SlideShare a Scribd company logo
1 of 31
CONFIDENTIAL 2015
Vendor Master Detox:
How to Sanitize & Stabilize
your VMF Process
April 30, 2015
LIVE WEBINAR
Speakers:
Jon Casher, Casher Associates, Inc.
Josh Morrison, Lavante Inc.
WebEx Webinar Interface
Listen–only mode teleconference
Ask Questions
• Question function in WebEx Webinar at the
bottom of your console
• Submit questions privately
• We will answer them during the presentation
as well as at the end
Listen through your computer or use the
conference dial in #
• Please use the dial in number provided
Ask Question Here!
Panelists
2
3
How to Earn Your CPE Credits
1. Must participate in all polling questions.
2. Attend the webinar for 50 minutes or more.
Introductions – The Panelists
4
Josh Morrison, Sr. Consultant, Lavante
• Former F200 AP & Strategic Sourcing Senior Manager
• Extensive background in Procure-to-Pay & Supply Chain Relationships
• Expertise in Audit Controls, Compliance & Enterprise P2P Systems
• Leading Process Improvement and Business Strategy Thought Leader
Josh.morrison@lavante.com
http://www.linkedin.com/in/joshmorrison
Jon Casher, President, Casher Associates
• Founded Casher Associates, Inc. in 1976 to design custom financial systems
•Co-founded CM Associates in 1985 to provide financial industry software products
• Co-founded RECAP, Inc., an A/P Audit firm, in 1988
• Director of NASDAQ company from 2000-2006
JCasher@casherassociates.com
http://www.linkedin.com/in/joncasher
Agenda
5
Vendor Master Detox: How to Sanitize & Stabilize your VMF
Process
• Criticality and Impact of the VMF
• The Three Pillars Maturity Model
• Prepare for Your Detox
• Execute an Effective Cleanse Process
– The Data
– The Process
• Summary
Criticality and Impact of the VMF
Why do we care
– Penalty
– Price of Non compliance
– Reduce Potential for Supplier Fraud
What is in it for me
– Enterprise coordination
– Leverage
– Decision support
– Standardizations
– Accountability
– Visibility
6
Why is a Sanitary, Healthy VMF so Critical
VMF is Center of all P2P Decisions
- Cornerstone of every P2P transaction
- Facilitates accurate withholding & reporting
- Aids in government & regulatory compliance
- Data framework for completeness & accuracy
- Serves as base for Key Performance
Indicators
- Supports adherence to contract terms &
corporate policies
7
Reduce Fraud
Main Types of Vendor Fraud
– Requests that look like invoices or government forms with a filing fee
– Invoices for goods not delivered or services not provided
– Checks that sign you up for a service if you deposit them (may appear to be
refunds, rebates or credits for a small amount)
– Intentional double billing
– Collusion with an employee, kickbacks, bribes
– Fictitious companies
The Size of the Problem
– Kroll Global Fraud Report
o 19% of companies experienced vendor fraud in 2013
– ACFE
o 5% of revenues lost due to fraud
o billing fraud is approx. 24% of the total monetary amount of fraud
VMF Impacts on Enterprise Decisions
Decision Support Scenarios
Scenario 1
Purchasing needs to have accurate expiry
information to manage supplier contracts for Legal
Scenario 2
Strategic Sourcing needs to analyze supplier
spend and usage data to reduce costs for HR
benefits
Scenario 3
Executive Mgt. needs to report diversity and
charitable contributions to support Compliance and
Tax as well as Sales initiatives with Customers
Scenario 4
Operations needs to find a new service provider
for security services to protect their Employees
and engages AP or Purchasing
Many Others….
9
Impacted Areas
VMF Impacts on P2P Functions & Processes
10
The Supplier Affect™
Agreements
• Document Retention
• Terms & Expiry
• Deliverables Management
• Notifications
• Service Levels
• Contract Compliance
• Business Segment Alignment
• Pricing & Specifications
• Statement of Work/Effort
• Change Collaboration & Management
Systems
• Vendor Master File
• Data Collection & Validation
• Approvals & Workflows
• Notifications
• Regional & Local Considerations
• Accurate Capture of Agreement Terms
• Accurate Capture of Pricing & Attributes
• Supplier Collaboration
• Updates & Change Management
• Supplier Self-Service
Transactions
• Purchase Orders
• Order Confirmations
• Hosted Shopping (Punch-Out)
• Shipments & Receipts
• Invoices
• Payments
• Bank Reconciliations
• Discrepancy Management
• Quality & Errors
• Contract Compliance
Analytics
• Effectiveness & Quality
• Efficiency & Throughput
• Service Levels
• Risk & Fraud Mitigation
• Regulatory Compliance
• Benchmarking & Scorecards
• Growth & Development Strategies
• Trending & Forecasting
• Value Chain Partner Alignment
• Corporate & Social Responsibility
Relationships
• Quality
• Service Levels
• Errors
• Defects & Returns
• Strategic Alignment
• Growth & Development Partners
• Preferred Supplier/Customer Designation
• Operational Continuity
• Risk & Fraud Mitigation
• Cash & Working Capital
Suppliers & Supplier Relationships
The Best-In-Class VMF Process
11
• Duplicates
• Missing Data
Points
• Inactive
Accounts
• Inter-
relationships
SYSTEMS, GOVERNANCE, TRANSACTIONS, ANALYTICS, PEOPLE
BEST-IN-CLASS VENDOR MASTER FILE PROCESS
SANITIZE
• Naming
Conventions
• Segregation
of Duties
• Add/Change
Workflows
• Profile
Completion
STABILIZE
• Regulatory
Compliance
• Validation at
On-Boarding
• Fraud
Protection
• Supplier Self-
Service
OPTIMIZE
The Three Pillars
Typical State
• Large, Outdated VMF
• Few Controls
• Low Automation
• High Risk of Fraud,
Lost Profits
Sanitize
• Duplicates Removed
• Relationships Identified
• Validation Points
• Aged Vendors Purged
Stabilize
• Naming Conventions
• Workflows
• Complete Profiles
• Segregation of Duties
• Centralization
• Reporting
• Transparency
Optimize
•On-Boarding
•Fraud Protection
•Supplier Self-Service
•Data Collection
•Data Validation
•Roles & Permissions
•GRC Controls
•Integrated Workflow
•3rd Party Validation
•Enterprise
Collaboration
Vendor File Process Maturity Model
Reactive Tactical Strategic
Define Measure Analyze Improve Control
12
Typical State
• Large, Outdated VMF
• Few Controls
• Low Automation
• High Risk of Fraud,
Lost Profits
Sanitize
• Duplicates Removed
• Relationships Identified
• Validation Points
• Aged Vendors Purged
Stabilize
• Naming Conventions
• Workflows
• Complete Profiles
• Segregation of Duties
• Centralization
• Reporting
• Transparency
Optimize
•On-Boarding
•Fraud Protection
•Supplier Self-Service
•Data Collection
•Data Validation
•Roles & Permissions
•GRC Controls
•Integrated Workflow
•3rd Party Validation
•Enterprise
Collaboration
Vendor File Process Maturity Model
Reactive Tactical Strategic
Define Measure Analyze Improve Control
13
What to know before you Sanitize
Preliminary Steps before you Detox
• Understand the complexities of
managing your Vendor Master
– Data Decay - Document and data collection,
validation & ageing
– Processes – Cross department Communication
– Benchmark Statistics
14
S a n i t i z e
The VMF Problem - Simplified
Supplier data constantly decays
Many data & documents required
Diverse supplier population
Communication complexity
Multiple internal locations &
division
Compliance to internal controls
Data Decay and Manual Processes Complexity
15
The Human Element within the Process
16
Effect
- Errors
- Fraud
- Duplications
- Regulatory Infractions
- Overpayments
Cause
- Human Error
- Multiple Owners
- Decentralization
- Conversions
- Uploads
Purchasing and AP can use Different Files and/or Multiple Systems
Data Quality and Consistency
– Missing
– Non-standard
– Invalid
– Obsolete
Why Vendor Files Grow
– Name entered differently by your staff
– Vendor changes its name
– Street Address and/or Lock Box changes
– Mergers
o By your organization and by your vendors
– Acquisitions
o By your organization and by your vendors
– Divestitures
o By your vendors
Other Vendor Master File Issues
Vendor Master Data Benchmark Metrics
• 20% - 80% of vendors in current vendor master files have had no activity
within the last 12 months
• 35% - 65% of “active” vendors are one-time vendors
• 7% of vendors change their name annually
• 20% of vendors change their HQ address annually
• Phone #(s), Contact Name(s), Email Addresses and Banking Information also
change
• The bigger your vendor file, the more duplicates you probably have
– 1-100 vendors - no duplicates
– 100 - 1,000 vendors - 1% - 3% redundant
– 1,000 - 10,000 - 2% - 6% redundant
– 10,000 - 100,000 - 4% - 10% redundant
– > 100,000 - > 10% redundant
The Data - Vendor Master Cleanse
Strategic Data Control Statement
– What are the acceptable sources of Data?
– What are the desired types of Data?
– How will you validate the data?
– Create a Data Guideline.
19
The Data - Sources of Supplier relationship data
Sources of Supplier Relationship Data
1. Client data – Data that resides in ERP
or Procurement
2. Supplier Data – Data that supplier fills
in self service
3. 3rd Party data – Government & non
government
4. Data aggregators – Supplier
Intelligence
5. Lavante Network Data – Data that LSN
provides – Fraud score
20
The Data - Score Your Current Data
Different Types of Supplier data
– Primary
o Core Supplier Name and Address
– Secondary
o Contact and Supplier Intelligence
21
Regulated
Tertiary
Secondary
Primary
37.50%
17.50%
20.00%
88.24%
– Tertiary
o Documents and certifications
– Regulated Data
o Data that needs to be validated
The Data - Ad Hoc Data Quality Query Capability
22
Ad Hoc Data Quality Query Tool
- Filtering
- Scoring
- Exporting
- Graphing
Create field guidelines for data format, validation and control
– Vendor Type and/or Class
– 1099 Type (Box)
– Phone Numbers
– Taxpayer Identifiers
– Payment Terms
– ACH, P-Card, EDI, etc.
– Diversity:
o Women, Minority, Small Business
Veteran, Disabled Veteran, etc.
– Insurance Certificate(s)
– Tax Certificate(s)
– Certifications
– Contacts
– Email addresses and web sites
The Data – Create Guideline of Data Controls
Field Controls
Size – Format
Score Weighting
Ownership
Privileges
Included in Workflow
Who can see it
Frequency of updating
Validation Source
More…
The Process- Vendor Master Cleanse
Strategic Process Control Statement
– Define the Roles?
– Define the Supplier Communication Strategy?
– How will we perform Validations and Verifications?
24
Owner should be responsible for
– Defining data requirements
– Setting, maintaining and monitoring standards and data quality
– Coordinating the activities of those who use, enter and update vendor
information
Well Documented and Tested Procedures
– Define the process for doing business with new vendors
– Ensure that only authorized individuals can make changes, additions, deletions
Segregation of Duties Controls
– People allowed to make changes must not be able to process
transactions such as issuing purchase orders, posting invoices,
disbursing funds or making accounting entries
Audit Trail of Changes
– All additions, changes and deletions should be logged, reported, reviewed
and signed off by someone in management other than the person posting
updates
Reconcile and Synchronize
– If multiple systems have vendor information, reconcile common information
The Process – Define the Roles
The Process – Simple Supplier Communications
Have general conventions and standards
– Use a new vendor form with field names and positions similar to
where they are in your vendor setup screens
o Require names and signatures of requestor, person doing setup and person
reviewing and verifying correct setup information
– Standardize how vendor names are entered
o Insist that the guidelines be followed – verify periodically
- Punctuation
- Abbreviations
- Name Prefixes and Suffixes
- Name Qualifiers
Provide to Vendors
– Send out a welcome letter and information packet that identifies:
o What to do to get paid
o When a contract or Purchase Order is required
o Whom to contact regarding issues
o Optionally, ethics and dispute resolution guidelines
Regulatory
– Ensure that you are not doing business with a prohibited party
on the OFAC, FTO and BIS lists or other lists of denied,
debarred, excluded or restricted parties
– Check GSA System for Awards Management
– Verify that information for regulatory reporting is correct
o Get W-9s for US vendors and appropriate W-8 for non-US vendors
o Use IRS TIN Matching
o Check State of Incorporation or Local Jurisdiction
- Secretary of State or Office of Corporations
o Determine State Reporting Requirements
- State Withholding and “1099” Reporting
- Office of Child Support for Deadbeat Parent
– Check Industry Specific lists
The Process - Validations and Verifications
The Process – Ongoing Regular Communication
Communicate regularly with vendors
– Prepare a document that explains how a vendor should conduct
business with your firm
– Require vendors to sign a business practices statement
– Use email intelligently
– Accept electronic input
– Provide sufficient remittance information to vendors so that they
can properly apply payments
– Provide on-line inquiry and self service capability (Vendor
Portal)
– Monitor vendor performance – accuracy and timeliness of
invoices
– Consider having “Service Level Agreements” with your strategic
vendors
The Power of the VMF
Leverage
– Fraud detection and prevention
– Strategic Suppler Relationship Management (SRM)
– Create value chain partners,
o Improve working capital
– Improve accuracy of business transactions
– Document solicitation and retention
o (W9, W8, COI, Diversity)
– Accurate metrics and analyses
– Spend management
– Strategic Sourcing
– Exclusion list management
29
Summary
• The secret is out
YOUR VMF IS CRITICAL
• Tell your secrets
– Executive Management
– Tax, Legal, Compliance
– Department Heads
– Supplier Relationship Owners
– Align AP, Purchasing, & Sourcing
• Achieve Best-In-Class
– Automate, Stabilize, Optimize
– Streamlined & Controlled Processes
– Compliance; Regulatory, Corporate, Contract
– Real-Time, Collaborative, Documented
– Comprehensive Profile Validation & Completion
– Supplier Self-Service
30
Next Thought Leadership Events
"Secrets You Need to Know About your Vendor Master File."
March 26, 2015 - 11am PST
"Detox Your Vendor File."
April 30, 2015 - 11am PST
Jon Casher and Josh Morrison outline that much of the data
and records
residing in your vendor file are unnecessary and even
damaging to your
ability to complete your daily tasks and hit your strategic goals.
"How to Take your Vendor File to the NEXT LEVEL"
June 23, 2015 - 11am PST
Jon Casher and Josh Morrison walk through the six indispensable steps
of the ideal master vendor file. Learn what it takes to be among the
industry's best of breed.
31

More Related Content

What's hot

Small Business Records Management
Small Business Records Management Small Business Records Management
Small Business Records Management Equilibria, Inc.
 
Electronic Payments and the Last Mile of the Procure-to-Pay Transformation
Electronic Payments and the Last Mile of the Procure-to-Pay TransformationElectronic Payments and the Last Mile of the Procure-to-Pay Transformation
Electronic Payments and the Last Mile of the Procure-to-Pay TransformationCorcentric
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditFraudBusters
 
To Track Or Not To Track Why Tracking Certificates Of Insurance Make Sense ...
To Track Or Not To Track   Why Tracking Certificates Of Insurance Make Sense ...To Track Or Not To Track   Why Tracking Certificates Of Insurance Make Sense ...
To Track Or Not To Track Why Tracking Certificates Of Insurance Make Sense ...robertbarryscott
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisFraudBusters
 
Reduce your aml compliance workload
Reduce your aml compliance workloadReduce your aml compliance workload
Reduce your aml compliance workloadAlessa
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseSharing Slides Training
 
Dynamic systems e ticket system for law enforcement
Dynamic systems e ticket system for law enforcementDynamic systems e ticket system for law enforcement
Dynamic systems e ticket system for law enforcementDynamic Systems
 
Legal & Regulatory Compliance - Audit Services
Legal & Regulatory Compliance - Audit ServicesLegal & Regulatory Compliance - Audit Services
Legal & Regulatory Compliance - Audit ServicesPiyush Bhandari
 
What is a business information report
What is a business information reportWhat is a business information report
What is a business information reportCRIF India
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Managementjgatrell
 
Commercial insurance risk and liability review, February 2016
Commercial insurance risk and liability review, February 2016Commercial insurance risk and liability review, February 2016
Commercial insurance risk and liability review, February 2016Browne Jacobson LLP
 
The Comprehensive Solution to All Your Legal Invoicing Issues
The Comprehensive Solution to All Your Legal Invoicing IssuesThe Comprehensive Solution to All Your Legal Invoicing Issues
The Comprehensive Solution to All Your Legal Invoicing IssuesAccurate Legal Billing
 
Why Technology Makes a Difference 201503 v2
Why Technology Makes a Difference 201503 v2Why Technology Makes a Difference 201503 v2
Why Technology Makes a Difference 201503 v2Laura Martin
 
USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...
USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...
USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...U.S. Women's Chamber of Commerce
 
Liberty Data Solutions, Know your Client
Liberty Data Solutions, Know your ClientLiberty Data Solutions, Know your Client
Liberty Data Solutions, Know your ClientStevenDendrinos
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Alessa
 
Half the Picture
Half the PictureHalf the Picture
Half the PictureThomas Lee
 
Infographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-StandardsInfographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-StandardsClint Walker
 

What's hot (20)

Small Business Records Management
Small Business Records Management Small Business Records Management
Small Business Records Management
 
Electronic Payments and the Last Mile of the Procure-to-Pay Transformation
Electronic Payments and the Last Mile of the Procure-to-Pay TransformationElectronic Payments and the Last Mile of the Procure-to-Pay Transformation
Electronic Payments and the Last Mile of the Procure-to-Pay Transformation
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
To Track Or Not To Track Why Tracking Certificates Of Insurance Make Sense ...
To Track Or Not To Track   Why Tracking Certificates Of Insurance Make Sense ...To Track Or Not To Track   Why Tracking Certificates Of Insurance Make Sense ...
To Track Or Not To Track Why Tracking Certificates Of Insurance Make Sense ...
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 
Reduce your aml compliance workload
Reduce your aml compliance workloadReduce your aml compliance workload
Reduce your aml compliance workload
 
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And AbuseAis Romney 2006 Slides 05 Computer Fraud And Abuse
Ais Romney 2006 Slides 05 Computer Fraud And Abuse
 
Dynamic systems e ticket system for law enforcement
Dynamic systems e ticket system for law enforcementDynamic systems e ticket system for law enforcement
Dynamic systems e ticket system for law enforcement
 
Minimum viable compliance whitepaper
Minimum viable compliance whitepaperMinimum viable compliance whitepaper
Minimum viable compliance whitepaper
 
Legal & Regulatory Compliance - Audit Services
Legal & Regulatory Compliance - Audit ServicesLegal & Regulatory Compliance - Audit Services
Legal & Regulatory Compliance - Audit Services
 
What is a business information report
What is a business information reportWhat is a business information report
What is a business information report
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Management
 
Commercial insurance risk and liability review, February 2016
Commercial insurance risk and liability review, February 2016Commercial insurance risk and liability review, February 2016
Commercial insurance risk and liability review, February 2016
 
The Comprehensive Solution to All Your Legal Invoicing Issues
The Comprehensive Solution to All Your Legal Invoicing IssuesThe Comprehensive Solution to All Your Legal Invoicing Issues
The Comprehensive Solution to All Your Legal Invoicing Issues
 
Why Technology Makes a Difference 201503 v2
Why Technology Makes a Difference 201503 v2Why Technology Makes a Difference 201503 v2
Why Technology Makes a Difference 201503 v2
 
USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...
USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...
USWCC | Review of the Proposed Regulations for the Women's Federal Procuremen...
 
Liberty Data Solutions, Know your Client
Liberty Data Solutions, Know your ClientLiberty Data Solutions, Know your Client
Liberty Data Solutions, Know your Client
 
Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)Assessing AML Geographic Risk: a Methodology (November 2020)
Assessing AML Geographic Risk: a Methodology (November 2020)
 
Half the Picture
Half the PictureHalf the Picture
Half the Picture
 
Infographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-StandardsInfographic-2-MainFrame-Compliance-Standards
Infographic-2-MainFrame-Compliance-Standards
 

Similar to Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF Process

Who What and Where Final v3
Who What and Where Final v3Who What and Where Final v3
Who What and Where Final v3Tammie Norman
 
Improve Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best PracticesImprove Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best PracticesLavante Inc.
 
Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...
Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...
Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...emermell
 
The Enterprise Supply Chain View
The Enterprise Supply Chain ViewThe Enterprise Supply Chain View
The Enterprise Supply Chain ViewScottMadden, Inc.
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101ntel
 
Using Analytics to Build Solid Supply and Supplier Management Relationships
Using Analytics to Build Solid Supply and Supplier Management RelationshipsUsing Analytics to Build Solid Supply and Supplier Management Relationships
Using Analytics to Build Solid Supply and Supplier Management RelationshipsHalo BI
 
Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTradeshift
 
Perfect Your Touchless Invoicing
Perfect Your Touchless InvoicingPerfect Your Touchless Invoicing
Perfect Your Touchless InvoicingTradeshift
 
SmartERP Cannon Webinar_2017_Oracle OpenWorld
SmartERP Cannon Webinar_2017_Oracle OpenWorldSmartERP Cannon Webinar_2017_Oracle OpenWorld
SmartERP Cannon Webinar_2017_Oracle OpenWorldSmart ERP Solutions, Inc.
 
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...Perficient, Inc.
 
Cloudway sipm capabilities
Cloudway sipm capabilitiesCloudway sipm capabilities
Cloudway sipm capabilitiesSaumya S
 
Overlooked issues in procure to-pay may 28-webinar vpa_v2
Overlooked issues in procure to-pay may 28-webinar vpa_v2Overlooked issues in procure to-pay may 28-webinar vpa_v2
Overlooked issues in procure to-pay may 28-webinar vpa_v2Tradeshift
 
A G S004 Smith 091707
A G S004  Smith 091707A G S004  Smith 091707
A G S004 Smith 091707Dreamforce07
 
Vendor/Supplier Portal Whitepaper - CRMJetty
Vendor/Supplier Portal Whitepaper - CRMJettyVendor/Supplier Portal Whitepaper - CRMJetty
Vendor/Supplier Portal Whitepaper - CRMJettyCRMJetty
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdfWilson Kao
 
Governance as a "painkiller": A Business First Approach to Data Governance
Governance as a "painkiller": A Business First Approach to Data GovernanceGovernance as a "painkiller": A Business First Approach to Data Governance
Governance as a "painkiller": A Business First Approach to Data GovernancePrecisely
 
Data Governance That Drives the Bottom Line
Data Governance That Drives the Bottom LineData Governance That Drives the Bottom Line
Data Governance That Drives the Bottom LinePrecisely
 
How Data.com Drives Data Quality
How Data.com Drives Data QualityHow Data.com Drives Data Quality
How Data.com Drives Data QualitySalesforce Partners
 
Realizing The Full Potential Of Your SAP Procurement Systems
Realizing The Full Potential Of Your SAP Procurement SystemsRealizing The Full Potential Of Your SAP Procurement Systems
Realizing The Full Potential Of Your SAP Procurement SystemsSAP Ariba
 
Procure-to-Pay Process Framework
Procure-to-Pay Process FrameworkProcure-to-Pay Process Framework
Procure-to-Pay Process FrameworkScottMadden, Inc.
 

Similar to Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF Process (20)

Who What and Where Final v3
Who What and Where Final v3Who What and Where Final v3
Who What and Where Final v3
 
Improve Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best PracticesImprove Regulatory Compliance & Risk Management Using Best Practices
Improve Regulatory Compliance & Risk Management Using Best Practices
 
Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...
Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...
Scaling FATCA’s Data Mountain – Technologies and best practices to streamline...
 
The Enterprise Supply Chain View
The Enterprise Supply Chain ViewThe Enterprise Supply Chain View
The Enterprise Supply Chain View
 
Revenue assurance 101
Revenue assurance 101Revenue assurance 101
Revenue assurance 101
 
Using Analytics to Build Solid Supply and Supplier Management Relationships
Using Analytics to Build Solid Supply and Supplier Management RelationshipsUsing Analytics to Build Solid Supply and Supplier Management Relationships
Using Analytics to Build Solid Supply and Supplier Management Relationships
 
Ten Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are RealTen Tips to Ensue that Your Suppliers are Real
Ten Tips to Ensue that Your Suppliers are Real
 
Perfect Your Touchless Invoicing
Perfect Your Touchless InvoicingPerfect Your Touchless Invoicing
Perfect Your Touchless Invoicing
 
SmartERP Cannon Webinar_2017_Oracle OpenWorld
SmartERP Cannon Webinar_2017_Oracle OpenWorldSmartERP Cannon Webinar_2017_Oracle OpenWorld
SmartERP Cannon Webinar_2017_Oracle OpenWorld
 
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
Leveraging Data in Financial Services to Meet Regulatory Requirements and Cre...
 
Cloudway sipm capabilities
Cloudway sipm capabilitiesCloudway sipm capabilities
Cloudway sipm capabilities
 
Overlooked issues in procure to-pay may 28-webinar vpa_v2
Overlooked issues in procure to-pay may 28-webinar vpa_v2Overlooked issues in procure to-pay may 28-webinar vpa_v2
Overlooked issues in procure to-pay may 28-webinar vpa_v2
 
A G S004 Smith 091707
A G S004  Smith 091707A G S004  Smith 091707
A G S004 Smith 091707
 
Vendor/Supplier Portal Whitepaper - CRMJetty
Vendor/Supplier Portal Whitepaper - CRMJettyVendor/Supplier Portal Whitepaper - CRMJetty
Vendor/Supplier Portal Whitepaper - CRMJetty
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
Governance as a "painkiller": A Business First Approach to Data Governance
Governance as a "painkiller": A Business First Approach to Data GovernanceGovernance as a "painkiller": A Business First Approach to Data Governance
Governance as a "painkiller": A Business First Approach to Data Governance
 
Data Governance That Drives the Bottom Line
Data Governance That Drives the Bottom LineData Governance That Drives the Bottom Line
Data Governance That Drives the Bottom Line
 
How Data.com Drives Data Quality
How Data.com Drives Data QualityHow Data.com Drives Data Quality
How Data.com Drives Data Quality
 
Realizing The Full Potential Of Your SAP Procurement Systems
Realizing The Full Potential Of Your SAP Procurement SystemsRealizing The Full Potential Of Your SAP Procurement Systems
Realizing The Full Potential Of Your SAP Procurement Systems
 
Procure-to-Pay Process Framework
Procure-to-Pay Process FrameworkProcure-to-Pay Process Framework
Procure-to-Pay Process Framework
 

Recently uploaded

Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Commonwealth
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfGale Pooley
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingMaristelaRamos12
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdfAdnet Communications
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...Call Girls in Nagpur High Profile
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfMichael Silva
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingAggregage
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...Suhani Kapoor
 
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdfAdnet Communications
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...ssifa0344
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Modelshematsharma006
 

Recently uploaded (20)

Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]Monthly Market Risk Update: April 2024 [SlideShare]
Monthly Market Risk Update: April 2024 [SlideShare]
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Maya Call 7001035870 Meet With Nagpur Escorts
 
The Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdfThe Economic History of the U.S. Lecture 18.pdf
The Economic History of the U.S. Lecture 18.pdf
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Quarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of MarketingQuarter 4- Module 3 Principles of Marketing
Quarter 4- Module 3 Principles of Marketing
 
20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf20240417-Calibre-April-2024-Investor-Presentation.pdf
20240417-Calibre-April-2024-Investor-Presentation.pdf
 
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
VVIP Pune Call Girls Katraj (7001035870) Pune Escorts Nearby with Complete Sa...
 
Stock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdfStock Market Brief Deck for 4/24/24 .pdf
Stock Market Brief Deck for 4/24/24 .pdf
 
How Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of ReportingHow Automation is Driving Efficiency Through the Last Mile of Reporting
How Automation is Driving Efficiency Through the Last Mile of Reporting
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
VIP Call Girls LB Nagar ( Hyderabad ) Phone 8250192130 | ₹5k To 25k With Room...
 
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service ThaneVIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
VIP Call Girls Thane Sia 8617697112 Independent Escort Service Thane
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf20240429 Calibre April 2024 Investor Presentation.pdf
20240429 Calibre April 2024 Investor Presentation.pdf
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
Solution Manual for Financial Accounting, 11th Edition by Robert Libby, Patri...
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Andheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot ModelsAndheri Call Girls In 9825968104 Mumbai Hot Models
Andheri Call Girls In 9825968104 Mumbai Hot Models
 

Detox Your Vendor Master File Process: How to Sanitize & Stabilize your VMF Process

  • 1. CONFIDENTIAL 2015 Vendor Master Detox: How to Sanitize & Stabilize your VMF Process April 30, 2015 LIVE WEBINAR Speakers: Jon Casher, Casher Associates, Inc. Josh Morrison, Lavante Inc.
  • 2. WebEx Webinar Interface Listen–only mode teleconference Ask Questions • Question function in WebEx Webinar at the bottom of your console • Submit questions privately • We will answer them during the presentation as well as at the end Listen through your computer or use the conference dial in # • Please use the dial in number provided Ask Question Here! Panelists 2
  • 3. 3 How to Earn Your CPE Credits 1. Must participate in all polling questions. 2. Attend the webinar for 50 minutes or more.
  • 4. Introductions – The Panelists 4 Josh Morrison, Sr. Consultant, Lavante • Former F200 AP & Strategic Sourcing Senior Manager • Extensive background in Procure-to-Pay & Supply Chain Relationships • Expertise in Audit Controls, Compliance & Enterprise P2P Systems • Leading Process Improvement and Business Strategy Thought Leader Josh.morrison@lavante.com http://www.linkedin.com/in/joshmorrison Jon Casher, President, Casher Associates • Founded Casher Associates, Inc. in 1976 to design custom financial systems •Co-founded CM Associates in 1985 to provide financial industry software products • Co-founded RECAP, Inc., an A/P Audit firm, in 1988 • Director of NASDAQ company from 2000-2006 JCasher@casherassociates.com http://www.linkedin.com/in/joncasher
  • 5. Agenda 5 Vendor Master Detox: How to Sanitize & Stabilize your VMF Process • Criticality and Impact of the VMF • The Three Pillars Maturity Model • Prepare for Your Detox • Execute an Effective Cleanse Process – The Data – The Process • Summary
  • 6. Criticality and Impact of the VMF Why do we care – Penalty – Price of Non compliance – Reduce Potential for Supplier Fraud What is in it for me – Enterprise coordination – Leverage – Decision support – Standardizations – Accountability – Visibility 6
  • 7. Why is a Sanitary, Healthy VMF so Critical VMF is Center of all P2P Decisions - Cornerstone of every P2P transaction - Facilitates accurate withholding & reporting - Aids in government & regulatory compliance - Data framework for completeness & accuracy - Serves as base for Key Performance Indicators - Supports adherence to contract terms & corporate policies 7
  • 8. Reduce Fraud Main Types of Vendor Fraud – Requests that look like invoices or government forms with a filing fee – Invoices for goods not delivered or services not provided – Checks that sign you up for a service if you deposit them (may appear to be refunds, rebates or credits for a small amount) – Intentional double billing – Collusion with an employee, kickbacks, bribes – Fictitious companies The Size of the Problem – Kroll Global Fraud Report o 19% of companies experienced vendor fraud in 2013 – ACFE o 5% of revenues lost due to fraud o billing fraud is approx. 24% of the total monetary amount of fraud
  • 9. VMF Impacts on Enterprise Decisions Decision Support Scenarios Scenario 1 Purchasing needs to have accurate expiry information to manage supplier contracts for Legal Scenario 2 Strategic Sourcing needs to analyze supplier spend and usage data to reduce costs for HR benefits Scenario 3 Executive Mgt. needs to report diversity and charitable contributions to support Compliance and Tax as well as Sales initiatives with Customers Scenario 4 Operations needs to find a new service provider for security services to protect their Employees and engages AP or Purchasing Many Others…. 9 Impacted Areas
  • 10. VMF Impacts on P2P Functions & Processes 10 The Supplier Affect™ Agreements • Document Retention • Terms & Expiry • Deliverables Management • Notifications • Service Levels • Contract Compliance • Business Segment Alignment • Pricing & Specifications • Statement of Work/Effort • Change Collaboration & Management Systems • Vendor Master File • Data Collection & Validation • Approvals & Workflows • Notifications • Regional & Local Considerations • Accurate Capture of Agreement Terms • Accurate Capture of Pricing & Attributes • Supplier Collaboration • Updates & Change Management • Supplier Self-Service Transactions • Purchase Orders • Order Confirmations • Hosted Shopping (Punch-Out) • Shipments & Receipts • Invoices • Payments • Bank Reconciliations • Discrepancy Management • Quality & Errors • Contract Compliance Analytics • Effectiveness & Quality • Efficiency & Throughput • Service Levels • Risk & Fraud Mitigation • Regulatory Compliance • Benchmarking & Scorecards • Growth & Development Strategies • Trending & Forecasting • Value Chain Partner Alignment • Corporate & Social Responsibility Relationships • Quality • Service Levels • Errors • Defects & Returns • Strategic Alignment • Growth & Development Partners • Preferred Supplier/Customer Designation • Operational Continuity • Risk & Fraud Mitigation • Cash & Working Capital Suppliers & Supplier Relationships
  • 11. The Best-In-Class VMF Process 11 • Duplicates • Missing Data Points • Inactive Accounts • Inter- relationships SYSTEMS, GOVERNANCE, TRANSACTIONS, ANALYTICS, PEOPLE BEST-IN-CLASS VENDOR MASTER FILE PROCESS SANITIZE • Naming Conventions • Segregation of Duties • Add/Change Workflows • Profile Completion STABILIZE • Regulatory Compliance • Validation at On-Boarding • Fraud Protection • Supplier Self- Service OPTIMIZE The Three Pillars
  • 12. Typical State • Large, Outdated VMF • Few Controls • Low Automation • High Risk of Fraud, Lost Profits Sanitize • Duplicates Removed • Relationships Identified • Validation Points • Aged Vendors Purged Stabilize • Naming Conventions • Workflows • Complete Profiles • Segregation of Duties • Centralization • Reporting • Transparency Optimize •On-Boarding •Fraud Protection •Supplier Self-Service •Data Collection •Data Validation •Roles & Permissions •GRC Controls •Integrated Workflow •3rd Party Validation •Enterprise Collaboration Vendor File Process Maturity Model Reactive Tactical Strategic Define Measure Analyze Improve Control 12
  • 13. Typical State • Large, Outdated VMF • Few Controls • Low Automation • High Risk of Fraud, Lost Profits Sanitize • Duplicates Removed • Relationships Identified • Validation Points • Aged Vendors Purged Stabilize • Naming Conventions • Workflows • Complete Profiles • Segregation of Duties • Centralization • Reporting • Transparency Optimize •On-Boarding •Fraud Protection •Supplier Self-Service •Data Collection •Data Validation •Roles & Permissions •GRC Controls •Integrated Workflow •3rd Party Validation •Enterprise Collaboration Vendor File Process Maturity Model Reactive Tactical Strategic Define Measure Analyze Improve Control 13
  • 14. What to know before you Sanitize Preliminary Steps before you Detox • Understand the complexities of managing your Vendor Master – Data Decay - Document and data collection, validation & ageing – Processes – Cross department Communication – Benchmark Statistics 14 S a n i t i z e
  • 15. The VMF Problem - Simplified Supplier data constantly decays Many data & documents required Diverse supplier population Communication complexity Multiple internal locations & division Compliance to internal controls Data Decay and Manual Processes Complexity 15
  • 16. The Human Element within the Process 16 Effect - Errors - Fraud - Duplications - Regulatory Infractions - Overpayments Cause - Human Error - Multiple Owners - Decentralization - Conversions - Uploads
  • 17. Purchasing and AP can use Different Files and/or Multiple Systems Data Quality and Consistency – Missing – Non-standard – Invalid – Obsolete Why Vendor Files Grow – Name entered differently by your staff – Vendor changes its name – Street Address and/or Lock Box changes – Mergers o By your organization and by your vendors – Acquisitions o By your organization and by your vendors – Divestitures o By your vendors Other Vendor Master File Issues
  • 18. Vendor Master Data Benchmark Metrics • 20% - 80% of vendors in current vendor master files have had no activity within the last 12 months • 35% - 65% of “active” vendors are one-time vendors • 7% of vendors change their name annually • 20% of vendors change their HQ address annually • Phone #(s), Contact Name(s), Email Addresses and Banking Information also change • The bigger your vendor file, the more duplicates you probably have – 1-100 vendors - no duplicates – 100 - 1,000 vendors - 1% - 3% redundant – 1,000 - 10,000 - 2% - 6% redundant – 10,000 - 100,000 - 4% - 10% redundant – > 100,000 - > 10% redundant
  • 19. The Data - Vendor Master Cleanse Strategic Data Control Statement – What are the acceptable sources of Data? – What are the desired types of Data? – How will you validate the data? – Create a Data Guideline. 19
  • 20. The Data - Sources of Supplier relationship data Sources of Supplier Relationship Data 1. Client data – Data that resides in ERP or Procurement 2. Supplier Data – Data that supplier fills in self service 3. 3rd Party data – Government & non government 4. Data aggregators – Supplier Intelligence 5. Lavante Network Data – Data that LSN provides – Fraud score 20
  • 21. The Data - Score Your Current Data Different Types of Supplier data – Primary o Core Supplier Name and Address – Secondary o Contact and Supplier Intelligence 21 Regulated Tertiary Secondary Primary 37.50% 17.50% 20.00% 88.24% – Tertiary o Documents and certifications – Regulated Data o Data that needs to be validated
  • 22. The Data - Ad Hoc Data Quality Query Capability 22 Ad Hoc Data Quality Query Tool - Filtering - Scoring - Exporting - Graphing
  • 23. Create field guidelines for data format, validation and control – Vendor Type and/or Class – 1099 Type (Box) – Phone Numbers – Taxpayer Identifiers – Payment Terms – ACH, P-Card, EDI, etc. – Diversity: o Women, Minority, Small Business Veteran, Disabled Veteran, etc. – Insurance Certificate(s) – Tax Certificate(s) – Certifications – Contacts – Email addresses and web sites The Data – Create Guideline of Data Controls Field Controls Size – Format Score Weighting Ownership Privileges Included in Workflow Who can see it Frequency of updating Validation Source More…
  • 24. The Process- Vendor Master Cleanse Strategic Process Control Statement – Define the Roles? – Define the Supplier Communication Strategy? – How will we perform Validations and Verifications? 24
  • 25. Owner should be responsible for – Defining data requirements – Setting, maintaining and monitoring standards and data quality – Coordinating the activities of those who use, enter and update vendor information Well Documented and Tested Procedures – Define the process for doing business with new vendors – Ensure that only authorized individuals can make changes, additions, deletions Segregation of Duties Controls – People allowed to make changes must not be able to process transactions such as issuing purchase orders, posting invoices, disbursing funds or making accounting entries Audit Trail of Changes – All additions, changes and deletions should be logged, reported, reviewed and signed off by someone in management other than the person posting updates Reconcile and Synchronize – If multiple systems have vendor information, reconcile common information The Process – Define the Roles
  • 26. The Process – Simple Supplier Communications Have general conventions and standards – Use a new vendor form with field names and positions similar to where they are in your vendor setup screens o Require names and signatures of requestor, person doing setup and person reviewing and verifying correct setup information – Standardize how vendor names are entered o Insist that the guidelines be followed – verify periodically - Punctuation - Abbreviations - Name Prefixes and Suffixes - Name Qualifiers Provide to Vendors – Send out a welcome letter and information packet that identifies: o What to do to get paid o When a contract or Purchase Order is required o Whom to contact regarding issues o Optionally, ethics and dispute resolution guidelines
  • 27. Regulatory – Ensure that you are not doing business with a prohibited party on the OFAC, FTO and BIS lists or other lists of denied, debarred, excluded or restricted parties – Check GSA System for Awards Management – Verify that information for regulatory reporting is correct o Get W-9s for US vendors and appropriate W-8 for non-US vendors o Use IRS TIN Matching o Check State of Incorporation or Local Jurisdiction - Secretary of State or Office of Corporations o Determine State Reporting Requirements - State Withholding and “1099” Reporting - Office of Child Support for Deadbeat Parent – Check Industry Specific lists The Process - Validations and Verifications
  • 28. The Process – Ongoing Regular Communication Communicate regularly with vendors – Prepare a document that explains how a vendor should conduct business with your firm – Require vendors to sign a business practices statement – Use email intelligently – Accept electronic input – Provide sufficient remittance information to vendors so that they can properly apply payments – Provide on-line inquiry and self service capability (Vendor Portal) – Monitor vendor performance – accuracy and timeliness of invoices – Consider having “Service Level Agreements” with your strategic vendors
  • 29. The Power of the VMF Leverage – Fraud detection and prevention – Strategic Suppler Relationship Management (SRM) – Create value chain partners, o Improve working capital – Improve accuracy of business transactions – Document solicitation and retention o (W9, W8, COI, Diversity) – Accurate metrics and analyses – Spend management – Strategic Sourcing – Exclusion list management 29
  • 30. Summary • The secret is out YOUR VMF IS CRITICAL • Tell your secrets – Executive Management – Tax, Legal, Compliance – Department Heads – Supplier Relationship Owners – Align AP, Purchasing, & Sourcing • Achieve Best-In-Class – Automate, Stabilize, Optimize – Streamlined & Controlled Processes – Compliance; Regulatory, Corporate, Contract – Real-Time, Collaborative, Documented – Comprehensive Profile Validation & Completion – Supplier Self-Service 30
  • 31. Next Thought Leadership Events "Secrets You Need to Know About your Vendor Master File." March 26, 2015 - 11am PST "Detox Your Vendor File." April 30, 2015 - 11am PST Jon Casher and Josh Morrison outline that much of the data and records residing in your vendor file are unnecessary and even damaging to your ability to complete your daily tasks and hit your strategic goals. "How to Take your Vendor File to the NEXT LEVEL" June 23, 2015 - 11am PST Jon Casher and Josh Morrison walk through the six indispensable steps of the ideal master vendor file. Learn what it takes to be among the industry's best of breed. 31