Security: A Four-Step Approach

There is no "silver bullet" for protecting the pharmaceutical supply chain. In this article, Susanne Hasselman, director of Axess Technologies, outlines a four-step strategy to improve brand protection.

1 of 2 < 1 | 2 View on one page
By Susanne Hasselmann, Director, Axess Technologies Ltd.

Technology can play an important part in a brand protection program, but technology introduced for its own sake is unlikely to be effective, and there are no “silver bullets” that are guaranteed to stop every criminal effort. An effective and comprehensive security strategy uses technology to support and enhance other elements of the strategy such as legal protection, enforcement policies and operational processes and procedures. The actual components of the strategy and the importance accorded to each one will depend on the organisation’s operations, culture, resources, organizational structure and product profile.

There are many instances where security technology can play a vital role as part of an overall security strategy:

  • In a crisis, authentication features can assist the public to identify whether a product is genuine (or at least suspect) and tracking systems can facilitate recalls from the market. In addition, the ability to pinpoint where the problem originates is invaluable.

  • Both anti-tamper devices and anti-theft systems prevent unauthorized removal of product from packaging or retail stores.

  • Authentication and tracking technologies can support enforcement efforts and make them more efficient and effective by enabling quick authentication in the field, by tracking 3rd party compliance or by providing evidence in court.

  • Security technology provides an effective deterrence to would-be criminals. Security features increase the barrier to entry (cost and time) and often divert the fraudster to another and easier target that is less well protected. In addition they increase the criminal’s risk of detection – which is probably the most powerful deterrence!
Technology Selection

There is a substantial array of security technology suppliers in the market and it is therefore not difficult to find what looks like a suitable security device. However, it is much more difficult to select an appropriate technology to address an incident-specific or company-specific set of problems that is also cost-effective. To do this requires time, research and resources.

The chosen technology has to be fit for purpose. It must address the threats to the individual pharmaceutical products; in addition, it must comply with regulatory requirements, it must be suitable for existing manufacturing processes and should withstand the environmental conditions experienced during storage and distribution.

It is therefore essential to have a rigorous selection process in place that delivers the optimum solution for a particular company’s needs. At the same time, it should allow a company to set up a system of continuous monitoring and review once the security technology solution has been implemented. This will involve reviewing the effectiveness of the implemented solution and upgrading it if required.

The ATL 4 Step Selection Process

Axess Technologies has developed a process (The ATL 4 Step Process) that ensures all relevant needs are taken into account when designing a technology program. It is a mature step-by-step elimination process that has been successfully implemented in the past and should therefore form the basis of any selection process.

Establishing the Need

The “needs analysis” is the first and most important step in the process. It clearly defines and documents the company’s requirements for a security technology solution. It provides the basis for technology selection and makes the long term review and monitoring of a solution much easier.

The “needs analysis” will address a number of factors. These include the following:

  • How does the product move through the supply chain? Where are the risk points?

  • What data/historical evidence is available in respect of criminal or unauthorized activities?

  • How does technology need to support existing company activities?

  • How and where is the product currently authenticated?

  • How and where will the product be authenticated in the future?

  • What are the product/packaging components and how are these manufactured?
These and other needs are established through a series of interviews, supply chain mapping, data gathering and analysis.

Product security reaches across a company’s functional boundaries and it is therefore important to build an organizational consensus. The “needs analysis” permits this to happen as it takes into account all views of stakeholders within the organization. It also allows for thinking ‘outside the box’: what appeared to be a technology solution in the first instance might be better served by a tightening of procedures or agreements.

Feature Selection

The findings from the “needs analysis” above are translated into technical requirements that are then matched with appropriate packaging or product components. This is how a list of features is derived. These are reviewed in terms of advantages and disadvantages and thus a final shortlist of features is selected.

Product Selection

Once the features have been selected, detailed technical specifications are compiled and a list of possible suppliers is produced. A final short list is drawn up by screening suppliers according to company supplier criteria, as well as technical requirements. A final short list will allow the company to select their preferred supplier.

It is not always necessary to source security technologies from third parties. It may be possible to adapt existing manufacturing processes and packaging specifications to incorporate a number of security features. These could include microtext, intentional mistakes, embossing and cutting, as well as altering packaging shapes and designs.

1 of 2 < 1 | 2 View on one page
Show Comments
Hide Comments

Join the discussion

We welcome your thoughtful comments.
All comments will display your user name.

Want to participate in the discussion?

Register for free

Log in for complete access.

Comments

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments