Bush Signs Bill Targeting Knockoffs - InformationWeek
IoT
IoT
News
News
3/17/2006
11:04 AM
50%
50%
RELATED EVENTS
Building Security for the IoT
Nov 09, 2017
In this webcast, experts discuss the most effective approaches to securing Internet-enabled system ...Read More>>

Bush Signs Bill Targeting Knockoffs

Manufacturers lose an estimated $200 billion a year from counterfeit products, and the new bill closes some loopholes.

The Stop Counterfeiting In Manufactured Goods bill closes loopholes that allowed the shipment of fake products from electronic components and automotive parts to apparel into the United States.

The bill also requires courts to order the destruction of all counterfeit products seized as part of a criminal investigation and convicted counterfeiters to relinquish profits and any equipment used in the operation. Those convicted of counterfeiting must reimburse the legitimate businesses they exploited.

Manufacturers lose an estimated $200 billion a year from counterfeit products, according to U.S. Customs and Border Protection.

Mike Wills, Intermec Corp.'s vice president of global services, RFID, and intellectual property, said more manufacturers in consumer goods and retail industries are looking at embedding radio frequency identification (RFID) tags in individual items as an option to stop counterfeiting.

Some industries, such as pharmaceutical, have already begun to deploy RFID technology in their supply chain to stop counterfeiting. Drug manufacturers and distributors have integrated RFID technology to make certain fake drugs don't reach consumers. Projects are being rolled out on request from the U.S. Food and Drug Administration (FDA).

The White House said in a statement that it broke up a prescription drug counterfeiting network and seized more than $4 million in counterfeit medicine with help from partners overseas.

With help from 16 countries on five continents, it also eliminated more than $100 million in illegal online software, games, movies and music.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll