SlideShare a Scribd company logo
1 of 14
Transform the Process to Protect the
Product Samples Embedded with
Intellectual Property
E-ISG Asset Intelligence (www.e-isg.com)
October, 2017
2
Global Scope of Intellectual
Property
IP theft stretches across a multitude of industries, from consumer goods and
manufacturing, to movies, music and software. Anything that can be
trademarked is susceptible to IP theft.
1. Trademark intensive industries are largest in number and contribute the most
employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010).
2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30%
from $5.06 trillion in 2010.
3
Cost of IP Theft
1. According to U.S. Department of Homeland Security, Intellectual Property
Rights Seizures statistics, in 2014, total number of IPR related seizures was
55.7 Million and the total value of IPR related seizures (MRSP) was $250
Billion.
2. Up to 5% of goods imported into the European Union are fakes, according to
the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping
the Economic Impact”.
3. In the defense industry alone, the number of known counterfeit electronic
products more than doubled from 2005 to 2008, according to a U.S.
Commerce Department report released in January 2010.
4
5
Where Does IP Theft Occur?
1. Asset Creation Stage
• When an asset is created, how does your company track its various pieces and
components?
• Do those involved in its creation understand the importance of how the asset is
moved?
• When does an asset get logged into your current tracking system?
2. Asset Transfer Stage
• From one person to another in the same building
• From one country to another
3. Asset Disposal Stage
1 . Process for disposal
2 . Evidence of disposal
6
Two Common but Inadequate
ways to track Product Samples
System 1: Manual Tracking Via Spreadsheets
1. Inability to Scale: Spreadsheets tend to get bloated once your tracking
hundreds (or even thousands) of distinct SKUs
2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of
each asset, which can lead to errors and missing information
3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to
an earlier state, it could mean the deletion of critical tracking information
System 2: Homegrown Asset Tracking System
1. Rigid and Unadaptable
2. Can Become Outdated: A high price tag combined with a non-flexible system
means that the system can become outdated and no longer meet the full
needs of team members
3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can
sometimes be hard to share tracking information with vendors and other
3rd parties that don’t have direct access to the software
7
Why Consider Using a Robust
Asset Management system
1 . Track product samples, Where, What, and Who, throughout
the Life Cycle
2 . Track chain of custody. Enforce Accountability
3 . Keep asset history, disposal record
4 . Web based – access from anywhere
5 . Mobile – use smartphone to search, update, and transfer
assets
8
5 Ways eQuip! can Transform the
process for Managing Product Samples
1. Easily Transfer or Issue Property to a Custodian
2. Automatically Record the Transaction History Transaction of an Asset
3. Know Where Your Assets Are Physical Located at All Times
4. Easily Photograph and Record Asset Images
5. Manage the Complete Asset Lifecycle with Web and Mobile Application
9
Easily Transfer or Issue Property
to a Custodian
Signature 1: The new IP custodian acknowledging
receipt (and ownership) of the IP property
Signature 2: The former IP custodian
acknowledging that
Once a custodian has signed the transfer
agreement, an email notification is automatically
sent to any designators “approvers.”
10
Automatically Record Asset
Transaction History
• When an entry modification was made
• Who made the entry modification
• The time and date of the modification
• The archival of old values
• Recording of any new values
11
Know Where Your Assets Are at
All Times
12
Photograph and Record Asset
Images
13
Manage with both Web and
Mobile Applications
14
Want to Learn more about how eQuip!
can help protecting IP samples?
1. Visit our website (www.e-isg.com)
2. Visit our blog (blog.e-isg.com)
3. Call 1-866-845-2416 to speak to our asset management experts
4. Request a software demo be emailing to Contact@e-isg.com

More Related Content

Similar to Transform process to protect product samples embedded with intellectual property

Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)Brian Brazil
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...APNIC
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxWaterFalls2
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using BlockchainIRJET Journal
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainPaul Hofmann
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Raw honey report
Raw honey reportRaw honey report
Raw honey reportaae
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulipTheMindSmith
 

Similar to Transform process to protect product samples embedded with intellectual property (20)

IOT ppt1.pptx
IOT ppt1.pptxIOT ppt1.pptx
IOT ppt1.pptx
 
Blockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfBlockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdf
 
IoT_IT_Unit1.pdf
IoT_IT_Unit1.pdfIoT_IT_Unit1.pdf
IoT_IT_Unit1.pdf
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)
 
UNIT IV.pptx
UNIT  IV.pptxUNIT  IV.pptx
UNIT IV.pptx
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
 
Iot for food business
Iot for food businessIot for food business
Iot for food business
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Raw honey report
Raw honey reportRaw honey report
Raw honey report
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
 

More from Jackie Luo

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset ManagementJackie Luo
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Jackie Luo
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesJackie Luo
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolJackie Luo
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset managementJackie Luo
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesJackie Luo
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemJackie Luo
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Jackie Luo
 

More from Jackie Luo (8)

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal grantees
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management tool
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset management
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal grantees
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten System
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligencePrecisely
 

Recently uploaded (20)

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial IntelligenceRevolutionizing SAP® Processes with Automation and Artificial Intelligence
Revolutionizing SAP® Processes with Automation and Artificial Intelligence
 

Transform process to protect product samples embedded with intellectual property

  • 1. Transform the Process to Protect the Product Samples Embedded with Intellectual Property E-ISG Asset Intelligence (www.e-isg.com) October, 2017
  • 2. 2 Global Scope of Intellectual Property IP theft stretches across a multitude of industries, from consumer goods and manufacturing, to movies, music and software. Anything that can be trademarked is susceptible to IP theft. 1. Trademark intensive industries are largest in number and contribute the most employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010). 2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30% from $5.06 trillion in 2010.
  • 3. 3 Cost of IP Theft 1. According to U.S. Department of Homeland Security, Intellectual Property Rights Seizures statistics, in 2014, total number of IPR related seizures was 55.7 Million and the total value of IPR related seizures (MRSP) was $250 Billion. 2. Up to 5% of goods imported into the European Union are fakes, according to the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact”. 3. In the defense industry alone, the number of known counterfeit electronic products more than doubled from 2005 to 2008, according to a U.S. Commerce Department report released in January 2010.
  • 4. 4
  • 5. 5 Where Does IP Theft Occur? 1. Asset Creation Stage • When an asset is created, how does your company track its various pieces and components? • Do those involved in its creation understand the importance of how the asset is moved? • When does an asset get logged into your current tracking system? 2. Asset Transfer Stage • From one person to another in the same building • From one country to another 3. Asset Disposal Stage 1 . Process for disposal 2 . Evidence of disposal
  • 6. 6 Two Common but Inadequate ways to track Product Samples System 1: Manual Tracking Via Spreadsheets 1. Inability to Scale: Spreadsheets tend to get bloated once your tracking hundreds (or even thousands) of distinct SKUs 2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of each asset, which can lead to errors and missing information 3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to an earlier state, it could mean the deletion of critical tracking information System 2: Homegrown Asset Tracking System 1. Rigid and Unadaptable 2. Can Become Outdated: A high price tag combined with a non-flexible system means that the system can become outdated and no longer meet the full needs of team members 3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can sometimes be hard to share tracking information with vendors and other 3rd parties that don’t have direct access to the software
  • 7. 7 Why Consider Using a Robust Asset Management system 1 . Track product samples, Where, What, and Who, throughout the Life Cycle 2 . Track chain of custody. Enforce Accountability 3 . Keep asset history, disposal record 4 . Web based – access from anywhere 5 . Mobile – use smartphone to search, update, and transfer assets
  • 8. 8 5 Ways eQuip! can Transform the process for Managing Product Samples 1. Easily Transfer or Issue Property to a Custodian 2. Automatically Record the Transaction History Transaction of an Asset 3. Know Where Your Assets Are Physical Located at All Times 4. Easily Photograph and Record Asset Images 5. Manage the Complete Asset Lifecycle with Web and Mobile Application
  • 9. 9 Easily Transfer or Issue Property to a Custodian Signature 1: The new IP custodian acknowledging receipt (and ownership) of the IP property Signature 2: The former IP custodian acknowledging that Once a custodian has signed the transfer agreement, an email notification is automatically sent to any designators “approvers.”
  • 10. 10 Automatically Record Asset Transaction History • When an entry modification was made • Who made the entry modification • The time and date of the modification • The archival of old values • Recording of any new values
  • 11. 11 Know Where Your Assets Are at All Times
  • 12. 12 Photograph and Record Asset Images
  • 13. 13 Manage with both Web and Mobile Applications
  • 14. 14 Want to Learn more about how eQuip! can help protecting IP samples? 1. Visit our website (www.e-isg.com) 2. Visit our blog (blog.e-isg.com) 3. Call 1-866-845-2416 to speak to our asset management experts 4. Request a software demo be emailing to Contact@e-isg.com