Bush Signs Bill Targeting Knockoffs - InformationWeek
IoT
IoT
News
News
3/17/2006
11:04 AM
50%
50%
RELATED EVENTS
Threat Intelligence Overload?
Aug 23, 2017
A wide range of threat intelligence feeds and services have cropped up keep IT organizations up to ...Read More>>

Bush Signs Bill Targeting Knockoffs

Manufacturers lose an estimated $200 billion a year from counterfeit products, and the new bill closes some loopholes.

The Stop Counterfeiting In Manufactured Goods bill closes loopholes that allowed the shipment of fake products from electronic components and automotive parts to apparel into the United States.

The bill also requires courts to order the destruction of all counterfeit products seized as part of a criminal investigation and convicted counterfeiters to relinquish profits and any equipment used in the operation. Those convicted of counterfeiting must reimburse the legitimate businesses they exploited.

Manufacturers lose an estimated $200 billion a year from counterfeit products, according to U.S. Customs and Border Protection.

Mike Wills, Intermec Corp.'s vice president of global services, RFID, and intellectual property, said more manufacturers in consumer goods and retail industries are looking at embedding radio frequency identification (RFID) tags in individual items as an option to stop counterfeiting.

Some industries, such as pharmaceutical, have already begun to deploy RFID technology in their supply chain to stop counterfeiting. Drug manufacturers and distributors have integrated RFID technology to make certain fake drugs don't reach consumers. Projects are being rolled out on request from the U.S. Food and Drug Administration (FDA).

The White House said in a statement that it broke up a prescription drug counterfeiting network and seized more than $4 million in counterfeit medicine with help from partners overseas.

With help from 16 countries on five continents, it also eliminated more than $100 million in illegal online software, games, movies and music.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll