ISO 22380:2018
(Main)Security and resilience — Authenticity, integrity and trust for products and documents — General principles for product fraud risk and countermeasures
Security and resilience — Authenticity, integrity and trust for products and documents — General principles for product fraud risk and countermeasures
This document establishes general principles for an organization to identify the risks related to various types of product fraud and product fraudsters. It provides guidance on how organizations can establish strategic, business countermeasures to prevent or reduce any harm, tangible or intangible loss and cost from such fraudulent attacks in a cost-effective manner. This document is applicable to all organizations regardless of type, size or nature, whether private or public sector. The guidance can be adapted to the needs, objectives, resources and constraints of the organization. This document is intended to promote common understanding in the field of product-related fraud risk and its countermeasures.
Sécurité et résilience — Titre manque
General Information
Standards Content (Sample)
INTERNATIONAL ISO
STANDARD 22380
First edition
2018-08
Security and resilience —
Authenticity, integrity and trust for
products and documents — General
principles for product fraud risk and
countermeasures
Reference number
©
ISO 2018
© ISO 2018
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO 2018 – All rights reserved
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 General principles for product fraud risk and countermeasures .2
4.1 Evaluation of situational context of product fraud . 2
4.1.1 Considering the product fraud opportunities . 2
4.1.2 Evaluating the product fraud risk . 2
4.2 Classification of intention and motive of product fraud . 3
4.3 Classification of product fraud activities . 4
4.4 Classification of product fraudsters . 5
4.5 Profiling and conducting a risk assessment of product fraud . 6
4.5.1 Profiling product fraud . 6
4.5.2 Risk assessment . . 6
4.6 Selection and implementation of countermeasures . 8
4.6.1 Approaches and strategies . 8
4.6.2 Selecting countermeasures based on ROSI and risk level . 9
4.7 Effectiveness assessment of countermeasures .10
Annex A (informative) Examples of profiling, risk assessment and countermeasures .11
Annex B (informative) Decision making on security countermeasure investments .12
Bibliography .14
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www .iso .org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO’s adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see www .iso
.org/iso/foreword .html.
This document was prepared by Technical Committee ISO/TC 292, Security and resilience.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www .iso .org/members .html.
iv © ISO 2018 – All rights reserved
Introduction
There is evidence that virtually every type of product fraud has been committed, including counterfeiting
of infant formula, prescription drugs, consumer goods and after-market parts for automobiles, aircraft
and nuclear power plants. A large number of individuals or organized criminal groups are committing
product fraud, with various motivations, such as financial gain, which is threatening global public
health and safety. The public health and safety risks associated with product fraud are diverse and
significant when the products are distributed through legitimate global supply chains. Examples
include lethal amounts of melamine in infant formula, medicines with little or no active ingredients,
aircraft replacement parts that fail and substandard electrical cords that catch fire.
Classical crime prevention strategies begin with an analysis of the situational contexts of a criminal
offence in order to find the structural opportunity of a particular crime. Next, specific types of crime
are classified according to modus operandi (MO) together with types of criminal intention and motive.
Then, the types of criminal offenders and their behaviours are examined to determine how to prevent
or deter the crime.
This document starts with understanding the external and internal situational context of product fraud.
It considers causes of the fraud, such as product marketplaces and product fraud-related opportunities.
It then examines the intentions and motives for product fraud, the types of product fraud, the types of
product fraudsters and strategic countermeasures that can be taken against product fraud.
A better understanding and classification of intentions and motives, product fraud activities and
fraudsters leads to a better selection of countermeasures. Product fraud countermeasures include
profiling product fraud, risk assessment and the selection/implementation of bespoke countermeasures.
Figure 1 illustrates how a strategy for product fraud countermeasures and control as a continual
process starts from an analysis of the situational context of product fraud, moves through several
classifications of product fraud and fraudsters, and results in the selection/implementation of bespoke
countermeasures and their effective assessment.
Figure 1 — The continual process for a product fraud countermeasures and control strategy
INTERNATIONAL STANDARD ISO 22380:2018(E)
Security and resilience — Authenticity, integrity and trust
for products and documents — General principles for
product fraud risk and countermeasures
1 Scope
This document establishes general principles for an organization to identify the risks related to various
types of product fraud and product fraudsters. It provides guidance on how organizations can establish
strategic, business countermeasures to prevent or reduce any harm, tangible or intangible loss and cost
from such fraudulent attacks in a cost-effective manner.
This document is applicable to all organizations regardless of type, size or nature, whether private or
public sector. The guidance can be adapted to the needs, objectives, resources and constraints of the
organization.
This document is intended to promote common understanding in the field of product-related fraud risk
and its countermeasures.
2 Normative references
The following documents, in whole or in part, are normatively referenced in this document and are
indispensable for its application. For dated references, only the edition cited applies. For undated
references, the latest edition of the referenced document (including any amendments) applies.
ISO 22300, Security and resilience — Vocabulary
ISO 31000:2018, Risk management — Guidelines
3 Terms and definitions
For the purposes of this document, the terms and definitions given in ISO 22300 and the following apply.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https: //www .iso .org/obp
— IEC Electropedia: available at https: //www .electropedia .org/
3.1
product fraud
wrongful or criminal deception that utilizes material goods for financial or personal gain
Note 1 to entry: Fraud means wrongful or criminal deception intended to result in financial or personal gain that
creates social or economic harm.
Note 2 to entry: Products include electronic media carried on material goods.
Note 3 to entry: Fraud related to digitally transmitted electronic media shall be considered separately.
4 General principles for product fraud risk and countermeasures
4.1 Evaluation of situational context of product fraud
4.1.1 Considering the product fraud opportunities
The organization should base its fraud control strategies on a proper understanding of the intentions,
motives, nature and types of the fraud and the fraudster.
The organization should consider all of the three elements (fraudster, victim/target and poor
guardianship) essential in crime occurrence for its basis of applied crime prevention.
Crime occurs when a motivated fraudster and suitable target come together in a time and a place,
without a capable guardian present.
Product fraudsters commit fraud crime when they perceive that a specific fraud target is vulnerable,
there are sufficient rewards from fraud attacks, and there is no or weak guardianship and
countermeasures for deterring, delaying, hindering or stopping their attacks. The vulnerability is
referred to as “fraud opportunity”. This is based on the “rational choice” theory in criminology, which
states that people commit crime when they perceive the risk of offending to be low and the rewards to
be high, as illustrated in Figure 2.
Figure 2 — The crime triangle for product fraud opportunity
The organization should distinguish between product fraud and financial fraud insofar that product
fraud is always related to products whereas financial fraud is broader and is not necessarily related to
products.
The main elements of financial fraud are pressure, opportunity and rationalization. The fraudsters in
financial fraud are usually employees, whereas the fraudsters in product fraud are varied, as suggested
in Table 4.
4.1.2 Evaluating the product fraud risk
The organization should evaluate the situational context of product fraud. It should understand the
factors that significantly influence the product fraud risk and the effectiveness of countermeasures.
Evaluating the external situational context of product fraud risk includes the following:
— the social and cultural, political, legal, regulatory, financial, technological and economic context;
— the natural and competitive environment, whether international, national, regional or local
marketplaces and the supply chain;
— key drivers and trends that have an impact on the particular products and brand-owners;
— relationships with, and perceptions and values of, external stakeholders.
2 © ISO 2018 – All rights reserved
Evaluating the internal situational context of product fraud risk includes the following:
— governance, organizational structure, roles and accountabilities;
— policies, objectives and the strategies that are in place to achieve them;
— capabilities, which are understood in terms of resources and knowledge (e.g. capital, time, people,
processes, systems and technologies);
— information systems, information flo
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.