Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

What You Should Do About Tainted Goods from China and Other Global Supply Chain Risks

If you and your company are part of the global economy, it’s essential that you monitor the work product of your suppliers and business partners overseas—early, often and forever.

The US government warnings about tainted imports from China are ominous and ongoing. In July 2007 poisonous chemicals were found in toothpaste. This was just a month after imports of farm-raised Chinese seafood and lead paint in Thomas the Tank Engine toy trains were detained. And May had seen contaminated pet foods sicken and kill thousand of US cats and dogs. Now its humans, when earlier this month every parents' nightmare became a reality: Melamine contaminated infant formula poisoned more than 50,000 Chinese infants and resulted in at least four deaths.

While much government attention focuses on the problems in China, experts say the emergence of these deficient goods highlights the risks associated with today’s global supply chains. The far-flung networks of suppliers and transportation systems connecting them to their destinations present a new set of challenges.

Longer supply chains mean more participants, and with that, come bigger risks. “There are more people that companies need to watch and make sure they trust,” says Yossi Sheffi, professor of engineering at MIT and an expert in risk analysis and supply chain management. Supplier visibility is a problem for many organizations, according to Mark Hillman, a research director at AMR Research, who says many companies operating globally don’t know every player in their supply chain as well as they should. In addition, increased speed means decreased time for product checks. Goods rarely stagnate in warehouses, so there is less opportunity to conduct quality checks, says Sheffi.

Such threats to the supply chain increase the importance of security, which like any other type of risk management, can be a hard sell. Getting it in place can be costly, and ROI is hard to justify, unless, of course, something goes wrong. The key to selling security, experts say, is to emphasize the collateral benefits—the kind of ROI that will be realized regardless of disaster. A 2006 Stanford report, which studied the supply chain behaviors of 11 logistics companies that are considered innovators in supply chain security, outlines some of those benefits: improved efficiency, better customer satisfaction, better inventory management, and reduced cycle and shipping time. (See a copy of the study here.)

Below are some of the most common supply chain risks according to Sheffi and Hillman, and ways you can manage them through security, resilience and vigilance.

What Can Go Wrong in a Global Supply Chain

The unexpected loss of a supplier: According to a study conducted by AMR Research in 2006, the number-one concern across industries is supplier failure and continuity. It’s particularly difficult to keep track of suppliers that may go out of business with little forewarning when you outsource, says Yossi Sheffi, an MIT professor and supply chain risk expert. “Suppliers in the US or Europe are easier to manage than those in the bowels of China.”

Geopolitical problems: A terrorist attack in the area of a major port can cause significant disruptions or shut down service altogether.

Damage to the brand: This could be related to product safety or counterfeiting, says Sheffi. “A company’s suppliers might be using child labor or sweatshops, or stealing intellectual property and copying the brand.”

Natural disasters and diseases: A hurricane near a major port, a disease outbreak (such as avian flu) or any other natural event over which there is limited control.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: Supply Chain
Latest Blog Posts
Whitepapers
  • IBM X-Force Threat Intelligence
    In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
    Learn more »
  • Swiss Nuclear Power Plant Improves Business Continuity
    Learn how Kernkraftwerk Leibstadt (KKL), a Swiss nuclear power plant, achieved 95% virtualization with 50% fewer servers in just two months by implementing a Vblock System. The solution ensures that KKL can reliably deliver the continuous electricity supply safely and cost effectively.
    Learn more »
  • The Three Essential Steps to Successful Cloud Migration
    Businesses and enterprises have quickly realised the power and efficiency of cloud computing, but migrating to the cloud can be a challenging process. This guide leads you through the three key steps you should take to assess your workload, select the most appropriate cloud model and ensure your cloud provider’s migration methodology stacks up.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments

Computerworld
ARN
Techworld
CMO