“Protect your e-commerce from counterfeit and online fraud”
Transcription
“Protect your e-commerce from counterfeit and online fraud”
“Protect your e-commerce from counterfeit and online fraud” 04.12.2013 Confidential – for intended recipient only 2 The Certilogo Authenticator is accessible via Web and Mobile. MOBILE Sign-up via Facebook, Google+ or e-mail. Works in 8 languages, before or after purchase. During product authentication the consumer provides valuable information for example on where the product has been found (retailer). WEB Used by brand protection managers, license managers, e commerce and supply chain managers. Proprietary “software as a service” online tool that translates product authentications performed by consumers and retailers into intelligence for brand owners on fraudulent retailers and supply chain security (e.g. subcontractors involved in overproduction). The internet economy of the G20 will be worth £2.7 trillion by 2016, BUT...... • 40,000 websites compromised by cybercriminals every week • 20% of a brand’s online traffic is being diverted away from its websites • $80 billion annually is the cost of digital piracy • $600 billion annually (7% of world trade) value of counterfeit goods sold • 1 in 6 products sold online is identified as counterfeit • 30% of all counterfeit seizures in the EU are linked to internet distribution 96% of companies admit that guarding their online assets is now essential for the success of their brand, but only 40% have a strategy in place 6 Online revenue – trust is essential.... 7 Search engines are still the main referral source to e-commerce sites selling deceptive fakes HOW DID YOU CONNECT TO THAT SITE? How did you connect to that site? People who bought a fake from… Marketplace “ eCommerce site Source: I wanted a bargain and got a fake instead. All Internet channels. Mar. 2012-Feb. 2013 8 ” The majority of deceived customers thought the site was official or an authorised reseller of the brand HOW DID YOU CONNECT TO THAT SITE? Why didn’t you but directly from the brands’ official website? “ Source: I wanted a bargain and got a fake instead. All Internet channels. Mar. 2012-Feb. 2013 People that bought a fake from e-commerce site. 9 ” Counterfeiters use a mix of price, assortment and IP cloning to deceive consumers HOW DID YOU CONNECT TO THAT SITE? Why did you decide to buy through that specific website? “ Source: I wanted a bargain and got a fake instead. All Internet channels. Mar. 2012-Feb. 2013 10 ” NetNames introduction and approach We protect your brand and increase your online revenues adopting a holistic approach 15 years Brand Protection 10 offices 350 employees 25% Fortune 100 30% FTSE 100 40% CAC 30% DAQ Industry focused INTA, IACC, IQPC, AGMA, ACG UK Switzerland France Germany Denmark Sweden Norway New York LA Protecting your brand from online counterfeiting, trademark infringements and cyber-fraud Domain Name Management Effective portfolio management. Ensuring traffic to your site is optimized Secure Maintaining customer integrity and trust in your websites • • • • • • IP protected Reduced counterfeit Increased sales Reduced costs Portfolio optimisation Strategic advice gTLD HOW DID YOU CONNECT TO THAT SITE? ONLINE THREATS TO BRANDS REVENUE AND REPUTATION 12 What are the online threats to brands and e-commerce? 1. Traffic Diversion 2. Revenue Dilution 3. Reputational Damage Cybersquotting Typosquotting Links on Social Media ONLINE DISTRIBUTION OF COUNTERFEIT GOODS Copycat & Rogue Websites / Mobile Apps Online Marketplace infringements gTLDs - friend & foe Illegal File sharing / streaming Reputation attacks on Social Media 13 Example ‘Type 1’ rogue website selling counterfeits http://www.hunterboots-sale.net// ….traffic: 4,620 web visitors per day!! Domain registrant: chen shoucheng xiamenshisimingquxia nyuehuayuan Fujian 360000 CN hunterbootsale@163. com 14 ‘Type 2’ rogue website: http://columbiajakker.info “columbia” in the domain name itself , the site bears a small resemblance to the genuine Columbia site. The site sells variety of branded products - Columbia - North Face - Spyder - Canada Goose 15 ‘Type 3’ rogue website: www.jacketbay.com No “columbia” in the domain name itself , but the site looks and feels like the a genuine Columbia website. The site only sells Columbia branded products 16 Don’t forget global online marketplaces – there are many.... MercardoLibre Brazil MercardoLibre Argentina MercardoLibre Chile MercardoLibre Columbia MercardoLibre Costa Rica MercardoLibre Dominican MercardoLibre Ecuador MercardoLibre Mexico MercardoLibre Panama MercardoLibre Peru MercardoLibre Uruguay MercardoLibre Venezula alibaba.cn All Global eBays eBid (UK) Made-in-china Hood (Germany) Deremate (Argentina) Marktplaats (Netherlands) Speurders.nl Kapaza (Belgium) china.cn ecplaza.net tradekey.com Worldbid Trademe Craigslist Taobao Alibaba.com Ubid Fuzing meggagoods Mobilephoneexchange china.cn ecplaza.net tradekey.com Worldbid Trademe BidonUSA mobilephones.cn Ubid Fuzing BidonUSA olx.ph ECVV Ec21 IndiaMart Amazon.com Amazon UK Amazon Canada Amazon France Amazon Germany Amazon France Amazon Japan DIYTrade ECEurope iOffer MGFTrade SulekhaB2B Sulit TooToo br.tradeholding.com busca.aonde.com uk.ebid.net worldbidfashion Amprice Auvito Dubli QXL Tradera Priceminister (France) slickdeals.net Bizrate dealtime ecrater bidorbuy.co.za Dealsea Dealcatcher Souq.com Twenga.com Dealighted.com 17 sell.com bargainist.com boddit.com locanto.com.mx disnet1.org alsoshop.com mystore.com dreams.appee.com lotsofwholesale.com brokerbin proxis.be Mobilephoneexchange Itrademarket trade.swissinfo.net Commerce TW Global sources (China) Busytrade mobilephones.cn Dhgate.com Pricegrabber Tradeboss (Romania) Allegro (Poland) Cheapstingybargins.com xpbargains.com japanese.tradevv exporters.sg All Global Yahoos Example 1: Marketplace selling fakes 18 Example 2: Marketplace selling fakes 19 HOW DID YOU CONNECT TO THAT SITE? HOW TO STOP INFRINGEMENTS TO YOUR BRAND 20 NetNames Brand Protection Methodology A bespoken service to your needs Detection Assessment • • • • • • • Analysis • Prioritization (product lines, site traffic, regions, seller IDs, revenue exposure ect.) • Scoring vs. priority Global marketplaces Cybersquatting Traffic diversion Affiliate abuse ImageFlare Non-Indexed websites Investigation & Countermeasures • • • • • Counterfeit investigation Infringement insight Top analyst services Test Purchasing Offline investigation BRAND ABUSE Enforcement • • • • • Takedowns Domain suspensions Disruption measures Legal actions Bespoke analytics & reporting Example 1: Suspension of rogue website The workflow of the enforcement: Step 1: Automatic detection of the infringement Step 2: Confirmed and reviewed by enforcement analysts and further reviewed by the client After initial contact with the registrar, the registrar tracked down over 25 additional rogue sites and suspend them because of our relationship and credibility. Result: Within 2 days, all the domain names in question were suspended by the registrar 22 End-to-end case study – Taobao listings removed We enforce effectively on Taobao while others can’t. Step 1: Automatic detection of the infringement Step 2: Confirmed and reviewed by enforcement analysts and report We have better understanding in Taobao IP policy and we communicate with the IP enforcement department of Taobao on a daily basis. Result: Within 2-3 working days, the listings are removed 23 Example result for a client – becoming a harder target 600 Number of Domains Closed 500 400 300 Closed Cumulative Closed 200 Number of infringing domains reducing as client becomes a harder target 100 0 April May June July August Month September 24 October November December Client case study: number of marketplace listings enforced by month 91% decrease since January 25 HOW DID YOU CONNECT TO THAT SITE? NEW FRONTIERS - MOBILE APPS 26 A few facts about Mobile Apps.... • 100bn apps have been downloaded from Apple’s App Store and Google’s Play marketplace • Approx 15bn apps are now downloaded each quarter across the iOS, Android, Blackberry, and Microsoft mobile ecosystems. • 58% of consumers with smart phones regularly shop online through Mobile Apps. • 61% of people state their mobile experience affects their opinion of brands. • More than 20,000 malicious and fraudulent apps for Android devices were found in July 2012 alone. 27 Mobile apps are the latest threat vector for cyber criminals 28 NetNames Mobile Apps Monitoring • Software developed specifically to monitor Apple App store, Google Play, Blackberry World and Windows Mobile • Detect & remove rogue, fraudulent, unauthorized or infringing apps • Expert analysis & reporting on scale, scope and origin of threats • Detection and prioritization of unauthorized or infringing apps by: • • • • • • • Brand / Title Developer Downloads Marketplace Rating Price Image 29 Enforcement of infringing apps • NetNames can deliver enforcement services against infringing or counterfeit apps on • Google Play • Apple App store • BlackBerry World • Windows • Compliance rates over 70% and growing.... • Takedown times – can be several days 30 Contact Chizzolini Daniele Corporate Sales & Account Manager at NetNames GmbH Telephone +41 (0)44 204 16 85 Email daniele.chizzolini@netnames.com 31