Course Content

  • 1
    Welcome to the Course
    • Why Empower - Text
    • Why Empower - Results
    • Authentication. Validation. Management.
    • Content
    • Job Role Survey
  • 2
    Sensitive Data and Social Engineering
    • What is Considered Sensitive Personal Information in the Vendor Master File?
    • What is Business Email Compromise?
    • What is Phishing?
    • What is Phishing - Video
    • Sensitive Data and Phishing Quiz
  • 3
    Step 1: AUTHENTICATION
    • A Note From Me
    • Authentication. Valdation. Management
    • Course Objectives
    • Course Content
  • 4
    Chapter 1: Authentication Techniques for Callers
    • Chapter 1: Authentication Techniques for Callers - Intro
    • Authentication Technique #1: Identify Critical Elements for Authentication - Vendors
    • Authentication Technique #1: Identify Critical Elements for Authentication - Employees
    • Authentication Technique #2: Limit Information Revealed
    • Internal Control: Record Phone Calls
    • Chapter 1 Quiz
  • 5
    Chapter 2: Authentication Techniques for Emails
    • Chapter 2: Authentication Techniques for Emails - Intro
    • Authentication Technique#3: Analyze Email Elements
    • Email Infographic
    • Authentication Technique#4: Verify Email Domain
    • Internal Control: Require Additional Steps for Email Payment Requests
    • Internal Control: Use Email Authentication Technology
    • Chapter 2 Quiz
  • 6
    Chapter 3: Authentication Techniques for Bank Details
    • Chapter 3: Authentication Techniques for Banking Information - Intro
    • Authentication Technique#5: Require Specific Data to Match to Vendor Record
    • Internal Control: Management Review of Bank Changes to Existing Vendors
    • Internal Control: Create a Company Branded ACH/Wire Form
    • Internal Control: Confirmation Process
    • Chapter 3 Quiz
  • 7
    Recap: AUTHENTICATION
    • Authentication Recap
    • Next Steps
    • Implement Goals
    • Authentication Reference Template
  • 8
    Step 2: VALIDATION
    • A Note From Me
    • Authentication. Valdation. Management
    • Course Objectives
    • Course Content
  • 9
    Chapter 4: Validate Vendor Data Collected
    • Validate Vendor Data Collected - Introduction
    • Key Reasons for Valid Vendor Data in the Vendor Master File
    • Duplicate Vendor Check
    • Vendor Legal Name and Tax ID validated against Internal Revenue Service (IRS) Records
    • Vendor Legal Name and Tax ID validated against Internal Revenue Service (IRS) Records for Exempt Organizations (EO)
    • Vendor Value Added Tax (VAT) Number against VAT Information Exchange System (VIES)
    • Vendor Address validated against US Postal Service (US) or Universal Postal Union (Non-US), Google Earth or SmartyStreets
    • Vendor Legal Name against Specially Designated Nationals List (SDN) and Blocked Persons List from the Office of Foreign Assets Control (OFAC)
    • Vendor Legal Name and Tax ID against Social Security Death Index
    • If you are a US Government Entity: Vendor Legal Name against System for Award Management (SAM)
    • If you are a Healthcare Entity: Vendor Legal Name Against Exclusion List of Office of Inspector General (OIG)
    • Vendor Legal Name Against Denied Persons List from Bureau and Industry and Security (BIS)
    • Chapter 4 Quiz
  • 10
    Chapter 5: Validate Vendor Banking Data Collected
    • Chapter 5: Validate Vendor Banking Data Collected - Introduction
    • Vendor Bank Name and ABA Routing Number against the Federal Reserve
    • Vendor Bank Name against Specially Designated Nationals list (SDN) from the Office of Foreign Assets Control (OFAC)
    • Optional: Vendor Bank Account Name and Vendor Bank Account Number
    • Vendor International Bank Account Number (IBAN)
    • Vendor International Business Identifier Code (BIC) or Society for Worldwide Interbank Financial Telecommunication Code (SWIFT)
    • Chapter 5 Quiz
  • 11
    Chapter 6: Other Considerations
    • Chapter 3: Other Considerations - Introduction
    • Other Considerations - Processes
    • Other Considerations - Internal Controls
    • Other Considerations - GDPR
    • Other Considerations - The California Consumer Privacy Act (CCPA)
    • Other Considerations – The SHIELD Act
    • Other Considerations and Validations - Part 1
    • Other Considerations and Validations - Part 2
    • Chapter 6 Quiz
  • 12
    Recap: VALIDATION
    • Validation Recap
    • Validation and the Vendor Master File - Resource Links
    • Validations to Implement
    • Next Steps
  • 13
    Step 3: MANAGEMENT
    • A Note From Me
    • Authentication. Validation. Management.
    • Course Objectives
    • Course Content
  • 14
    Chapter 7: Management – Vendor Master File Best Practices & Internal Controls
    • Chapter 7: Management – Vendor Master File Best Practices & Internal Controls - Introduction
    • Naming Convention Recommendations
    • Naming Convention Considerations - System Capabilities and Limitations
    • Address Standardizations
    • Best Practices - Part 1
    • Best Practices - Part 2
    • Best Practices - Part 3
    • Internal Controls - Part 1
    • Internal Controls - Part 2
    • Internal Controls - Part 3
    • Chapter 7 Quiz
  • 15
    Chapter 8: Management – Vendor Master File Vendor Data Review
    • Chapter 8: Management – Vendor Master File Vendor Data Review - Introduction
    • Step 1: Inactivate Vendor Records w/no Activity
    • Step 2: Address Standardization
    • Step 3: IRS TIN Match
    • Step 4: Validate Bank Details
    • Step 5: Validate Sanction and Exclusion Lists
    • Step 6: Validate VAT for International Vendors
    • Step 7: Validate Other Regulatory and Third Parties as needed
    • Step 8: Analyze Vendor Records
    • Chapter 8 Quiz
  • 16
    Chapter 9: Management – Vendor Master File Mergers & Acquisitions
    • Chapter 9: Management – Vendor Master File Mergers & Acquisitions - Introduction
    • Step 1: Create a Vendor Template
    • Step 2: Request IRS Tax Information
    • Step 3: Follow Validation Process
    • Step 4: Add Vendors to Vendor Master File
    • Step 5: Create a Vendor Mapping File
    • Chapter 9 Quiz
  • 17
    Recap: MANAGEMENT
    • Management Recap
    • Next Steps