SlideShare a Scribd company logo
Transform the Process to Protect the
Product Samples Embedded with
Intellectual Property
E-ISG Asset Intelligence (www.e-isg.com)
October, 2017
2
Global Scope of Intellectual
Property
IP theft stretches across a multitude of industries, from consumer goods and
manufacturing, to movies, music and software. Anything that can be
trademarked is susceptible to IP theft.
1. Trademark intensive industries are largest in number and contribute the most
employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010).
2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30%
from $5.06 trillion in 2010.
3
Cost of IP Theft
1. According to U.S. Department of Homeland Security, Intellectual Property
Rights Seizures statistics, in 2014, total number of IPR related seizures was
55.7 Million and the total value of IPR related seizures (MRSP) was $250
Billion.
2. Up to 5% of goods imported into the European Union are fakes, according to
the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping
the Economic Impact”.
3. In the defense industry alone, the number of known counterfeit electronic
products more than doubled from 2005 to 2008, according to a U.S.
Commerce Department report released in January 2010.
4
5
Where Does IP Theft Occur?
1. Asset Creation Stage
• When an asset is created, how does your company track its various pieces and
components?
• Do those involved in its creation understand the importance of how the asset is
moved?
• When does an asset get logged into your current tracking system?
2. Asset Transfer Stage
• From one person to another in the same building
• From one country to another
3. Asset Disposal Stage
1 . Process for disposal
2 . Evidence of disposal
6
Two Common but Inadequate
ways to track Product Samples
System 1: Manual Tracking Via Spreadsheets
1. Inability to Scale: Spreadsheets tend to get bloated once your tracking
hundreds (or even thousands) of distinct SKUs
2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of
each asset, which can lead to errors and missing information
3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to
an earlier state, it could mean the deletion of critical tracking information
System 2: Homegrown Asset Tracking System
1. Rigid and Unadaptable
2. Can Become Outdated: A high price tag combined with a non-flexible system
means that the system can become outdated and no longer meet the full
needs of team members
3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can
sometimes be hard to share tracking information with vendors and other
3rd parties that don’t have direct access to the software
7
Why Consider Using a Robust
Asset Management system
1 . Track product samples, Where, What, and Who, throughout
the Life Cycle
2 . Track chain of custody. Enforce Accountability
3 . Keep asset history, disposal record
4 . Web based – access from anywhere
5 . Mobile – use smartphone to search, update, and transfer
assets
8
5 Ways eQuip! can Transform the
process for Managing Product Samples
1. Easily Transfer or Issue Property to a Custodian
2. Automatically Record the Transaction History Transaction of an Asset
3. Know Where Your Assets Are Physical Located at All Times
4. Easily Photograph and Record Asset Images
5. Manage the Complete Asset Lifecycle with Web and Mobile Application
9
Easily Transfer or Issue Property
to a Custodian
Signature 1: The new IP custodian acknowledging
receipt (and ownership) of the IP property
Signature 2: The former IP custodian
acknowledging that
Once a custodian has signed the transfer
agreement, an email notification is automatically
sent to any designators “approvers.”
10
Automatically Record Asset
Transaction History
• When an entry modification was made
• Who made the entry modification
• The time and date of the modification
• The archival of old values
• Recording of any new values
11
Know Where Your Assets Are at
All Times
12
Photograph and Record Asset
Images
13
Manage with both Web and
Mobile Applications
14
Want to Learn more about how eQuip!
can help protecting IP samples?
1. Visit our website (www.e-isg.com)
2. Visit our blog (blog.e-isg.com)
3. Call 1-866-845-2416 to speak to our asset management experts
4. Request a software demo be emailing to Contact@e-isg.com

More Related Content

Similar to Transform process to protect product samples embedded with intellectual property

IOT ppt1.pptx
IOT ppt1.pptxIOT ppt1.pptx
IOT ppt1.pptx
ChandraPrakash715640
 
Blockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfBlockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdf
ProexportColombia1
 
IoT_IT_Unit1.pdf
IoT_IT_Unit1.pdfIoT_IT_Unit1.pdf
IoT_IT_Unit1.pdf
ArshiniGubbala2
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Duo Security
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
VaishnaviBorse8
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)
Brian Brazil
 
UNIT IV.pptx
UNIT  IV.pptxUNIT  IV.pptx
UNIT IV.pptx
ArtiSingh320853
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
APNIC
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptx
WaterFalls2
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
Somasundaram Jambunathan
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Abhinav Biswas
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
Somasundaram Jambunathan
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET Journal
 
Iot for food business
Iot for food businessIot for food business
Iot for food business
haranadhreddy2
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
Paul Hofmann
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
Surajgroupsvideo
 
Raw honey report
Raw honey reportRaw honey report
Raw honey report
aae
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
TheMindSmith
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
Sanura Hettiarachchi
 

Similar to Transform process to protect product samples embedded with intellectual property (20)

IOT ppt1.pptx
IOT ppt1.pptxIOT ppt1.pptx
IOT ppt1.pptx
 
Blockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdfBlockchain_Logyca (ENG).pdf
Blockchain_Logyca (ENG).pdf
 
IoT_IT_Unit1.pdf
IoT_IT_Unit1.pdfIoT_IT_Unit1.pdf
IoT_IT_Unit1.pdf
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)What does "monitoring" mean? (FOSDEM 2017)
What does "monitoring" mean? (FOSDEM 2017)
 
UNIT IV.pptx
UNIT  IV.pptxUNIT  IV.pptx
UNIT IV.pptx
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
BLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptxBLOCKCHAIN-scribd.pptx
BLOCKCHAIN-scribd.pptx
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
IRJET -  	  Analyzing Need of Secure Forensic Report System using BlockchainIRJET -  	  Analyzing Need of Secure Forensic Report System using Blockchain
IRJET - Analyzing Need of Secure Forensic Report System using Blockchain
 
Iot for food business
Iot for food businessIot for food business
Iot for food business
 
RFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply ChainRFID Simulation of the US Pharmaceutical Supply Chain
RFID Simulation of the US Pharmaceutical Supply Chain
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Raw honey report
Raw honey reportRaw honey report
Raw honey report
 
Diginotar Hack - Black-tulip
Diginotar Hack  - Black-tulipDiginotar Hack  - Black-tulip
Diginotar Hack - Black-tulip
 
Io t for_scm
Io t for_scmIo t for_scm
Io t for_scm
 

More from Jackie Luo

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
Jackie Luo
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016
Jackie Luo
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal grantees
Jackie Luo
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management tool
Jackie Luo
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset management
Jackie Luo
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal grantees
Jackie Luo
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten System
Jackie Luo
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...
Jackie Luo
 

More from Jackie Luo (8)

EQuip! for IT Asset Management
EQuip! for IT Asset ManagementEQuip! for IT Asset Management
EQuip! for IT Asset Management
 
Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016Uniform guidance property management webinar march 10 2016
Uniform guidance property management webinar march 10 2016
 
Uniform guidance on property management for federal grantees
Uniform guidance on property management for federal granteesUniform guidance on property management for federal grantees
Uniform guidance on property management for federal grantees
 
Structured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management toolStructured and Staged process for migrating to eQuip! Asset Management tool
Structured and Staged process for migrating to eQuip! Asset Management tool
 
Bring rfid to asset management
Bring rfid to asset managementBring rfid to asset management
Bring rfid to asset management
 
Equipment management best practicesfor federal grantees
Equipment management best practicesfor federal granteesEquipment management best practicesfor federal grantees
Equipment management best practicesfor federal grantees
 
Government Property Management -- the Forgotten System
Government Property Management -- the Forgotten SystemGovernment Property Management -- the Forgotten System
Government Property Management -- the Forgotten System
 
Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...Challenges in implementing property management system -- presented in Aug'15 ...
Challenges in implementing property management system -- presented in Aug'15 ...
 

Recently uploaded

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 

Recently uploaded (20)

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 

Transform process to protect product samples embedded with intellectual property

  • 1. Transform the Process to Protect the Product Samples Embedded with Intellectual Property E-ISG Asset Intelligence (www.e-isg.com) October, 2017
  • 2. 2 Global Scope of Intellectual Property IP theft stretches across a multitude of industries, from consumer goods and manufacturing, to movies, music and software. Anything that can be trademarked is susceptible to IP theft. 1. Trademark intensive industries are largest in number and contribute the most employment with 23.7 million in jobs in 2014 (up from 22.6 million in 2010). 2. IP intensive industries account for $6.6 trillion in value added in 2014, up 30% from $5.06 trillion in 2010.
  • 3. 3 Cost of IP Theft 1. According to U.S. Department of Homeland Security, Intellectual Property Rights Seizures statistics, in 2014, total number of IPR related seizures was 55.7 Million and the total value of IPR related seizures (MRSP) was $250 Billion. 2. Up to 5% of goods imported into the European Union are fakes, according to the 2013 OECD report, “Trade in Counterfeit and Pirated Goods: Mapping the Economic Impact”. 3. In the defense industry alone, the number of known counterfeit electronic products more than doubled from 2005 to 2008, according to a U.S. Commerce Department report released in January 2010.
  • 4. 4
  • 5. 5 Where Does IP Theft Occur? 1. Asset Creation Stage • When an asset is created, how does your company track its various pieces and components? • Do those involved in its creation understand the importance of how the asset is moved? • When does an asset get logged into your current tracking system? 2. Asset Transfer Stage • From one person to another in the same building • From one country to another 3. Asset Disposal Stage 1 . Process for disposal 2 . Evidence of disposal
  • 6. 6 Two Common but Inadequate ways to track Product Samples System 1: Manual Tracking Via Spreadsheets 1. Inability to Scale: Spreadsheets tend to get bloated once your tracking hundreds (or even thousands) of distinct SKUs 2. Manual Entry: Spreadsheets rely on individuals to input the tracking data of each asset, which can lead to errors and missing information 3. No Redundancy: If a mistake occurs, and a document is deleted or reverted to an earlier state, it could mean the deletion of critical tracking information System 2: Homegrown Asset Tracking System 1. Rigid and Unadaptable 2. Can Become Outdated: A high price tag combined with a non-flexible system means that the system can become outdated and no longer meet the full needs of team members 3. Vendor and 3rd Party Sharing Limitations: With homegrown systems, it can sometimes be hard to share tracking information with vendors and other 3rd parties that don’t have direct access to the software
  • 7. 7 Why Consider Using a Robust Asset Management system 1 . Track product samples, Where, What, and Who, throughout the Life Cycle 2 . Track chain of custody. Enforce Accountability 3 . Keep asset history, disposal record 4 . Web based – access from anywhere 5 . Mobile – use smartphone to search, update, and transfer assets
  • 8. 8 5 Ways eQuip! can Transform the process for Managing Product Samples 1. Easily Transfer or Issue Property to a Custodian 2. Automatically Record the Transaction History Transaction of an Asset 3. Know Where Your Assets Are Physical Located at All Times 4. Easily Photograph and Record Asset Images 5. Manage the Complete Asset Lifecycle with Web and Mobile Application
  • 9. 9 Easily Transfer or Issue Property to a Custodian Signature 1: The new IP custodian acknowledging receipt (and ownership) of the IP property Signature 2: The former IP custodian acknowledging that Once a custodian has signed the transfer agreement, an email notification is automatically sent to any designators “approvers.”
  • 10. 10 Automatically Record Asset Transaction History • When an entry modification was made • Who made the entry modification • The time and date of the modification • The archival of old values • Recording of any new values
  • 11. 11 Know Where Your Assets Are at All Times
  • 12. 12 Photograph and Record Asset Images
  • 13. 13 Manage with both Web and Mobile Applications
  • 14. 14 Want to Learn more about how eQuip! can help protecting IP samples? 1. Visit our website (www.e-isg.com) 2. Visit our blog (blog.e-isg.com) 3. Call 1-866-845-2416 to speak to our asset management experts 4. Request a software demo be emailing to Contact@e-isg.com