What You Should Do About Tainted Goods from China and Other Global Supply Chain Risks
- 25 September, 2008 09:50
The US government warnings about tainted imports from China are ominous and ongoing. In July 2007 poisonous chemicals were found in toothpaste. This was just a month after imports of farm-raised Chinese seafood and lead paint in Thomas the Tank Engine toy trains were detained. And May had seen contaminated pet foods sicken and kill thousand of US cats and dogs. Now its humans, when earlier this month every parents' nightmare became a reality: Melamine contaminated infant formula poisoned more than 50,000 Chinese infants and resulted in at least four deaths.
While much government attention focuses on the problems in China, experts say the emergence of these deficient goods highlights the risks associated with today’s global supply chains. The far-flung networks of suppliers and transportation systems connecting them to their destinations present a new set of challenges.
Longer supply chains mean more participants, and with that, come bigger risks. “There are more people that companies need to watch and make sure they trust,” says Yossi Sheffi, professor of engineering at MIT and an expert in risk analysis and supply chain management. Supplier visibility is a problem for many organizations, according to Mark Hillman, a research director at AMR Research, who says many companies operating globally don’t know every player in their supply chain as well as they should. In addition, increased speed means decreased time for product checks. Goods rarely stagnate in warehouses, so there is less opportunity to conduct quality checks, says Sheffi.
Such threats to the supply chain increase the importance of security, which like any other type of risk management, can be a hard sell. Getting it in place can be costly, and ROI is hard to justify, unless, of course, something goes wrong. The key to selling security, experts say, is to emphasize the collateral benefits—the kind of ROI that will be realized regardless of disaster. A 2006 Stanford report, which studied the supply chain behaviors of 11 logistics companies that are considered innovators in supply chain security, outlines some of those benefits: improved efficiency, better customer satisfaction, better inventory management, and reduced cycle and shipping time. (See a copy of the study here.)
Below are some of the most common supply chain risks according to Sheffi and Hillman, and ways you can manage them through security, resilience and vigilance.
What Can Go Wrong in a Global Supply Chain
The unexpected loss of a supplier: According to a study conducted by AMR Research in 2006, the number-one concern across industries is supplier failure and continuity. It’s particularly difficult to keep track of suppliers that may go out of business with little forewarning when you outsource, says Yossi Sheffi, an MIT professor and supply chain risk expert. “Suppliers in the US or Europe are easier to manage than those in the bowels of China.”
Geopolitical problems: A terrorist attack in the area of a major port can cause significant disruptions or shut down service altogether.
Damage to the brand: This could be related to product safety or counterfeiting, says Sheffi. “A company’s suppliers might be using child labor or sweatshops, or stealing intellectual property and copying the brand.”
Natural disasters and diseases: A hurricane near a major port, a disease outbreak (such as avian flu) or any other natural event over which there is limited control.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Bouncing Back From CIO Unemployment
Union slams latest fibre-to-premise trial in Tasmania
Cloud-Based Mobile Device Security Streamlines Data Protection
Read this white paper to learn why cloud-based security offers superior protection that meets today’s requirements for identifying and preventing access to malicious sites and applications while reducing management complexity and IT staff time and effort. This whitepaper discusses: • Increased use of mobile devices and the associated risks • Ways to address security challenges • Benefits of cloud-based anti-malware solutions
Taking Managed Security Services to the Next Level
In this white paper, we will outline the changing landscape of security; the importance of a high-security posture; the elements of effective Web, endpoint, user and mobile protection; and the ways in which Webroot helps partners increase the value and profitability of their security practices.
Embracing Behaviour-Based Pricing Models
The telecommunications industry is one of the most challenged, fast-moving and evolving industries thanks to the worldwide embrace of mobile lifestyles that demand new services, solutions and experiences. In this survey, we investigate where and how new thinking around data, analytics and the actionable customer intelligence can further monetise mobile subscribers. Click to download!