{"id":18826,"date":"2025-06-09T11:28:05","date_gmt":"2025-06-09T15:28:05","guid":{"rendered":"https:\/\/events.iofm.com\/conference-fall\/session\/documenting-your-vendor-processes-the-key-to-avoiding-errors-and-mitigating-risks\/"},"modified":"2025-11-07T06:01:28","modified_gmt":"2025-11-07T11:01:28","slug":"documenting-your-vendor-processes-the-key-to-avoiding-errors-and-mitigating-risks","status":"publish","type":"session","link":"https:\/\/events.iofm.com\/conference-fall\/session\/documenting-your-vendor-processes-the-key-to-avoiding-errors-and-mitigating-risks\/","title":{"rendered":"Documenting Your Vendor Processes: The Key to Avoiding Errors and Mitigating Risks"},"content":{"rendered":"<p>Documenting vendor processes ensure error avoidance and risk mitigation. Create or update desktop procedures for training and audit purposes. Learn the importance of documentation, what to include, and how to keep procedures current with user-friendly templates.<\/p>\n<p>Learning Objectives:<\/p>\n<ul>\n<li>Understand why desktop procedures are necessary to avoid errors and mitigate risk<\/li>\n<li>Understand which desktop procedures are critical to create and what sections are needed for an efficient process<\/li>\n<li>Once completed, how implement a process to keep them updated<\/li>\n<\/ul>\n<p>Includes Desktop Procedure Templates:<\/p>\n<ul>\n<li>New Vendor Add \u2013 US<\/li>\n<li>Existing Vendor Change \u2013 US<\/li>\n<li>Help Desk &#8211; Authentication<\/li>\n<\/ul>\n","protected":false},"excerpt":{"raw":"Documenting vendor processes ensure error avoidance and risk mitigation. Create or update desktop procedures for training and audit purposes. Learn the importance of documentation, what to include, and how to...","rendered":"<p>Documenting vendor processes ensure error avoidance and risk mitigation. Create or update desktop procedures for training and audit purposes. Learn the importance of documentation, what to include, and how to&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","session_category":[54,69,169,32,89,165],"class_list":["post-18826","session","type-session","status-publish","hentry","session_category-fraud-prevention","session_category-general-session","session_category-main-agenda","session_category-operations-compliance-security","session_category-vendor-management","session_category-wednesday-2025"],"thumbnail":[],"metadata":{"session_id":["81d4ca2e-920e-4c31-a494-2dccc78a01fa"],"session_speakers":[16205],"session_topics":[],"session_date":["2025-11-05 00:00"],"session_start":["2025-11-05 13:00"],"session_end":["2025-11-05 13:50"],"session_updated_at":[null],"session_display_priority":["3"],"session_weblink":[null],"session_sponsored_by":[null],"_eael_post_view_count":["673"],"session_room_number":["Milano III-IV"],"rank_math_analytic_object_id":["130"],"rank_math_internal_links_processed":["1"],"_elementor_page_assets":["a:0:{}"]},"_links":{"self":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/session\/18826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/types\/session"}],"author":[{"embeddable":true,"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/comments?post=18826"}],"wp:attachment":[{"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/media?parent=18826"}],"wp:term":[{"taxonomy":"session_category","embeddable":true,"href":"https:\/\/events.iofm.com\/conference-fall\/wp-json\/wp\/v2\/session_category?post=18826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}