{"id":30516,"date":"2023-02-24T20:34:46","date_gmt":"2023-02-24T20:34:46","guid":{"rendered":"https:\/\/www.trulioo.com\/?page_id=30516"},"modified":"2023-06-09T17:17:32","modified_gmt":"2023-06-09T17:17:32","slug":"vendor","status":"publish","type":"page","link":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor","title":{"rendered":"Vendor Onboarding"},"content":{"rendered":"\n<div class=\"bg-green-500\">\n    <div class=\"section\">\n        <h1 class=\"h2 lg:h1 mt-[180px] mb-[100px] text-green-900\" >What Is Vendor Onboarding and Why Is It Important?<\/h1>\n            <\/div>\n<\/div>\n\n\n\n<div\n    class=\"section mb-16\"\n    x-data=\"{ current: 0 }\"\n>\n\t<article class=\"relative lg:grid lg:grid-cols-4 lg:gap-10\">\n\t\t<div class=\"mt-12 lg:mt-24\">\n\t\t\t<aside class=\"lg:sticky lg:top-24 lg:bg-white\">\n\t\t\t\t<p class=\"p-lg subheading text-black mb-10\">\n\t\t\t\tJump to:\t\t\t\t<\/p>\n\t\t\t\t                                                <a\n                                                        href=\"#digital-vendor-onboarding\"\n                                                        class=\"border-l border-gray-300 pl-4 py-3 block p-xs subheading text-gray-700 hover:text-green-900 hover:border-red-500 opacity-60 transition\"\n                                                        :class=\"(current === 0) &#038;&#038; '!text-green-900 !border-red-500 !opacity-100'\"\n                                                >\n                                                         Digital Vendor Onboarding                                                <\/a>\n                                                                                        <a\n                                                        href=\"#what-is-third-party-risk-management\"\n                                                        class=\"border-l border-gray-300 pl-4 py-3 block p-xs subheading text-gray-700 hover:text-green-900 hover:border-red-500 opacity-60 transition\"\n                                                        :class=\"(current === 1) &#038;&#038; '!text-green-900 !border-red-500 !opacity-100'\"\n                                                >\n                                                        What Is Third-Party Risk Management?                                                <\/a>\n                                                                                        <a\n                                                        href=\"#common-risks-when-onboarding-vendors\"\n                                                        class=\"border-l border-gray-300 pl-4 py-3 block p-xs subheading text-gray-700 hover:text-green-900 hover:border-red-500 opacity-60 transition\"\n                                                        :class=\"(current === 2) &#038;&#038; '!text-green-900 !border-red-500 !opacity-100'\"\n                                                >\n                                                        Common Risks When Onboarding Vendors                                                <\/a>\n                                                                                        <a\n                                                        href=\"#managing-risk-when-onboarding-vendors\"\n                                                        class=\"border-l border-gray-300 pl-4 py-3 block p-xs subheading text-gray-700 hover:text-green-900 hover:border-red-500 opacity-60 transition\"\n                                                        :class=\"(current === 3) &#038;&#038; '!text-green-900 !border-red-500 !opacity-100'\"\n                                                >\n                                                        Managing Risk When Onboarding Vendors                                                <\/a>\n                                                                                        <a\n                                                        href=\"#vendor-onboarding-best-practices\"\n                                                        class=\"border-l border-gray-300 pl-4 py-3 block p-xs subheading text-gray-700 hover:text-green-900 hover:border-red-500 opacity-60 transition\"\n                                                        :class=\"(current === 4) &#038;&#038; '!text-green-900 !border-red-500 !opacity-100'\"\n                                                >\n                                                        Vendor Onboarding Best Practices                                                <\/a>\n                                                                                        <a\n                                                        href=\"#balancing-security-and-speed-in-vendor-onboarding\"\n                                                        class=\"border-l border-gray-300 pl-4 py-3 block p-xs subheading text-gray-700 hover:text-green-900 hover:border-red-500 opacity-60 transition\"\n                                                        :class=\"(current === 5) &#038;&#038; '!text-green-900 !border-red-500 !opacity-100'\"\n                                                >\n                                                        Balancing Security and Speed in Vendor Onboarding                                                <\/a>\n                                        \t\t\t<\/aside>\n\t\t<\/div>\n                <div\n                    class=\"lg:col-span-3\"\n                    x-data=\"{ count: 6 }\"\n                    x-init=\"document.addEventListener('scrollspy:ready', function() {\n                        let debounce;\n\n                        register_scroller($el, function() {},\n                            function(scroller) {\n                                \/\/ Prevent slowdowns by debouncing to 50ms\n                                const now = performance.now();\n                                if (now - debounce < 50) return false;\n                                debounce = now;\n\n                                \/\/ Each scroll event, determine which section is nearest to the top of the viewport\n                                let closest = { value: 99999, index: 5 };\n                                for (let i = 0; i < 6; i++) {\n                                    \/\/ If the sticky anchor is visible, determine if it is closer than prior anchors\n                                    const rect = $refs['sticky_' + i].getBoundingClientRect();\n                                    if (rect.top &gt;= 0 &#038;&#038; closest.value &gt; rect.top) {\n                                        closest = { value: rect.top, index: i };\n                                    }\n                                }\n                                \/\/ Update the visible image accordingly, and return false to keep the event listener enabled\n                                current = closest.index;\n                                return false;\n                            },\n                        )\n                    })\"\n                >\n\t\t\t                                        <div\n                                            id=\"subtopic-article\"\n                                            class=\"custom-typography mb-4\"\n                                            x-ref=\"sticky_0\"\n                                        >\n\n\t\t\t\t\t\t<h3 class=\"h3 \" id='digital-vendor-onboarding' > Digital Vendor Onboarding<\/h3>\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Vetting business partners and suppliers through vendor onboarding protects companies and their customers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vendors extend the capabilities of a business and support its reputation and revenue, whether by reselling a vendor\u2019s products or using its services. But without <\/span><a href=\"https:\/\/www.trulioo.com\/blog\/business-verification\/third-party-due-diligence\"><span style=\"font-weight: 400;\">third-party due diligence<\/span><\/a><span style=\"font-weight: 400;\"> on vendors, organizations face supply chain, fraud and compliance risks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations also can run the risk of a vendor using the relationship for criminal activity. When businesses work with unscrupulous vendors that launder money, sell counterfeit goods or use child labor, they can face legal repercussions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Vendors also pose a risk when they have access to a company\u2019s systems and data. If a vendor has weak security or privacy procedures, cybercrime or data leaks can compromise the entire supply chain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s essential that businesses understand the risks, enact policies and procedures to know who they are doing business with, and conduct ongoing vendor monitoring.<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t                                        <div\n                                            id=\"subtopic-article\"\n                                            class=\"custom-typography mb-4\"\n                                            x-ref=\"sticky_1\"\n                                        >\n\n\t\t\t\t\t\t<h3 class=\"h3 \" id='what-is-third-party-risk-management' >What Is Third-Party Risk Management?<\/h3>\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Third-party risk management helps organizations understand the risk a third party poses and the measures that can control it. The third-party management life cycle includes screening, assessment, risk mitigation, monitoring and offboarding.<\/span><\/p>\n<p><b>Vendor Screening<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Is the vendor a legitimate business? Confirming a business actually exists and is what it claims to be is fundamental to managing third-party risk. Organizations can use that information for<\/span><a href=\"https:\/\/www.trulioo.com\/solutions\/aml-watchlist-screening\"> <span style=\"font-weight: 400;\">watchlist screening<\/span><\/a><span style=\"font-weight: 400;\">, adverse media monitoring and other checks for business problems.<\/span><\/p>\n<p><b>Vendor Assessment<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There is always risk when dealing with third parties. Understanding how they operate and how that measures up to the organization\u2019s security requirements helps determine the level of scrutiny.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not all vendors pose the same risks. Assessments focus on how a third party integrates with the business, the vendor\u2019s security environment and the expectations of customers, partners and regulators.<\/span><\/p>\n<p><b>Vendor Risk Mitigation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A risk-based approach<span style=\"font-weight: 400;\"> to vetting vendors helps businesses adjust risk controls and due diligence based on individual circumstances.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Risk scores can guide businesses in determining how carefully they monitor accounts or activities. Ongoing monitoring also helps businesses flag accounts or transactions for deeper review.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When businesses encounter new threats or change their risk tolerance, the risk-assessment process likely will change too. Internal reassessments can help ensure vendor vetting is aligned with the business\u2019 strategy. <\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\" mb-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.trulioo.com\/blog\/compliance\/risk-based-approach\" class=\"my-16 block bg-brown-100 hover:bg-brown-300 md:relative md:flex md:flex-row\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:w-64 md:flex-shrink-0\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:relative md:h-fit md:w-full md:self-stretch\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:absolute md:top-0 md:-left-64 md:h-full md:w-64\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 480px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/blog-risk-based-approach-468x263.jpeg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 768px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/blog-risk-based-approach-608x342.jpeg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/blog-risk-based-approach-468x263.jpeg\" width=\"468\" height=\"263\" itemprop=\"image\" alt=\"Risk-based Approach \u2013 Effective Procedures to Determine and Manage AML &#038; KYC Risk\" class=\"md:h-full w-full object-cover object-top\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"px-6 py-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"sm subheading text-red-500 mb-4\">Read the Article<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"h-sm text-green-900 mb-4\">Risk-based approach \u2013 effective procedures to determine and manage AML &#038; KYC risk<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"p text-green-900\">Understand the risks your organization faces and creating controls for these risks based on prioritizing the damage they can do.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t                                        <div\n                                            id=\"subtopic-article\"\n                                            class=\"custom-typography mb-4\"\n                                            x-ref=\"sticky_2\"\n                                        >\n\n\t\t\t\t\t\t<h3 class=\"h3 \" id='common-risks-when-onboarding-vendors' >Common Risks When Onboarding Vendors<\/h3>\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The modern risk matrix is complicated, quickly evolving and involves multiple areas of business operations.<\/span><\/p>\n<p><b>Cybersecurity and Information Security Risks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Protecting internal systems, networks and data is core to business operations. Businesses can face significant losses when payment information, trade secrets, operational plans or other critical systems are compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybercriminals can leverage vendor access to internal systems or data using viruses, malware or other attacks. They also can gain access through fake orders or fraudulent communications that appear to come from legitimate accounts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Strict controls and access management help, but if a vendor has weak security practices, cybercriminals may already have entry points. Ongoing monitoring and awareness of<\/span><a href=\"https:\/\/www.trulioo.com\/blog\/business-verification\/managing-supply-chain-risk\"> <span style=\"font-weight: 400;\">supply chain<\/span><\/a><span style=\"font-weight: 400;\"> vulnerabilities can help companies avoid damaging breaches.<\/span><\/p>\n<p><b>Compliance Risks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Businesses in regulated industries have to ensure vendors comply with <\/span><a href=\"https:\/\/www.trulioo.com\/blog\/aml-compliance\"><span style=\"font-weight: 400;\">Anti-Money Laundering<\/span><\/a><span style=\"font-weight: 400;\">, data privacy and<\/span><a href=\"https:\/\/www.trulioo.com\/blog\/sanctions-pep-screening\"> <span style=\"font-weight: 400;\">sanctions<\/span><\/a><span style=\"font-weight: 400;\"> laws, among many others.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Who are the vendor\u2019s suppliers, partners and customers, and what risks do they pose? What are the vendor\u2019s compliance procedures? What vetting processes and monitoring does the vendor perform?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A supply chain is only as strong as the weakest link. Due diligence requires confirming that third parties also have strong due diligence.<\/span><\/p>\n<p><b>Environmental, Social and Governance Risks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ethical lapses by a vendor can reflect poorly on an organization. Doing business with a third party whose standards and practices don\u2019t align with the organization can damage employee, investor and public relations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Holding vendors to a code of conduct that reflects company values helps ensure third parties are accountable.<\/span><\/p>\n<p><b>Reputational, Operational and Financial Risks<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Intertwined supply chains and far-flung organizations create agile business opportunities but also allow for risks to spread faster and wider. A small event can quickly gain traction on social media, a system weakness can be broadcast on the dark web, or a website crash can affect entire business lines.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Policies to limit damage and robust response procedures that vendors understand and implement go a long way toward avoiding reputational, operational and financial impairment.<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t                                        <div\n                                            id=\"subtopic-article\"\n                                            class=\"custom-typography mb-4\"\n                                            x-ref=\"sticky_3\"\n                                        >\n\n\t\t\t\t\t\t<h3 class=\"h3 \" id='managing-risk-when-onboarding-vendors' >Managing Risk When Onboarding Vendors<\/h3>\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The first step in third-party due diligence is <\/span><a href=\"https:\/\/www.trulioo.com\/solutions\/business-verification\"><span style=\"font-weight: 400;\">identification and verification<\/span><\/a><span style=\"font-weight: 400;\">. Is the vendor what it claims to be? That step involves gathering business information such as registration number, business name, status, address, managing directors and incorporation date.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s not enough to gather the information. Verifying its accuracy helps establish legitimacy. Generally, that involves checking official records through a government register or public file to ensure the information matches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Other<\/span><a href=\"https:\/\/www.trulioo.com\/blog\/customer-due-diligence-checklist\"> <span style=\"font-weight: 400;\">due diligence<\/span><\/a><span style=\"font-weight: 400;\"> questions help assess the vendor\u2019s activities, reputation and business sustainability:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What kind of business is it?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What is the vendor\u2019s contact information?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What services does it provide?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How long has it been in business?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What is the CEO\u2019s track record with the current vendor and past businesses?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Is the vendor adequately insured?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Does the vendor have data-protection safeguards?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What is the vendor\u2019s reputation?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Where does it operate?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How will the laws governing the vendor affect the organization?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Does it follow sound business practices?<\/span><\/li>\n<\/ul>\n<p>Enhanced due diligence<span style=\"font-weight: 400;\"> might be necessary to resolve unanswered questions or if the relationship involves sharing sensitive business or personally identifiable information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Checks and assessments at the outset and at critical moments during the relationship help ensure risk mitigation.<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\" mb-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.trulioo.com\/blog\/enhanced-due-diligence\" class=\"my-16 block bg-brown-100 hover:bg-brown-300 md:relative md:flex md:flex-row\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:w-64 md:flex-shrink-0\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:relative md:h-fit md:w-full md:self-stretch\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:absolute md:top-0 md:-left-64 md:h-full md:w-64\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 480px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/05\/blog-enhanced-due-diligence-468x263.jpeg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 768px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/05\/blog-enhanced-due-diligence-608x342.jpeg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2022\/05\/blog-enhanced-due-diligence-468x263.jpeg\" width=\"468\" height=\"263\" itemprop=\"image\" alt=\"\" class=\"md:h-full w-full object-cover object-top\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"px-6 py-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"sm subheading text-red-500 mb-4\">Read the Article<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"h-sm text-green-900 mb-4\">Enhanced Due Diligence procedures for high-risk customer<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"p text-green-900\">Learn effective EDD procedures you can use to minimize risk and maintain practical compliance standards when onboarding high-risk customers.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t                                        <div\n                                            id=\"subtopic-article\"\n                                            class=\"custom-typography mb-4\"\n                                            x-ref=\"sticky_4\"\n                                        >\n\n\t\t\t\t\t\t<h3 class=\"h3 \" id='vendor-onboarding-best-practices' >Vendor Onboarding Best Practices<\/h3>\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Vendor onboarding isn\u2019t just about managing risk. It creates a solid working relationship that benefits both parties.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The initial onboarding experience can make or break a relationship, especially with small vendors. They might not have the time or expertise to handle complex onboarding, and the risk level might not require it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Risk management is necessary when <\/span><a href=\"https:\/\/www.trulioo.com\/blog\/business-verification\/vendor-onboarding-marketplaces\"><span style=\"font-weight: 400;\">onboarding marketplace vendors<\/span><\/a><span style=\"font-weight: 400;\"> or<\/span><a href=\"https:\/\/www.trulioo.com\/blog\/business-verification\/best-practices-merchant-onboarding\"> <span style=\"font-weight: 400;\">small merchants<\/span><\/a><span style=\"font-weight: 400;\"> for payment accounts, but the scrutiny isn\u2019t the same as with a major supplier.<\/span><\/p>\n<p><b>Customize the Onboarding Experience<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Adjusting vendor onboarding based on risk level syncs with the risk-based approach. Creating different onboarding<\/span><a href=\"https:\/\/www.trulioo.com\/blog\/identity-verification\/workflow-studio\"> <span style=\"font-weight: 400;\">workflows<\/span><\/a><span style=\"font-weight: 400;\"> for different types of vendors helps accelerate onboarding in low-risk scenarios.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Automated workflows can require more or less information based on specific vendor details. The key is to provide the right onboarding experience for the risk level.<\/span><\/p>\n<p><b>Clear Vendor Communications<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Communicating with the vendor and providing documentation and guidelines throughout the relationship helps establish trust. Background information, training materials, case studies and other content helps build vendor onboarding best practices.<\/span><\/p>\n<p><b>Self-Help Tools and Services<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Enabling vendors to grow benefits both parties. Automated processes for orders, invoices, payments and other business activities provides transparency and decreases support requirements. Advanced analytics offer insights on the health of the business and areas for growth.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Setting up the vendor with the right tools helps get them get started without any questions about how the account is performing.<\/span><\/p>\n<p><b>Timely and Professional Support<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Ensuring the vendor can get questions answered and problems solved reduces friction and enhances the working relationship.<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\" mb-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/content.trulioo.com\/flip-book\/351985\/886262\" class=\"my-16 block bg-brown-100 hover:bg-brown-300 md:relative md:flex md:flex-row\"  rel=\"noopener noreferrer\" target=\"_blank\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:w-64 md:flex-shrink-0\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:relative md:h-fit md:w-full md:self-stretch\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:absolute md:top-0 md:-left-64 md:h-full md:w-64\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 480px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/50-50-business-onboarding.svg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 768px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/50-50-business-onboarding.svg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/50-50-business-onboarding.svg\" width=\"1\" height=\"1\" itemprop=\"image\" alt=\"Business Onboarding\" class=\"md:h-full w-full object-cover object-top\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"px-6 py-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"sm subheading text-red-500 mb-4\">View the Solution Sheet <\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"h-sm text-green-900 mb-4\">Enhance Business  Verification for  Global Digital  Commerce<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"p text-green-900\">Learn how Business Verification helps clients comply with  strict Know Your Business (KYB) regulations at any level,  anywhere in the world.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t                                        <div\n                                            id=\"subtopic-article\"\n                                            class=\"custom-typography mb-4\"\n                                            x-ref=\"sticky_5\"\n                                        >\n\n\t\t\t\t\t\t<h3 class=\"h3 \" id='balancing-security-and-speed-in-vendor-onboarding' >Balancing Security and Speed in Vendor Onboarding<\/h3>\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">While there are many steps to vendor onboarding, the initial verification is especially important.<\/span><\/p>\n<p><a href=\"https:\/\/www.trulioo.com\/solutions\/business-verification\"><span style=\"font-weight: 400;\">Business verification<\/span><\/a><span style=\"font-weight: 400;\"> sets the tone for the relationship. Slow and overly complex experiences can start the relationship off on the wrong foot.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Business verification is also the first opportunity to stop fraudulent vendors from gaining access to an organization\u2019s systems. At the core of risk mitigation is preventing problems before they occur.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Intelligent, automated and agile business verification accounts for a risk-based approach by varying onboarding based on circumstances. It adjusts to different use cases, markets and vendors to help protect an organization and its supply chain.\u00a0\u00a0<\/span><\/p>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\" mb-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/id.trulioo.com\/business-verification.html\" class=\"my-16 block bg-brown-100 hover:bg-brown-300 md:relative md:flex md:flex-row\"  rel=\"noopener noreferrer\" target=\"_blank\" >\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:w-64 md:flex-shrink-0\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:relative md:h-fit md:w-full md:self-stretch\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"md:absolute md:top-0 md:-left-64 md:h-full md:w-64\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 480px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/wp-verify-businesses-quickly-thumbnail-468x263.jpg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<source media=\"(max-width: 768px)\" srcset=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/wp-verify-businesses-quickly-thumbnail-608x342.jpg\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/wp-verify-businesses-quickly-thumbnail-468x263.jpg\" width=\"468\" height=\"263\" itemprop=\"image\" alt=\"\" class=\"md:h-full w-full object-cover object-top\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/picture>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"px-6 py-4\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"sm subheading text-red-500 mb-4\">Download the White Paper<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"h-sm text-green-900 mb-4\">Global Business Verification<\/h4>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"p text-green-900\">Discover how Trulioo Business Verification services provide clients the clarity they need to streamline Know Your Business, Anti-Money Laundering, Know Your Customer and Customer Due Diligence processes.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<div class=\"hidden lg:block section px-0 pt-10 mt-20 border-t border-green-900\">\n\t\t\t\t\t\n<script>\n\t\/\/ @author Justin Golden - Copied from Desktop Clock\n\tasync function copyText(str) {\n\t\tconsole.log('Copying', str);\n\t\tif (!navigator.clipboard) {\n\t\t\t\/\/ fallback\n\t\t\tconst input = document.createElement('textarea');\n\t\t\tinput.innerHTML = str;\n\t\t\tdocument.body.appendChild(input);\n\t\t\tinput.focus();\n\t\t\tinput.select();\n\t\t\tlet result;\n\n\t\t\ttry {\n\t\t\t\tresult = document.execCommand('copy');\n\t\t\t\tconsole.log('Fallback: Copying text command was ' + (result ? 'successful' : 'unsuccessful'));\n\t\t\t} catch (err) {\n\t\t\t\tconsole.error('Fallback: Could not copy text: ', err);\n\t\t\t}\n\t\t\tdocument.body.removeChild(input);\n\t\t\treturn result;\n\t\t}\n\t\tconst result = navigator.clipboard.writeText(str).then(\n\t\t\tfunction() {\n\t\t\t\tconsole.log('Async: Copying to clipboard was successful');\n\t\t\t\treturn true;\n\t\t\t},\n\t\t\tfunction(err) {\n\t\t\t\tconsole.error('Async: Could not copy text: ', err);\n\t\t\t\treturn false;\n\t\t\t}\n\t\t);\n\t\treturn result;\n\t}\n<\/script>\n\n<div x-data=\"{open: false}\" class=\"text-green-900\">\n\t<div :class=\"open &#038;&#038; 'bg-brown-100'\" class=\"transition-colors inline-block p-4\">\n\t\t<!-- Add `rotate-90` class to button when open\n            When open button should have hover classes without `hover:` and add `hover:bg-green-700` -->\n\t\t<button class=\"flex items-center cursor-pointer\" @click=\"open = !open\">\n\t\t\t<div :class=\"open ? 'rotate-90 bg-green-900 text-green-500 hover:bg-green-700' : 'bg-green-500 text-green-900 hover:bg-green-900 hover:text-green-500'\" aria-label=\"Share URLs\" class=\"btn-circle-md mr-3\">\n\t\t\t\t<svg class=\"h-3.5\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 6 9\"><path fill=\"currentColor\" d=\"m1.8.9a.9.9 0 10-1.8 0 .9.9 0 101.8 0m2.1 1.8a.9.9 0 10-1.8 0 .9.9 0 101.8 0m2.1 1.8a.9.9 0 10-1.8 0 .9.9 0 101.8 0m-2.1 1.8a.9.9 0 10-1.8 0 .9.9 0 101.8 0m-2.1 1.8a.9.9 0 10-1.8 0 .9.9 0 101.8 0\"\/><\/svg>\t\n\t\t\t<\/div>\n\t\t\t<p class=\"p-lg subheading text-green-900\">Share this<\/p>\n\t\t<\/button>\n\t\t<hr x-show=\"open\" class=\"border-green-900 mt-4 mb-6\">\n\n\n\t\t<div x-show=\"open\" x-transition>\n\t\t\t<a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.trulioo.com%2Fidentity-verification-use-cases%2Fonboarding%2Fvendor\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"flex items-center mb-6 text-green-900 hover:text-red-500\">\n\t\t\t\t<svg class=\"h-5 mr-7\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path fill=\"currentColor\" d=\"M13.79 24V13.5h3.54l.53-4.08h-4.07V6.81c0-1.18.33-2 2.04-2H18V1.17c-.38-.05-1.67-.16-3.17-.16-3.14 0-5.28 1.9-5.28 5.4v3.02H6v4.09h3.55V24h4.24Z\"\/><\/svg>\t\t\t\t<p class=\"p subheading\">\n\t\t\t\t\tFacebook\t\t\t\t<\/p>\n\t\t\t<\/a>\n\n\t\t\t<a href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.trulioo.com%2Fidentity-verification-use-cases%2Fonboarding%2Fvendor\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"flex items-center mb-6 text-green-900 hover:text-red-500\">\n\t\t\t\t<svg class=\"h-5 mr-7\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path fill=\"currentColor\" d=\"M21.6 8.5c1-.7 1.8-1.4 2.4-2.4-.9.4-1.8.6-2.7.7 1-.5 1.7-1.4 2-2.5-.9.6-1.9 1-3 1.1A4.8 4.8 0 0 0 17 4a4.6 4.6 0 0 0-4.6 5.6c-3.9-.2-7.4-2-9.7-4.8A4.5 4.5 0 0 0 4.1 11c-.8 0-1.6-.2-2.2-.6 0 2.3 1.7 4.1 3.8 4.6a4.9 4.9 0 0 1-2.1 0A4.7 4.7 0 0 0 8 18.1 9.7 9.7 0 0 1 1 20c2 1.3 4.6 2 7.2 2A13 13 0 0 0 21.6 8.5Z\"\/><\/svg>\t\t\t\t<p class=\"p subheading\">\n\t\t\t\t\tTwitter\t\t\t\t<\/p>\n\t\t\t<\/a>\n\n\t\t\t<a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.trulioo.com%2Fidentity-verification-use-cases%2Fonboarding%2Fvendor\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"flex items-center mb-6 text-green-900 hover:text-red-500\">\n\t\t\t\t<svg class=\"h-5 mr-7\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" fill=\"none\" viewBox=\"0 0 24 24\"><path fill=\"currentColor\" d=\"M22.91 22.91v-8C22.91 11 22.07 8 17.48 8a4.74 4.74 0 0 0-4.28 2.35h-.05v-2H8.8v14.57h4.53v-7.23c0-1.9.35-3.73 2.7-3.73 2.32 0 2.34 2.15 2.34 3.84v7.1h4.53v.02ZM1.44 8.34h4.53v14.57H1.44V8.34ZM3.7 1.09A2.62 2.62 0 0 0 1.1 3.7 2.64 2.64 0 0 0 3.7 6.35c1.44 0 2.62-1.2 2.62-2.64A2.62 2.62 0 0 0 3.7 1.09Z\"\/><\/svg>\t\t\t\t<p class=\"p subheading\">\n\t\t\t\t\tLinkedin\t\t\t\t<\/p>\n\t\t\t<\/a>\n\n\t\t\t<button onclick=\"copyText(window.location.href)\" class=\"flex items-center mb-6 text-green-900 hover:text-red-500\" aria-label=\"Copy Link\">\n\t\t\t\t<svg class=\"h-5 mr-7\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\"><path fill=\"none\" stroke=\"currentColor\" stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M10 9.5A4.5 4.5 0 0 0 6.8 8H5.3a4.5 4.5 0 0 0 0 9h1.5a4.5 4.5 0 0 0 3.4-1.5M14 9.5A4.5 4.5 0 0 1 17.2 8h1.4a4.5 4.5 0 1 1 0 9h-1.4a4.5 4.5 0 0 1-3.4-1.5M6.8 12.5h10.4\"\/><\/svg>\t\t\t\t<p class=\"p subheading\">\n\t\t\t\t\tGet Link\t\t\t\t<\/p>\n\t\t\t<\/button>\n\t\t<\/div>\n\n\t<\/div>\n<\/div>\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/article>\n<\/div>\n\n\n\n\n<div class=\"w-full bg-white h-[120px] lg:h-[240px]\"><\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":26244,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.1 (Yoast SEO v22.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital Vendor Onboarding | Trulioo<\/title>\n<meta name=\"description\" content=\"Learn how vetting business partners and suppliers through digital vendor onboarding protects companies and their customers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital Vendor Onboarding | Trulioo\" \/>\n<meta property=\"og:description\" content=\"Learn how vetting business partners and suppliers through digital vendor onboarding protects companies and their customers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor\" \/>\n<meta property=\"og:site_name\" content=\"Trulioo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trulioo\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-09T17:17:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/hero-homepage-identity-verification-service-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"514\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@trulioo\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor\",\"url\":\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor\",\"name\":\"Digital Vendor Onboarding | Trulioo\",\"isPartOf\":{\"@id\":\"https:\/\/www.trulioo.com\/#website\"},\"datePublished\":\"2023-02-24T20:34:46+00:00\",\"dateModified\":\"2023-06-09T17:17:32+00:00\",\"description\":\"Learn how vetting business partners and suppliers through digital vendor onboarding protects companies and their customers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trulioo.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Use Cases\",\"item\":\"https:\/\/www.trulioo.com\/identity-verification-use-cases\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Onboarding\",\"item\":\"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Vendor Onboarding\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trulioo.com\/#website\",\"url\":\"https:\/\/www.trulioo.com\/\",\"name\":\"Trulioo\",\"description\":\"Building trust online (online identity verification services)\",\"publisher\":{\"@id\":\"https:\/\/www.trulioo.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trulioo.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.trulioo.com\/#organization\",\"name\":\"Trulioo\",\"url\":\"https:\/\/www.trulioo.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"contentUrl\":\"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png\",\"width\":2784,\"height\":1464,\"caption\":\"Trulioo\"},\"image\":{\"@id\":\"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/trulioo\",\"https:\/\/twitter.com\/trulioo\",\"https:\/\/www.linkedin.com\/company\/trulioo\",\"https:\/\/www.instagram.com\/trulioo_global\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital Vendor Onboarding | Trulioo","description":"Learn how vetting business partners and suppliers through digital vendor onboarding protects companies and their customers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor","og_locale":"en_US","og_type":"article","og_title":"Digital Vendor Onboarding | Trulioo","og_description":"Learn how vetting business partners and suppliers through digital vendor onboarding protects companies and their customers.","og_url":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor","og_site_name":"Trulioo","article_publisher":"https:\/\/www.facebook.com\/trulioo","article_modified_time":"2023-06-09T17:17:32+00:00","og_image":[{"url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/hero-homepage-identity-verification-service-scaled.jpg","width":1024,"height":514,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@trulioo","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor","url":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor","name":"Digital Vendor Onboarding | Trulioo","isPartOf":{"@id":"https:\/\/www.trulioo.com\/#website"},"datePublished":"2023-02-24T20:34:46+00:00","dateModified":"2023-06-09T17:17:32+00:00","description":"Learn how vetting business partners and suppliers through digital vendor onboarding protects companies and their customers.","breadcrumb":{"@id":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding\/vendor#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trulioo.com\/"},{"@type":"ListItem","position":2,"name":"Use Cases","item":"https:\/\/www.trulioo.com\/identity-verification-use-cases"},{"@type":"ListItem","position":3,"name":"Onboarding","item":"https:\/\/www.trulioo.com\/identity-verification-use-cases\/onboarding"},{"@type":"ListItem","position":4,"name":"Vendor Onboarding"}]},{"@type":"WebSite","@id":"https:\/\/www.trulioo.com\/#website","url":"https:\/\/www.trulioo.com\/","name":"Trulioo","description":"Building trust online (online identity verification services)","publisher":{"@id":"https:\/\/www.trulioo.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trulioo.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.trulioo.com\/#organization","name":"Trulioo","url":"https:\/\/www.trulioo.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","contentUrl":"https:\/\/www.trulioo.com\/wp-content\/uploads\/2023\/01\/Trulioo-Wordmark-Dark-Green.png","width":2784,"height":1464,"caption":"Trulioo"},"image":{"@id":"https:\/\/www.trulioo.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/trulioo","https:\/\/twitter.com\/trulioo","https:\/\/www.linkedin.com\/company\/trulioo","https:\/\/www.instagram.com\/trulioo_global\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/pages\/30516"}],"collection":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/comments?post=30516"}],"version-history":[{"count":1,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/pages\/30516\/revisions"}],"predecessor-version":[{"id":35033,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/pages\/30516\/revisions\/35033"}],"up":[{"embeddable":true,"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/pages\/26244"}],"wp:attachment":[{"href":"https:\/\/www.trulioo.com\/wp-json\/wp\/v2\/media?parent=30516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}