<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区
             
           
          Intellectual property fraud: what can be done to help prevent the fraud from occurring?
          By Scot Warren
          Updated: 2011-03-01

          The CEO looked in disbelief at his company’s latest audio device prototype, representing two years of groundbreaking engineering – its burnished-chrome design the result of months of intensive effort by a team of international experts. Profits had suffered during its development, but the planned release was just four months away. The future of the business was staked on it. Yet, here he was holding it in his hand, having purchased it on eBay! How could something so catastrophic happen?

          He called Kroll to find out. An audit of the firm’s manufacturing facility in China, including numerous company-wide interviews, revealed several weaknesses, in particular the way defective products and rejected prototypes were stored. Under the contract with the factory, these items were to be kept in a room until destroyed in the presence of a company representative. Because the defective and rejected goods sat for some time in a room with poor physical security, the temptation to sneak items out past the metal detectors proved too great for some factory employees. Kroll also identified the sellers on eBay and worked up the supply chain until most of it had been found and dismantled.

          IP fraud cases in Asia and other developing economies often involve:

          Night manufacturing: licensees declaring the products they make during the day, but not those manufactured at night, when enforcement authorities and company representatives are less likely to visit.

          Terminated licensees continuing to manufacture the company’s products.

          Extortion attempts via email, such as a threat to release sensitive company data or embarrassing personal facts hacked from the company’s system.

          Employees leaving with the company’s intellectual property, trade secrets, customer lists, pricing, or other sensitive data at the end of their employment, or new employees bringing such information with them. In one instance, a foreign competitor filed a patent on technology that had taken its arch-rival years to develop, only a few weeks after it had hired a critical group of engineers away from the rival firm.

          What can be done to help prevent the fraud from occurring?

          Proactive IP Protection

          Companies can take several critical steps to protect themselves from the loss of IP:

          Conduct an IP Audit

          Identify your key IP that needs protection, determine how this is currently being protected, and implement improvements. This includes not only understanding, from a technical perspective, the IP pipeline essential to your company’s success, but also:

          Analyzing legal rights on file, where they are registered, and monitoring capabilities.

          Reviewing HR policies to ensure that appropriate non-disclosure, non-compete provisions, and IP ownerships Provisions are signed locally when new employees are hired, and that all IP assets are gathered upon termination.

          Evaluating IT system access rights and logging policies to electronically-stored data, as well as policies which will allow this information to be copied, especially onto portable media, such as thumb drives.

          Examining physical security, locks, cameras, and access to areas where critical IP is kept.

          Conducting other evaluations relevant to your particular IP, corporate structure, and environment.

          Companies are advised to implement improvements based upon the location of facilities and the risk involved. Do not assume that the policy that has worked in the United States over the years is the same one that should be implemented in China.

          When creating your product, consider how you might include IP that is more easily enforceable (such as trademarks) to protect IP that is more challenging to defend in most countries (such as patents and copyrights). This can greatly enhance your ability to thwart fraudulent products and counterfeits.

          Know your local partner

          Before entrusting your valuable IP to an unknown third-party, conduct a background check on the entity, its key executives and its employees.

          Know your supply and manufacturing chain

          Among the strategies available here is to implement royalty-tracking devices throughout the supply chain to better insure accurate collection of this income. Furthermore, bring an IP theft expert on site visits to suppliers and manufacturers. Such an expert may notice things that will greatly enhance your IP protection.

          A Culture of IP Protection

          The overarching goal is to establish a culture of IP protection awareness within your organization and among those with whom you do business. Taking the above steps will guard your IP better. Doing so also sends a clear message that you value your intellectual property, and that your employees and partners should do the same. If people know that you are serious about defending your IP, they will be much less likely to try to abuse your trust in the first place.

          Don’t Wait

          If intellectual property is a key component of your company’s success, take proactive steps to protect it as soon as possible. All too often companies wait too long to implement IP protection, usually acting only after a significant loss.

          Frequently, the company must wait until the next product life cycle in order to recover, assuming that it can do so at all. In the long run, early detection is the best recipe for success.

          By Scot Warren, Managing Director of Kroll



          The J-Innovation

          Steve Jobs died the month that the latest Nobel Prize winners were announced. The coincidence lends itself to speculation about inevitability.

          The future of China & WTO

          JETRO: A decade of development in China

          The protection of design on printed flat works

          Preventing a patent authorization

          主站蜘蛛池模板: 亚洲老女人区一区二视频| 免费a级毛片18以上观看精品 | 久久99热只有视精品6国产| 日韩国产精品中文字幕| 噜噜噜噜私人影院| 亚洲国产精品毛片av不卡在线| 日韩午夜福利视频在线观看| 亚洲精品日本久久一区二区三区| 成人国产精品免费网站| 久久精品手机观看| 线观看的国产成人av天堂| 无码高潮爽到爆的喷水视频app| 无码av永久免费大全| 浴室人妻的情欲hd三级国产| 国产成人综合网在线观看| 国产精品毛片一区二区| 亚洲自偷自拍另类小说| www.一区二区三区在线 | 中国| 深夜在线观看免费av| 91九色系列视频在线国产| 色吊丝一区二区中文字幕| 国产成年码av片在线观看| 亚洲香蕉伊综合在人在线| 国产乱子伦农村xxxx| 久久久久国产一级毛片高清版A | 成人免费av色资源日日| 国产成人精品久久综合| 亚洲精品一二三四区| 日本中文字幕久久网站| 中文字幕最新精品资源| 尤物国产精品福利在线网| 国产在线观看免费观看| 国产老熟女乱子一区二区| 国产亚洲欧洲AⅤ综合一区| 成人自拍短视频午夜福利| 亚洲高清免费在线观看| 日本人妻巨大乳挤奶水免费| 97久久精品人人澡人人爽| 国产精品分类视频分类一区| 欧美国产综合欧美视频| 国精偷拍一区二区三区|