Blog chevron right How-to Guides

Vendor Red Flags: Hidden Subcontractors, Weak Security, and Inconsistent QA (Plus a Due Diligence Checklist)

Daniel Chang
Daniel Chang
Posted in Zoom Mar 24 · 26 Mar, 2026
Vendor Red Flags: Hidden Subcontractors, Weak Security, and Inconsistent QA (Plus a Due Diligence Checklist)

Vendor red flags are warning signs that a provider may mishandle your data, deliver inconsistent quality, or create surprises after you sign. The biggest risks usually show up as unclear data handling, hidden subcontractors, weak security, poor correction policies, and inconsistent formatting or QA. This guide lists the most common red flags and gives you a practical due diligence checklist of what to ask for before you commit.

Primary keyword: vendor red flags

Key takeaways

  • Ask who will touch your files (employees vs. subcontractors), where they are located, and how access is controlled.
  • Get data handling in writing: storage location, retention period, deletion process, and breach notification steps.
  • Quality problems often look like “small” issues first: inconsistent formatting, unclear style rules, and vague correction policies.
  • Request samples, QA steps, and an error-fix process before you sign anything.
  • Use a checklist so sales promises become contractual requirements.

Why vendor red flags matter (and what they really cost)

Most vendor problems do not start with a big failure. They start with unclear answers, missing documents, and “we’ll figure it out later” processes.

In transcription, captioning, translation, and similar services, small gaps can create real damage: sensitive audio shared too widely, deadlines missed because work is re-assigned, or deliverables that your team must reformat by hand. A short due diligence step upfront often saves weeks of cleanup later.

High-risk vendor red flags to watch for

Use the red flags below as a screening tool. One red flag does not always mean “walk away,” but each one should trigger follow-up questions and written commitments.

1) Unclear data handling (vague answers about storage, retention, and deletion)

If a vendor cannot explain how they store, access, and delete your files, you cannot evaluate your risk. “We take security seriously” is not a process.

  • No clear data retention policy: They cannot tell you how long they keep files, transcripts, or backups.
  • Unclear deletion method: They offer “we can delete” but cannot describe how deletion works across systems and backups.
  • Unknown storage locations: They cannot say where data is hosted or whether it crosses borders.
  • Weak access controls: They cannot explain who can access customer files and how access is logged.

2) Hidden subcontractors (or unclear workforce disclosure)

Subcontracting is not automatically bad. The risk comes from secrecy, poor oversight, and unclear responsibility when something goes wrong.

  • They will not disclose who does the work: You get vague language like “our team” with no detail.
  • They cannot provide subcontractor policies: No written rules for onboarding, confidentiality, or audits.
  • No clarity on location: They cannot tell you where workers are based, which matters for privacy and compliance needs.
  • Responsibility is blurred: The vendor acts like errors, delays, or breaches are “a contractor issue,” not theirs.

3) Weak security signals (process gaps, not buzzwords)

Security risk often hides behind confident marketing. Look for specific practices, not brand names or slogans.

  • No MFA requirement: They do not require multi-factor authentication for staff access.
  • No audit logs: They cannot provide logging for file access and changes.
  • Informal file transfer: They ask for files over email attachments or consumer file-sharing without clear controls.
  • No incident response plan: They cannot explain what happens if data is exposed.
  • Overbroad access: “Everyone on the team can see everything” instead of least-privilege access.

If you work with personal data, you may also need clarity on privacy roles (controller vs. processor) and a written data processing agreement. For a plain-language overview of GDPR roles and responsibilities, see the GDPR Article 28 processor requirements.

4) Poor correction policy (or no clear way to fix errors)

Every vendor makes mistakes sometimes. What matters is how they correct them, how fast they respond, and what counts as “in scope.”

  • Vague wording: “We can revise if needed” with no timeline or limits.
  • Blame shifting: They call obvious errors “subjective” to avoid fixes.
  • No escalation path: You cannot reach someone responsible for QA or account support.
  • Fixes cost extra by default: They charge for corrections even when requirements were clear.

5) Inconsistent formatting and weak QA (quality that varies file to file)

Inconsistent QA is one of the most expensive problems because your team becomes the quality layer. It also causes downstream issues in publishing, legal review, and accessibility workflows.

  • No style guide: They cannot follow speaker labels, timestamps, verbatim rules, or glossary terms consistently.
  • Inconsistent templates: Headings, speaker names, and paragraphing change across files.
  • No defined QA step: They cannot describe how they check work before delivery.
  • No measurable targets: They cannot define what “accurate” means for your use case.

6) Hidden fees and unclear scope

Pricing confusion often signals process confusion. If you cannot predict costs from a clear scope, you may also struggle to manage delivery.

  • Unclear add-ons: Fees appear for speakers, noise, multiple files, or quick turnarounds without disclosure.
  • Ambiguous deliverables: You are not sure whether you will receive timestamps, speaker IDs, or specific file formats.
  • Vague turnaround rules: They cannot define what “rush” means or how deadlines are tracked.

7) Overpromising without proof (especially around accuracy and security)

A vendor should be able to show you their process. If the pitch sounds perfect but the documentation is thin, treat that as a risk.

  • No sample aligned to your content: They avoid doing a small trial on similar audio.
  • No documentation: They cannot provide written policies for QA, security, or corrections.
  • “One-size-fits-all” answers: They do not ask what you need the deliverable for.

Due diligence checklist: what to request before signing

Use this checklist to turn red flags into clear yes/no requirements. Ask for written answers, then attach them to your contract or statement of work.

A) Data handling and privacy

  • Where is data stored and processed (countries/regions)?
  • How long do you retain audio, transcripts, captions, and backups?
  • What is the deletion process (including backups), and how do you confirm deletion?
  • Who can access customer data, and what access controls are used (least privilege, role-based access)?
  • Do you provide a data processing agreement (if needed) and confidentiality terms?
  • What is your breach/incident notification process and timeline?

B) Subcontractors and workforce transparency

  • Do you use subcontractors, and if so, for which parts of the work?
  • Will you disclose subcontractor use and locations before work begins?
  • What background checks or vetting do you perform (if any)?
  • How do you enforce confidentiality and security requirements with subcontractors?
  • Can you commit that subcontractors will not be added without written notice or approval?

C) Security controls (practical, not theoretical)

  • Is multi-factor authentication required for staff accounts?
  • Is data encrypted in transit and at rest?
  • Do you maintain access logs and change history for files?
  • How do you handle file transfer (secure portal, expiring links, permissions)?
  • Who in your organization can grant access, and how is access removed when staff leave?

D) Quality assurance and formatting consistency

  • Describe your QA workflow step-by-step (including who reviews and what they check).
  • Do you support a client style guide (speaker labels, timestamps, verbatim rules, punctuation preferences)?
  • Can you follow a glossary of names, acronyms, product terms, and jargon?
  • What are your standard deliverable formats (DOCX, PDF, SRT, VTT), and can you match ours?
  • How do you handle unclear audio (tags, notes, escalation questions)?

E) Correction policy and support

  • What counts as an error vs. a preference?
  • How do we submit corrections, and what is the turnaround time?
  • How many revision rounds are included?
  • Who owns the final decision on disputed terms (for example, brand names)?
  • What is the escalation path if deadlines or quality slip?

F) Commercial terms and scope clarity

  • Confirm turnaround times and how you calculate them (business hours, weekends, holidays).
  • List all possible extra charges and the triggers for each charge.
  • Define acceptance criteria (what “done” means) and any service credits (if applicable).
  • Confirm ownership of deliverables and permitted uses.

How to run a simple vendor evaluation (step-by-step)

You do not need a long procurement cycle to reduce risk. You need a repeatable process that forces clarity.

Step 1: Start with a one-page requirements brief

Write down the basics so vendors cannot guess what you want. Include the content type (interviews, meetings, podcasts), expected audio quality, number of speakers, required formats, and deadlines.

  • Deliverable type: transcript, captions, subtitles, or translation.
  • Formatting rules: speaker labels, timestamps, paragraphing, verbatim level.
  • Security needs: access controls, retention limits, approved transfer methods.
  • Correction expectations: what “fixing errors” should look like and by when.

Step 2: Ask the same questions to every vendor

Use the checklist above as your standard questionnaire. You will spot gaps faster when answers sit side-by-side.

Step 3: Run a small, realistic pilot

Choose 2–3 short files that match your real work (not the easiest clips). Ask for delivery in your preferred format, with your style guide, and evaluate consistency across files.

  • Do speaker labels stay consistent?
  • Do names and key terms match your glossary?
  • Does punctuation and paragraphing feel readable and consistent?
  • Do they flag unclear audio in a useful way?

Step 4: Test the correction loop

Submit a small set of corrections and see what happens. A good vendor makes the fix process simple, fast, and predictable.

Step 5: Put the important parts in writing

Sales emails do not protect you later. Add your requirements to the contract, SOW, or order form, including data handling terms and subcontractor rules.

Pitfalls that make red flags harder to spot

Even careful teams miss vendor red flags when they rely on assumptions. These are common traps that lead to preventable surprises.

  • Only reviewing one “best” sample: Ask for multiple files or a pilot across different speakers and audio conditions.
  • Skipping your style guide: If you do not provide rules, you will get inconsistent formatting and subjective choices.
  • Not asking about subcontractors: If you do not ask directly, you may never get a clear answer.
  • Confusing speed with reliability: Fast delivery is helpful, but you also need stable QA and a clear fix process.
  • Letting security stay “high level”: Ask for specific controls, not general promises.

Common questions

How do I ask about subcontractors without sounding difficult?

Keep it factual and tied to risk: “Do you use subcontractors for any part of the work, and will you disclose them and their locations before processing our files?”

What security questions matter most if I only have time for a few?

Ask about access control (who can access), MFA, retention/deletion, secure file transfer, and incident notification. These five areas reveal whether security is real or just marketing.

Is inconsistent formatting really a big deal?

Yes if you publish, search, subtitle, or review content at scale. Inconsistent formatting forces manual cleanup and can slow legal review, content workflows, and accessibility tasks.

What should a correction policy include?

It should define what counts as an error, how to submit fixes, how fast the vendor responds, and how many revision rounds are included. It should also explain escalation if you disagree.

Should I choose automated transcription to reduce risk?

Automation can be a fit for some content, but it does not remove the need for data handling clarity and quality checks. If you use automation, confirm how files are stored, who can access them, and whether you can add human review when needed.

What documents should I request before signing?

Ask for written policies on data handling (retention/deletion), subcontractor use, QA process, and corrections. If relevant, request contract terms covering confidentiality, incident response, and any required data processing addendum.

How do I compare vendors fairly?

Use the same pilot files, the same style guide, the same delivery format, and the same scoring sheet. Score quality, consistency, correction speed, and clarity of written commitments.

If you are setting up transcription or caption workflows, you may also find it helpful to compare automated transcription options with human-reviewed deliverables, and to plan your formatting and QA with transcription proofreading in mind.

For accessibility-related deliverables like captions, it can help to align your process with widely used guidance such as the W3C guidance on captions and transcripts.

Build a safer vendor relationship after you sign

Vendor risk does not end at onboarding. You can reduce issues with a simple operating rhythm.

  • Share updates: Send new speaker names, product terms, and pronunciation notes as they change.
  • Review samples regularly: Spot-check deliverables to catch drift early.
  • Track corrections: Keep a short log of recurring errors so the vendor can fix root causes.
  • Limit access: Only give portal access to staff who need it, and remove access promptly when roles change.

If you want a workflow that supports clear requirements, consistent formatting, and dependable deliverables, GoTranscript offers options that can match different needs, including professional transcription services. Share your style guide and security requirements upfront, and choose an approach that fits your team’s risk level and review process.