Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingPhysical Security

Confronting human trafficking and forced labor in the global supply chain

By Fred Waelter
human-trafficking-freepik1170x658v792.jpg

Image by macrovector via Freepik

July 22, 2022

Much has been made of COVID-19’s impact on global supply chain performance and awareness over the past two years. Over time, this disruption has led organizations to constantly evaluate their supply chain performance in search of greater optimization. 


Unfortunately, increased supply chain attention has not yet led to more scrutiny around one of the most disheartening effects of globalization: human trafficking and forced labor. Common examples of trafficking can include trafficking for forced labor, trafficking for forced criminal activities, trafficking of women and children for sexual exploitation, trafficking for the removal of organs, and people smuggling. Forced labor takes many forms, but includes labor that is forced due to indebtedness, which is very common in supply chain branches that rely on migrant labor.


It may seem like these practices could never occur on a well-meaning company’s watch. But that is simply not the reality. As sourcing has gone global and efficiency has become a top priority, companies all over the world have — knowingly or unknowingly — had this practice occurring in their supply chains.


While human trafficking and forced labor often take place in emerging or frontier markets — where due to price point, sourcing of products is most prevalent — the trafficking of persons and forced labor can also happen in “consuming” or developed markets. If business leaders want to prioritize sustainability in their supply chains, they would be wise to consider the following strategies to prevent both of these issues.


Take a Stance

Before taking any action on human trafficking or forced labor, organizations must first look inward. As a company, do you want to be a leader? Or would you settle for just not being in the headlines? Once company leaders set a direction, sustainability specialists can help with benchmarking against competitors and other relevant companies, as well as local legal requirements in the geographies in which the organization is present. This background research helps develop the essential materials of this stage: codes of conduct for employees and suppliers.


Every company should have a written stance on human trafficking and forced labor, complete with explicit terms of which practices they will and won’t tolerate from workers and business partners. This can be a succinct reference document, but it must set expectations properly for suppliers, consultants and more. Implementation guidance for the code of conduct is also key, to spell out clearly what the aspects of the code mean and how good practice looks in real-life settings.


The importance of the language in these materials cannot be overstated, given the reputational damage of not following through on public commitments. Consider hiring an expert to ensure that your code of conduct is well-vetted, appropriately specific, and properly translated into the languages of all relevant workers and suppliers.


Raise Awareness Through Training

Setting company guidelines around labor abuse is key, but no amount of regulation can help unless the expectations are followed at every level. As such, businesses should develop level-appropriate training that covers what various employees should watch for and guidelines for how to report it. Key audiences for training around human trafficking and forced labor include:


  • Suppliers + Business Partners: However your company organizes its logistics, human trafficking and forced labor training should be present at every link of the supply chain. That often means developing tips for factory managers and floor workers of suppliers, alerting them to the signs of human trafficking and forced labor. This category of training should also include any partnered recruitment or temp agencies, at which issues with indebted labor are frequently present.
  • Company Employees: In a perfect world, every employee can act as another set of eyes and ears, keeping watch for suspicious behavior. When everyone keeps watch, it can supplement the auditing required to monitor that required practices are being followed throughout the business. Typically, this kind of training explains how human trafficking most often presents in the workplace and how forced labor can manifest itself, including forced and excessive overtime, and fees paid to labor agencies. 
  • Specialized Workers: While most employees can get by with basic training, certain positions require advanced knowledge of warning signs. This typically includes procurement and supply chain professionals who have a direct influence on the suppliers and partners with which your company works. These workers should be highly aware of indicators that mean that human trafficking or forced labor is more likely, such as a heavy reliance on migrant labor or opacity regarding a company’s service or manufacturing capacity — which could mean that a contractor has promised more manufacturing capacity than it could reasonably output.


Get to Know Your Supply Chain

It may feel like the job is done once key stakeholders are informed of company expectations, but this is not the case. To follow best practices around human trafficking and forced labor prevention, companies should pursue more advanced tactics, such as supply chain mapping, desktop and onsite due diligence, and corrective action.


In the past, companies would loosely track supply chain activity with a list of primary suppliers. Today, leading experts know better: Proper supply chain mapping requires an understanding of not just the origin of products but the origin of labor too. It’s not enough to merely know the intermediary that ships you something — you should know from which factory it came, which subcontractor worked on the product, and which agency recruited labor to support manufacturing activities. 


Due diligence should take place in two forms: desktop and onsite. It is typically best to partner with human trafficking and forced labor experts who can conduct online research into all the companies listed in the supply chain mapping. This may seem a simple task, but it’s far more complex when considering that most companies will need expertise in numerous languages and familiarity with local recruiting websites in every country. 


Once a business identifies potential risks in its supply chain, it must follow through with corrective action to prevent future non-compliance. This process often starts with enforcing regular vetting of all third-party agencies, contractors and suppliers — even those with existing long-term relationships. Businesses can also build more reasonable timelines in their contracts to ensure that partners don’t feel pressured to seek illicit solutions to production capacity challenges.


While it takes many resources to sufficiently address labor abuse, organizations must press on. Not only can their efforts help to mitigate the abuse of those working everywhere, but they can also bring business benefits. At a time when every company is hoping to showcase their efforts in sustainability, addressing human trafficking and forced labor on a meaningful scale should be a strongly-emphasized component of these efforts and will allow a company to be a true leader in sustainability. 


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: business continuity human trafficking risk management security operations supply chain

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Fred Waelter is Principal Consultant for Sustainable Supply Chains at BSI Consulting.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0921-Talk-Feat-slide1_900px

    The risk of human trafficking to the enterprise supply chain

    See More
  • human trafficking 2020 report numbers

    Federal Human Trafficking Report show active human trafficking cases broken down by state

    See More
  • Cargo Theft, Terrorism Top Global Supply Chain Risks in 2016

    See More

Related Products

See More Products
  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing