Independent Counterparty Risk Intelligence

Veridict
Intelligence

Engaged where automated ESG ratings, screening tools or adverse media signals create material consequences without sufficient contextual clarity.

Veridict provides governance-level determination of counterparty exposure — grounded in documented evidence and structured analytical methodology — delivered with the independence and discretion that consequential decisions require.

01

The challenge

Contextual analysis beyond automated screening

Focused on counterparty, supplier, investment and strategic partner exposure.

Automated systems generate signals. They do not determine context.

Veridict provides independent clarification of counterparty exposure in situations where reputational, regulatory or investment consequences are material. Risk determination is undertaken through structured analytical models across financial crime, ESG sustainability, governance integrity and reputational exposure domains.

Outputs are calibrated to verifiable evidence and subjected to independent analytical review before any governance conclusion is reached.

Forensically structured review

Where required, mandates extend beyond documentary assessment. This may include structured verification of counterparty-provided information, targeted interviews and documented right-of-response procedures.

Counterparties may be involved in a controlled and, where appropriate, anonymised manner — ensuring the assessment remains balanced, evidentially robust and defensible under scrutiny.

All work is conducted using lawful, proportionate and documented analytical methods.

"Structured judgement where automated signals are insufficient."

When clients engage

Veridict Intelligence is typically instructed where standard ESG ratings, compliance screening or automated scoring tools do not provide sufficient context for defensible decision-making. Engagements commonly arise where:

  • A key supplier is classified "High ESG Risk" and termination is under consideration
  • A financial institution signals de-risking based on adverse media or NGO reporting
  • A board and compliance function hold differing views on continuation of a relationship
  • ESG allegations are invoked in a contractual or commercial dispute
  • A private equity or investment committee requires an independent assessment of reputational exposure
  • Complex ownership structures or source-of-funds explanations require structured verification
  • An external whistleblowing report implicates a commercial counterparty
  • A regulator-facing disclosure requires documented governance assessment
  • A company seeks to contextualise or challenge a negative ESG classification

In such situations, Veridict provides independent governance-level risk determination grounded in documented evidence and structured analytical methodology.

02

What we do

Services

Independent forensic-style analysis for situations where standard tools are insufficient.

01 · Primary service

Counterparty Risk
Intelligence Reports

Governance-grade analytical reports relating to suppliers, commercial counterparties, investment targets and strategic partners.

  • Financial crime and sanctions exposure
  • ESG and sustainability-related risk
  • Governance and integrity concerns
  • Reputational and regulatory escalation dynamics

Prepared for boards, investment committees, legal counsel and senior risk functions.

02 · Contextualisation

Independent Second-Level
Assessment

Structured review where automated ratings or due diligence outputs create material commercial or contractual consequences.

  • Evidentiary validation and source reliability
  • Contextual interpretation of risk signals
  • Documented proportionality analysis
  • Historical versus ongoing exposure distinction
  • Whether escalation or regulatory scrutiny is plausible

03 · Special situations

Special Situations
Memoranda

Independent analytical memoranda in dispute, termination or regulatory contexts.

  • Substantiation versus allegation
  • Mitigating and contradictory evidence
  • Historical versus ongoing exposure
  • Pattern and systemic risk indicators
  • Proportionality of proposed action

Structured for internal governance use and external defensibility. Handled on a strictly confidential basis.

04 · Selective basis

External Integrity
Oversight

On a limited basis, independent receipt and structured assessment of external disclosures concerning commercial counterparties.

  • Secure receipt of confidential disclosures
  • Structured intake and documentation
  • Preliminary credibility and materiality assessment
  • Determination of appropriate escalation pathways
  • Structured reporting to governance bodies or external counsel

Complementary to — not a substitute for — internal compliance structures.

03

How we work

Methodology

Technology supports judgement. It does not replace it.

The analytical process combines advanced data analytics and technology-assisted information structuring with manual forensic validation.

Technology is used to systematically review relevant public information, identify emerging cross-domain risk signals, structure and organise unstructured information, and support multi-source corroboration.

No conclusions are generated automatically. The objective is not classification. It is defensible determination.

All material findings are subject to independent analytical review. Outputs are calibrated to verifiable evidence before any governance conclusion is reached.

I

Source reliability assessment

Structured corroboration. Primary sources verified. Contradictory information actively sought and assessed before any finding is relied upon.

II

Multi-source corroboration

No material finding rests on a single source. Cross-domain signals are assessed for convergence, contradiction and evidential weight before conclusions are drawn.

III

Proportionality & materiality

Distinguishing allegation from confirmed misconduct. Historical issues from current systemic exposure. Risk context from risk signal. Documented professional judgement throughout.

"Findings assessed through a structured determination framework designed to distinguish between allegation, investigation and confirmed misconduct."

Not screening.  Not automated rating.  Structured analytical judgement.

04

What we offer

Judgement. Credibility.
Defensibility. Discretion.

Judgement
Analysis that goes beyond what a screening tool or automated rating can produce. Structured interpretation of what available evidence actually means in the context of the decision at hand — distinguishing material risk from noise, and allegation from established fact.
Credibility
Work that withstands scrutiny from boards, legal counsel, regulators and auditors. Methodology documented. Sources identified and assessed. Conclusions proportionate to the evidence — and capable of being explained and defended.
Defensibility
Outputs designed to support proportionate internal decisions. A structured and documented basis for governance processes, regulatory responses and board-level deliberations — built to hold up under challenge, not just to inform in the moment.
Discretion
Assignments are handled personally and on a limited basis. Engagements are treated with the same confidentiality standards applied in privileged legal and regulatory contexts — and the existence of an instruction is never disclosed.
05

About

Background

Frank Staelens
Founder

Assignments are undertaken personally and on a mandate-limited basis.

Veridict Intelligence is led by Frank Staelens, with more than three decades of experience in regulated and governance-critical environments across European jurisdictions.

His work has centred on situations requiring independent judgement, forensic discipline and regulatory defensibility — particularly where commercial, reputational or supervisory consequences are material.

Prior engagements have included governance framework design, forensic investigations and senior advisory roles in complex regulatory and reputational matters.

06

Get in touch

Enquiries

Confidential enquiries are welcome where independent counterparty risk intelligence may be of value.

Initial discussions are exploratory and without obligation. Where an engagement is not suitable, that assessment will be communicated at the outset.

enquiries@veridictintelligence.com

Enquiries are handled in strict confidence. Where appropriate, Veridict Intelligence may apply digital signatures to outgoing communications and may enable encrypted email exchange upon request.

Veridict Intelligence

Risk Assessment
Architecture™

Independent governance-level risk assessment across Financial Crime, ESG and Integrity domains.

Designed for boards, compliance functions and legal counsel requiring structured determination where automated ratings or screening outputs provide insufficient context.

FCRM™

Financial Crime &
Integrity Risk

Independent assessment of sanctions exposure, ownership opacity, enforcement history and systemic financial crime indicators.

Σ (Severity × Procedure × Reliability × Jurisdiction × Convergence)

ESRM™

ESG Sustainability
Risk

Assessment of ESG exposure based on documented signals, jurisdictional context, procedural stage and convergence dynamics.

Σ (Severity × Procedure × Reliability × Sector × Convergence)

EWRM™

External Whistleblowing
Risk

Independent plausibility and evidentiary assessment of integrity allegations affecting commercial relationships.

Σ (Plausibility × Evidentiary Strength × Source Reliability × Escalation Risk)

Framework Architecture

Three Independent Models.
One Governance Lens.

FCRM™

Financial Crime
& Integrity

Eleven analytical domains covering the full spectrum of financial crime, sanctions and integrity risk across structured multi-source documentary analysis.

ESRM™

ESG Sustainability
Risk

Eight ESG risk domains evaluated against documented evidence and procedural stage, with cross-domain convergence assessment and governance classification.

EWRM™

External Whistleblowing Risk

Eight risk domains considered to support an independent, structured assessment of external disclosures concerning commercial counterparties — evaluating plausibility, evidentiary weight and governance escalation implications.

Analytical Method

Structured Multi-Factor
Assessment

01SeverityMagnitude of identified risk indicator if substantiated
02Procedural StageAllegation through to final regulatory or judicial determination
03Source ReliabilityOfficial record to unverified open-source, calibrated by type
04Corroboration QualityIndependent verification and contradictory evidence assessment
05Jurisdiction ExposureFATF, EU and Basel AML Index risk classification — highest prevails
06Sector SensitivityInherent financial crime risk of the entity's sector classification
07Convergence InteractionMulti-domain structural amplification where factual nexus exists
08Confidence LevelData sufficiency and jurisdictional transparency assessment

Model calibration parameters are not disclosed and are subject to periodic internal governance review.

Model Structure

Domain Architecture

FCRM™

Financial Crime & Integrity

Identity & Ownership Risk
Corporate Status & Integrity
Sanctions & Regulatory Exposure
Financial Crime Indicators
Geopolitical & Jurisdictional Risk
Litigation & Legal Conduct
Adverse Media & Open Source
Digital & Cyber Exposure
Sector-Specific Sensitivity
Management & Personnel Integrity
Procurement & Commercial Conduct

ESRM™

ESG Sustainability Risk

Environmental Risk
Human Rights & Labour
Corruption & Integrity
Litigation & Adverse Media
Sanctions & Geopolitical Exposure
Governance & Controls
Cross-Domain Convergence
Composite Governance Classification

EWRM™

External Whistleblowing Risk

Source Credibility
Substantiation & Evidentiary Strength
Severity of Potential Exposure
External Escalation & Contagion Risk
Allegation Context & Strategic Risk
Governance Response Quality
Whistleblower Information Treatment
Case Classification & Recommendation

Risk escalates not by volume,
but by interaction.

Structural Convergence

Risk escalates when independent signals converge or when exposure becomes material across multiple domains.

Governance Classification

Five-Tier Governance
Escalation Scale

LowStandard monitoring. No immediate governance action required. Review trigger documented.
ModerateEnhanced review. Findings documented. Trajectory monitored for escalation indicators.
HighGovernance escalation. Senior oversight and formal risk acceptance or mitigation required.
SevereRelationship reassessment. Board or committee-level review. Structured disengagement consideration.
CriticalImmediate senior-level intervention. Structured disengagement or regulatory notification assessment.

Certain domain-level thresholds may independently trigger governance review irrespective of composite classification.
Enhanced scrutiny applies where ownership opacity materially affects sanctions or financial crime assessment confidence.

Output Format

Governance Assessment
Memorandum

Structured outputs designed to withstand scrutiny from boards, compliance functions, auditors, regulators and legal counsel.

Governance Assessment · Financial Crime & Integrity Risk

Governance-Level Classification

High

Financial Crime & Integrity Risk Model · FCRM™


Contributing Domains

Identity & Ownership RiskElevated
Financial Crime IndicatorsModerate
Sanctions & Regulatory ExposureLimited

Convergence AssessmentStructural Convergence · Tier II
Confidence LevelModerate

Governance Recommendation

Escalation to senior governance review. Ownership verification required prior to relationship continuation.

Legal

Privacy Policy

Veridict Intelligence  ·  Last updated: February 2026

Section 1

Introduction

Veridict Intelligence provides independent counterparty risk assessment, ESG risk analysis, financial crime risk assessment and external integrity oversight services.

We are committed to protecting personal data in accordance with:

  • Regulation (EU) 2016/679 (General Data Protection Regulation — "GDPR")
  • Applicable Belgian data protection legislation
  • Other applicable data protection and professional confidentiality standards

This Privacy Policy explains how we collect, use and protect personal data in the context of our activities.

Section 2

Data Controller

Veridict Intelligence acts as data controller for personal data processed in connection with website visitors, business contacts, clients and prospective clients, and external stakeholders submitting reports via designated reporting channels.

Contact details:
Veridict Intelligence  ·  Brussels, Belgium
enquiries@veridictintelligence.com

Section 3

Categories of Personal Data

3.1 Business Contact Data

  • Name, professional title, company affiliation
  • Email address and telephone number

3.2 Counterparty & Governance Assessment Data

  • Names of directors, shareholders, beneficial owners
  • Professional roles and mandates
  • Publicly available regulatory, judicial or enforcement information
  • Public adverse media references and corporate registry data

3.3 External Integrity Oversight

  • Identity of reporting individuals (where disclosed)
  • Identity of individuals named in allegations
  • Supporting documentation and communications during structured review

3.4 Technical Website Data

  • IP address, browser type, access timestamps
  • Cookies (if applicable — see separate cookie notice if implemented)

Section 4

Legal Basis for Processing

4.1 Legitimate Interests (Article 6(1)(f) GDPR)

For risk assessments, governance-level integrity reviews, counterparty due diligence and protection against fraud and misconduct. Our legitimate interests consist of providing structured, independent determination services to clients operating in regulated and high-risk environments.

4.2 Contractual Necessity (Article 6(1)(b) GDPR)

Where processing is necessary to perform a service agreement with a client.

4.3 Legal Obligations (Article 6(1)(c) GDPR)

Where required under applicable regulatory or professional obligations.

4.4 Consent (Article 6(1)(a) GDPR)

Where required — for example, certain reporting channel configurations.

Section 5

Special Categories of Data

In limited cases — for example, integrity allegations — processing may involve data relating to criminal allegations or regulatory investigations. Such data is processed strictly where it is manifestly made public, necessary for the establishment, exercise or defence of legal claims (Article 9(2)(f) GDPR), or necessary for substantial public interest under applicable law.

We do not conduct intrusive surveillance or covert data collection.

Section 6

Sources of Data

  • Public corporate registries and official regulatory publications
  • Judicial decisions and enforcement records
  • Reputable media sources and publicly accessible databases
  • Information provided by clients or submitted via external reporting channels

Veridict Intelligence does not access restricted databases without lawful access rights.

Section 7

Purpose of Processing

  • Governance classification and financial crime and integrity risk assessment
  • ESG risk contextual analysis and structured external integrity oversight assessment
  • Preparation of governance memoranda and supporting defensible escalation decisions

Our assessments reflect structured analytical judgement and do not constitute judicial determinations.

Section 8

Data Sharing

Personal data may be shared with the instructing client, with legal counsel acting for the client, and with competent authorities where legally required. We do not sell personal data. We do not engage in automated decision-making within the meaning of Article 22 GDPR.

Section 9

International Transfers

Where services involve cross-border elements, data may be processed within the European Economic Area (EEA). If transfers outside the EEA occur, appropriate safeguards will be implemented in accordance with GDPR — for example, Standard Contractual Clauses.

Section 10

Data Retention

Data is retained for the duration necessary to complete the engagement, and for a defensible period thereafter for legal and audit purposes. In external integrity oversight contexts, retention follows applicable regulatory frameworks. Data minimisation principles apply at all times.

Section 11

Data Security

We implement appropriate technical and organisational measures including restricted access controls, encrypted data storage where appropriate, secure communication channels and structured case documentation protocols.

Section 12

Communication Infrastructure & Secure Email

Veridict Intelligence uses mailbox.org as its professional email service provider. Mailbox.org is a German-based provider whose infrastructure is hosted in Germany and subject to strict German and European Union data protection laws. Email communications may therefore be processed on infrastructure operated by mailbox.org in Germany, in accordance with applicable GDPR requirements.

Mailbox.org supports secure communication standards including:

  • S/MIME digital signatures
  • OpenPGP encryption
  • Optional end-to-end encryption functionality

Where appropriate, Veridict Intelligence may apply digital signatures to outgoing communications and may enable encrypted email exchange upon request.

While reasonable technical and organisational security measures are implemented, email communication inherently involves residual transmission risk. Clients requiring enhanced confidentiality may request encrypted communication or alternative secure channels.

Further information regarding mailbox.org's security architecture and data protection standards is available in the provider's published materials at mailbox.org.

Section 13

Rights of Data Subjects

Under GDPR, individuals may have the right to access their personal data, rectify inaccurate data, request erasure (subject to legal limitations), restrict processing, object to processing based on legitimate interest, and lodge a complaint with the Belgian Data Protection Authority.

Requests may be submitted to: enquiries@veridictintelligence.com

Certain rights may be limited where processing is necessary for legal claims, confidential governance assessments, or protection of whistleblower identity.

Section 14

Confidentiality & Professional Discretion

Veridict Intelligence operates under strict confidentiality principles. Structured determination outputs are prepared for governance purposes and are not intended for public disclosure or use outside the scope of the instructing engagement.

The existence of an engagement, the identity of instructing parties and the content of assessments are treated as strictly confidential. This obligation continues after the conclusion of an engagement and is not subject to a time limit.

Section 15

Updates to this Policy

This Privacy Policy may be updated periodically to reflect changes in applicable law, our services or our data processing practices. The current version will always be available on this website. Material changes will be communicated to active clients where appropriate.