No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Risk

Ignorance is No Excuse: Managing Third-Party Risk

by Greg Dickinson
October 5, 2015
in Risk
graphic detailing the TPRM model

The technology industry today is transforming its approach to assessing and managing third parties for bribery and corruption risk. As if it wasn’t already a massive challenge for organizations to keep up with new and ever-changing legislation and regulations, FCPA enforcement has elevated to a whole new level of intensity with the DOJ putting heavy resources behind taking action.

But fines are just the tip of the iceberg, and even greater expense may be incurred in pre- and post-enforcement activity. Investigations and their associated legal fees often far exceed the actual fines. In many cases, they can run to five or 10 times more. Post-enforcement costs – updating policies, increased training and dealing with monitors – can also be significant and may last years. In addition, FCPA violations can have a damaging and public effect on a company’s reputation and long-term revenues.

The reality is that the many FCPA risks arise from relationships with third parties — agents, brokers, distributors, suppliers, etc. who may interact with foreign governments or agents. The following points are red flags that require input from your third parties:

  • Points of contact with government officials and agencies
  • Operations in known “high-risk” jurisdictions

Beyond the financial penalties, FCPA actions are likely to impact a company’s ability to raise capital, conduct merger activity and acquire contracts. When everyone in the company understands that it impacts the ability to make money and the company’s future, the FCPA conversation shifts from being a purely legal issue to its more proper designation as a general business issue that needs to be the on the radar screen of all business managers.

Given these factors combined, it is more important than ever for enterprise leaders to collaborate to reduce the cost, risk, inefficiencies and channel friction that currently exists. Major brands are coming to understand the importance of a new, collective approach and are teaming to solve the challenges and risks associated with third-party management together. One industry group, the Global Technology Distribution Council (GTDC), has decided to address the assumed resource issues and complexity of managing third-party risk head on by rationalizing effort and sharing the costs among its members.

Third-party management, anti-bribery/anti-corruption (ABAC) training, due diligence and vendor risk assessments are all measures that for the most part organizations recognize they should have in place – all key topics covered at a recent meeting of technology company executives hosted by Hiperos in Palo Alto, California. Yet the enormity and complexity of implementing anti-corruption compliance policies has companies struggling to properly and comprehensively manage the whole third-party landscape. In fact, research from Alix Partners highlights that while some companies have expanded how they engage with and audit their foreign subsidiaries, less than half (43 percent to be exact) regularly conduct due diligence on their third parties.

The catch is these programs often hit the back burner due to lack of funds, lack of awareness of risks until it is too late or inherent attitudes that “bad things cannot possibly happen to my enterprise.” The reality is, FCPA failures can happen at almost any company. Bad things can happen to a good company, especially when engaging third parties and not managing and monitoring them completely. Typical shortcomings include putting only policies and training in place, failing to perform a robust risk assessment before instituting the overall program, not considering all of the risks associated with countries or specific geographical regions and not integrating into the overall compliance program of the organization.

But today’s regulatory landscape dictates the need to act and, specifically, to be much smarter and more proactive about the management of third parties. The result of more enterprises collaborating and knowledge-sharing is a much-needed ripple effect. A larger sphere of knowledge, standards and best-practice sharing, in turn, creates awareness and actionable steps to understand and address the true risks posed by third-party partners and vendors.

In order to truly protect enterprises from bribery and corruption risks, organizations must put a simple, effective ABAC and third-party management program in place. It starts with risk identification. Understanding how the business could be at risk is vital. The first thing management should do is answer the following questions:

  • Does the company do business in foreign markets?
  • Do we or our third parties interact with government agents or officials and, if so, do we understand these points of contact?

Due diligence when it comes to accurately identifying risk and road-mapping a plan of coverage is the best method of protection because it helps companies understand the risks they are faced with and why these risks should be taken seriously. It’s important to keep in mind that FCPA is far from just a compliance problem. It is a business issue that needs to be managed progressively and holistically throughout the organization.

If you do business in any form with third parties outside the U.S., here are some action items and questions to consider:

  • Make sure you know what partners and vendors do for the company.
  • What are your due diligence procedures for engaging third parties?
  • Assess which jurisdictions present the most operational risk.
  • Conduct periodic compliance audits of third parties. Follow up on any red flags that may emerge during the relationship.
  • Have your third parties agreed to your code of conduct?
  • Review all points of contact with foreign officials.
  • Check to see if any competitors or peers are under scrutiny. If so, you may be next.
  • Review various departments such as sales, logistics, IT and marketing and identify high-risk functions.
  • Determine if training procedures are robust and up-to-date.

Here are the four ways to begin to make ABAC and third-party management implementation a reality:

  1. Know Your Third Parties: While it’s easy to outsource work to third parties, it’s not so easy to know who you’re actually doing business with and who is delivering the goods or services. Companies often default to only completing due diligence and managing a limited number of “high-risk” or high-spend third parties – or assuming that only traditional “IT vendors” pose an IT risk. Review whether your policies and technology allow you to identify, assess and manage all of your third parties for IT risk (as well as other risks of course).
  2. Know Their Business: It is not enough to hire third parties to help your company; you also have to know what business they are doing on your behalf. Ask yourself this question: If today you had to pull a list of which of your vendors or business partners have access to employee or customer personally identifiable information (PII) or to your IT systems, how long would it take? If you had to contact those companies for additional information, do you have accurate contact details?
  3. Know Their Risk: Less than half of companies regularly conduct due diligence on their third parties. While all third parties pose some level of risk, the risk and the level of seriousness differs dependent on the role of the third party. For example, third parties that deal with payroll or taxes usually pose a higher risk of security to your company’s data than the cleaning crew that comes in at night. Managing your third parties based on the risks that they pose requires knowing the risks in the first place and then having policies and procedures to control those risks throughout the life of the contract.
  4. Know Their Access: Not knowing that a third party had access to system passwords is not a valid excuse when your client’s records are stolen. Understanding what each party has access to – and why – will ensure that you have control over their access and can limit or deny access to sensitive information as appropriate.
Tags: Third Party Risk Management
Previous Post

Creating Trust to Affect Compliance Change

Next Post

5 Tips to Minimize Frustration with Your GRC Technology

Greg Dickinson

Greg Dickinson

Greg Dickinson, CEO of Hiperos, has an exceptional track record of driving innovation and revenue within the software and technology space. Under Greg’s leadership, Hiperos continues to establish itself as one of the premier solutions for third-party management. Prior to Hiperos, Greg was CEO at Venafi, an encryption management software company. Before Venafi, Greg was Senior Vice President of North American Sales and a member of the CEO’s management committee for Ariba. Greg joined Ariba in 1997 when it was a startup with less than $1 million in revenue. By the time he left Ariba in 2004, he was part of the executive team responsible for managing a $200 million company. Greg began his professional career as a founding member of PCNet, Inc., a computer reseller. A true visionary, Greg helped launch PCNet’s first Internet product and became a sought-after expert on doing business on the web. Greg served in the United States Air Force, where he was the recipient of both the Air Force Commendation Medal and Humanitarian Award. He holds a master’s degree in Information Systems from Pace University and a bachelor’s degree in Computer Science from Southern Connecticut State.

Related Posts

examining financial data with magnifying glass

The Compliance Blind Spots Hiding Inside Financial Data

by Steve Markle
April 13, 2026

Financial compliance processes will miss what they’re not looking for

mexico landscape viewer

A Year After Designation of Cartels as Terrorists, What Is the Risk Landscape for Multinationals Operating in Mexico?

by Robert Johnston, Brian Mich and Ulla Pentinpuro
February 18, 2026

A year after the Trump Administration designated six Mexican cartels as foreign terrorist organizations, the compliance implications for multinationals are...

us pentagon building

US Finalizes CMMC Rule: Cybersecurity Verification Now Determines Contract Eligibility for Defense Contractors

by Richard W. Arnholt and Todd R. Overman
December 12, 2025

New requirements expected to affect more than 300,000 defense contractors by the time they are fully phased in

expiration date on product

Why Your Third-Party Risk Assessment Has an Expiration Date

by Mandy Cooper
September 22, 2025

Financial institutions have learned expensive lessons about the cost of treating vendor oversight as a one-time exercise

Next Post
Internal Control Checklist: 5 Anti-Fraud Strategies to Deter, Prevent and Detect Fraud

5 Tips to Minimize Frustration with Your GRC Technology

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2026 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • Artificial Intelligence (AI)
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2026 Corporate Compliance Insights