Skip to content
Due Diligence & Investigations

Third-Party Due Diligence: Process, Tools & Compliance Tips

A comprehensive guide to third-party due diligence. Learn the assessment process, compliance requirements, essential tools, and best practices for managing third-party relationships.

LexFlag Team Apr 8, 2026 9 min read
Share this page:

For Informational Purposes Only. The articles, guides, and analyses published on this blog are provided by the LexFlag team and guest contributors for educational and informational purposes. They do not constitute legal, regulatory, or professional advice.

AI-Generated Content. Some articles may be partially or fully generated or assisted by artificial intelligence. While we strive for accuracy, errors or outdated information may remain.

Independent Verification Required. You must independently verify any information obtained from this blog before making any decisions. LexFlag, its affiliates, and contributors accept no liability for any loss or damage arising from reliance on blog content.

Third-Party Due Diligence: Process, Tools & Compliance Tips

What Is Third-Party Due Diligence?

Third-party due diligence is the compliance-driven investigation and assessment of all external business relationships — vendors, suppliers, partners, agents, distributors, consultants, and other counterparties — to identify anti-corruption, sanctions, and regulatory risks before and during the engagement. It extends beyond vendor due diligence and vendor risk management to encompass all third-party relationships that could expose your organization to third-party risks, including financial, legal, regulatory, or reputational harm. The goal is to manage third party risk before it becomes a problem.

Regulatory frameworks worldwide increasingly mandate formal due diligence programs. The Foreign Corrupt Practices Act (FCPA), UK Bribery Act, EU Anti-Money Laundering Directives, and sector-specific guidance from the OCC, FFIEC, and FCA all require organizations to know who they are doing business with and to manage the associated risks proportionately.

Why Third-Party Due Diligence Is Critical

Organizations typically maintain hundreds or thousands of external relationships. Each introduces potential risks and distinct risk vectors:

  • Anti-bribery and corruption risk — Third-party agents, consultants, and intermediaries are the most common channel through which bribery occurs. DOJ and SEC enforcement data shows that over 90% of FCPA cases involve third-party intermediaries.
  • Sanctions and regulatory risk — Engaging with sanctioned entities — even unknowingly — can result in compliance violations, severe penalties, asset freezes, and criminal prosecution.
  • Reputational risk — A third party's misconduct (environmental violations, labor abuses, fraud) becomes your reputational problem when the association is public.
  • Operational risk — Third-party failures disrupt your operations. The deeper the integration, the greater the disruption potential.
  • Data and cybersecurity risk — Third parties with access to your systems or data can become breach vectors.

The Due Diligence Process

Phase 1: Risk-Based Scoping

Not every relationship requires the same level of investigation. Tier your due diligence based on:

Factor Lower Risk Higher Risk
Interaction with government None Frequent, direct government contact
Geographic risk Low-corruption, well-regulated country CPI score < 40, FATF-listed jurisdiction
Transaction value Low spend, routine procurement High value, strategic partnership
Access to data/systems No access Handles sensitive data, system integration
Agent/intermediary role Direct supplier of goods Sales agent, lobbyist, consultant

Tier 1 (Enhanced): Full investigation for high-risk relationships — government-facing agents, high-value partners in high-risk jurisdictions, entities handling sensitive data.

Tier 2 (Standard): Moderate investigation for medium-risk relationships — significant vendors, service providers, distributors.

Tier 3 (Basic): Simplified screening for low-risk relationships — commodity suppliers, low-value vendors, established entities in low-risk jurisdictions.

Phase 2: Information Collection

Gather data from the third party and independent sources:

From the third party:

  • Completed due diligence questionnaire covering ownership, operations, compliance programs, and references
  • Corporate documents (registration certificates, financial statements, organizational charts)
  • Compliance certifications and policy attestations (anti-corruption, sanctions, data protection)
  • Disclosure of government relationships, politically exposed person connections, and potential conflicts of interest

From independent sources:

  • Corporate registry searches (to verify legal existence and ownership)
  • Sanctions screening (OFAC, EU, UN, HMT lists)
  • PEP database checks (politically exposed persons screening)
  • Adverse media screening (financial crime, fraud, corruption, regulatory actions)
  • Financial health checks (credit reports, financial stability indicators)
  • Litigation and regulatory enforcement searches
  • Site visits and operational verification (for high-risk relationships)

Phase 3: Analysis and Risk Evaluation

Synthesize collected information into a risk assessment:

  • Verify claims — Cross-reference the third party's representations against independent data
  • Identify red flags — Unexplained wealth, complex ownership structures, connections to sanctioned or high-risk entities, adverse media findings, reluctance to provide information
  • Assess materiality — How significant are identified risks relative to the nature and value of the relationship?
  • Document findings — Create a due diligence report summarizing the investigation scope, methodology, findings, risk rating, and recommendation

Phase 4: Decision and Approval

Based on due diligence findings:

  • Approve — Risk is acceptable; proceed with appropriate contractual protections
  • Approve with conditions — Acceptable if specific measures to mitigate risks are implemented (enhanced monitoring, contractual safeguards, compliance training for the third party)
  • Escalate — Findings require senior management or compliance committee review before proceeding
  • Decline — Unacceptable risk; do not establish the relationship

Define approval authority aligned with risk level:

  • Tier 3: Business unit manager
  • Tier 2: Compliance officer + business unit head
  • Tier 1: Senior management or compliance committee

Phase 5: Ongoing Monitoring

Due diligence is not a one-time event. Organizations must continuously monitor their third parties through:

  • Periodic reassessment — Refresh due diligence at defined intervals (annually for high-risk, every 2–3 years for standard)
  • Continuous screening — Automated sanctions, PEP, and adverse media monitoring with alerts for new findings
  • Performance monitoring — Track compliance with contractual obligations, SLAs, and behavioral expectations
  • Event-triggered reviews — Reassess when material changes occur (ownership change, market entry into high-risk jurisdiction, adverse media, regulatory action)

Red Flags in Third-Party Due Diligence

Watch for these warning indicators during your investigation:

  • Reluctance to provide requested information or documentation
  • Complex or opaque ownership structures with no clear business rationale
  • Connections to sanctioned individuals, entities, or jurisdictions
  • Requests for unusual payment arrangements (cash, third-country payments, payments to unrelated entities)
  • Adverse media involving financial crime, corruption, fraud, or regulatory violations
  • Government officials or PEPs among beneficial owners without clear commercial justification
  • Disproportionate compensation relative to the scope of services
  • Newly formed entity with no track record, established specifically to serve your organization
  • Resistance to compliance certifications or anti-corruption contractual provisions

Anti-Corruption and Anti-Bribery Due Diligence

Anti-corruption due diligence deserves special attention because intermediaries and agents are the primary channel through which bribery and corruption occur in cross-border business. Both the FCPA and UK Bribery Act hold organizations liable for the actions of their third parties, making compliance-focused investigation essential.

Key investigation steps for anti-corruption due diligence:

  • Beneficial ownership analysis — Identify the ultimate beneficial owners of the third party to detect hidden government connections, PEP relationships, and conflicts of interest
  • Government touchpoint mapping — Document every point where the third party interacts with government officials on your behalf (permits, licenses, customs, inspections)
  • Compensation review — Assess whether proposed fees are commercially reasonable for the services provided. Excessive commissions are a corruption red flag under DOJ guidance
  • Anti-corruption program assessment — Evaluate whether the third party has its own compliance program, code of conduct, and anti-bribery training
  • Country risk overlay — Apply enhanced scrutiny for relationships in countries with high Corruption Perceptions Index scores, weak rule of law, or known bribery patterns in your industry sector

Organizations that build anti-corruption due diligence into their standard process gain a defensible position under both FCPA and UK Bribery Act enforcement guidelines.

Compliance Requirements by Regulation

Regulation Due Diligence Requirement
FCPA "Adequate procedures" to prevent bribery by third-party agents and intermediaries
UK Bribery Act "Adequate procedures" defense requires proportionate due diligence
EU AMLD Customer and counterparty due diligence, beneficial ownership identification
OCC Guidance (OCC 2013-29) Third-party risk management including due diligence before selection
DOJ ECCP Evaluation of compliance program effectiveness includes third-party compliance and management
German Supply Chain Act Human rights and environmental due diligence in supply chain

Third-Party Due Diligence Tools

Modern due diligence platforms automate and accelerate the process:

  • Identity verification — Corporate registry searches, beneficial ownership resolution, document verification
  • Screening databases — Integrated sanctions, PEP, adverse media, and enforcement screening
  • Questionnaire platforms — Automated distribution, collection, and scoring of due diligence questionnaires
  • Continuous monitoring — Real-time alerts for changes in risk profile (new sanctions, adverse media, financial distress)
  • Case management — Centralized tracking of due diligence status, findings, and approvals
  • Reporting — Audit-ready documentation and portfolio-level risk analytics

Building a Sustainable Program

Effective third-party due diligence requires more than a checklist. It should be embedded within your broader compliance and risk management program, aligned with your organization's anti-corruption framework and overall risk management strategy. It requires organizational commitment, adequate resourcing, clear governance, and integration with business processes. Following third-party due diligence best practices, the most successful programs treat due diligence as a partnership function — helping the business make informed decisions about external relationships — rather than a compliance gate that slows operations without adding perceived value.

An effective third party due diligence process, embedded in relationship lifecycle management and supported by appropriate technology, becomes a competitive advantage: enabling faster, safer engagement with third parties while protecting the organization from the financial, legal, and reputational consequences of inadequate oversight.

Frequently Asked Questions

What is the difference between third-party due diligence and vendor risk management?

Third-party due diligence is the investigative step where you gather and verify information about an external party. Vendor risk management is the broader, ongoing discipline that includes due diligence plus risk scoring, contract governance, continuous monitoring, and remediation throughout the relationship lifecycle. Due diligence feeds the risk management program with evidence. Management turns that evidence into decisions and controls.

How often should third-party due diligence be refreshed?

It depends on risk tier. High-risk third parties should be reassessed annually. Standard-risk relationships warrant a refresh every two to three years. In all cases, event-triggered reviews should happen immediately when material changes occur, such as an ownership change, a data breach, a regulatory action, or expansion into a high-risk jurisdiction. Continuous screening tools help fill the gaps between formal reviews.

What are the most common red flags that third-party due diligence uncovers?

The most common findings include connections to sanctioned individuals or entities, adverse media related to corruption or fraud, complex ownership structures designed to obscure beneficial owners, and reluctance to provide requested documentation. Financial instability, lack of compliance certifications, and conflicts of interest also surface frequently. Each red flag should be evaluated in context to determine whether the risk can be mitigated or whether the relationship should be declined.

Can small organizations implement effective third-party due diligence?

Yes. Small organizations face many of the same third-party risks as large enterprises but typically work with fewer vendors. A simplified, risk based approach can cover the essentials: screen all third parties against sanctions and adverse media databases, conduct deeper financial health and compliance checks on critical vendors, and document findings consistently. Even basic third-party due diligence practices significantly reduce exposure compared to no formal process at all.

Explore Our AI-Powered Tools

Put these insights into practice with automated screening, risk assessment, and compliance tools.

Get Started Free

Need Help?

Our support team is here to assist you with any questions

In-App Messages

Registered users can contact support directly through the messaging system.

Login to Message Register