𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Gray Markets: Prevention, Detection and Litigation

✍ Scribed by David R. Sugden


Year
2009
Tongue
English
Leaves
359
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


It's often said that the 21st century is characterized by a flat world in which globalization, technology, and the Internet have each contributed to level the economic playing field. But for companies that manufacture and sell their products internationally, the world is not exactly flat -- it is tilted. From cars to cigarettes to pianos to pharmaceuticals, products that were manufactured to be sold in other countries are finding their way back to the United States where they are sold through unauthorized and illegal channels. This unauthorized economy - the "gray market" - is growing in size and scope at an alarming rate: information technology manufacturers alone have estimated losses at $40 billion in annual sales. In Gray Markets: Prevention, Detection, and Litigation, David Sugden provides the first comprehensive analysis of the gray market as well as a blueprint for attorneys and businesses to prevent, detect, and litigate gray market cases. In Gray Markets, Sugden introduces readers to a variety of strategies to prevent a brand owner's products from finding their way into unauthorized distribution channels. From educational and contractual methods that communicate the importance of gray market abstinence, to on-site security and modern tracking technologies, and to the use of private investigators and even "dumpster dives," the book offers specific methods to prevent supply chain leakage, while also examining the legal boundaries of gray market investigations.


πŸ“œ SIMILAR VOLUMES


Surveillance and Threat Detection: Preve
✍ Richard Kirchner πŸ“‚ Library πŸ“… 2014 πŸ› Butterworth-Heinemann 🌐 English

<p><span>Surveillance and Threat Detection</span><span> offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack. </span></p><p><span>Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance a

Insider Threat. Prevention, Detection, M
✍ Michael G. Gelles πŸ“‚ Library πŸ“… 2016 πŸ› Butterworth-Heinemann 🌐 English

<p><i>Insider Threat: Detection, Mitigation, Deterrence and Prevention</i> presents a set of solutions to address the increase in cases of insider threat. This includes espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft from current or former em

Insider threat: prevention, detection, m
✍ Turner, James;Gelles, Michael G πŸ“‚ Library πŸ“… 2016 πŸ› Elsevier Science & Technology;Butterworth-Heineman 🌐 English

Presents a set of solutions to address the increase in cases of insider threat, including espionage, embezzlement, sabotage, fraud, intellectual property theft, and research and development theft. Focuses on management and employee engagement, as well as ethical, legal, and privacy concerns. Also in

Unexploded Ordnance Detection and Mitiga
✍ Patrice Abry, StΓ©phane Jaffard (auth.), Jim Byrnes (eds.) πŸ“‚ Library πŸ“… 2009 πŸ› Springer Netherlands 🌐 English

<p>The chapters in this volume were presented at the July–August 2008 NATO Advanced Study Institute on Unexploded Ordnance Detection and Mitigation. The conference was held at the beautiful Il Ciocco resort near Lucca, in the glorious Tuscany region of northern Italy. For the ninth time we gathered

Intrusion Detection and Prevention
✍ Carl Endorf, Gene Schultz, Jim Mellander πŸ“‚ Library πŸ“… 2003 πŸ› McGraw-Hill Osborne Media 🌐 English

Authors Carl Endorf, Eugene Schultz, and Jim Mellander deliver the hands-on implementation techniques that IT professionals need. Learn to implement the top intrusion detection products into real-world networked environments and covers the most popular intrusion detection tools including Internet Se