Gray Markets: Prevention, Detection and Litigation
β Scribed by David R. Sugden
- Year
- 2009
- Tongue
- English
- Leaves
- 359
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
It's often said that the 21st century is characterized by a flat world in which globalization, technology, and the Internet have each contributed to level the economic playing field. But for companies that manufacture and sell their products internationally, the world is not exactly flat -- it is tilted. From cars to cigarettes to pianos to pharmaceuticals, products that were manufactured to be sold in other countries are finding their way back to the United States where they are sold through unauthorized and illegal channels. This unauthorized economy - the "gray market" - is growing in size and scope at an alarming rate: information technology manufacturers alone have estimated losses at $40 billion in annual sales. In Gray Markets: Prevention, Detection, and Litigation, David Sugden provides the first comprehensive analysis of the gray market as well as a blueprint for attorneys and businesses to prevent, detect, and litigate gray market cases. In Gray Markets, Sugden introduces readers to a variety of strategies to prevent a brand owner's products from finding their way into unauthorized distribution channels. From educational and contractual methods that communicate the importance of gray market abstinence, to on-site security and modern tracking technologies, and to the use of private investigators and even "dumpster dives," the book offers specific methods to prevent supply chain leakage, while also examining the legal boundaries of gray market investigations.
π SIMILAR VOLUMES
<p><span>Surveillance and Threat Detection</span><span> offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. </span></p><p><span>Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance a
<p><i>Insider Threat: Detection, Mitigation, Deterrence and Prevention</i> presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former em
Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also in
<p>The chapters in this volume were presented at the JulyβAugust 2008 NATO Advanced Study Institute on Unexploded Ordnance Detection and Mitigation. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the ninth time we gathered
Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se