Verifying a factory's brand protection practices is crucial to safeguard your IP, reputation, and revenue from counterfeiting, diversion, and unauthorized production. Here’s a step-by-step guide to conduct thorough due diligence:
-
Request Formal Documentation:
- Brand Protection Policy: Ask for a written policy outlining procedures for handling sensitive designs, materials, and IP.
- Employee NDAs/Training Records: Verify signed Non-Disclosure Agreements (NDAs) and proof of regular anti-counterfeiting training.
- Access Control Logs: Review records of visitor/employee access to production areas, especially for sensitive products.
- Incident Reports: Request documentation of past IP breaches, counterfeiting incidents, and corrective actions taken.
- Third-Party Audits: Check reports from independent auditors (e.g., SGS, BSCI) focusing on IP protection.
-
Verify Certifications:
- Confirm relevant certifications like ISO 28000 (Supply Chain Security) or Anti-Counterfeiting certifications (e.g., from ACFE).
-
Reference Checks:
- Contact past clients (especially in your industry) to ask about:
- Evidence of counterfeiting linked to the factory.
- Strictness in enforcing NDAs.
- Handling of prototype/sample security.
- Contact past clients (especially in your industry) to ask about:
Phase 2: On-Site Verification Audit
-
Physical Security Inspection:
- Production Access: Observe if sensitive areas (e.g., R&D, tooling rooms) are secured with access logs, cameras, and visitor escorts.
- Inventory Controls: Check if branded materials/components are stored in locked, inventoried areas with restricted access.
- Waste Disposal: Verify secure disposal of defective products, scrap materials, and packaging to prevent diversion.
-
Process & Personnel Checks:
- Interview Staff: Ask workers (randomly selected) about:
- Training on brand protection.
- Consequences of IP violations.
- Procedures for reporting suspicious activity.
- Review Workflow: Trace how designs/materials move through the factory. Ensure digital files are password-protected and access is audited.
- Subcontractor Approval: Confirm the factory has a written policy requiring your approval for any subcontracting involving your IP.
- Interview Staff: Ask workers (randomly selected) about:
-
Digital Security Audit:
- Assess IT controls:
- Encryption of sensitive data.
- Restricted access to design files.
- Network monitoring for data exfiltration.
- Assess IT controls:
Phase 3: Testing & Ongoing Monitoring
-
Covert Testing (If Permitted):
- "Mystery Shopper" Test: Send a non-disclosure request to test their response.
- Sample Leak Test: Provide a uniquely marked sample and track if it appears illicitly online.
-
Contractual Safeguards:
- Include IP protection clauses in contracts:
- Penalties for counterfeiting.
- Right to audit at any time.
- Joint ownership of tooling/molds.
- Restrictions on producing similar products for competitors.
- Include IP protection clauses in contracts:
-
Continuous Monitoring:
- Market Surveillance: Use tools like Brand Monitoring Software (e.g., MarkMonitor, Red Points) to detect fakes.
- Unannounced Audits: Conduct surprise checks annually.
- Supply Chain Mapping: Ensure no unapproved subcontractors are added.
Key Red Flags During Verification
| Area | Warning Signs |
|---|---|
| Documentation | Vague policies, missing training records, no incident reports. |
| Physical Security | Unlocked storage, poor visitor logs, inadequate waste disposal. |
| Personnel | Inconsistent answers about IP rules, lack of NDAs on file. |
| Digital Security | Shared passwords, unencrypted files, no IT audits. |
| Subcontracting | Refusal to disclose subcontractors or approval processes. |
Tools & Resources
- Audit Frameworks: Use standards like the Brand Protection Audit Checklist (from ICC or ACG).
- Tech Solutions: Implement Track & Trace systems (e.g., QR codes, RFID) to monitor product flow.
- Industry Associations: Leverage groups like the International AntiCounterfeiting Coalition (IACC) for best practices.
Final Tip: Start with high-risk suppliers (e.g., those producing luxury goods or complex tech). Always prioritize transparency—a factory hiding information is a major risk. Combine documentation, on-site checks, and continuous monitoring for robust protection.
Request an On-site Audit / Inquiry