system 1 . Track product samples, Where, What, and Who, throughout the Life Cycle 2 . Track chain of custody. Enforce Accountability 3 . Keep asset history, disposal record 4 . Web based – access from anywhere 5 . Mobile – use smartphone to search, update, and transfer assets
  8. 8. 8 5 Ways eQuip! can Transform the process for Managing Product Samples 1. Easily Transfer or Issue Property to a Custodian 2. Automatically Record the Transaction History Transaction of an Asset 3. Know Where Your Assets Are Physical Located at All Times 4. Easily Photograph and Record Asset Images 5. Manage the Complete Asset Lifecycle with Web and Mobile Application
  9. 9. 9 Easily Transfer or Issue Property to a Custodian Signature 1: The new IP custodian acknowledging receipt (and ownership) of the IP property Signature 2: The former IP custodian acknowledging that Once a custodian has signed the transfer agreement, an email notification is automatically sent to any designators “approvers.”
  10. 10. 10 Automatically Record Asset Transaction History • When an entry modification was made • Who made the entry modification • The time and date of the modification • The archival of old values • Recording of any new values
  11. 11. 11 Know Where Your Assets Are at All Times
  12. 12. 12 Photograph and Record Asset Images
  13. 13. 13 Manage with both Web and Mobile Applications
  14. 14. 14 Want to Learn more about how eQuip! can help protecting IP samples? 1. Visit our website (www.e-isg.com) 2. Visit our blog (blog.e-isg.com) 3. Call 1-866-845-2416 to speak to our asset management experts 4. Request a software demo be emailing to Contact@e-isg.com

×