SlideShare a Scribd company logo
A SUPPLY CHAIN SECURITY SOLUTION:
PRISM (PROVENANCE IDENTIFICATION
SYSTEM FOR MARIJUANA)
© Source Certain International Pty Ltd - 2017
DISCLAIMER AND LEGAL MATTERS
2Confidential © SCI 2017
• Purpose of presentation: This presentation has been prepared by Source Certain International Pty Ltd (Source Certain). It is intended for prospective clients and for
providing high-level background information on Source Certain and its operations.
• Nature of presentation: This presentation is not a product disclosure statement or other disclosure document. This presentation does not purport to contain all of the
information that a prospective customer may require to make an evaluation of Source Certain or its business activities and nothing in this presentation is, or is intended to
be, a recommendation to a prospective client of Source Certain.
• Disclaimer: Neither Source Certain nor its officers, employees, contractors or advisers make any warranty (express or implied) as to the accuracy, reliability, relevance or
completeness of the material contained in this presentation. Nothing contained in this presentation is, or may be relied upon as a promise, representation or warranty,
whether as to the past or the future. Source Certain excludes all warranties that can be excluded by law. Except for statutory liability which cannot be excluded, Source
Certain, its officers, employees, contractors and advisers expressly disclaim any responsibility for the accuracy or completeness of the material contained in this
presentation and exclude all liability whatsoever (including in negligence) for any loss or damage which may be suffered by any person as a consequence of any
information in this presentation or any error or omission therefrom.
• Proprietary information and copyright: This presentation and the information it contains is proprietary to Source Certain. Source Certain holds the copyright in this
presentation. Except as permitted under the Copyright Act 1968 (Cth), this presentation or any part thereof may not be reproduced without its written permission.
WHO & WHAT IS SOURCE CERTAIN
Confidential © SCI 2017 3
• Source Certain is a global service business with global access
to use the unique TSW TraceTM provenance (origin) process.
This process comprises;
a) Highly experienced and globally recognised
forensic investigators and analytical scientists.
b) Use of state of the art laboratory and analytical
instrumentation to test products.
c) A well established and recognised process for
profiling (fingerprinting) products to determine or
verify origin.
• Source Certain substantiates the source of products and
delivers “Verified Supply Chain Integrity”.
• Source Certain, by providing accuracy, clarity and
transparency of origin claims builds confidence in supply
chains. This confidence enhances brand and assists in
management of brand reputation risks.
• Source Certain can help develop confidence for all supply
chain stakeholders and critically helps build trust with the
consumer.
• Source Certain offers a real, science based, security solution
for supply chains to combat fraud and substitution.
SOURCE CERTAIN VALUE PROPOSITIONS:
BRAND ENHANCEMENT AND PROTECTION
Confidential © SCI 2017 4
Risk Management –
Assists with Managing Recall & Crisis, Supply Chain Threats
(EMA, EMS, Fraud), System Verification
Supply Chain Security –
Surveillance
Builds Trust with Consumers –
Connects and communicates with consumers
Compliance-
Satisfy regulatory or other statutory requirements with respect
to origin verification and declarations
VERIFIEDSUPPLYCHAININTEGRITY
HOW WE DO IT - REAL VERIFICATION
5Confidential © SCI 2017
A ROBUST SCIENTIFIC METHOD FOR THE
DETERMINATION OF PROVENANCE
SOURCE CERTAIN FOOD ORIGIN
TECHNOLOGY
What is TSW Trace TM
TSW TraceTM has
been developed by
TSW Scientists over
the past 30 years.
TSW TraceTM is a
method that robustly
determines the
provenance of an
item.
TSW TraceTM uses a
variety of scientific
approaches to
determine the
fingerprint of a sample
and link it to its origin.
TSW TraceTM is
routinely employed as
a Forensic tool and is
delivered by Expert
Forensic Chemists
and Investigators.
Confidential © SCI 2017 6
Every substance, whether
natural or synthetic, is not
pure and will contain a
cocktail of “contaminants” in
concentrations that range
from single atoms or
molecules to percentages.
SOURCE CERTAIN HAS EXCLUSIVE, GLOBAL LICENSE FOR APPLICATION OF
TSW TRACE™
Elemental Fingerprinting
TM
BROAD APPLICATION
Confidential © SCI 2017 7
Gold, Diamonds, Precious & Conflict Metals
•Routinely applied to tracing stolen gold or diamonds back to their mine of origin.
In addition, the method is used to determine if a Diamond is synthetic and
investigate commodities sourced from conflict zones (blood diamonds) and
assist to provide basis for integrity promises such as welfare practices (e.g child
or slave labour).
Scene of Crime Investigations
•The TSW forensic science services team undertake routine forensic
investigations which employ the TSW TraceTM method. Typical example include
the analysis and profiling of scene of crime evidence. E.g paint, glass, bullets or
metal fragments.
Drugs and Pharmaceuticals
•The TSW TraceTM method can be used to trace the origin of drugs. For example
the growing location of Marijuana or alternatively the batch of a particular
pharmaceutical.
Food
•The TSW TraceTM determines the provenance (origin) of a food including its
production system (e.g Free Range v Cage Eggs). This method has been
employed successfully to provide rapid traceability of meat (36 hours) back to
farm of origin and also complete investigations into food substitution and
mislabeling.
TM
LONG HISTORY
8Confidential © SCI 2017
• First applied nearly 40 years ago in South
Africa to establish the provenance of
sediments from ocean floor sampling.
• First publication in gold was over 30 years
ago.
• Pioneered by TSW Founder John Watling.
• Routinely used in Gold Investigations to
establish if gold has come from a
particular mine or mineralising event.
EXPERT LEVEL SERVICE
• The team that deliver this service have
collectively over 100 years of forensic analytical
experience.
• The method has been published extensively in
peer reviewed publications.
• In addition to this academic publication the team
also have a chapter in Expert Evidence (a globally
recognised treatise on forensic sciences used in
the courtroom).
• The team are currently preparing a second
chapter for this treatise and have also been
invited to contribute in the future on food forensics
and tracing items (food, products etc) back to
origin.
Confidential © SCI 2017 9
Confidential © SCI 2017 10
SOURCE CERTAIN SERVICE VALUE
SCI SERVICE vs PACKAGING-BASED SYSTEMS
Through TSW TraceTM, SCI provides REAL verification of an items
(e.g foods’) origin or source.
– SCI takes the cannabis or cannabis product itself, and verifies that the
actual product gets from source to consumers.
– The team delivering TSW TraceTM access cutting edge chemical
analysis technology to identify key markers which are used to
determine a unique ‘fingerprint’ that is a representation of the
cannabis discrete production source, and also how the item may have
been produced.
– This is the fundamental difference and major advantage that an SCI
service provides over traceability strategies that rely on packaging-
based security alone.
TSW TraceTM technology, as part of a SCI service, enables verification that the
actual product that has travelled through the defined supply chain can be
physically linked, through chemical analysis, to its production source or origin.
This Verification assurance is independent of any labels on
packaging.
TM
Confidential © SCI 2017 11
Paper-based quality control
and quality assurance
traceability systems
Unique-to-product barcode
or other labelling
Trackable QR code scanning
to connect consumers with
product information
Security packaging seals
SOURCE CERTAIN SERVICE VALUE
SCI SERVICE vs PACKAGING-BASED SYSTEMS
Packaging-based
traceability security
systems examples:
Packaging-based traceability systems in no
way lay claim to the integrity or authenticity of
the actual food product, only the packaging.
• The product packaging itself and any traceability
information (labels, barcodes, QR codes) can be
copied in implementation of counterfeiting
strategies.
• There is inherent potential for label duplication or
substitution, including:
– Direct duplication of ‘unique’ QR or
barcodes,
– Creation of false codes on duplicated
packaging linking consumers to different and
unrelated source verification information, or
– Substitution or adulteration of a product
through re-packaging false or fake product
inside ‘authentic’ and ‘unique’ packaging.
• Not all products are sold in packaging.
WHAT DOES SOURCE CERTAIN BRING TO
SUPPLY CHAINS?
Confidential © SCI 2017 12
ORIGINS
CONSUMERS
& MARKET
Transparency & Integrity
Confidence & Trust
SOURCE CERTAIN SERVICES
Confidential © SCI 2017 13
Source Certain Services fall within one of three categories:
- Compliance with a Source
Verification Standard
- Statement of Compliance
for production sources
Verifiable supply chain
integrity:
- Source Check
- Source Secure
- Source Certified
- Support service
- Food Fraud Investigation
Unit
14
SOURCE CERTAIN SERVICES
1. SOURCE CONNECT
STATEMENT OF COMPLIANCE
SC1000:2016
Confidential © SCI 2017
• Source Connect enables suppliers with large or open supply chains
and little to no control or visibility to all segments of the supply chain
to implement a strategy that enables verification of production
source.
• Source Connect is designed for suppliers who wish to communicate
to third party business buyers and regulators that they have
invested in the effort to provide origin verification capability for their
products.
• Once set-up requirements of the SC1000 Source Verification
Standard have been complied with, the Supplier is issued with a
Statement of Compliance.
• The SC1000 Source Verification Standard sets a minimum source
verification capability requirement for product supply chains.
– Capacity to complete a Verification request as to whether the product’s
origin matches the stated production source at any point in the supply
chain.
– Individual product Verifications requested by supplier-permitted users.
SOURCE CERTAIN SERVICES
2. SUPPLY CHAIN SECURITY
Confidential © SCI 2017 15
EXTERNAL COMMUNICATION
• Value adding, mass communication options
available.
• Communicate that supply chain is secure.
CONSUMER COMMUNICATION
• Add-on to Source Secure Service.
• Consumer facing, on product, Source Certified
trademark.
• Dynamic communication option for consumer
regarding service and source of food specific
to product and supply chain.
INTERNAL COMMUNICATION
• No external (consumer engaging
Communication.
• Risk Management
• QA / QC
Source
Check
• Brand differential and
value creation
Source
Secure
• Dynamic consumer
communications
Source
Certified
SOURCE CERTAIN SERVICES
SOURCE CHECK
• Random verification of existing systems (traceability and
management).
• Internal supply chain service only – NO external
communication to customers.
• QA type approach.
• Example: processed food product of which verification of a
batch ID is required. An investigation service could be
added on at any time also to facilitate the determination of
a product’s traceability.
Confidential © SCI 2017 16
Confidential © SCI 2017 17
• Standard, recommended service.
• A high integrity supply chain solution.
• Comprised of random verification of provenance claims across
all segments of the supply chain.
• Security, education, and communication strategy implemented
across all supply chain segments.
• All stakeholders of supply chain are on notice of security
strategy and program in place within supply chain.
• External communication options available: B2B
communication, mass communication to consumer
SOURCE CERTAIN SERVICES
SOURCE SECURE
Confidential © SCI 2017 18
• Includes all Source Secure service features.
• Access to license for use of the consumer-facing
Source Certified certification trademark.
– Must comply with established criteria and rules for
use.
• The highest level of scrutiny for the supply chain
with consequences for non-verified samples,
delivering ultimate security and in turn transparency
to all stakeholders.
– Additional requirements for follow-up of non-
verified samples with respect to the mark, and
further use of the mark.
• Program registered on SCI website for consumer
access.
SOURCE CERTAIN SERVICES
SOURCE CERTIFIED
• Unique combination of investigation, scientific and
digital forensic expertise.
• Applicable to almost any food fraud, food
contamination or supply chain based investigation.
19
Forensic
Science
Investigation
Digital
Forensics
SOURCE CERTAIN SERVICES
3. SOURCE INVESTIGATION
Confidential © SCI 2017
SOURCE CERTAIN MARIJUANA / CANNABIS SERVICE
Confidential © SCI 2017 20
A MOVE FROM ILLEGAL TO DECRIMINALISED
BUT REGULATED
• There are many drivers for the move of Cannabis (Marijuana and Marijuana
products) from completely illegal to regulated (but legal).
• On the recreational side this may be a pure tax revenue driver or be more
philosophical and a policy to take this supply chain out of organised criminal
hands.
• On the medical side this may be as simple as providing a legitimate way for
patients to access a treatment.
• Irrespective of the driver, historically the supply chain for marijuana and its
products is rooted underground and controlled often by criminals and in some
cases by organised criminal organisations.
• We cannot take our eye of the fact that some of these criminal organisations
will fight for and find ways to protect that business.
Confidential © SCI 2017 21
CONTROLLING THE SUPPLY CHAIN IS
CRITICAL
• Regardless of the driver or the end use the successful move from illegal to
regulated will be on the back of being able to suitably control the various
supply chains.
• Almost all compliance related activities that will enable control are underpinned
by knowing the Source for the marijuana or its products.
• It will be this source being licensed or registered and the compliance of this
source (e.g growing facility) that will make the product legal.
• All safety (e.g chemical residues or heavy metals) requirements and
compliance for the product will also be delivered by to the source.
• Knowing where the marijuana comes from and being able to confirm this is
critical to the integrity of the overall supply chain.
• It will be the control of the regulated supply chain (through compliance) that will
provide confidence to the community which builds integrity and trust in the
overall shift of marijuana from illegal to regulated.
Confidential © SCI 2017 22
MARIJUANA CULTIVATION REGULATION
MODEL: EXAMPLE
Confidential © SCI 2017 23
Regulated
Cannabis
Industry
Non-
Licensed
Caregiver
(Medicinal
Cannabis)
Personal
Grow
Licensed
Medicinal
Cannabis
Recreational
Cannabis
REGULATED (LEGAL) MARIJUANA INDUSTRY
Illegal
Cultivation
(Black Market)
THE THREAT OF BLACK MARKET MARIJUANA
OR NOT CONTROLLING THE SUPPLY CHAIN
• It is reasonable for the community to ask if
the illegal marijuana is coming from a legal
growing facility.
• Not being able to confirm the source of
seized marijuana does leave the the
question un-answered, does it come from
the legal supply chain?
• Actually impacting the prevalence of the
black market is likely outside the scope of
the regulator for the legal supply chain but
for community confidence, the legal supply
chain must make it possible to confirm that
seized, illegal material hasn’t come from
inside their supply chain - transparency
• With decriminalisation policies it is possible
to create a place where illegal activity can
hide in plain site.
Confidential © SCI 2017 24
https://www.washingtonpost.com/news/wonk/wp/2016/08/04/t
he-dea-warns-marijuana-grow-spots-are-the-new-meth-
houses/
RESPONSIBILITIES OF STAKEHOLDERS
• Regardless of the model and the drivers for making marijuana legal all stakeholders that benefit,
including governments, need to own the responsibility for making sure that the legal supply chain is
transparent and can be verified.
• All of these stakeholders are asking the community to trust them. Transparency is a reasonable
expectation.
• All stakeholders have significant businesses to lose if it is not under control and the only solution is to
default back to it being illegal.
Confidential © SCI 2017 25
NEW
INDUSTRY
Growers
Retailers
Processors
Support
Services
Government
/ Regulator
TRUST
Confidential © SCI 2017 26
PRISM SERVICE FEATURES
A SECURE SUPPLY CHAIN FROM GROWER TO
CONSUMER
Supply chain for legal distribution for
marijuana and products is known – SUPPLY
CHAIN DEFINITION
Origin of product from anywhere within
this known and defined sample chain
can be scientifically verified– VERFIED
SUPPLY CHAIN INTEGRITY
Product from outside the supply chain can
be scientifically verified as not being from
known, registered source – SUPPLY CHAIN
SECURITY
Transparency
Confidence
Trust
EXAMPLE OF COVERED SUPPLY CHAIN
Confidential © SCI 2017 27
Licensed
Growing
Locations
Cultivation Location
(Licensed Grower)
Licensed
Recreation
al &
Medical
Retail
Retail
Licensed
Processors
(Oil)
Production Facility
Consumers
SECURE
SECURE
VERIFED
SERVICE OUTPUT: VERIFICATION SAMPLE
FROM A LICENSED RETAIL OUTLET
Confidential © SCI 2017 28
Licensed
Growing
Locations
Cultivation Location
(Licensed Grower)
YES
VERIFIED
LOCATION ID
No
Seizure: Subject
Marijuana Product
INTEL OUTPUT
LINKAGE OF SUBJECT
SAMPLES
INTEL OUTPUT
NB: Subject to Program
Implementation
POSSSIBLE INTEL
OUTPUT
- Indication of region of
origin
- Indication of likelihood
sample is from macro
region (e.g State or
Country)
NOT FROM
LICENSED GROWER
Licensed Retail
Verification Sample
Licensed Retail
Verification Sample
Supply Chain Verified
Black Market Product
in Legal Supply Chain
SERVICE OUTPUT: SEIZED SAMPLE
INVESTIGATION / VERIFICATION
Confidential © SCI 2017 29
Licensed
Growing
Locations
Cultivation Location
(Licensed Grower)
YES
LOCATION ID
No
Seizure: Subject
Marijuana Product
INTEL OUTPUT
LINKAGE TO OTHER SUBJECT
SAMPLES
INTEL OUTPUT
NB: Subject to Program
Implementation
POSSSIBLE INTEL
OUTPUT
- Indication of region of
origin
- Indication of likelihood
sample is from macro
region (e.g State or
Country)
NOT FROM
LICENSED GROWER
Seizure: Subject
Marijuana Product
Seizure: Subject Marijuana
Product
Diversion from licensed
supply chain to black market.
Black Market Product
– Outside of Licensed
Supply Chain
Legal
Supply
Chain
Verification of supply chain from licensed growers
and processors to licensed retail distribution.
Ability to verify that seized product is not from from
licensed growers or processors.
Black
Market
Identification of Black Market or Illegal Grow
product inside legal supply chain.
Identification if Black Market or Illegally sold
product has come from the legal supply chain
(diversion).
Confidential © SCI 2017 30
SERVICE OUTPUT SUMMARY: VERIFICATION
DRIVEN TRANSPARENCYAND INTEGRITY
SUMMARY
• The PrISM service has been designed to offer maximum coverage.
• Because of this, the program has flexibility with respect to what objectives want
to be satisfied and how the value may be best realised.
• Specific investigations can be built from the service at any time.
• The verification or unknown testing aspect of the service can be tailored
depending on where the focus needs to be to achieve best outcomes. E.g
could be seized samples.
• PrISM can be applied to all aspects of the regulated marijuana supply chain.
Confidential © SCI 2017 31
NEXT STEPS
• If a Source Certain service is
suitable then the next step is to
connect with one of the SCI team
who will understand your supply
chain and expectations of the
service.
• The team will then craft a service
proposal and presentation for your
application.
• If you have specific technical
queries you can be connected to
the SCI technical team to discuss
specific applications.
Confidential © SCI 2017 32
MORE INFORMATION
33Confidential © SCI 2017
CORPORATE OFFICE (SINGAPORE)
7 Temasek Boulevard
Suntec Tower One, 44th Floor
SINGAPORE 038987
Call: +65 6430 6626
Customer Service Locations
AUSTRALIA
2/27 Clark Court
Bibra Lake WA 6163
Free Call: 1300 872 233
UNITED STATES
2801 Grand, Suite B
Grand Junction CO 81501
Call: (970) 245-9410
MORE INFORMATION
www.sourcecertain.com
CONTACT
Email Enquiries: info@sourcecertain.com

More Related Content

Viewers also liked

2017 Microsoft Hosting and Cloud study. By 451 Research.
2017 Microsoft Hosting and Cloud study. By 451 Research.2017 Microsoft Hosting and Cloud study. By 451 Research.
2017 Microsoft Hosting and Cloud study. By 451 Research.
Hameed Mohammed
 
Design pattern-refactor-functional
Design pattern-refactor-functionalDesign pattern-refactor-functional
Design pattern-refactor-functional
Kfir Bloch
 
Protocolo de estado epileptico
Protocolo de estado epilepticoProtocolo de estado epileptico
Protocolo de estado epileptico
David Barreto
 
第51回NDS PostgreSQLのデータ型 #nds51
第51回NDS PostgreSQLのデータ型 #nds51第51回NDS PostgreSQLのデータ型 #nds51
第51回NDS PostgreSQLのデータ型 #nds51
civicpg
 
Cours Prestashop 1.6 / Webbax - Ecole club Migros
Cours Prestashop 1.6 / Webbax - Ecole club MigrosCours Prestashop 1.6 / Webbax - Ecole club Migros
Cours Prestashop 1.6 / Webbax - Ecole club Migros
Germain Tenthorey
 
Drupal Developer Days Keynote
Drupal Developer Days KeynoteDrupal Developer Days Keynote
Drupal Developer Days Keynote
Angela Byron
 
条件式評価器の実装による管理ツールの抽象化
条件式評価器の実装による管理ツールの抽象化条件式評価器の実装による管理ツールの抽象化
条件式評価器の実装による管理ツールの抽象化
Takuya Ueda
 
An intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECSAn intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECS
Yevgeniy Brikman
 

Viewers also liked (8)

2017 Microsoft Hosting and Cloud study. By 451 Research.
2017 Microsoft Hosting and Cloud study. By 451 Research.2017 Microsoft Hosting and Cloud study. By 451 Research.
2017 Microsoft Hosting and Cloud study. By 451 Research.
 
Design pattern-refactor-functional
Design pattern-refactor-functionalDesign pattern-refactor-functional
Design pattern-refactor-functional
 
Protocolo de estado epileptico
Protocolo de estado epilepticoProtocolo de estado epileptico
Protocolo de estado epileptico
 
第51回NDS PostgreSQLのデータ型 #nds51
第51回NDS PostgreSQLのデータ型 #nds51第51回NDS PostgreSQLのデータ型 #nds51
第51回NDS PostgreSQLのデータ型 #nds51
 
Cours Prestashop 1.6 / Webbax - Ecole club Migros
Cours Prestashop 1.6 / Webbax - Ecole club MigrosCours Prestashop 1.6 / Webbax - Ecole club Migros
Cours Prestashop 1.6 / Webbax - Ecole club Migros
 
Drupal Developer Days Keynote
Drupal Developer Days KeynoteDrupal Developer Days Keynote
Drupal Developer Days Keynote
 
条件式評価器の実装による管理ツールの抽象化
条件式評価器の実装による管理ツールの抽象化条件式評価器の実装による管理ツールの抽象化
条件式評価器の実装による管理ツールの抽象化
 
An intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECSAn intro to Docker, Terraform, and Amazon ECS
An intro to Docker, Terraform, and Amazon ECS
 

Similar to Introducing Source Certain - A Supply Chain Integrity and Security Solution for Cannabis (PrISM)

Supply Chain Integrity - An Opportunity
Supply Chain Integrity - An Opportunity Supply Chain Integrity - An Opportunity
Supply Chain Integrity - An Opportunity
Cameron Scadding
 
FRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIES
FRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIESFRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIES
FRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIES
Cameron Scadding
 
Announcing the TSW Analytical Investigations Unit
Announcing the TSW Analytical Investigations Unit Announcing the TSW Analytical Investigations Unit
Announcing the TSW Analytical Investigations Unit
Dom Blackshaw
 
TSW Investigations Unit (Email Version)
TSW Investigations Unit (Email Version)TSW Investigations Unit (Email Version)
TSW Investigations Unit (Email Version)
Dom Blackshaw
 
Does Serialization Compliance Equal Brand Protection?
Does Serialization Compliance Equal Brand Protection?Does Serialization Compliance Equal Brand Protection?
Does Serialization Compliance Equal Brand Protection?
Shari Popovich
 
Gdp
GdpGdp
SAP EquityBrch
SAP EquityBrchSAP EquityBrch
SAP EquityBrch
Michael Greenhouse
 
Services Guide
Services GuideServices Guide
Services Guide
avanella
 
Consultancy Services
Consultancy ServicesConsultancy Services
Consultancy Services
Manoj VM
 
Rqs aisl company profile-rev.11
Rqs aisl company profile-rev.11Rqs aisl company profile-rev.11
Rqs aisl company profile-rev.11
lester ifill
 
Isabelle moeller biometrics institute presentation for Nesta
Isabelle moeller   biometrics institute presentation for NestaIsabelle moeller   biometrics institute presentation for Nesta
Isabelle moeller biometrics institute presentation for Nesta
Nesta
 
Ethics and integrity policy
Ethics and integrity policyEthics and integrity policy
Ethics and integrity policy
Akilimingi
 
New February 2016
New February 2016New February 2016
New February 2016
Spectro Group of Companies
 
Metrology for Identity and Other Nominal Properties
Metrology for Identity and Other Nominal PropertiesMetrology for Identity and Other Nominal Properties
Metrology for Identity and Other Nominal Properties
nist-spin
 
Background Check Group Profile
Background Check Group Profile Background Check Group Profile
Background Check Group Profile
Background Check Group
 
POVIGY - ONE_PAGER - JUL2016
POVIGY - ONE_PAGER - JUL2016POVIGY - ONE_PAGER - JUL2016
POVIGY - ONE_PAGER - JUL2016
Enrique Villa
 
Innovative Policies: Using ACO Principles and Financial Incentives to Improve...
Innovative Policies: Using ACO Principles and Financial Incentives to Improve...Innovative Policies: Using ACO Principles and Financial Incentives to Improve...
Innovative Policies: Using ACO Principles and Financial Incentives to Improve...
AHRQ Health Care Innovations Exchange
 
Andwin Clinical Supplies Management
Andwin Clinical Supplies Management Andwin Clinical Supplies Management
Andwin Clinical Supplies Management
Andrew Billimore
 
Alpes strategie v5
Alpes strategie v5Alpes strategie v5
Alpes strategie v5
Elysée (Elisha) Attia
 
Bsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochureBsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochure
Udomsak Suntithikavong
 

Similar to Introducing Source Certain - A Supply Chain Integrity and Security Solution for Cannabis (PrISM) (20)

Supply Chain Integrity - An Opportunity
Supply Chain Integrity - An Opportunity Supply Chain Integrity - An Opportunity
Supply Chain Integrity - An Opportunity
 
FRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIES
FRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIESFRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIES
FRAUD IN SUPPLY CHAINS: THE RISKS, THE SOLUTIONS AND THE OPPORTUNITIES
 
Announcing the TSW Analytical Investigations Unit
Announcing the TSW Analytical Investigations Unit Announcing the TSW Analytical Investigations Unit
Announcing the TSW Analytical Investigations Unit
 
TSW Investigations Unit (Email Version)
TSW Investigations Unit (Email Version)TSW Investigations Unit (Email Version)
TSW Investigations Unit (Email Version)
 
Does Serialization Compliance Equal Brand Protection?
Does Serialization Compliance Equal Brand Protection?Does Serialization Compliance Equal Brand Protection?
Does Serialization Compliance Equal Brand Protection?
 
Gdp
GdpGdp
Gdp
 
SAP EquityBrch
SAP EquityBrchSAP EquityBrch
SAP EquityBrch
 
Services Guide
Services GuideServices Guide
Services Guide
 
Consultancy Services
Consultancy ServicesConsultancy Services
Consultancy Services
 
Rqs aisl company profile-rev.11
Rqs aisl company profile-rev.11Rqs aisl company profile-rev.11
Rqs aisl company profile-rev.11
 
Isabelle moeller biometrics institute presentation for Nesta
Isabelle moeller   biometrics institute presentation for NestaIsabelle moeller   biometrics institute presentation for Nesta
Isabelle moeller biometrics institute presentation for Nesta
 
Ethics and integrity policy
Ethics and integrity policyEthics and integrity policy
Ethics and integrity policy
 
New February 2016
New February 2016New February 2016
New February 2016
 
Metrology for Identity and Other Nominal Properties
Metrology for Identity and Other Nominal PropertiesMetrology for Identity and Other Nominal Properties
Metrology for Identity and Other Nominal Properties
 
Background Check Group Profile
Background Check Group Profile Background Check Group Profile
Background Check Group Profile
 
POVIGY - ONE_PAGER - JUL2016
POVIGY - ONE_PAGER - JUL2016POVIGY - ONE_PAGER - JUL2016
POVIGY - ONE_PAGER - JUL2016
 
Innovative Policies: Using ACO Principles and Financial Incentives to Improve...
Innovative Policies: Using ACO Principles and Financial Incentives to Improve...Innovative Policies: Using ACO Principles and Financial Incentives to Improve...
Innovative Policies: Using ACO Principles and Financial Incentives to Improve...
 
Andwin Clinical Supplies Management
Andwin Clinical Supplies Management Andwin Clinical Supplies Management
Andwin Clinical Supplies Management
 
Alpes strategie v5
Alpes strategie v5Alpes strategie v5
Alpes strategie v5
 
Bsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochureBsi supply-chain-solutions-overview-brochure
Bsi supply-chain-solutions-overview-brochure
 

Recently uploaded

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 

Recently uploaded (20)

Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 

Introducing Source Certain - A Supply Chain Integrity and Security Solution for Cannabis (PrISM)

  • 1. A SUPPLY CHAIN SECURITY SOLUTION: PRISM (PROVENANCE IDENTIFICATION SYSTEM FOR MARIJUANA) © Source Certain International Pty Ltd - 2017
  • 2. DISCLAIMER AND LEGAL MATTERS 2Confidential © SCI 2017 • Purpose of presentation: This presentation has been prepared by Source Certain International Pty Ltd (Source Certain). It is intended for prospective clients and for providing high-level background information on Source Certain and its operations. • Nature of presentation: This presentation is not a product disclosure statement or other disclosure document. This presentation does not purport to contain all of the information that a prospective customer may require to make an evaluation of Source Certain or its business activities and nothing in this presentation is, or is intended to be, a recommendation to a prospective client of Source Certain. • Disclaimer: Neither Source Certain nor its officers, employees, contractors or advisers make any warranty (express or implied) as to the accuracy, reliability, relevance or completeness of the material contained in this presentation. Nothing contained in this presentation is, or may be relied upon as a promise, representation or warranty, whether as to the past or the future. Source Certain excludes all warranties that can be excluded by law. Except for statutory liability which cannot be excluded, Source Certain, its officers, employees, contractors and advisers expressly disclaim any responsibility for the accuracy or completeness of the material contained in this presentation and exclude all liability whatsoever (including in negligence) for any loss or damage which may be suffered by any person as a consequence of any information in this presentation or any error or omission therefrom. • Proprietary information and copyright: This presentation and the information it contains is proprietary to Source Certain. Source Certain holds the copyright in this presentation. Except as permitted under the Copyright Act 1968 (Cth), this presentation or any part thereof may not be reproduced without its written permission.
  • 3. WHO & WHAT IS SOURCE CERTAIN Confidential © SCI 2017 3 • Source Certain is a global service business with global access to use the unique TSW TraceTM provenance (origin) process. This process comprises; a) Highly experienced and globally recognised forensic investigators and analytical scientists. b) Use of state of the art laboratory and analytical instrumentation to test products. c) A well established and recognised process for profiling (fingerprinting) products to determine or verify origin. • Source Certain substantiates the source of products and delivers “Verified Supply Chain Integrity”. • Source Certain, by providing accuracy, clarity and transparency of origin claims builds confidence in supply chains. This confidence enhances brand and assists in management of brand reputation risks. • Source Certain can help develop confidence for all supply chain stakeholders and critically helps build trust with the consumer. • Source Certain offers a real, science based, security solution for supply chains to combat fraud and substitution.
  • 4. SOURCE CERTAIN VALUE PROPOSITIONS: BRAND ENHANCEMENT AND PROTECTION Confidential © SCI 2017 4 Risk Management – Assists with Managing Recall & Crisis, Supply Chain Threats (EMA, EMS, Fraud), System Verification Supply Chain Security – Surveillance Builds Trust with Consumers – Connects and communicates with consumers Compliance- Satisfy regulatory or other statutory requirements with respect to origin verification and declarations VERIFIEDSUPPLYCHAININTEGRITY
  • 5. HOW WE DO IT - REAL VERIFICATION 5Confidential © SCI 2017 A ROBUST SCIENTIFIC METHOD FOR THE DETERMINATION OF PROVENANCE
  • 6. SOURCE CERTAIN FOOD ORIGIN TECHNOLOGY What is TSW Trace TM TSW TraceTM has been developed by TSW Scientists over the past 30 years. TSW TraceTM is a method that robustly determines the provenance of an item. TSW TraceTM uses a variety of scientific approaches to determine the fingerprint of a sample and link it to its origin. TSW TraceTM is routinely employed as a Forensic tool and is delivered by Expert Forensic Chemists and Investigators. Confidential © SCI 2017 6 Every substance, whether natural or synthetic, is not pure and will contain a cocktail of “contaminants” in concentrations that range from single atoms or molecules to percentages. SOURCE CERTAIN HAS EXCLUSIVE, GLOBAL LICENSE FOR APPLICATION OF TSW TRACE™ Elemental Fingerprinting TM
  • 7. BROAD APPLICATION Confidential © SCI 2017 7 Gold, Diamonds, Precious & Conflict Metals •Routinely applied to tracing stolen gold or diamonds back to their mine of origin. In addition, the method is used to determine if a Diamond is synthetic and investigate commodities sourced from conflict zones (blood diamonds) and assist to provide basis for integrity promises such as welfare practices (e.g child or slave labour). Scene of Crime Investigations •The TSW forensic science services team undertake routine forensic investigations which employ the TSW TraceTM method. Typical example include the analysis and profiling of scene of crime evidence. E.g paint, glass, bullets or metal fragments. Drugs and Pharmaceuticals •The TSW TraceTM method can be used to trace the origin of drugs. For example the growing location of Marijuana or alternatively the batch of a particular pharmaceutical. Food •The TSW TraceTM determines the provenance (origin) of a food including its production system (e.g Free Range v Cage Eggs). This method has been employed successfully to provide rapid traceability of meat (36 hours) back to farm of origin and also complete investigations into food substitution and mislabeling. TM
  • 8. LONG HISTORY 8Confidential © SCI 2017 • First applied nearly 40 years ago in South Africa to establish the provenance of sediments from ocean floor sampling. • First publication in gold was over 30 years ago. • Pioneered by TSW Founder John Watling. • Routinely used in Gold Investigations to establish if gold has come from a particular mine or mineralising event.
  • 9. EXPERT LEVEL SERVICE • The team that deliver this service have collectively over 100 years of forensic analytical experience. • The method has been published extensively in peer reviewed publications. • In addition to this academic publication the team also have a chapter in Expert Evidence (a globally recognised treatise on forensic sciences used in the courtroom). • The team are currently preparing a second chapter for this treatise and have also been invited to contribute in the future on food forensics and tracing items (food, products etc) back to origin. Confidential © SCI 2017 9
  • 10. Confidential © SCI 2017 10 SOURCE CERTAIN SERVICE VALUE SCI SERVICE vs PACKAGING-BASED SYSTEMS Through TSW TraceTM, SCI provides REAL verification of an items (e.g foods’) origin or source. – SCI takes the cannabis or cannabis product itself, and verifies that the actual product gets from source to consumers. – The team delivering TSW TraceTM access cutting edge chemical analysis technology to identify key markers which are used to determine a unique ‘fingerprint’ that is a representation of the cannabis discrete production source, and also how the item may have been produced. – This is the fundamental difference and major advantage that an SCI service provides over traceability strategies that rely on packaging- based security alone. TSW TraceTM technology, as part of a SCI service, enables verification that the actual product that has travelled through the defined supply chain can be physically linked, through chemical analysis, to its production source or origin. This Verification assurance is independent of any labels on packaging. TM
  • 11. Confidential © SCI 2017 11 Paper-based quality control and quality assurance traceability systems Unique-to-product barcode or other labelling Trackable QR code scanning to connect consumers with product information Security packaging seals SOURCE CERTAIN SERVICE VALUE SCI SERVICE vs PACKAGING-BASED SYSTEMS Packaging-based traceability security systems examples: Packaging-based traceability systems in no way lay claim to the integrity or authenticity of the actual food product, only the packaging. • The product packaging itself and any traceability information (labels, barcodes, QR codes) can be copied in implementation of counterfeiting strategies. • There is inherent potential for label duplication or substitution, including: – Direct duplication of ‘unique’ QR or barcodes, – Creation of false codes on duplicated packaging linking consumers to different and unrelated source verification information, or – Substitution or adulteration of a product through re-packaging false or fake product inside ‘authentic’ and ‘unique’ packaging. • Not all products are sold in packaging.
  • 12. WHAT DOES SOURCE CERTAIN BRING TO SUPPLY CHAINS? Confidential © SCI 2017 12 ORIGINS CONSUMERS & MARKET Transparency & Integrity Confidence & Trust
  • 13. SOURCE CERTAIN SERVICES Confidential © SCI 2017 13 Source Certain Services fall within one of three categories: - Compliance with a Source Verification Standard - Statement of Compliance for production sources Verifiable supply chain integrity: - Source Check - Source Secure - Source Certified - Support service - Food Fraud Investigation Unit
  • 14. 14 SOURCE CERTAIN SERVICES 1. SOURCE CONNECT STATEMENT OF COMPLIANCE SC1000:2016 Confidential © SCI 2017 • Source Connect enables suppliers with large or open supply chains and little to no control or visibility to all segments of the supply chain to implement a strategy that enables verification of production source. • Source Connect is designed for suppliers who wish to communicate to third party business buyers and regulators that they have invested in the effort to provide origin verification capability for their products. • Once set-up requirements of the SC1000 Source Verification Standard have been complied with, the Supplier is issued with a Statement of Compliance. • The SC1000 Source Verification Standard sets a minimum source verification capability requirement for product supply chains. – Capacity to complete a Verification request as to whether the product’s origin matches the stated production source at any point in the supply chain. – Individual product Verifications requested by supplier-permitted users.
  • 15. SOURCE CERTAIN SERVICES 2. SUPPLY CHAIN SECURITY Confidential © SCI 2017 15 EXTERNAL COMMUNICATION • Value adding, mass communication options available. • Communicate that supply chain is secure. CONSUMER COMMUNICATION • Add-on to Source Secure Service. • Consumer facing, on product, Source Certified trademark. • Dynamic communication option for consumer regarding service and source of food specific to product and supply chain. INTERNAL COMMUNICATION • No external (consumer engaging Communication. • Risk Management • QA / QC Source Check • Brand differential and value creation Source Secure • Dynamic consumer communications Source Certified
  • 16. SOURCE CERTAIN SERVICES SOURCE CHECK • Random verification of existing systems (traceability and management). • Internal supply chain service only – NO external communication to customers. • QA type approach. • Example: processed food product of which verification of a batch ID is required. An investigation service could be added on at any time also to facilitate the determination of a product’s traceability. Confidential © SCI 2017 16
  • 17. Confidential © SCI 2017 17 • Standard, recommended service. • A high integrity supply chain solution. • Comprised of random verification of provenance claims across all segments of the supply chain. • Security, education, and communication strategy implemented across all supply chain segments. • All stakeholders of supply chain are on notice of security strategy and program in place within supply chain. • External communication options available: B2B communication, mass communication to consumer SOURCE CERTAIN SERVICES SOURCE SECURE
  • 18. Confidential © SCI 2017 18 • Includes all Source Secure service features. • Access to license for use of the consumer-facing Source Certified certification trademark. – Must comply with established criteria and rules for use. • The highest level of scrutiny for the supply chain with consequences for non-verified samples, delivering ultimate security and in turn transparency to all stakeholders. – Additional requirements for follow-up of non- verified samples with respect to the mark, and further use of the mark. • Program registered on SCI website for consumer access. SOURCE CERTAIN SERVICES SOURCE CERTIFIED
  • 19. • Unique combination of investigation, scientific and digital forensic expertise. • Applicable to almost any food fraud, food contamination or supply chain based investigation. 19 Forensic Science Investigation Digital Forensics SOURCE CERTAIN SERVICES 3. SOURCE INVESTIGATION Confidential © SCI 2017
  • 20. SOURCE CERTAIN MARIJUANA / CANNABIS SERVICE Confidential © SCI 2017 20
  • 21. A MOVE FROM ILLEGAL TO DECRIMINALISED BUT REGULATED • There are many drivers for the move of Cannabis (Marijuana and Marijuana products) from completely illegal to regulated (but legal). • On the recreational side this may be a pure tax revenue driver or be more philosophical and a policy to take this supply chain out of organised criminal hands. • On the medical side this may be as simple as providing a legitimate way for patients to access a treatment. • Irrespective of the driver, historically the supply chain for marijuana and its products is rooted underground and controlled often by criminals and in some cases by organised criminal organisations. • We cannot take our eye of the fact that some of these criminal organisations will fight for and find ways to protect that business. Confidential © SCI 2017 21
  • 22. CONTROLLING THE SUPPLY CHAIN IS CRITICAL • Regardless of the driver or the end use the successful move from illegal to regulated will be on the back of being able to suitably control the various supply chains. • Almost all compliance related activities that will enable control are underpinned by knowing the Source for the marijuana or its products. • It will be this source being licensed or registered and the compliance of this source (e.g growing facility) that will make the product legal. • All safety (e.g chemical residues or heavy metals) requirements and compliance for the product will also be delivered by to the source. • Knowing where the marijuana comes from and being able to confirm this is critical to the integrity of the overall supply chain. • It will be the control of the regulated supply chain (through compliance) that will provide confidence to the community which builds integrity and trust in the overall shift of marijuana from illegal to regulated. Confidential © SCI 2017 22
  • 23. MARIJUANA CULTIVATION REGULATION MODEL: EXAMPLE Confidential © SCI 2017 23 Regulated Cannabis Industry Non- Licensed Caregiver (Medicinal Cannabis) Personal Grow Licensed Medicinal Cannabis Recreational Cannabis REGULATED (LEGAL) MARIJUANA INDUSTRY Illegal Cultivation (Black Market)
  • 24. THE THREAT OF BLACK MARKET MARIJUANA OR NOT CONTROLLING THE SUPPLY CHAIN • It is reasonable for the community to ask if the illegal marijuana is coming from a legal growing facility. • Not being able to confirm the source of seized marijuana does leave the the question un-answered, does it come from the legal supply chain? • Actually impacting the prevalence of the black market is likely outside the scope of the regulator for the legal supply chain but for community confidence, the legal supply chain must make it possible to confirm that seized, illegal material hasn’t come from inside their supply chain - transparency • With decriminalisation policies it is possible to create a place where illegal activity can hide in plain site. Confidential © SCI 2017 24 https://www.washingtonpost.com/news/wonk/wp/2016/08/04/t he-dea-warns-marijuana-grow-spots-are-the-new-meth- houses/
  • 25. RESPONSIBILITIES OF STAKEHOLDERS • Regardless of the model and the drivers for making marijuana legal all stakeholders that benefit, including governments, need to own the responsibility for making sure that the legal supply chain is transparent and can be verified. • All of these stakeholders are asking the community to trust them. Transparency is a reasonable expectation. • All stakeholders have significant businesses to lose if it is not under control and the only solution is to default back to it being illegal. Confidential © SCI 2017 25 NEW INDUSTRY Growers Retailers Processors Support Services Government / Regulator TRUST
  • 26. Confidential © SCI 2017 26 PRISM SERVICE FEATURES A SECURE SUPPLY CHAIN FROM GROWER TO CONSUMER Supply chain for legal distribution for marijuana and products is known – SUPPLY CHAIN DEFINITION Origin of product from anywhere within this known and defined sample chain can be scientifically verified– VERFIED SUPPLY CHAIN INTEGRITY Product from outside the supply chain can be scientifically verified as not being from known, registered source – SUPPLY CHAIN SECURITY Transparency Confidence Trust
  • 27. EXAMPLE OF COVERED SUPPLY CHAIN Confidential © SCI 2017 27 Licensed Growing Locations Cultivation Location (Licensed Grower) Licensed Recreation al & Medical Retail Retail Licensed Processors (Oil) Production Facility Consumers SECURE SECURE VERIFED
  • 28. SERVICE OUTPUT: VERIFICATION SAMPLE FROM A LICENSED RETAIL OUTLET Confidential © SCI 2017 28 Licensed Growing Locations Cultivation Location (Licensed Grower) YES VERIFIED LOCATION ID No Seizure: Subject Marijuana Product INTEL OUTPUT LINKAGE OF SUBJECT SAMPLES INTEL OUTPUT NB: Subject to Program Implementation POSSSIBLE INTEL OUTPUT - Indication of region of origin - Indication of likelihood sample is from macro region (e.g State or Country) NOT FROM LICENSED GROWER Licensed Retail Verification Sample Licensed Retail Verification Sample Supply Chain Verified Black Market Product in Legal Supply Chain
  • 29. SERVICE OUTPUT: SEIZED SAMPLE INVESTIGATION / VERIFICATION Confidential © SCI 2017 29 Licensed Growing Locations Cultivation Location (Licensed Grower) YES LOCATION ID No Seizure: Subject Marijuana Product INTEL OUTPUT LINKAGE TO OTHER SUBJECT SAMPLES INTEL OUTPUT NB: Subject to Program Implementation POSSSIBLE INTEL OUTPUT - Indication of region of origin - Indication of likelihood sample is from macro region (e.g State or Country) NOT FROM LICENSED GROWER Seizure: Subject Marijuana Product Seizure: Subject Marijuana Product Diversion from licensed supply chain to black market. Black Market Product – Outside of Licensed Supply Chain
  • 30. Legal Supply Chain Verification of supply chain from licensed growers and processors to licensed retail distribution. Ability to verify that seized product is not from from licensed growers or processors. Black Market Identification of Black Market or Illegal Grow product inside legal supply chain. Identification if Black Market or Illegally sold product has come from the legal supply chain (diversion). Confidential © SCI 2017 30 SERVICE OUTPUT SUMMARY: VERIFICATION DRIVEN TRANSPARENCYAND INTEGRITY
  • 31. SUMMARY • The PrISM service has been designed to offer maximum coverage. • Because of this, the program has flexibility with respect to what objectives want to be satisfied and how the value may be best realised. • Specific investigations can be built from the service at any time. • The verification or unknown testing aspect of the service can be tailored depending on where the focus needs to be to achieve best outcomes. E.g could be seized samples. • PrISM can be applied to all aspects of the regulated marijuana supply chain. Confidential © SCI 2017 31
  • 32. NEXT STEPS • If a Source Certain service is suitable then the next step is to connect with one of the SCI team who will understand your supply chain and expectations of the service. • The team will then craft a service proposal and presentation for your application. • If you have specific technical queries you can be connected to the SCI technical team to discuss specific applications. Confidential © SCI 2017 32
  • 33. MORE INFORMATION 33Confidential © SCI 2017 CORPORATE OFFICE (SINGAPORE) 7 Temasek Boulevard Suntec Tower One, 44th Floor SINGAPORE 038987 Call: +65 6430 6626 Customer Service Locations AUSTRALIA 2/27 Clark Court Bibra Lake WA 6163 Free Call: 1300 872 233 UNITED STATES 2801 Grand, Suite B Grand Junction CO 81501 Call: (970) 245-9410 MORE INFORMATION www.sourcecertain.com CONTACT Email Enquiries: info@sourcecertain.com