Counterfeit Risk Self Assessment Checklist for Mid Sized Manufacturers

Counterfeit Risk Self Assessment Checklist for Mid Sized Manufacturers

Introduction: Why Counterfeit Risk Increases as You Scale

Counterfeiting rarely appears overnight.
It grows quietly as manufacturers expand production, add distributors, enter new regions, or outsource packaging.

Mid-sized manufacturers face the highest exposure because growth often outpaces infrastructure.
Processes that worked at a smaller scale begin to fail, not due to negligence, but due to complexity.

This checklist helps you evaluate whether your current systems can detect counterfeit risk before it becomes a regulatory, financial, or reputational issue.

How to Use This Checklist

Answer each question honestly with Yes, No, or Not Sure.

  • Yes means the control exists and is actively enforced

  • No means there is a clear gap

  • Not sure means visibility is already insufficient

Multiple No or Not Sure answers indicate elevated risk.

Section 1: Product Identity and Authentication

Product Identity and Authentication
  1. Can you authenticate every individual unit outside your factory or warehouse?

  2. Do your products carry non-reusable and non-clonable identities?

  3. Can you detect duplicated serial numbers in the field?

  4. Can distributors or inspectors verify authenticity using a simple scan?

  5. Can returned products be authenticated before being reintroduced into inventory?

If you rely only on visual labels, holograms, or static serial numbers, risk is already present.

Section 2: Production and Packaging Controls

  1. Do you have visibility into which packaging partner handled each unit?

  2. Are unit identities generated and recorded during packaging, not after dispatch?

  3. Can you link each unit to its production batch digitally?

  4. Are rejected or destroyed units permanently invalidated in your system?

  5. Can you confirm that no extra units were produced outside planned quantities?

Outsourced packaging without unit-level control is a common counterfeit entry point.

Section 3: Distribution and Channel Visibility

Distribution and Channel Visibility
  1. Can you see where each unit is after it leaves your warehouse?

  2. Do you rely on distributor reports instead of scan-based verification?

  3. Can you detect product movement outside authorised regions?

  4. Can you identify substitution at the distributor or sub-distributor level?

  5. Do you know which channel handled a specific unit at a specific time?

If inventory movement is based on trust instead of verification, blind spots exist.

Section 4: ERP and System Limitations

  1. Can your ERP verify physical authenticity or only record transactions?

  2. Can your ERP detect duplicated serial numbers across locations?

  3. Do you have a system outside ERP that validates real-world movement?

  4. Can you reconcile ERP data with scan-level evidence?

  5. Are anomaly alerts generated automatically or discovered manually?

ERP visibility without physical verification does not stop counterfeit movement.

Section 5: Returns, Refurbishment, and Secondary Markets

  1. Can you authenticate returned products at the unit level?

  2. Are refurbished units digitally differentiated from new units?

  3. Can you detect resale of your products on unauthorised platforms?

  4. Do you track which serial numbers should never re-enter circulation?

  5. Can you prove whether a disputed unit was originally manufactured by you?

Returns and secondary markets are high-risk zones for counterfeit reintroduction.

Section 6: Regulatory and Audit Readiness

  1. Can you produce unit-level movement history during an audit?

  2. Can you prove where a specific unit has been at every stage?

  3. Can you isolate affected units without recalling entire batches?

  4. Can you demonstrate proactive counterfeit detection controls?

  5. Can you provide time-stamped, tamper-resistant evidence to regulators?

Regulators expect evidence, not explanations.

Scoring Your Risk Level

  • 0 to 5 No or Not Sure answers
    Low risk, controls are mostly in place

  • 6 to 12 No or Not Sure answers
    Medium risk, blind spots exist and should be addressed

  • 13 or more No or Not Sure answers
    High risk, counterfeit exposure is likely already present

High risk does not mean failure.
It means growth has outpaced visibility.

Why Most Mid-Sized Manufacturers Score Higher Than Expected

Why Most Mid-Sized Manufacturers Score Higher Than Expected

In practice, many companies discover that their controls are fragmented.

  • Authentication exists in one system.

  • Inventory lives in another.

  • ERP data assumes authenticity.

  • Distributors operate with limited verification.

Counterfeiters exploit the gaps between systems, not the systems themselves.

Turning Risk Awareness Into Control

Identifying risk is only the first step.
The next step is closing gaps without disrupting operations.

This typically requires:

  • Unit-level digital identity

  • Scan-based verification across channels

  • A traceability layer that works alongside ERP

  • Real-time anomaly detection

  • Evidence-ready reporting

This is where traceability overlays become essential.

When Prevention Is Easier Than Response

Once counterfeit products are discovered by customers or regulators, the response becomes expensive and public.

Manufacturers who detect risk internally retain control of the narrative, the remediation, and the timeline.

The difference lies in visibility.

Where to Go From Here

If this checklist revealed gaps, the next step is not replacing systems.
It is strengthening them with verification.

Origin helps mid-sized manufacturers implement unit-level traceability and authentication as an overlay to existing ERP and supply chain systems, allowing growth without losing control.

Explore how Origin can help you move from risk awareness to counterfeit resilience.

Join acviss technologies brand protection, anti-counterfeiting and supply chain traceability solution.

Protect Your Brand with Cutting-Edge Anti-Counterfeiting Solutions

Defend your brand. Choose Acviss for unparalleled anti-counterfeiting solutions.

Acviss | Blog

At Acviss we help protect products & brands from supply chain fraud and build user engagement. We have helped brands encode their products which can be verified by the end user for authenticity, track and trace and consumer data collection. Additionally we also work omni channel removing frauds of fake product listings, brand impersonation, fake websites etc . Acviss' technology has already tested on more than 400 million Products.