Disconnected Data Is More Expensive Than Missing Data
Most inventory variance isn't caused by lack of data — it's caused by disconnected data. Cannabis compliance is the case study. The lesson applies everywhere.

A capabilities deck tells you what a vendor wants you to know. The right questions reveal what you need to know. A framework for vendor evaluation that goes past the demo.
Every vendor evaluation starts with a demo. The demo is optimized to show the product's best capabilities on the inputs most likely to produce impressive outputs. It is not a representative sample of what the system does with your data, your edge cases, and your operational requirements.
The evaluation work happens after the demo — in the questions you ask, the references you check, and the contractual terms you read before signing.
A well-structured vendor evaluation covers four domains that the sales process rarely addresses completely:
Data handling and residency. Where does your data go when you use this product? Is it stored? For how long? In which jurisdiction? Is it used for model training or product improvement? What happens to your data if you cancel? Who at the vendor organization has access to your data? For any vendor handling sensitive or regulated data, these questions have compliance implications that the sales rep may not be equipped to answer — which means the answers need to come from the vendor's legal or security team in writing, not verbally during a demo call.
The security evaluation framework overlaps significantly here: data residency, access controls, incident notification timelines, and SOC 2 status are the same questions whether you're evaluating a SaaS tool or a security product.
Support model and escalation path. What does the support SLA actually guarantee — acknowledgment time, resolution time, or neither? Is support included or a separate purchase tier? What's the escalation path for a production incident at 2 AM? For vendors on critical workflow paths, support model is an operational dependency that belongs in the vendor evaluation, not the implementation phase.
Pricing structure and true cost. Base pricing rarely represents the cost of production deployment. Evaluate: what happens to pricing when you exceed the demo tier's limits? What add-ons are required for the features shown in the demo but not in the base plan? What does the contract look like at renewal — are rates guaranteed or subject to change? What are the exit costs: data export complexity, migration effort, notice period requirements?
Contractual terms. Specifically: the data processing agreement (required for any vendor handling personal data in jurisdictions with privacy law), the acceptable use policy, indemnification terms, limitation of liability, and termination conditions. The standard contract favors the vendor. The places where your interests diverge are visible in the data processing terms and the liability cap — both of which are often negotiable for enterprise contracts.
Resistance to security questionnaire. Enterprise vendors are accustomed to security questionnaires. A vendor who resists completing one, provides incomplete answers, or routes the question back to the sales rep instead of a security contact is telling you something about how they approach security review. It should not be a friction point.
Vague data deletion policy. "We delete your data when you cancel" needs specifics: what timeline, which data, by what mechanism, with what confirmation? Vague answers in writing (not just verbal reassurance) are a compliance risk for any organization subject to data retention or deletion requirements.
No references in your industry. Vendors who can't provide references from companies similar to yours in size, industry, or compliance posture haven't validated their product in your context. That's a risk that belongs in the evaluation, not discovered post-implementation.
Pricing tied entirely to usage volume with no cap. Usage-based pricing without a cap is a budget risk for any workload with variable demand. Understand the full price curve before committing — what the cost looks like at 2x your expected usage, 5x, 10x.
This framework pairs with vendor consolidation strategy: before adding a new vendor, evaluate whether an existing vendor in your stack can meet the need at acceptable quality — the consolidation benefit compounds over time as the vendor count decreases.
Proportional to the risk. A low-cost tool on a non-critical workflow can be evaluated in a few hours. A vendor with access to sensitive customer data on a critical workflow should have a full evaluation cycle: demo, security questionnaire, reference calls, contract review, legal sign-off. Rushing that process trades evaluation cost for implementation risk.
At minimum: the business owner of the workflow, someone who can read and evaluate technical security posture, and someone who can review contractual terms. For vendors handling regulated data: legal review of the data processing agreement before signature. The evaluation is not just a procurement decision — it's a risk decision.
SOC 2 Type II is the baseline for B2B SaaS vendors with access to business or customer data. ISO 27001 for international operations. HIPAA BAA for healthcare data. PCI DSS for payment data. Vendors who don't meet the applicable baseline for your data classification shouldn't handle that data — no exception for "they're working on it."
Most inventory variance isn't caused by lack of data — it's caused by disconnected data. Cannabis compliance is the case study. The lesson applies everywhere.
Forty percent of public company boards now prioritize data governance. Growing businesses can't keep theirs in a spreadsheet someone built three years ago.
The cost of managing multiple technology vendors doesn't show up on any invoice. It shows up in your time, your team's attention, and the problems that fall through the gaps between vendor contracts.
Work With Us
Kief Studio builds, protects, automates, and supports full-stack systems for businesses up to $50M ARR.
Newsletter
Strategy, psychology, AI adoption, and the patterns that actually compound. No spam, easy to leave.
Subscribe