Welcome!

News Feed Item

Resilinc Announces SupplyIntel Corporate Social Responsibility (CSR) Module to Protect Against Brand Risk

Customers Harness the Power of Multi-Tier Supply Chain Mapping on Resilinc to Proactively Identify Sub-Tier Vulnerabilities and Protect Their Brand

SANTA CLARA, CA -- (Marketwired) -- 04/29/14 -- Resilinc Corp., the leading provider of supply chain resiliency solutions, today announced the immediate availability of SupplyIntel™ CSR Module™ to help companies interested in taking a proactive stand to protect against threats to their brand arising from inadequate management systems, controls and governance processes involving labor, ethics, and environmental compliance and sustainability.

Most companies have internal corporate policies regarding use of child labor or slave labor, bonded labor, sweat shops and working conditions, minimum pay and employee health, and environment friendly sustainable practices. However, recent examples have shown that companies need to address these issues not only within their own factories and businesses but also outside the four walls by including their direct and sub-tier suppliers.

Increasingly, companies are being held accountable for the conduct of their suppliers and vendors. Apple and its contract manufacturer, Flextronics, provide a recent example. When poor working conditions at Flextronics' factories became public knowledge, Apple received negative publicity which affected its brand. Prior to that, employee suicides at another contract manufacturer, Foxconn in China, also had a negative impact on Apple's brand.

Another notable example of brand damage resulted from the tragic fire at a garment factory in Bangladesh owned by Tazreen Fashions which killed 117 people, making it the deadliest factory fire in Bangladesh history. The Tazreen Fashions factory was found to be a sub-contractor to a supplier to Walmart. Walmart had previously terminated relationships with this factory due to repeated violations and marked it high risk. However, a Walmart supplier had sub-contracted work to Tazreen Fashions, unbeknownst to Walmart. Though Walmart had not sanctioned the use of this sub-contractor, the company was nonetheless held to be morally responsible for having this sub-contractor in its supply chain.

It should be noted that in this Walmart example it was a sub-contractor to a Tier 1 supplier that was in violation of Walmart's code of conduct -- a clear demonstration of why supply chain mapping is now a critical first step in understanding and mitigating brand risk.

In order to proactively protect their brand against these types of threats, companies need to first gain a better understanding of their global supply chain through supply chain mapping, which involves identifying the manufacturing locations worldwide that are used by their component suppliers, and then for each site gain a deeper understanding of their suppliers' practices regarding labor and workers' rights, as well as environmental and sustainable practices.

"Companies are finding their brands are vulnerable as the market holds brand owners accountable for the business practices of their suppliers. As is seen in California with the passing of the SB-657 legislation, this is on its way to becoming a compliance issue," said Bindiya Vakil, CEO of Resilinc. "Brand owners need a better way to identify which factories and sub-tier suppliers are used in their extended supply chain, in order to make sure these suppliers accept and comply with the company's code of conduct. The Resilinc CSR Module leverages the powerful multi-tier mapping capabilities of Resilinc's market-leading technology platform, and enables brand owners to proactively manage the risk to their brands."

Resilinc CSR Module™ for Brand Risk Protection
The Resilinc CSR Module™ is based on the EICC (Electronics Industry Citizenship Coalition) standard and covers the management systems and business practices and controls instituted by the suppliers that govern labor practices, employee health and safety, and environmental compliance and sustainability. It is offered in combination with the unique supply chain mapping capabilities of the Resilinc platform. Resilinc SupplyIntel™ enables companies to identify factories worldwide that are used in manufacturing their parts and raw materials as well as the ownership of the factories, whether owned or sub-contracted.

The Resilinc CSR module enables brand owners to survey suppliers at the supplier and site levels. Resilinc provides all the supplier onboarding, training and data collection services needed to make the CSR survey process a low resource impact undertaking for customers. Additionally, Resilinc's industry leading publish-once, share multiple times methodology enables suppliers to automatically share their business practices with many customers, thereby minimizing the effort required to provide the requisite information.

The Resilinc CSR solution also automatically generates scorecards at a site level and provides a quick heat map of the weakest areas where insufficient management systems and controls are prevalent. This allows the brand owners to quickly identify sites that might need to be audited, and suppliers who may need to be educated.

SupplyIntel Meets Today's Risk Management Challenges

Resilinc SupplyIntel is specifically designed to address multi-tier visibility issues experienced in major global industries, including high-tech and electronics, automotive, medical devices and the life sciences. Resilinc SupplyIntel provides these and other industries with the foundational supply chain mapping capability that is core to addressing the challenges associated with risk management, conflict minerals compliance, business continuity and social responsibility.

With the business-critical addition of CSR capabilities, Resilinc SupplyIntel now delivers a complete and scalable solution for the entire spectrum of risk management challenges. SupplyIntel's comprehensive capabilities include multi-tier mapping, event monitoring, and risk quantification and mitigation tools, together with a broad range of survey modules for business continuity mapping, conflict minerals, corporate social responsibility and supply chain security -- all on a single integrated platform.

Resilinc's model delivers benefits of the network effect as customers can quickly connect with many suppliers and adopt multiple capabilities at the lowest total cost of ownership, with the lowest resource impact and fastest time to value in the industry. Resilinc's clients also realize a growing ROI over time as more and more supplier data can be seamlessly and securely shared with multiple clients.

Resources and Links

About Resilinc
Resilinc is the leading provider of supply chain resiliency solutions and delivers scalable enterprise solutions that enable supply chain professionals to gain visibility across multiple tiers of their complex, global supply chains. With a comprehensive offering that encompasses multi-tier supply chain mapping, single points of failure analytics, global disruption event monitoring and management, mitigation workflow, and part-level supply chain compliance programs such as conflict minerals, Resilinc has become the leader in comprehensive supply chain resiliency solutions. Resilinc helps customers achieve supply chain resiliency through innovative and patent-pending technology, an extensive resiliency-driven supply network, and a proven comprehensive enterprise scale solution that delivers strong value to both clients and supplier partners. For more information, visit www.resilinc.com.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Media Contact:
Jon Bovit
Resilinc
919-461-9680
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...