Course Content
-
1
Welcome to the Course
- Why Empower - Text
- Why Empower - Results
- Authentication. Validation. Management.
- Content
- Job Role Survey
-
2
Sensitive Data and Social Engineering
- What is Considered Sensitive Personal Information in the Vendor Master File?
- What is Business Email Compromise?
- What is Phishing?
- What is Phishing - Video
- Sensitive Data and Phishing Quiz
-
3
Step 1: AUTHENTICATION
- A Note From Me
- Authentication. Valdation. Management
- Course Objectives
- Course Content
-
4
Chapter 1: Authentication Techniques for Callers
- Chapter 1: Authentication Techniques for Callers - Intro
- Authentication Technique #1: Identify Critical Elements for Authentication - Vendors
- Authentication Technique #1: Identify Critical Elements for Authentication - Employees
- Authentication Technique #2: Limit Information Revealed
- Internal Control: Record Phone Calls
- Chapter 1 Quiz
-
5
Chapter 2: Authentication Techniques for Emails
- Chapter 2: Authentication Techniques for Emails - Intro
- Authentication Technique#3: Analyze Email Elements
- Email Infographic
- Authentication Technique#4: Verify Email Domain
- Internal Control: Require Additional Steps for Email Payment Requests
- Internal Control: Use Email Authentication Technology
- Chapter 2 Quiz
-
6
Chapter 3: Authentication Techniques for Bank Details
- Chapter 3: Authentication Techniques for Banking Information - Intro
- Authentication Technique#5: Require Specific Data to Match to Vendor Record
- Internal Control: Management Review of Bank Changes to Existing Vendors
- Internal Control: Create a Company Branded ACH/Wire Form
- Internal Control: Confirmation Process
- Chapter 3 Quiz
-
7
Recap: AUTHENTICATION
- Authentication Recap
- Next Steps
- Implement Goals
- Authentication Reference Template
-
8
Step 2: VALIDATION
- A Note From Me
- Authentication. Valdation. Management
- Course Objectives
- Course Content
-
9
Chapter 4: Validate Vendor Data Collected
- Validate Vendor Data Collected - Introduction
- Key Reasons for Valid Vendor Data in the Vendor Master File
- Duplicate Vendor Check
- Vendor Legal Name and Tax ID validated against Internal Revenue Service (IRS) Records
- Vendor Legal Name and Tax ID validated against Internal Revenue Service (IRS) Records for Exempt Organizations (EO)
- Vendor Value Added Tax (VAT) Number against VAT Information Exchange System (VIES)
- Vendor Address validated against US Postal Service (US) or Universal Postal Union (Non-US), Google Earth or SmartyStreets
- Vendor Legal Name against Specially Designated Nationals List (SDN) and Blocked Persons List from the Office of Foreign Assets Control (OFAC)
- Vendor Legal Name and Tax ID against Social Security Death Index
- If you are a US Government Entity: Vendor Legal Name against System for Award Management (SAM)
- If you are a Healthcare Entity: Vendor Legal Name Against Exclusion List of Office of Inspector General (OIG)
- Vendor Legal Name Against Denied Persons List from Bureau and Industry and Security (BIS)
- Chapter 4 Quiz
-
10
Chapter 5: Validate Vendor Banking Data Collected
- Chapter 5: Validate Vendor Banking Data Collected - Introduction
- Vendor Bank Name and ABA Routing Number against the Federal Reserve
- Vendor Bank Name against Specially Designated Nationals list (SDN) from the Office of Foreign Assets Control (OFAC)
- Optional: Vendor Bank Account Name and Vendor Bank Account Number
- Vendor International Bank Account Number (IBAN)
- Vendor International Business Identifier Code (BIC) or Society for Worldwide Interbank Financial Telecommunication Code (SWIFT)
- Chapter 5 Quiz
-
11
Chapter 6: Other Considerations
- Chapter 3: Other Considerations - Introduction
- Other Considerations - Processes
- Other Considerations - Internal Controls
- Other Considerations - GDPR
- Other Considerations - The California Consumer Privacy Act (CCPA)
- Other Considerations – The SHIELD Act
- Other Considerations and Validations - Part 1
- Other Considerations and Validations - Part 2
- Chapter 6 Quiz
-
12
Recap: VALIDATION
- Validation Recap
- Validation and the Vendor Master File - Resource Links
- Validations to Implement
- Next Steps
-
13
Step 3: MANAGEMENT
- A Note From Me
- Authentication. Validation. Management.
- Course Objectives
- Course Content
-
14
Chapter 7: Management – Vendor Master File Best Practices & Internal Controls
- Chapter 7: Management – Vendor Master File Best Practices & Internal Controls - Introduction
- Naming Convention Recommendations
- Naming Convention Considerations - System Capabilities and Limitations
- Address Standardizations
- Best Practices - Part 1
- Best Practices - Part 2
- Best Practices - Part 3
- Internal Controls - Part 1
- Internal Controls - Part 2
- Internal Controls - Part 3
- Chapter 7 Quiz
-
15
Chapter 8: Management – Vendor Master File Vendor Data Review
- Chapter 8: Management – Vendor Master File Vendor Data Review - Introduction
- Step 1: Inactivate Vendor Records w/no Activity
- Step 2: Address Standardization
- Step 3: IRS TIN Match
- Step 4: Validate Bank Details
- Step 5: Validate Sanction and Exclusion Lists
- Step 6: Validate VAT for International Vendors
- Step 7: Validate Other Regulatory and Third Parties as needed
- Step 8: Analyze Vendor Records
- Chapter 8 Quiz
-
16
Chapter 9: Management – Vendor Master File Mergers & Acquisitions
- Chapter 9: Management – Vendor Master File Mergers & Acquisitions - Introduction
- Step 1: Create a Vendor Template
- Step 2: Request IRS Tax Information
- Step 3: Follow Validation Process
- Step 4: Add Vendors to Vendor Master File
- Step 5: Create a Vendor Mapping File
- Chapter 9 Quiz
-
17
Recap: MANAGEMENT
- Management Recap
- Next Steps