Phase 1:Pre-Audit Research Documentation Review

  Blog    |     March 09, 2026

Verifying a factory's brand protection practices is crucial to safeguard your IP, reputation, and revenue from counterfeiting, diversion, and unauthorized production. Here’s a step-by-step guide to conduct thorough due diligence:

  1. Request Formal Documentation:

    • Brand Protection Policy: Ask for a written policy outlining procedures for handling sensitive designs, materials, and IP.
    • Employee NDAs/Training Records: Verify signed Non-Disclosure Agreements (NDAs) and proof of regular anti-counterfeiting training.
    • Access Control Logs: Review records of visitor/employee access to production areas, especially for sensitive products.
    • Incident Reports: Request documentation of past IP breaches, counterfeiting incidents, and corrective actions taken.
    • Third-Party Audits: Check reports from independent auditors (e.g., SGS, BSCI) focusing on IP protection.
  2. Verify Certifications:

    • Confirm relevant certifications like ISO 28000 (Supply Chain Security) or Anti-Counterfeiting certifications (e.g., from ACFE).
  3. Reference Checks:

    • Contact past clients (especially in your industry) to ask about:
      • Evidence of counterfeiting linked to the factory.
      • Strictness in enforcing NDAs.
      • Handling of prototype/sample security.

Phase 2: On-Site Verification Audit

  1. Physical Security Inspection:

    • Production Access: Observe if sensitive areas (e.g., R&D, tooling rooms) are secured with access logs, cameras, and visitor escorts.
    • Inventory Controls: Check if branded materials/components are stored in locked, inventoried areas with restricted access.
    • Waste Disposal: Verify secure disposal of defective products, scrap materials, and packaging to prevent diversion.
  2. Process & Personnel Checks:

    • Interview Staff: Ask workers (randomly selected) about:
      • Training on brand protection.
      • Consequences of IP violations.
      • Procedures for reporting suspicious activity.
    • Review Workflow: Trace how designs/materials move through the factory. Ensure digital files are password-protected and access is audited.
    • Subcontractor Approval: Confirm the factory has a written policy requiring your approval for any subcontracting involving your IP.
  3. Digital Security Audit:

    • Assess IT controls:
      • Encryption of sensitive data.
      • Restricted access to design files.
      • Network monitoring for data exfiltration.

Phase 3: Testing & Ongoing Monitoring

  1. Covert Testing (If Permitted):

    • "Mystery Shopper" Test: Send a non-disclosure request to test their response.
    • Sample Leak Test: Provide a uniquely marked sample and track if it appears illicitly online.
  2. Contractual Safeguards:

    • Include IP protection clauses in contracts:
      • Penalties for counterfeiting.
      • Right to audit at any time.
      • Joint ownership of tooling/molds.
      • Restrictions on producing similar products for competitors.
  3. Continuous Monitoring:

    • Market Surveillance: Use tools like Brand Monitoring Software (e.g., MarkMonitor, Red Points) to detect fakes.
    • Unannounced Audits: Conduct surprise checks annually.
    • Supply Chain Mapping: Ensure no unapproved subcontractors are added.

Key Red Flags During Verification

Area Warning Signs
Documentation Vague policies, missing training records, no incident reports.
Physical Security Unlocked storage, poor visitor logs, inadequate waste disposal.
Personnel Inconsistent answers about IP rules, lack of NDAs on file.
Digital Security Shared passwords, unencrypted files, no IT audits.
Subcontracting Refusal to disclose subcontractors or approval processes.

Tools & Resources

  • Audit Frameworks: Use standards like the Brand Protection Audit Checklist (from ICC or ACG).
  • Tech Solutions: Implement Track & Trace systems (e.g., QR codes, RFID) to monitor product flow.
  • Industry Associations: Leverage groups like the International AntiCounterfeiting Coalition (IACC) for best practices.

Final Tip: Start with high-risk suppliers (e.g., those producing luxury goods or complex tech). Always prioritize transparency—a factory hiding information is a major risk. Combine documentation, on-site checks, and continuous monitoring for robust protection.


Request an On-site Audit / Inquiry

SSL Secured Inquiry