{"id":1422,"date":"2017-12-04T13:15:06","date_gmt":"2017-12-04T18:15:06","guid":{"rendered":"http:\/\/blogs.luc.edu\/compliance\/?p=1422"},"modified":"2017-12-04T13:15:06","modified_gmt":"2017-12-04T18:15:06","slug":"financial-institutions-join-forces-for-vendor-management-compliance","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/compliance\/?p=1422","title":{"rendered":"Financial Institutions Join Forces for Vendor Management Compliance"},"content":{"rendered":"<p><em>Richard W. Shepherd<br \/>\nAssociate Editor<br \/>\nLoyola University Chicago School of Law, JD 2019<\/em><\/p>\n<p>Financial institutions often rely on outside vendors to provide information technology services.\u00a0 While doing so often provides economic efficiency and quicker technological innovation, the risks associated with outsourcing information technology services are significant.\u00a0 Institutions must develop strong vendor management programs to ensure the safety of their customer\u2019s personal information. Several large financial institutions have come together to create a new consortium to perform vendor and partner due diligence.<\/p>\n<p><!--more--><\/p>\n<p><strong>Vendor Management: Benefits and Risks<\/strong><\/p>\n<p><strong>\u00a0<\/strong>In the normal course of business, financial institutions increasingly rely on external service providers for a variety of technology-related services.\u00a0 Institutions typically <a href=\"https:\/\/ithandbook.ffiec.gov\/it-booklets\/outsourcing-technology-services\/introduction.aspx\">outsource<\/a> to external service providers to keep up with rapidly changing technology, to provide their customers with the latest products, services, and delivery channels.\u00a0 Doing so is often more cost-effective than the financial institution developing the technology or service in-house.\u00a0 Financial institutions will often outsource operations such as the origination, processing, and settlement of payments and financial transactions, information processing, transaction processing, fiduciary and trading activities, security monitoring and testing, system development and maintenance, network operations, help desk operations, and call centers.<\/p>\n<p>While it may be cost efficient, outsourcing information technology services to an outside vendor does not remove the risk associated with information technology.\u00a0 Risks such as loss of funds, loss of competitive advantage, damaged reputation, improper disclosure of information, and regulatory action remain.\u00a0 Further, by outsourcing the service to an outside vendor, the financial institution may not be able to exercise the same level of control over the operation, compared to an in-house service provider.\u00a0 Thus, it is imperative for financial institutions to exercise strong vendor management practice to mitigate the risk associated with outsourcing.\u00a0 <a href=\"http:\/\/blog.hornellp.com\/banking\/what-banks-need-to-know-about-secure-vendor-management\">Vendor management practices<\/a> include prudent contract development, conducting a vendor risk assessment, assessing vendor financial stability, and maintaining compliance with the contract terms.<\/p>\n<p><strong>\u00a0<\/strong><strong>How do financial institutions practice vendor management?<\/strong><\/p>\n<p><strong>\u00a0<\/strong>A strong vendor management program arises from a decision by the Board of Directors and senior management.\u00a0 When a financial institution decides to outsource information technology, the technology itself is often the driving factor in the decision.\u00a0 However, managing the relationship with the outside vendor is the more critical consideration.\u00a0 The board and management should establish enterprise-wide policies and procedures to make the outsourcing process consistent.<\/p>\n<p>The Federal Financial Institutions Examination Council (FFIEC) IT Examination <a href=\"https:\/\/ithandbook.ffiec.gov\/it-booklets\/outsourcing-technology-services\/board-and-management-responsibilities.aspx\">Handbook<\/a> recommends the board to address outsourced relationships from an end-to-end perspective, by \u00a0establishing servicing requirements and strategies, selecting a provider, negotiating the contract, and monitoring, changing, and discontinuing the outsourced relationship.\u00a0 Further, financial institutions should consider factors such as:<\/p>\n<ul>\n<li>Ensuring each outsourcing relationship supports the institution\u2019s overall requirements and strategic plans<\/li>\n<li>Ensuring the institution has sufficient expertise to oversee and manage the relationship<\/li>\n<li>Evaluating prospective providers based on the scope and criticality of outsourced vendors<\/li>\n<li>Tailoring the enterprise-wide, service provider monitoring program based on intimal and ongoing risk assessments of outsourced services<\/li>\n<li>Notifying its primary regulator regarding outsourced relationships, when required by that regulator<\/li>\n<\/ul>\n<p>Vendor management is absolutely critical to financial institutions.\u00a0 Improper practices can lead to customer information being compromised, resulting in damaged reputation and financial cost.\u00a0 <a href=\"https:\/\/www.washingtonpost.com\/news\/the-switch\/wp\/2017\/10\/12\/equifax-says-its-looking-into-another-possible-hack\/?utm_term=.dc0c40737b18\">Equifax<\/a> was compromised by an information technology vendor used to collect website performance data.\u00a0 During the data breach, the personal information of 143 million people was compromised.\u00a0 <a href=\"http:\/\/time.com\/money\/4936732\/equifaxs-massive-data-breach-has-cost-the-company-4-billion-so-far\/\">Equifax<\/a> could spend $300 million to settle the crisis, and the stock market value of the company has dropped by $4 billion.\u00a0 Further and most importantly, the reputation of Equifax has been destroyed.<\/p>\n<p><a href=\"http:\/\/www.bakertilly.com\/insights\/new-occ-standards-require-stricter-oversight-of-third-party-relationships\/\">Penalties<\/a> for noncompliance with vendor management regulations can be severe.\u00a0 A major bank recently outsourced identity protection to a vendor, who was found to be in violation of federal regulations.\u00a0 The institution entered a consent order, paid $618 million in restitution, and $80 million in civil money penalties.<\/p>\n<p><strong>How are competitors working together?<\/strong><\/p>\n<p><strong>\u00a0<\/strong>In <a href=\"https:\/\/www.reuters.com\/article\/us-usa-banks-vendors\/u-s-financial-giants-create-consortium-to-vet-third-party-suppliers-idUSKBN1DE1TV\">response<\/a> to the risk associated with outsourcing information technology services to outside vendors, Bank of America Corp, JPMorgan Chase &amp; Co, Wells Fargo &amp; Co, and American Express &amp; Co, created a company to standardize the work of vetting third party vendors.<\/p>\n<p><a href=\"http:\/\/www.bankingexchange.com\/news-feed\/item\/7196-consortium-takes-on-third-party-risk?Itemid=259\">Large financial institutions<\/a>, like the ones backing the new venture, have between 10,000 and 20,000 vendor relationships.\u00a0 Each relationship has its own nuance and risk associated with its management.\u00a0 Effectively managing and mitigating the risks associated with each relationship is a daunting task, requiring a great deal of resources and expertise. After two years of negotiations, the institutions created TruSight to manage the risk associated with vendor management.<\/p>\n<p>TruSight is designed to conduct third-party risk assessment reports of potential outside vendors and partners that meet regulatory requirements.\u00a0 The goal is for the financial institutions to share a common source of due diligence research complied company by company.\u00a0 Doing so reduces the cost associated with vendor management, and makes the process much quicker, opposed to each financial institution completing the process independently.\u00a0 TruSight is developing a library of reports on particular vendors.\u00a0 The library will be built on the records of the financial institutions which subscribe to the service.\u00a0 If a vendor is not in the library, TruSight will perform vendor due diligence on request.<\/p>\n<p>As financial institutions continue to integrate more complex technology into their products, services, and delivery channels, prudent vendor management practices become more and more important.\u00a0 The risks associated with failure to properly manage vendors is so significant, it has induced rival financial institutions to work together to better manage the risk.\u00a0 The creation of TruSight is a step in the right direction for financial institutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Financial institutions often rely on outside vendors to provide information technology services.\u00a0 While doing so often provides economic efficiency and quicker technological innovation, the risks associated with outsourcing information technology services are significant.\u00a0 Institutions must develop strong vendor management programs to ensure the safety of their customer\u2019s personal information. Several large financial institutions have come together to create a new consortium to perform vendor and partner due diligence.<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[252,256,369,843,851,1133,1458,1690,2090],"class_list":["post-1422","post","type-post","status-publish","format-standard","hentry","category-finance-banking","tag-banking","tag-banks","tag-cfpb","tag-ffiec","tag-finance","tag-information-technology","tag-occ","tag-regulation","tag-vendor-management"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/1422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1422"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=\/wp\/v2\/posts\/1422\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/compliance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}