Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Talk ColumnSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceFire & Life SafetyPhysical Security

Security Talk

The risk of human trafficking to the enterprise supply chain

By Maggie Shein
SEC0921-Talk-Feat-slide1_900px

oldsnowstorm / iStock / Getty Images Plus via Getty Images

SEC0921-talk-slide2_900px
SEC0921-Talk-Feat-slide1_900px
SEC0921-talk-slide2_900px
September 7, 2021

Around the world, there are an estimated 40.3 million victims trapped in modern-day slavery, according to the International Labour Organization. One in four of those victims are children. In addition, victims’ rights groups say that human trafficking across the U.S. (and the world) rose during the COVID-19 pandemic.

The U.S. National Human Trafficking Hotline, which only collects information from its hotline, has seen growth year over year in human trafficking situations, recording a 5% increase in reported cases between 2018 and 2019, for example.

But the numbers are difficult to get a handle on due to the nature of human trafficking; many crimes are never prosecuted, let alone reported. Countries or states reporting zero or low amounts of human trafficking offenses, for example, are merely reflecting data reported by local law enforcement or the justice system.

Aside from a moral obligation to seek out and report possible criminal behaviors such as human trafficking, organizations in any sector may face repercussions related to human trafficking, such as reputational damage, legal damage and supply chain damage, according to Lindsey Roberson, Director of Legal Engagement at the Human Trafficking Institute. The Human Trafficking Institute works all over the world to identify best practices for the prosecution of trafficking crimes, publish human tracking data, and help other countries identify and prosecute trafficking crimes.

“Frontline workers in any industry can certainly be briefed and trained on signs of trafficking,” Roberson says. But security leaders or those leaders within the enterprise that deal with risk and resilience, labor and safety, should also be looking at other areas to mitigate human trafficking and potential effects on the business, she says.

Taking a proactive approach to examining potential risks and liabilities within the supply chain in regards to human rights violations, human trafficking or other abuses, can save a company from financial or legal liabilities, but also help it avoid the look of impropriety that can cause consumers and others to place judgment on the organization and inflict irreversible reputational damage.

Roberson says proactive risk management programs within companies need to look at the entire supply chain and work toward making that supply chain completely transparent. Taking a look at your organization’s supply chain helps mitigate areas of possible complicity or areas that could open the company up to civil litigation based on the accusation of reckless disregard when it comes to human rights violations or forced labor.

Recently, for example, several large clothing manufacturers have been in the news for human rights abuses and forced labor accusations in factories that make some of the companies’ goods. While none have had to admit legal culpability thus far, public judgment could be just as damaging to a company that relies on consumer demand for its bottom line.

“Within the business itself, it’s important to know who is working in your workforce as well as in the organizations you are working with,” Roberson says. In instances of labor trafficking, for example, many times trafficked workers are working alongside people that are not being forced or coerced.

“It’s about awareness and transparency in the supply chain. Organizations can look at everything from recruitment to training, labor and safety and make sure that it is all well-vetted and well-documented, so you don’t expose yourself to liability or allow for the appearance of exploitation,” she says.

Roberson says that security leaders and other organizational leaders can look to experts to help create strategies surrounding transparency. Those organizations that are proactive enough to start the process now can mitigate potential risk or damage in the future. “This is the direction we are going, and companies that get ahead of their curve and are proactive can ultimately save their company from potential ruin. It’s due diligence in a proactive manner,” she says.

KEYWORDS: enterprise security human trafficking risk management supply chain

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Maggie shein

Maggie Shein was Editor in Chief at Security magazine. She has been writing, editing and creating content for the security industry since 2004. She has an experienced background in publishing, communications, content creation and management. Within her role at Security, Maggie handled the overall direction of the brand, organized and executed the annual conference, facilitated Solutions by Sector webinars, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column. She has both an undergraduate degree and master's degree in journalism.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Security’s 2025 Women in Security

Security’s 2025 Women in Security

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Ground Zero 9/11 terrorist attacks 20th anniversary

    The 20th anniversary of September 11: Reflections on the evolution of enterprise security

    See More
  • SEC0821-Talk-Feat-slide1_900px

    The anatomy of a tabletop exercise

    See More
  • boeing

    Boeing values information as the backbone to pandemic response

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • The-Complete-Guide-to-Physi.gif

    The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing