Due Diligence Reviews (DDRs)
Due diligence reviews are systematic evaluations that organizations conduct to assess the risks associated with suppliers, vendors, or business partners. For language services companies, this means evaluating freelance translators, agencies, or technology providers before establishing working relationships.
What is a Due Diligence Review?
A due diligence review investigates whether a potential vendor has:
- Appropriate security policies and procedures
- Financial and legal stability
- Adequate insurance and legal protections
- Necessary certifications or qualifications
- Processes for handling confidential information
- Contingency plans for business disruptions
Why it matters: According to Agostino Carrideo in Vendor Management: An Insider’s Strategies to Win and Create Long Lasting Change, failing to conduct due diligence reviews exposes organizations to significant risks, including:
- Legal liability if suppliers don’t meet regulatory standards
- Reputational damage if confidential information is mishandled
- Business disruption if suppliers fail unexpectedly
- Financial losses from security breaches or quality failures
Red Flags in Vendor Due Diligence
Carrideo identifies critical warning signs when evaluating vendors:
| ❌ Security Red Flags | ❌ Financial/Legal Red Flags |
|---|---|
| - No processes for protecting confidential information - No formal security policy - No risk assessment or management procedures - No periodic security auditing - No contingency plans for disruptions |
- Prior bankruptcies or ongoing legal issues - Poor credit ratings - Unclear organizational structure - Lack of appropriate insurance coverage |
Due Diligence for Translation Vendors
The challenge: If language services companies disqualified every freelance translator who demonstrated one of the red flags listed above, they would eliminate most available talent. Many freelance translators:
- Work as individuals without formal security policies
- Don’t conduct formal risk assessments
- May not have contingency plans documented
- Operate as sole proprietors with limited organizational structure
The balance: Rather than automatically disqualifying vendors with red flags, organizations must:
- Assess proportionality: Match security requirements to the sensitivity of the work
- Provide support: Help vendors develop appropriate safeguards
- Implement contracts: Use NDAs and service agreements to establish legal protections
- Create tiers: Categorize vendors by capability and assign work accordingly
- Monitor ongoing performance: Regular reviews rather than one-time assessments
DDR Review Schedule
Due diligence isn’t a one-time activity. Carrideo recommends ongoing reviews tailored to each supplier:
- Established, stable providers: Annual reviews may be sufficient
- Newer providers or those handling sensitive data: Quarterly or semi-annual reviews
- High-risk or critical suppliers: More frequent monitoring
Activity: DDR Self-Evaluation
Complete this self-evaluation to assess your readiness as a potential vendor in the language services industry. This activity helps you:
- Identify security gaps in your current practices
- Understand what clients look for when vetting translators
- Develop a plan for professionalizing your operations
- Recognize where you need additional resources or support
Instructions: Work through each section honestly. Note areas where you don’t meet best practices—these become your professional development priorities.
Part 1: Technology Basics
Before beginning, you may want to review Top 10 Tech Security Basics Every Person Should Follow by Lifehacker to familiarize yourself with fundamental security concepts.
Router Security
According to Bradley Mitchell of Lifewire, “Most routers ship from the manufacturer with a default password built-in. The password is easy to guess[, so]… [i]f you don’t change the password to your router, then anyone with access to it can change its settings and even lock you out.” According to Elsie Otachi of Help Desk Geek, “changing the SSID [wifi] name may keep network attackers or hackers away as it indicates the particular router is more carefully managed compared to routers using generic default SSIDs.”
- ✅ Best Practice: Change administrator login and default password on your internet router
- ✅ Best Practice: Change your wifi network name (SSID) from the default
Changing your SSID indicates that the router is carefully managed, which may deter potential attackers.
Device Protection
- ✅ Best Practice: Install anti-virus protection on all devices that access client intellectual property
- ✅ Best Practice: Install malware protection on all devices
- ✅ Best Practice: Install spyware protection on all devices
Self-Assessment Questions:
- Have I changed my router’s default administrator password?
- Have I changed my wifi network name (SSID)?
- On which devices do I access or store confidential client information? (Desktop, laptop, tablet, phone, cloud storage, external hard drive, private server?)
- Do I have anti-virus, malware, and spyware protection on all my devices through which I access or store confidential client information?
Important Note: As Boxcryptor reminds us, “There is no cloud. It’s just someone else’s computer.” Consider carefully where you store client data.
Part 2: Translation-Specific Security
Translation Memory Management
Mixing confidential intellectual property from various clients in a single translation memory violates non-disclosure agreements.
- ✅ Best Practice: Maintain separate translation memories for each client
- ✅ Best Practice: Establish clear procedures for managing glossaries, termbases, and style guides
Self-Assessment Questions:
- Do I house translations for multiple clients in a single TM, or do I keep them separate?
- How do I organize and protect client-specific glossaries, termbases, and style guides?
- What happens to client materials when a project ends? Do I have a data retention policy?
Part 3: Data Protection Measures
Safeguarding Client Information
Common data protection measures include:
- Password protection: Using strong, unique passwords for files and systems
- Encryption: Converting data into code to prevent unauthorized access
- Private storage: Keeping sensitive files in secure, non-public locations
- Access controls: Limiting who can view or edit specific information
Self-Assessment Questions:
- Which data protection measures do I currently use?
- How do I protect files in transit (when sending them to clients)?
- How do I protect files at rest (when stored on my devices)?
- If someone gained access to my computer, could they easily access client files?
Part 4: Security Policies and Procedures
Ongoing Security Management
Professional vendors conduct regular risk assessments and security checks to identify vulnerabilities before they become problems.
Privacy Policies
Under many international data security laws, processors of personally identifiable information must have a privacy policy that discloses:
- Where confidential information is stored
- How it is protected
- How it can be destroyed upon request
- Who has access to it
Privacy Policy Levels:
- 🟢 Excellent: Formal privacy policy updated annually
- 🟡 Good: Formal privacy policy updated within last 5 years
- 🟠 Needs Improvement: Formal privacy policy last updated more than 5 years ago
- 🔴 Insufficient: Informal privacy policy or no privacy policy
Self-Assessment Questions:
- Do I conduct regular risk assessments of my security measures?
- Do I have documented procedures for handling security incidents?
- Do I have a privacy policy? When was it last updated?
- If a client asked to see my privacy policy, could I provide one?
Part 5: Contingency Planning
Working Environment
- ❌ Avoid: Working with confidential client information on public wifi networks (coffee shops, airports, hotels)
- ✅ Better: Use a mobile hotspot from your cellular phone when working in public spaces
Exception: In countries without affordable universal internet access, working at internet cafés may be necessary. In these cases, use additional security measures like VPNs and encryption.
Data Backup
Regular backups protect against data loss from hardware failure, theft, or accidents.
Device Loss or Theft
Modern devices can be remotely wiped to prevent unauthorized access to sensitive information if lost or stolen.
Self-Assessment Questions:
- Do I ever work with client files on public wifi networks?
- What is my data backup process? How frequently do I back up important files?
- If my computer crashed today, could I still meet my deadlines? What is my backup plan?
- If I lost my laptop or phone, what would happen to the client information stored on it?
- Can I remotely wipe my devices if they’re lost or stolen?
Data Security Improvement Planning
After completing this self-evaluation:
- Identify Your Strengths: Which areas are you already handling well?
- Prioritize Improvements: Which gaps pose the highest risk or are easiest to address?
- Create a Timeline: What can you implement this week? This month? This year?
- Seek Resources: Where do you need help or additional tools to improve your security?
Remember: The goal isn’t perfection, but continuous improvement. Even small steps toward better security practices demonstrate professionalism and protect both you and your clients.
Key Terminology
| Term | Definition |
|---|---|
| Vendor Management | Systematic process for selecting, monitoring, and maintaining relationships with suppliers |
| Contingency Planning | Preparing backup plans for business disruptions, technology failures, or other crises |
| Default Password | Pre-configured password that comes with new devices or software; should always be changed |
| SSID (Service Set Identifier) | The name of a wifi network; changing from default increases security |
| VPN (Virtual Private Network) | Technology that creates a secure, encrypted connection over a less secure network |
| Remote Wipe | Feature that allows you to delete all data from a device remotely if it’s lost or stolen |
Self-Reflection
As you work through the DDR self-evaluation, consider these questions:
- Future Preparedness: What specific security measures do you need to implement before you can ethically accept professional translation work involving confidential information? Create a prioritized list of steps to take in the next 6-12 months.
- Resource Constraints: Many of the “best practices” described assume access to resources (multiple devices, paid software, private servers). How can you balance ideal security practices with practical constraints as a student or emerging professional?
- Professional Standards: After reviewing what clients look for in vendors, how does your current setup compare? What investments (time, money, learning) would give you the best return in terms of professional readiness?
- Client Communication: If a potential client asked about your data security practices today, how would you respond? Would you feel confident explaining your measures, or would you need to defer work until you improved your systems?
- Continuous Improvement: Security isn’t a one-time achievement but an ongoing practice. How can you build regular security reviews into your professional routine? What triggers should prompt you to update your practices?
📥 Download this Content
Find this file on our repo and download it.
🤖 GAI Study Prompts
Copy the downloaded content and try it with these prompts:
- “I completed a DDR self-evaluation and identified these security gaps: [list gaps]. Help me create a realistic action plan to address these issues, prioritized by risk level and ease of implementation.”
- “Explain the difference between encryption, password protection, and access controls. When should I use each one?”
- “Help me create a simple privacy policy appropriate for a freelance. What key elements must it include?”
- “I’m a student with limited budget. What are free or low-cost security tools I can implement now to protect client data?”
- “Walk me through what ‘separate translation memories for each client’ means in practice. How would I organize my files and folders?”
- “What questions should I ask a translation agency about their security practices before agreeing to work with them?”
- “Create a checklist I can use to audit my own security practices quarterly. What should I review regularly?”
- “Help me understand the relationship between NDAs, confidentiality agreements, and due diligence reviews. How do they work together?”
- “I use [specific cloud service] to store translation files. What security settings should I enable? What are the risks?”