HP’s fight against counterfeits

Slides:



Advertisements
Similar presentations
The Health and Safety Risks Counterfeit products Pose to Consumers Christine HUBER 2 December Cancun.
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
© Copyright 2011 Hewlett-Packard Development Company, L.P. 1 HP ANTI-COUNTERFEIT PROGRAM RECOGNIZE. REPORT. PREVENT.
1August 2006 HP security labels on original HP print cartridge packaging.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
PowerEdge T20 Customer Presentation. Product overview Customer benefits Use cases Summary PowerEdge T20 Overview 2 PowerEdge T20 mini tower server.
Strengthening the Protection of Intellectual and Industrial Property Rights Deputy Manager Jan Hylleberg The Danish Association of the Pharmaceutical Industry.
preventing counterfeit …
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Direct Attacks on Computational Devices
Implementation Network Wide
Concepts of Database Management Seventh Edition
Geneva, Switzerland, November 2014 United Arab Emirates Experience Ahmad Alshamsi Manager Type Approval, UAE TRA Combating.
Combating Counterfeit and Substandard ICT Devices (Geneva, Switzerland, November 2014) WCO’s Actions to Combat Counterfeiting Samantha Gompel IPR.
RSA SecurID November 10, 2005.
SMARTER. TOGETHER. Skimming Prevention: Overview of Best Practices August 5, 2014.
Providing Onboard and Onsite Ticketing Solutions to the Travel and Tourist Industry 1.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
Overview of ITU-T Study Group 5 “Environment and Climate Change” Cristina Bueti, Adviser, ITU.
Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.
Norman SecureSurf Protect your users when surfing the Internet.
An Introduction to Mersen Electrical Services Putting electrical safety to work.
UniKey Software Protection Solutions, Products & Services All Rights Reserved © SecuTech Solution Inc.
Get More from Your Software The Genuine Windows Vista™ Experience.
Objectives 4 Understand the ISO standards. Why are standards required? 4 Need standards to ensure that a term means the same for all 4 Need company standards.
Creator of RG Supervision Mobile Word Congress 16th &17th February 2011 Barcelona – ESP.
1 QUICK TECH HELP HARDWARE. 2 HARDWARE TROUBLE SHOOTING. S. no. PROBLEMSREMEDY 1Non start of Computer  Check whether Floppy is left in Floppy drive Check.
World Leader In Gas Detection & Sensor Technology Stand Alone Calibration Station SM 2000 Series.
U.S. Qualified Supplies 2.0 Partner Program
Copyright 2009 Trend Micro Inc. 1 Classification 10/10/ New Trend Micro Security Suites for Enterprise and Medium Business Pre-Briefing for January.
Practical Cooperation with Latvian Customs and Enforcement Officers in Intellectual Property Enforcment CIPR - REACT 25 November 2004.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Illicit hardware Neil Ichiki 14 July 07. Agenda Quick background Overview of the global counterfeit market Illicit products defined & how to protect yourself.
Advanced Secure Technologies Secure Document Technologies.
StorCenter ix4-200d Training By Erik Collett August 2009.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
Life cycle services for automation products
Making a Difference with Customer Care At eMachines, Customer Care is the top priority – we are committed to offering PC buyers high-quality systems at.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Framework for combating Importation, Supply and Use of Counterfeit/substandard terminals in EACO member states Presenter Mwende Njiraini Communications.
I-Corporate Risk Consultants Ltd Imaging Supplies Coalition 2010 Conference i-Corporate Risk Consultants Ltd.
Introduction TO Network Administration
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Smoke Notification System (SNS) Final Presentation Senior Design II November 19, 2013.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
UNECE International Seminar Product Safety and Counterfeiting CEN WORKSHOP on Anti-Counterfeiting 6 November 2007.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Vending machine monitoring system Industry&Business &Government IT transformation.
Vermont- Automated Vehicle Inspection Program (AVIP)
Association of World Election Bodies Contents ICT–based Election Management Voter Registration and Identification Voting and Counting Examples.
Counterfeits in Electrical Products. By Kevin Auguste.
Contents  Introduction  Our Vision,Mission and Values  Services  Contact Details  Partnerships  Clients  Introduction  Our Vision,Mission and.
International Conference on Global Emergency Preparedness and Response October 2015 Canadian Medical Emergency Treatment for Exposures to Radiation (METER)
High Performance Ink and Toner
CONDUCTING TEST ON THE INSTALLED COMPUTER SYSTEM
Electronic Plan By Ben Smithers and Dana Natov
PCI-DSS Security Awareness
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
UNIT 19 Data Security 2.
RAILWAY TRACK SNAP NOTIFICATION
Dial 1(844) How to Fix the HP Printer Error Code 20 ?
McAfee Issue Updating the antivirus with the most recent version accessible Activate security software suite.
SOLUTION LAND TITLES.
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Stand Alone Calibration Station
Millennium HongQiao Hotel Shanghai
Microsoft Data Insights Summit
Presentation transcript:

HP’s fight against counterfeits Combating Counterfeit and Substandard ICT Devices (Geneva, Switzerland, 17-18 November 2014) HP’s fight against counterfeits George Wiessing Global ACF Training Manager HP Global Security Group George.Wiessing@hp.com Geneva, Switzerland, 17-18 November 2014

Hardware product & Printer Supplies HP Product Overview Hardware product & Printer Supplies

Counterfeit hardware illicitly bears HP trademarks Hardware products particularly likely to be counterfeited include: networking products, server memory and hard drives USB flash drives laptop adapters and batteries Server memory Server HDD

Example of counterfeit laptop adaptors Fake laptop power adaptors can pose risks of failure, fire, and even electric shock A counterfeit adaptor seized in the UK was tested on behalf of officials Testing resulted in incompliance with the UK Electrical Equipment (Safety) regulations 1994, and norms BS1363, BS1362:1973 Incompliant parts included: Counterfeit IT products can pose danger of life or serious injury the fuse the plug (non-confirming earth pin sleeve) Test report by Calibration and Test Centre, Land and Environmental Services, Glasgow City Council, June 2012

Customers are mostly unwitting victims of counterfeiting. Only 6% of corporate customers who purchased counterfeits did so intentionally.* * Survey by Harris Interactive on behalf of HP, June 2013.

Five pillars of ACF HP ACF Programme Prevention and Education Channel Management Investigation and Enforcement Product and Packaging Gov. Relations and Legal

HP encourages stakeholders to take action Customer Delivery Inspections Free on-site inspections of suspicious deliveries by HP ACF experts support HP’s major clients Anti-counterfeiting events HP conducts numerous ACF events to inform customers, partners and end-users all across EMEA Online education HP offers custom-tailored ACF e-learning modules and extensive information material

HP encourages clients and vendors to protect themselves Checking security labels HP’s sophisticated security labels allow all stakeholders to check for possible counterfeits Using ACF software Easy-to-use authentication software checks installed print cartridges for possible counterfeits Reporting suspicions Reports on suspicious products and offers help HP to shield markets and clients in EMEA from counterfeits

Ink & Toner - HP security labels

HP Mobile Authentication – pre-purchase solution Capture the QR code… or enter the serial number at hp.com/go/ok

Security features on Hard Drives and memory Security seals On packaging and product

Hot Plug Smart Hard Drive Status Indicators Security features on HDD HP Smartdrive carrier authentication on Gen8 products Hot Plug Smart Hard Drive Status Indicators Hard Drive Status Name Definition Solid Green Configured Hard drive is a member of 1 or more logical drives Solid Amber Failed Hard drive is failed. Message on Screen: Authentication on this drive carrier failed due to a communication error. This may not be an authentic HP product

Security features on HDD HP Smartdrive carrier authentication on Gen8 products Easy and quick identification of counterfeit Reduced service calls & faster debug Adherence to US Defense Authorization Act – Detection of Counterfeit Parts Requirements Counterfeiters attempts to replicate yet unsuccessful Reduction of warranty claims

Recent significant blows to counterfeiting Saudi Arabia 2013: 34,000 counterfeit laptop adaptors and components and 25,000 fake print cartridges seized East Africa 2013: 10,000 fake print cartridges and components seized Germany 2012: 80,000 fake printing supplies and components seized

Thank you. Do you have any questions? Find out more on hp.com/go/anticounterfeit