Due Diligence International
   
 
Today’s Headlines From
The FCPA Blog »

Contact Us  |  1-800-444-6361   Kreller Due Diligence on YouTube  Kreller Due Diligence on Twitter  Kreller Due Diligence on LinkedIn  Kreller Due Diligence on Google Places  Kreller Due Diligence on Facebook  Kreller Due Diligence Blog
site search  
Background Image

KOL

Kreller Group Risk Management Solutions WorldwideRevolutionary. Intuitive. Secure.
The ability to ensure proper management of third-party information to mitigate risk is imperative for businesses. A company’s financial and human resources are limited, yet it is critical to maintain a high level of knowledge regarding third party affiliations and partnerships. For multinational corporations in particular, these relationships can include hundreds, perhaps thousands, of global entities which must be scrutinized continuously.


KOL is a revolutionary data management system with vast capabilities including multi-level customization for any company regardless of size and number of affiliations. A highly secure web based portal allows users to manage third party information globally 24 hours a day, 7 days a week. KOL can administer millions of records and multiple attachments.

Features
Customization is a key component of KOL. The system allows for companies to develop and administer their own questionnaire for third parties to include a subject’s understanding of the business, level of FCPA knowledge and adherence to guidelines as well as the ability to authenticate answers.

• Customized questionnaires and checklists administered
• Client driven renewal notifications (yearly)
• FCPA third party training for clients

Functionality is a critical piece of KOL. The platform is easy to use, intuitive and includes many options to receive notifications, review, screen and report information.

• Risk rating that designates level of due diligence required
• Comprehensive screening tool (checks against hundreds of worldwide sanction lists)
• Continuous monitoring of each profile
• Ease of operation

Security is a primary attribute of KOL. All information passed through KOL is done over a secure HTTPS protocol. All data is encrypted using high assurance SSL. External and internal firewalls provide an additional layer of security.

• Databases backed up daily
• Code backed up weekly, stored offline and backed up in three separate locations
• Server is located offsite and housed in a state of the art facility
• Facility monitored 24/7/365 by onsite staff
• Server room access restricted by fingerprint detection software
• 55,000 square feet with 5 server rooms equipped to house 40,000 servers
• Connectivity and high redundant capacity to route thousands of tbytes of traffic monthly

Contact the professionals at Kreller today for more information.



Kreller Group Business Risk Management for Corporate Compiance

Business Risk Assessment

The Kreller Group is pleased to provide a complimentary business risk assessment analysis to evaluate and assign a risk rating to your third party engagements.
Read More »
 
REQUEST A COMPLIMENTARY
KOL DEMO



Complimentary Business
Risk Assessment


New on KBlog

Kreller Group Anti-bribery & anti-corruption complianceGlobal Anti-Corruption and Anti-Money Laundering at the Halfway Point—As we approach the middle of 2015, the threat of bribery and corruption continues to...
Read More »

Go to KBlog

What Our Clients Say…

Kreller’s due diligence team has provided outstanding global investigation services for our company for the last five years. Their deep-dive, boots on the ground approach to vetting our third party vendors is critical to the safety and security of our clients’ missions.

K.S. --  Director, Compliance/Audit, Fortune 100 Aviation Services Company

Stay in Touch...

Sign up for regular updates about the latest in due diligence and FCPA compliance.
Compliance & Ethics Institute
© 2017 Kreller Group. All rights reserved. | KOL Portal | Kreller Code of Ethics | Careers | Privacy Policy | Terms & Conditions | Site Map
We self-certify
compliance with:

  Privacy Shield Framework