Você está na página 1de 3

The Holography Times Cover Story

Brand Protection:
Challenges and Solutions

Mr. Pradip Shroff is the President of HOMAI, Board member of IHMA, and
Vice-chairman of PRS Permacel Pvt Ltd. He is a B.Tech from IIT Mumbai,
M.S. from Case Western Reserve University, USA, and accredited by
Coaching foundation India Ltd as a CEO Coach. He has worked with Johnson
& Johnson India for almost 25 years and has been involved in developing
solutions for Brand protection for over 35 years.

There are several forums


of industry associations
B rand has been considered as
one of the most valuable assets
for a company. In today’s world,
In as much as brand is the
property of a company, the brand
owner or the CEO should assume
who have sub committees several brands are under attack the primary responsibility to lead
from various angles. These attacks all the efforts required to protect
to discuss the loss to the can be in the form of counterfeiting, the company brand from being
industry due to brand tampering, pilfering etc. Each of attacked. Each company CEO/
these lead to erosion of brand value, brand owner should take a proactive
attack. Frequently, these loss of market share, profit and approach and not wait for a reactive
above all dissatisfied customers. approach.
sub committees end up
in recommending to the The importance of brand Highlighted below are
attack and its impact to the brand some of the case studies or examples
government what it can do in owner, government, society and of why the various efforts have not
terms of tightening the laws or consumer has been a matter of resulted in arresting brand attacks:
debate and discussion at several
enforcement of the laws. forums. There are several studies Case 1
and attempts made to quantify the
loss. However, one important facet A Sales person (perhaps for not
appears to have been missed out in having achieved his sales target)
most of the discussions as to what complains to the Sales Management
is the way out. Is there a solution that there are duplicate products
and what is the responsibility of available in his territory. The Sales
each of the stake holders in the Manager will perhaps ask him to
process of fighting this menace? buy some samples. These samples,
There are several forums of along with primary information,
industry associations who have sub are then passed on to the Legal
committees to discuss the loss to Department of the company to
the industry due to brand attack. initiate action. Legal Department is
Frequently, these sub committees either not able to take action or if
end up in recommending to the the evidence is strong, organisations
government what it can do in are raided but when the raids are
terms of tightening the laws or conducted nothing concrete is
enforcement of the laws. found. Perhaps the information

8 www.homai.org
Cover Story The Holography Times

Analysis / Designing /
Change in Formation of Protection /
Brand Brand Risk Usage of Monitoring
protection management technology
approach Team

Fig. 1: Integrated Holistic brand protection strategy

about the likely raid was leaked out of the product. The order is given (BRM) as part of his business
and hence no evidence was traced. to the supplier who has quoted plan, review and report. The
the lowest price. This can end up team can comprise of CEO/
Case 2 with several prospective suppliers Brand owner, / Brand Managers/
who do not supply to the original Head of Marketing / Product
Based on advance intimation company but can now do business development/ Sales /Logistic/
or use of a private detective a with contributors. Packaging/Manufacturing,
raid is conducted and goods are etc and or outside consultant
confiscated. The guilty person Case 6 accountable for brand. The
is released on bail, the matter is team can periodically review
delayed and the case continues for A CEO or brand owner feels that the BRM by analysing various
years. The counterfeiter opens he has tried everything possible issues like:
another factory and restarts his and nothing works because all
business. previous attempts have been either i) product categories & markets
copied or have not been easy to use ii) buyer profiles
Case 3 by customers. Hence, the solution iii) supply chain management
is not with him but it is with the and SWOT analysis of
Another similar example. A government. counterfeiters.
company develops a new track and
trace solution but few influential or These are some of the examples that 2. Make a customized totally
dominating Sales persons and the clearly indicate that there is a need integrated solution by
Distributors rationalise that such to change from stray piecemeal increasing the participation of
approach will reduce the sales of the efforts to total integrated solutions. co-opting consumer, channel
company and forces the company The key elements of the need for partner conducting verification,
to withdraw such solutions. total integrated solutions are: raids or ensuring strong law
enforcement.

Case 4 Solutions 3. Use technology: Use a secure


anti-counterfeiting device
A packaging technologist is asked By Brand Owners: comprising overt3, covert4
to find out a technology which is There is a need of creating an end- & forensic5 security feature.
very novel, but easy to identify. to-end solution, intrinsic part of a Examples of such tools are
Unfortunately whatever he adopts holistic brand protection strategy; security hologram seal and
is copied in a short time. (see fig. 1) labels, tamper evident security
films, and light-sensitive ink
Case 5 1. Analysis / Changes in designs. While there are any
approach towards Brand number of technologies brand
A packaging technologist develops protection: As a first step, manager can use, it is better if it
a new technological solution. every CEO or Brand owner is decided at an early stage with
Purchasing officer floats a tender should take the responsibility of some basic guidelines such as:
to all suppliers giving all details of brand attack and need to make
features and specifications required the Brand Risk Management i) Find a vendor who can provide

www.homai.org 9
The Holography Times Cover Story

Certificate of Authenticity (COA)


A new Certificate of Authenticity (COA) has begun shipping
with various OEM System Builder products as of September 1,
2007.
Note that the prior COA will still be in the market for some time, so please familiarize yourself
with both versions. See below for details.
® ®

A COA is a label to help you and your customers identify genuine Microsoft Windows
software. Without it, your customers will not have a legal license to run their Windows
software.
D
B

COA
C
New COA:
A The new COA features two portholes, one in the shape of an ellipse and the second in
the shape of the Windows “flying window” logo. The over-laminate has been removed to
enhance the visibility of the individual paper fibers within each of the portholes.

B The embedded metallic thread includes new color transitions that occur when viewed at
an angle.

C The new COA contains microprint - a security feature adopted from currency - that is
legible when viewed under a magnifying lens.

D The new COA has been changed to a more rectangular shape.

Distribution:
Certificate of Authenticity

The COA constitutes the end-user’s


proof-of-license and it must be
distributed with the additional
Documentation components noted here. A COA
should never be distributed by itself,
without the software it authenticates.

Hologram En
End-user license
Media ag
agreement (EULA)

Prior COA: A A porthole anti-piracy feature allows the computer chassis to


be visible through a clear hole. Individual paper fibers can be
D discerned within the porthole.

C B An embedded metallic thread with recognizable letters spelling


B “Genuine” runs through the label.
A C The technology strips running down the side of the Certificate
of Authenticity have been eliminated providing a flatter profile
enabling a more acceptable print surface for thermal printers.

D The COA does not have a laminate finish.

For more information on identifying COAs, visit http://oem.microsoft.com/coa.

Fig. 2: Picture of Microsoft website which defines its steps in Fig. 3: An example of flyer, which can
product protetion. be downloaded from microsoft website.

you overt as well as covert By Government: Conclusion:


technologies as it is more “Brand Risk Management” should Negative impact of counterfeiting
important to select a solution be treated as part of risk management can be diminished to a great level
using multiple technologies; under the direct responsibility of if it becomes a part of every brand
ii) Get help from trade association board of directors / brand owners. strategy - plan and review process-
in selecting ethical vendor, The vision and mission statement with the accountability of the brand
best practices and resources for should be communicated to all owner towards its most valuable
fighting counterfeiting; the stakeholders and customers to asset - i.e., Brand.
iii) Select the technology in ensure that the Brand Protection
terms of parameters like how concern is communicated to all Fighting counterfeiting is a Brand
difficult to copy / tamper concerned. This can be done issue, when managed well will
evident (preferably patented), by putting up on the company result into:
uniqueness, how many corporate governance, annual - Consumers getting right products
suppliers available, easy to report, intranet in text and video. at right prices;
identify and user friendly; (for example, companies like HP / - Manufacturers gaining higher
iv) Solutions should also have Microsoft have a section on their market share, increase in brand
feasibility to be integrated website which defines their steps value and profits;
with the automated production in product protection). (see Fig. 2 - Government receiving increased
/packaging line if required, and 3). revenue which can be used for
especially wherever the betterment of society;
volumes are real large; As an initial step Government - One channel of funding terrorism
v) Try to combine low and high can make mandatory for every will be dried.
security elements to enhance company to incorporate “Brand
protections, for example, by Biblography:
Risk Management” as part of 1. HoMAI : Hologram Manufacturers
integrating a sequential or their annual report for welfare of Association of India.
unique numbers in the solution. 2. IHMA: International Hologram
stakeholders. Manufacturers Association .
3. Overt Feature: Feature which can be seen
4. Monitoring and developing with naked eye.
4. Covert Feature: Features which can be seen
an Intellectual property with economical tools i.e. magnifier glass/
strategy readers etc.
5. Forensic Feature: Which can be tested/ seen
at laborateries.

10 www.homai.org

Você também pode gostar